The Securities and Exchange Commission (SEC), the Economic Crime Suppression Division of the Royal Thai Police (ECD) and the Thai Digital Asset Operators Trade Association (TDO) jointly organized a workshop to exchange information on cyber scams as well as identification and examination of crypto nominee accounts for representatives from public and private sectors. On this occasion, Ms. Jomkwan Kongsakul, SEC Deputy Secretary-General, gave welcoming remarks and presided over the opening c...
payments by scanning (e.g., via smartphone applications) at various merchants across Thailand, including both large-sized retailers and small vendors. Importantly, DA are not allowed to be used directly as a
device (an iris-scanning machine) located at various points, and several digital asset business operators are servicing these coins. Mr. Anek Yooyuen, SEC Deputy Secretary-General and Spokesperson
connectivity would enable foreign tourists to use the converted Thai baht to purchase goods or services through electronic channels including QR code scanning. Furthermore, Sandbox participants must comply
On 24 October 2025, the SEC and the CCIB jointly conducted a raid on WLD exchange services at the iris scanning location, identifying an exchange service provider potentially constituted to be
ประกอบธุรกิจต้องจัดให้มี การทดสอบอย่างเข้มงวด เพื่อทราบถึงช่องโหว่ ของระบบ (vulnerability scanning) และ การใช้ประโยชน์จากช่องโหว่ (exploitation test) ทั้งนี้ ผู้ประกอบธุรกิจต้องจัดให้มีมาตรการ ควบคุมเพื่อ
vulnerability scanning เนื่องจากมีความเป็นห่วงว่าหากให้บุคคลภายนอกจัดทำ penetration test กับระบบภายใน อาจทำให้ล่วงรู้ถึง architecture ของบริษัทได้ อีกทั้งการทำ vulnerability scanning สามารถใช้บุคคลภายในได้ ซึ่งจะ
devices and modify up to date. [M] · Inspect the securities of devices prior to connect to network system such as virus scanning, value specifying inspection related to security etc.. and cancel absolutely
system such as virus scanning, value specifying inspection related to security etc.. and cancel absolutely connection of physical disconnect and disable port that unnecessary to connect to network system
, monitoring, examining and remedying any potentially adverse impacts of our business activities upon our customers, employees and counterparties. Those activities related to each stakeholder are detailed below