risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
Information Technology of a Securities Company. 2. Segregation of Duties. 3. Physical Security. 4. Information and Network Security. 5. Change Management. 6. Backup and IT Contingency Plan. 7. Computer
business sector’s awareness and readiness to handle cyber threats, with guest speakers, i.e., Pol. Col. Naughtakid Phromchan, Director of the Operations Office, Thailand Computer Emergency Response Team
), imparted the false statement in the financial statements for Q2/2013 of BLISS with intent to mislead other persons that the revenues from computer system testing services, Baht 7.50 million, were the
Supervisory Board. Chapter 3 Business Continuity Management and Security of Information Technology Systems __________________ Clause 19 In this Chapter: “computer system relating to trading services with
Telecom Systems Integration and Telecom Service business of Baht 51.02 million, mainly decreasing due to the sale of notebooks and computer servers; - The revenue obtained from Computer Systems Integration
Systems Integration and Telecom Service business of Baht 68.71 million, mainly increasing due to the sale of notebooks and computer servers; - The revenue obtained from Computer Systems Integration business
revenue comprised:- - The revenue obtained from Telecom Systems Integration and Telecom Service business of Baht 22.27 million, mainly increasing due to the sale of notebooks and computer servers; - The