management that should be applied by each intermediary and for determining a clear detail of practical approaches suitable for size and complexity of business operation of companies. In addition, the
documented information security policy which addresses at least the following matters: (1) policy on the use of cloud computing which covers the methods for selection and evaluation of cloud providers, review
approaches. Additional contributions to social and environmental causes by any other means apart from normal business operation ( after-process CSR) may also be disclosed in a separate section from the in
new money laundering and financing of terrorism techniques. The timeframe for trainings shall be set out as the securities company deems appropriate. Chapter 2 Know-Your-Client / Customer Due Diligence
business undertaking of the Company or the subsidiaries during the previous year, disclose related facts and clarify the causes, impacts, solutions, future inspection and preventive approaches. Additional
shall comply with the following rules: (1) dealing with customer and customer service: (a) having procedures and methods to know the customer and understand the customer’s investment objective restriction
monitoring the implementation of the exercise of voting rights; (4) Disclose the guidelines referred in (1) and the exercise of voting rights referred in (2) to investors by using appropriate methods and in
as securities broker, the securities company shall establish methods and procedures for considering an application for account opening and entering into an agreement with a client in writing . There
together with evidentiary documentation in accordance with the procedures and methods specified in the Licensing Manual for the Public: (1) consisting of at least fifteen securities companies; (2) the group
intent made in writing that he or she does not wish an intermediary to implement methods and procedures complying with the details in this Chapter; (3) investor or client who uses services related to