Bangkok, September 25, 2014 - The SEC organized ?3rd SEC Working Papers Forum?, jointly with the Faculty of Business Administration and the Faculty of Management Sciences, Kasetsart University presented three research papers on ?Listed Company Assessment?. Dr. Vorapol Socatiyanurak, SEC Secretary-General said that the third SEC Working Papers Forum, organized under the MoU with four leading business schools aiming to provide a platform for capital market research presentation and implementation....
Transaction, Kinpo and the Company agreed on the following condition precedent for the merged CCPH; a) Chairman or chairperson nominated by Kinpo Group shall have agreed that in case of tied votes in any agenda
restructuring exercise, Indorama Ventures Mexico Assets, S. de R.L. de C.V. (“IVMA”) has merged into Indorama Ventures Polymers Mexico, S. de R.L. de C.V. (“IVPM”). Post-merger, IVPM shall be the surviving entity
Department and the Corporate Monitoring Department have been merged to be in charge of fully-fledged supervision of listed companies, while the Fin Tech Department is the center of digital asset-related
goodwill and for those investments in subsidiaries, (2) to assess the impairment loss for other assets, apart from goodwill in the consolidated financial statements, such as property, plant and equipment
Communications with relevant persons (7) Division 7 Cross-border communication (8) Division 8 Companies shall test and assess the BCP (Training, Exercising and Auditing) (9) Division 9 Examples of emergency
) Division 7 Cross-border communication (8) Division 8 Companies shall test and assess the BCP (Training, Exercising and Auditing) (9) Division 9 Examples of emergency incidents which may cause major
); (5) review procedures and processes in the management of information security incidents, after the testing under (4) is carried out, at least once a year; (6) evaluate the results of the testing under
) establish conditions and controls relating to information security in an agreement signed by both parties; (2) monitor, evaluate, review and audit service delivery of the outsourcee regularly; (3) re-assess
) establish conditions and controls relating to information security in an agreement signed by both parties; (2) monitor, evaluate, review and audit service delivery of the outsourcee regularly; (3) re-assess