: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6
) Chapter 2: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6
in Concert and having an intention to use their voting rights and other in the SUTGH’s business to be in the same way in order to control SUTGH’s business (concert parties). In this regard, the
the website of the SEC Office: (a) certifying that such audit firm has a audit quality control system under Clause 11(1) and giving consent for an inspection by a representative of the SEC Office; (b
Control Board (NCB), etc. In the case where no wrongdoing is detected, the SEC Office will not store such data; Data for authentication from the Department of Administrative Affairs which will be stored in
ครอบคลุมการดำเนินการอย่างน้อย ดังนี้ (ก) กำหนดผู้รับผิดชอบต่อความเสี่ยง หรือเจ้าของความเสี่ยง (risk owner) (ข) ระบุการควบคุมที่มีอยู่ในปัจจุบัน (existing control) (ค) วิเคราะห์โอกาสหรือความถี่ที่จะเกิด
Material Agreement amongst Them: Currently, the Investor does not have any relationship with the Company, the management, the person having control, or major shareholder of the Company. Nevertheless, after
: Currently, the Investor does not have any relationship with the Company, the management, the person having control, or major shareholder of the Company. Nevertheless, after the subscription of capital
entity or natural person, as well as the nature of such control. To the extent known to the issuer, indicate whether the issuer is directly or indirectly owned or controlled by another corporation, by any
29 percent of shares of NYKT (“NYKT Shares”) from Artlion Development Limited (“ArtLion”) which is a subsidiary of and under the control of NYK Group. The purchase of NYKT Shares is regarded as a