SEC Secretary-General Ruenvadee Suwanmongkol said that SEC and the related agencies had discussed the COVID-19 situation and acknowledged limitations on the AGM holding of listed companies. The meeting concluded with primary suggestions as follows: (1) proxy voting: shareholders are advised to consider proxy voting through independent directors instead of in-person voting at the meeting. If the meeting’s notice has not been sent, listed companies are requested to inform s...
represent our collective pathway out of the COVID-19 pandemic. Every day, more and more businesses are looking for straightforward ways to operate more sustainably and make a positive contribution to the SDGs
Case of Possible Impact on the Holding of Juristic Person’s Meeting B.E. 2563 (2020), dated 4 March 2020,
developing criteria Our starting point The approach for developing criteria is defined in the introduction to the Climate Bond Standard.4 To the maximum degree possible, it aims to adopt a positive technology
Thailand (SET) to discuss possible solutions to the AGM holding of listed companies amid the spread of COVID-19, SEC has disseminated the circular and frequently asked questions to inform all listed
Criteria 3, 4 and 5. However, there are a number of other possible infrastructure projects that could be eligible or excluded under the standard. In many cases it is fairly straightforward to assess whether
the financial statements (paragraph number........) ( 2.2 The auditor is unable to obtain sufficient appropriate audit evidence on which to base the opinion, but the auditor concludes that the possible
straightforward. The benefit of having an authoritative standard eases decision-making and focuses attention on credible climate change solution opportunities. The easier it is to use the faster the market will
monitoring and coordinating with the business operators, we have found that they have implemented their BCP to manage possible impacts of COVID-19 and opened an alternative site or installed remote working
the consistency and cybersecurity that is appropriate and sufficient to protect against possible risks from cyber threats. _____________________________