appropriately protected, the intermediary shall identify organizational IT assets and define proper protection roles and responsibilities. Provisions in the Notification No. Sor Thor. 37/2559 Clause 15 An
person realise the essential of security of the information technology thoroughly had known the duties and responsibilities and guideline on controlling the various risk which have a content covering the
reports have been finalized? If yes, Please describe the policies and procedures. 14 Has the firm established policies and procedures designed to maintain the confidentiality, safe custody, integrity
system for retain documents relating to payment to the fund, trade date, and payment out of the fund to the member that is easy to search and secure from unrelated persons and having control on correction
custodian: (a) System for separating the private fund assets from the custodian’s assets, system for safe keeping of such assets, and internal control system to prevent the misuse of its client’s assets; (b
secure or satisfy the obligations incurred incidental to or resulted from derivatives transaction for the account of a customer, it shall, in compliance with the rules specified in the notification of the
private fund assets; □ (3) Operation system that allows the custodian to operate efficiently shall include at least the following: □ (3.1) System to separate client’s assets from custodian’s assets, safe
been kept in custody of a securities company shall not be protected under the measures of protection of the Financial Institutions Development Fund; (3) provide a contract or an agreement on the custody
according to the guidelines under (1) as well. If the holding company operates business of various types with a central company performing the role of managing subsidiaries or associated companies in each
where the securities company encounters financial problems, the clients’ money under custody of the securities company shall not be protected under the Deposit Protection Agency Act; (3)2 provide a