assessment according to the degree of importance of the outsourced function; (6) information security system of a service provider for protecting the information of the intermediary and the clients; 5 Clause 9
banking business, directly and indirectly. In detail: 1. Cyber Security Risk Amid rapid technological change, Thai consumers have readily embraced the new tech trends. Obviously, economic activity
นักงานที่เกี่ยวข้องกับการบันทึก จัดเก็บหลักฐานและติดตาม (logging and monitoring) และการบริหารจัดการเหตุการณ์ที่อาจส่งผลกระทบต่อความมั่นคงปลอดภัยของระบบสารสนเทศ (information security incident management
Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable these by changing your browser settings, but this may
, maintenance of data security systems, and risk management against cyber crime. The approved operator must also conduct Know-Your-Customer (KYC) and Customer-Due-Diligence (CDD) and set up preventive measures
development to support compliance with the personal data protection law of the Office of the National Digital Economy and Society Commission, the Project of Geographic Information Acquisition and Development
supporting the protection of investor personal data, to ease the burden of cost of the investors to repeatedly provide such data when switching their services.Mr. Boonsun Prasitsumrit, Chief Executive
criteria Security Type --- Not Specify --- Common share Warrant-Preferred share Real Estate Investment Trust (REIT) Infrastructure Fund Property Fund Debenture Note Derivative Warrants Securitization
criteria Security Type --- Not Specify --- Common share Warrant-Preferred share Real Estate Investment Trust (REIT) Infrastructure Fund Property Fund Debenture Note Derivative Warrants Securitization
criteria Security Type --- Not Specify --- Common share Warrant-Preferred share Real Estate Investment Trust (REIT) Infrastructure Fund Property Fund Debenture Note Derivative Warrants Securitization