when such securities company has resumed its business operation with the approval from the SEC or the Office. (2) Any securities company, which ceases to undertake any particular category of its business
such securities company has resumed its business operation with the approval from the SEC or the Office. (2) Any securities company, which ceases to undertake any particular category of its business or
Commercial Code (including the amendments thereof). In this regard, the shareholders’ meetings of SRT and GCT will consider approval of the amalgamation and proceed to convene a joint shareholders’ meeting
coordinate with government agencies to obtain all relevant licenses i.e. Use of Land, Construction permit, In Principal Approval of Investment, Investment Registration Certificate, Power Purchase Agreement, in
Exchange Commission No. SorChor. 24/2555 regarding approval of asset valuation companies and major appraiser for capital market transactions. 4. Settlement Monthly payment and 3 month deposit must be made in
): .................................................................................................................................................................................... Wish to apply for Company Account from the SEC Office in the following manners: Not an urgent application (normal case) An urgent application (a 30-day expiry from the SEC Office’s approval date
digital services and platforms to both consumers and enterprise. Continue growing core revenue with controlled marketing expenses In 1Q18, AIS reported service revenue of Bt34,565mn, +6.5% YoY and +2.5% QoQ
improved following on-going cost optimization and FY17 guidance maintained. AIS reported 3Q17 EBITDA of Bt17,589mn, +15% YoY and +2.8% QoQ, mainly due to revenue growth and controlled SG&A. YTD, AIS spent
enable assignment of assess rights; (b) the allocation and use of privileged access rights should be restricted and controlled; (c) the allocation of passwords should be controlled through a formal
assess rights; (b) the allocation and use of privileged access rights should be restricted and controlled; (c) the allocation of passwords should be controlled through a formal management process; (d