controls of unauthorized access to information systems and applications, as follows: (a) control access of users and system administrators to information and application system functions in accordance with
. At the same time, M-150 team have been joining the Big Cleaning Mission with the Royal Thai Army, volunteers and Bangkok officials in cleaning and disinfecting various public areas in Bangkok, and
, oversight functions related to the CRA, the employees responsible for interacting with the officials of the rated entity or the obligor (e.g., government regulators) regarding supervisory matters should be
1 August 17, 2018 Subject: Capital Increase for Offering for Sale to Specific Investors (Private Placement), Connected Transaction, Amendments to Articles of Association/Objectives of the Company and Determination of the Date of Extraordinary General Meeting of Shareholders No. 1/2018 To: President The Stock Exchange of Thailand Enclosures: 1. Information Memorandum on the Offering of Newly Issued Ordinary Shares to Specific Investors (Private Placement) at the Offering Price with a Discount of...
1 August 17, 2018 Subject: Capital Increase for Offering for Sale to Specific Investors (Private Placement), Connected Transaction, Amendments to Articles of Association/Objectives of the Company and Determination of the Date of Extraordinary General Meeting of Shareholders No. 1/2018 To: President The Stock Exchange of Thailand Enclosures: 1. Information Memorandum on the Offering of Newly Issued Ordinary Shares to Specific Investors (Private Placement) at the Offering Price with a Discount of...
obligors (e.g., sovereign nations or states) have, or are simultaneously pursuing, oversight functions related to the CRA, the employees responsible for interacting with the officials of the rated entity or
) control access of users and system administrators to information and application system functions in accordance with the defined access rights; (b) control access to information systems and applications by
administrators 45 มีการทดสอบการบุกรุกระบบ (penetration test) กับระบบงาน ที่มีความสำคัญทุกระบบ โดยผู้ประกอบธุรกิจอาจพิจารณา เลือกจัดทำการทดสอบกับบางระบบงานตามการวิเคราะห์ผลกระทบทางธุรกิจ (business impact analysis
system administrators to information and application system functions in accordance with the defined access rights; (b) control access to information systems and applications by a secured log-on procedure
DB_Part1 ”π—°ß“π§≥–°√√¡°“√°”°—∫À≈—°∑√—æ¬å·≈–µ≈“¥À≈—°∑√—æ¬å µÿ≈“§¡ 2547 §Ÿà¡◊Õ°√√¡°“√∫√‘…—∑®¥∑–‡∫’¬π ‡≈à¡ 1 ∫∑∫“∑ Àπâ“∑’Ë ·≈–§«“¡√—∫º‘¥™Õ∫¢Õß ç°√√¡°“√é ·≈– ç§≥–°√√¡°“√é à«π∑’Ë 1 À≈—°°“√∑—Ë«‰ª . . . . . . . . . . . . . . . . . . . . . . . 1. ¡“√Ÿâ®—° ç°√√¡°“√é ¢Õß∫√‘…—∑®¥∑–‡∫’¬π . . . . . . . . . . . 1.1 °√√¡°“√ §◊Õ„§√ ”§—≠Õ¬à“߉√ . . . . . . . . . . . . . . . 1.2 °√√¡°“√ °—∫À≈—°°“√∫√√…—∑¿‘∫“≈∑’Ë¥’ . . . . . . . . . . . 2. ç°√√¡°“√é §«√ªØ‘∫—µ‘Àπâ“∑’ËÕ¬à“߉√ . . . . . . . . . . . . . . . 2.1 Àπâ...