{{company.License_UnderSecuritiesAndExchange.length + company.License_UnderDerivatives.length + company.License_UnderTrust.length + company.License_RegisterType.length + company.License_RegisterType2.length + company.License_UnderDigitalAsset.length
{{company.License_UnderSecuritiesAndExchange.length + company.License_UnderDerivatives.length + company.License_UnderTrust.length + company.License_RegisterType.length + company.License_RegisterType2.length + company.License_UnderDigitalAsset.length
+ company.License_UnderTrust.length + company.License_RegisterType.length + company.License_RegisterType2.length + company.License_UnderDigitalAsset.length + company.License_RegisterType3.length}} รายงานการตรวจสอบ ประวัติการถูกลงโทษ
+ company.License_UnderTrust.length + company.License_RegisterType.length + company.License_RegisterType2.length + company.License_UnderDigitalAsset.length + company.License_RegisterType3.length}} รายงานการตรวจสอบ ประวัติการถูกลงโทษ
{{company.License_UnderSecuritiesAndExchange.length + company.License_UnderDerivatives.length + company.License_UnderTrust.length + company.License_RegisterType.length + company.License_RegisterType2.length + company.License_UnderDigitalAsset.length
charges expenses 0.53 0.14 3. Kabin Patthanakij Co., Ltd. B - Sale of products/ raw materials 19.94 3.01 4. Pitakkij Security Guard Co., Ltd. B - Security fees expenses 7.45 1.38 5. Thai Itokin Co., Ltd. B
system. 11.2 The company should define suitable control measures for infrastructure of technology system. 11.3 The company should define suitable security control for the technology system. Questions Yes
Director at the Digital Government Development Agency (public organization) (DGA). His professional experience includes development of digital standards of government agencies, cyber security and member of
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to