technology security, integrity and availability; (e) preventing the business operator, directors, executives and employees from seeking benefits wrongfully by virtue of duty performance. 3 (3) notifying the
is using the online service; 2. the management company has an operating system to verify the identity of the investor; (d) security system for customer information and other important information
between the investor and the investor contact person when the investor is using the online service; 2. the management company has an operating system to verify the identity of the investor; (d) security
meeting is held The meeting through electronic media under paragraph three (3) shall be conducted with an information security and shall have audio or video recording, as the case may be, of every attended
to provide the security for lease agreement in the amount of 1 time of leasing fee per year throughout the term of the agreement. 6. The basis used to determine the value of consideration The value of
สารสนเทศ (IT Security) ที่ก าหนดไว้แล้วด้วย 3. ผู้ประกอบธุรกิจต้องจัดให้มีบุคคลใดเป็นผู้ที่รับผิดชอบในการน าเทคโนโลยีมาใช้? 3.1 คณะกรรมการหรือผู้บริหารระดับสูง2 ผู้ที่อนุมัตินโยบายการน าเทคโนโลยีมาใช้ รวม
, and expertise. For example, where the complexity of a security or the structure of a type of security, or the lack of robust data about the assets underlying the security raise serious questions as to
as follows: 1) Services : Operating personnel services, e.g., drivers, head of security guards, housekeepers, technicians, receptionists, etc. 2) Number of personnel : approximately 22 persons 4) Rates
dividend income instead of share of profit from investment in associates after the reclassification of the investments in TTW from investment in associate to investment in available-for-sale security in
bonus due to the unforeseen circumstances that might happen in the future. There was also financial support policy from Social Security Board for COVID-19 by reduced 5% employer’s monthly contribution to