Compliance Week - Search for keywords
Across
- 5. The company must conduct proper .......... on the third party service provider’s competency, system infrastructure and financial viability as relevant prior to engaging its services.
- 6. The company must adhere to the requirements in the Policy Document on Outsourcing for engagements with third party service providers that meet the definition of .......... arrangement as specified in the policy document.
- 8. Appropriate governance requirements must be established to commensurate with the risk and complexity of .......... projects undertaken. This shall include project oversight roles and responsibilities, authority and reporting structures, and risk assessments throughout the project life cycle.
- 9. Diversity in technology may include the use of different technology architecture designs and applications, technology platforms and .......... infrastructure.
- 10. There is a need to diversity in technology to enhance .......... by ensuring critical systems infrastructure are not excessively exposed to similar technology risks
Down
- 1. Comprehensive risk assessment is required to be conducted prior to .......... adoption which considers the inherent architecture of .......... services that leverages on the sharing of resources and services across multiple tenants over the Internet.
- 2. large-scale integration projects or those involving critical systems should be subject to more stringent project .......... requirements.
- 3. Tools must be deployed to support the continuous and proactive monitoring and timely detection of anomalous activities in technology infrastructure. The scope of monitoring must cover all .......... systems including the supporting infrastructure.
- 4. The company must implement robust technology .......... controls in providing digital services.
- 7. .......... insurance means the use of the .......... as a channel to transact .......... business with customers or as a platform for transmission of customers’ information.