and secured environment in accordance with the manufacturer’s instructions (if any); 2.5 establish security procedures for physical media transfer from the operating areas. 5. Access Control 5.1
environment in accordance with the manufacturer’s instructions (if any); 2.5 establish security procedures for physical media transfer from the operating areas. 5. Access Control 5.1 Business Requirements of
No. OrThor/Nor. 5/2547 Re: Operational Control and Security of the Information Technology of Securities Company For the purpose of rendering the securities companies to efficiently comply with the
: Operational Control and Security of the Information Technology of Securities Company For the purpose of rendering the securities companies to efficiently comply with the Notification of the Office of Securities
The Securities and Exchange Commission (SEC) held a meeting with the Department of Climate Change and Environment (DCCE), the Ministry of Natural Resources and Environment (MNRE), the Thailand
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
is to build a conducive environment to support listed companies in their ESG integration. The social aspect, in particular, includes human rights and gender equality. This is in line with the 20
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2015 1 Security IPO NDR Jan 15 2015 12:00AM 0 0 2025-01-09 2015 2 Infra IPO 3BBIF
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2015 1 Security IPO NDR Jan 15 2015 12:00AM 0 0 2025-01-09 2015 2 Infra IPO 3BBIF
investors and companies managing assets for investors locally and overseas. This in turn will help to create a favorable environment for good corporate governance and encourage responsible business operation