Showing 3434 Documents for "securities"

Filter by
Sort by

    • PDPC
    • Commission's Decisions

    Last revised date:

    • Page 4 of 7 -------- Adequacy of Security Arrangements 27.
    • It was also unable to explain or provide sufficient information on the security measures implemented on either the Site or database at the material time.
    • In the Commission’s view, the facts demonstrate that, prior to the Data Leak, Fei Fah Medical had made little effort to inquire into and/or ensure the security of personal data stored on the Site.
    • PDPC
    • Commission's Decisions

    Last revised date:

    • at [15] was not a sufficient security arrangement as it only required password based encryption for external emails.
    • A financial penalty of $6,000 was imposed on Institute of Singapore Chartered Accountants for failing to make reasonable security arrangements to prevent the unauthorised disclosure of the personal data of its members. Click here to find out more.
    • email, thumbdrives etc) of personal data, please ensure the files are encrypted. 17 However, none of ISCAs security arrangements at [15] and [16] required password based encryption for the Excel File in the circumstances leading up to the Incident.
    • PDPC
    • Commission's Decisions

    Last revised date:

    • This created uncertainty as to whether Bossini Holdings or the Organisation was responsible for software patching and security testing of the Organisations IT systems in Singapore. 25 It was also accepted that the security lapse and privilege escalation that enabled the attackers to overcome
    • The vulnerability allowed the attackers to extract valid VPN credentials and bypass the Groups perimeter network security measures. 4 -------- 8 The vulnerability exploited by the attackers had been fixed by a patch released by the VPN software developer in September 2019.
    • decisions. 22 It is appreciated that a corporate subsidiary in the circumstances of the Organisation, which is subject to group-level security arrangements managed centrally, may not have the autonomy or power to respond independently to a multinational data breach incident.
    • MAS
    • Forms and Templates

    Last revised date:

    • Any reference to the Act in this form and in the Securities and Futures (Approved Holding Companies) Regulations 2005 is to be construed to include a reference to any subsidiary legislation made under the Securities and Futures Act (Cap. 289). 6.
    • Approved Holding Company - Form 1 Application for Approval as an Approved Holding Company SECURITIES AND FUTURES ACT (CAP. 289) SECURITIES AND FUTURES (APPROVED HOLDING COMPANIES) REGULATIONS 2005 FORM 1 REGULATION 6 APPLICATION FOR APPROVAL AS AN APPROVED HOLDING COMPANY Explanatory
    • Application is hereby made for approval under section 81V(1) of the Securities and Futures Act (Cap. 289) to be an approved holding company. II. 1.
    • MAS
    • Speeches

    Last revised date:

    • Swift, secure, and seamless payments are fundamental to a digital economy. Fourth, data governance . We must ensure the responsible use of data and seamless and secure flow of data. Fifth, applied research .
    • Not all data localisation is bad: there may be some legitimate concerns about national security. But a good part of data localisation that is happening in the world today is due to misguided notions of cyber security or data privacy or, worse still, old-fashioned protectionism.
    • It aims to make cross-border payments and settlements cheaper and faster at no compromise in security or privacy, using blockchain technology.
    • PDPC
    • Commission's Decisions

    Last revised date:

    • Security scans are important in light of the type of personal data likely to be held by MSIG as an insurer.
    • The cyber-security consultancys investigations concluded that the Spam Emails did not contain phishing or malware content.
    • Section 24 of the PDPA requires organisations to make reasonable security arrangements to protect personal data in their possession or under their control by making reasonable security arrangements to prevent unauthorised access, collection, use, disclosure, copying, modification
    • PDPC
    • Commission's Decisions

    Last revised date:

    • Whether the Organisation was in breach of section 24 of the PDPA The security arrangements implemented by the Organisation to prevent unauthorised access to the Personal Data 21 The investigations by this office found that the following security arrangements were implemented by the Organisation
    • BHG (Singapore) was found not in breach for failing to make reasonable security arrangements to prevent the unauthorised disclosure of the personal data of its loyalty card account holders. Click here to find out more.
    • In such circumstances, would the Organisation be required to implement security arrangements in addition to those that were already implemented at the time of the incident?
    • PDPC
    • Public Consultations

    Last revised date:

    • Once the information security breach arrives, much will be at stake.
    • rst thing that really happens is not so much the information security breach itself, but the company’s discovery that a data breach may have occurred.
    • During the early hours of its breach response effort, the enterprise may know only that a security breach incident may have occurred, and not very much more.
    • MAS
    • Annual Reports

    Last revised date:

    • of securities dations, is now focused on the IMF.
    • companies under the Securities Industry Act (Chapter 289).
    • mainly to a 35% drop in securities holdings as merchant banks decreased holdings of regional debt papers as well as other Off-Balance Sheet Activities public securities.
    • MAS
    • Financial Sector Development Fund Annual Report

    Last revised date:

    • The Fund retains substantially all the risks and rewards of these securities and has not derecognised them. In these transactions, the counterparty is typically allowed to sell or re- pledge those securities transferred, but has an obligation to return securities at maturity.
    • In these agreements, the counterparty is typically allowed to sell or re-pledge non-cash collateral (i.e. securities) transferred, but has an obligation to return the securities at maturity.
    • If the securities received decrease in value, the Fund may, in certain circumstances, call for additional collateral. The Fund manages issuer credit risk by imposing minimum credit rating requirements on the investment of its fixed income securities.