Privacy Policy Personal Data Protection Policy for Investment Management The Office of the Securities and Exchange Commission (SEC Office) 0. Scope of this Policy This Personal Data Protection
Privacy Policy Personal Data Protection Policy for Internal Administration (Website) The Office of the Securities and Exchange Commission (SEC Office) 0. Scope of this Policy This Personal Data
- Translation - Tender Offer for Securities (Form 247-4) Of Glow Energy Public Company Limited By Global Power Synergy Public Company Limited (The Tender Offeror) The Siam Commercial Bank Public Company Limited And Phatra Securities Public Company Limited (Tender Offer Preparers) Phatra Securities Public Company Limited (Tender Offer Agent) “This English language translation of the Tender Offer has been prepared solely for the convenience of the foreign shareholders of Glow Energy Public Company...
on scope of audit imposed by the companies’ managements. AIE and AI must submit to the SEC and publicly disclose the rectified and audited 2014 financial statements by May 27, 2015. AIE was also
auditors were unable to express opinions due to limitation on scope of audit imposed by the companies? managements. AIE and AI must submit to the SEC and publicly disclose the rectified and audited 2014
method, as well as to increase the trustworthiness in the identification and authentication process for onboarding customers that could boost the standard of performing e-KYC in the capital market. The
in auditing and reviewing its 2014 and Q1/2015 financial statements where the auditor expressed qualified opinions due to limitation on scope of audit imposed by the company management. EIC must submit
scope of digital asset business currently covers only digital asset exchange, digital asset broker and digital asset dealer. Therefore, the SEC Board views it appropriate to add digital asset advisory
Bangkok, September 1, 2014 ? The SEC notified Vintage Engineering Plc. (VTE) to rectify its Q2/2014 financial statements due to auditor?s qualified opinion arising from scope restriction. VTE is then
controlling [M] · Keeping a written policy of security in the place where the user and the concerned person can simply reach [M] 2. Detail of Policy · Identifying clearly the purpose and scope and having a