Authority. (2) In addition to the audits referred to in sub-rule HV the Authority may conduct audits of the operations and systems of such ... BRDH. Technology details, Network Architecture, Information security policy and processes, software codes, internal reports, audit and assessment reports, applications details, asset details, contractual agreements, present
BRDH. Technology details, Network Architecture, Information security policy and processes, software codes, internal reports, audit and assessment reports, applications details, asset details, contractual agreements, present
registered person to inspect books of account, documents, computers, computer programs, computer software whether installed in a computer or otherwise and such other things ... available at such place, for the purposes of carrying out any audit, scrutiny, verification and checks as may be necessary to safe guard the interest
plan, develop, maintain and review the documents of inventory of hardware and software related to "Protected System"; (f) ensure that Vulnerability/Threat/Risk ... Infrastructure Protection Centre; (h) ensure conduct of internal and external Information Security audits periodically according to Information Security Management System(ISMS) as suggested in clause
Authorised personnel having access to "Protected System". (f) Inventory of Hardware and Software related to "Protected System". (g) Details of Vulnerability/Threat/Risk ... Protected System". (h) Cyber Crisis Management Plan(CCMP). (i) Information Security Audit Reports and post Audit Compliance Reports of "Protected System". (j) IT Security Service
location of the capacitor installations shall be determined using appropriate computer software, with reliable field data. Suitable precautionary measures, such as automatic switching, etc., shall ... Metering. - (1) All interface meters, consumer meters and energy accounting and audit meters shall be installed and operated in conformance with the Central Electricity Authority
Securities and Exchange Board of India (Depositories and Participants) Regulations, 2018
SECURITIES AND EXCHANGE BOARD
registered person to inspect books of account, documents, computers, computer programs, computer software whether installed in a computer or otherwise and such other things ... available at such place, for the purposes of carrying out any audit, scrutiny, verification and checks as may be necessary to safeguard the interest
registered person to inspect books of account, documents, computers, computer programs, computer software whether installed in a computer or otherwise and such other things ... available at such place, for the purposes of carrying out any audit, scrutiny, verification and checks as may be necessary to safeguard the interest
registered person to inspect books of account, documents, computers, computer programs, computer software whether installed in a computer or otherwise and such other things ... available at such place, for the purposes of carrying out any audit, scrutiny, verification and checks as may be necessary to safeguard the interest