giving an importance to information technology security, integrity and availability; (e) preventing the securities trading center, directors, executives and employees from seeking benefits wrongfully by
technology risk and cyber risk by giving an importance to information technology security, integrity and availability; (e) preventing the securities trading center, directors, executives and employees from
importance to information technology security, integrity and availability; (e) preventing the business operator, directors, executives and employees from seeking benefits wrongfully by virtue of duty
technology security, integrity and availability; (e) preventing the business operator, directors, executives and employees from seeking benefits wrongfully by virtue of duty performance. 3 (3) notifying the
is using the online service; 2. the management company has an operating system to verify the identity of the investor; (d) security system for customer information and other important information
between the investor and the investor contact person when the investor is using the online service; 2. the management company has an operating system to verify the identity of the investor; (d) security
to provide the security for lease agreement in the amount of 1 time of leasing fee per year throughout the term of the agreement. 6. The basis used to determine the value of consideration The value of
payment, social security 40 (3) payment, E-Wallet top up, bein sport cash card and others services. The Company plans to launch a selling sim card service on the kiosks in the end of year and continue to
สารสนเทศ (IT Security) ที่ก าหนดไว้แล้วด้วย 3. ผู้ประกอบธุรกิจต้องจัดให้มีบุคคลใดเป็นผู้ที่รับผิดชอบในการน าเทคโนโลยีมาใช้? 3.1 คณะกรรมการหรือผู้บริหารระดับสูง2 ผู้ที่อนุมัตินโยบายการน าเทคโนโลยีมาใช้ รวม
, and expertise. For example, where the complexity of a security or the structure of a type of security, or the lack of robust data about the assets underlying the security raise serious questions as to