year at least the policy and indicated the concerned risks, arrangement the importance of information and computer system, specify the acceptable level of risk and specify measure or practice for risk
aware of the necessity and the importance of compliance inspection including the understanding of the policy and the guideline; (2) Authorises the head of operational and business unit to monitor and
effect from the behavior of prohibited characteristics such as impact to money market or capital market, the public in general or a specific group of people, etc.; (b) the significance of the behavior of
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
. (c) Addressing significant matters arising during the engagement, considering their significance and modifying the planned approach appropriately. (d) Identifying matters for consultation or
force as from 1 January 2015; (2) the second paragraph of Clause 34 relating to fundamental recommendation regarding the importance of basic asset allocation shall come into force as from 1 April 2016
giving an importance to information technology security, integrity and availability; (e) preventing the securities trading center, directors, executives and employees from seeking benefits wrongfully by
importance to information technology security, integrity and availability; (e) preventing the business operator, directors, executives and employees from seeking benefits wrongfully by virtue of duty
mutual fund management’s performance shall come into force as from 1 January 2015; (2) the second paragraph of Clause 34 relating to fundamental recommendation regarding the importance of basic asset
) appropriate guideline for risk assessment according to the degree of importance of the outsourced function; (6) information security system of a service provider for protecting the information of the