& Verify(A) SignFile & Verify(B) Authorization details (EF-3) : companyName systemName reportName effectiveDate
manager that she had obtained such authorization and decided to trade by the instruction of clients? appointee or by her own deliberation. For a long period of time, she continually made trading decisions
Company Registration Number Officer Name Officer Email Current Datetime Client Datetime SecSign File Version SignMessage & Verify SignFile & Verify(A) SignFile & Verify(B) Authorization details (EF-3
effective cybersecurity plans. SEC Secretary-General Rapee Sucharitakul said: ?Cyber threats are evolving very fast and becoming more complicated. Preventive measures alone may not be enough. It is therefore
securities trading account without any written authorization from the account owner. He admitted that both clients were siblings and the account owner asked her brother to submit trading orders without prior
contact and assigned to work for the company. Such trader later sent several trading orders in the client's account without authorization or contrary to the client's orders, causing damage to the client
ensure business continuity and prevent damage caused by deficient information security ?Currently, operating business of listed companies no longer deals with economic prosperity alone. Rather, managing
KITHA shares is classified as acquisition of significant asset and related party transaction, the shareholders? resolution alone was unable to satisfy the requirements under regulations under the
KITHA shares is classified as acquisition of significant asset and related party transaction, the shareholders? resolution alone was unable to satisfy the requirements under regulations under the
consultants were more knowledgeable or had better information than them. A number of clients were affected from trading and suffered losses. In many cases, the authorization led to trading more than the clients