. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
Information Technology of a Securities Company. 2. Segregation of Duties. 3. Physical Security. 4. Information and Network Security. 5. Change Management. 6. Backup and IT Contingency Plan. 7. Computer
ภายใน (Internal) Questionnaire_B B Communication within https://www.sec.or.th/TH/Documents/Auditor/QAQR-07.xlsx OFFER_DEBENT_EN.xlsx Electrical Products and Computer 08 Energy and Utilities 23,323.60 7 09
Bangkok, June 2, 2014 ? The SEC notified Professional Waste Technology (1999) Plc. (PRO) to rectify its Q1-3/2012 financial statements due to limitation on scope of review imposed by PRO management
Bangkok, May 27, 2014 ? The SEC notified Shun Thai Rubber Gloves Industry Plc. (STHAI) to rectify its 2012 financial statements due to limitation on scope of audit imposed by the company management
Bangkok, June 6, 2014 ? The SEC notified Vintage Engineering Plc. (VTE) to rectify its 2013 and Q1/2014 financial statements due to limitation on auditors? audit/review scope, respectively. VTE is
qualified opinions due to limitation on scope of audit imposed by the company management. EIC must submit to the SEC and publicly disclose the rectified and audited/reviewed financial statements urgently. The
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
in auditing and reviewing its 2014 and Q1/2015 financial statements where the auditor expressed qualified opinions due to limitation on scope of audit imposed by the company management. EIC must submit