to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
, such as, the forms of services, the presumption of algorithm, any relevant risks, including the factors or events that would hinder the use of technology, and such information must be sufficient enough
, the hypothesis of an algorithm, any relevant risks, including the factors or events that would hinder the use of technology. This is to provide investors with sufficient information to decide to use
hinder the impact affecting the investors, the capital market, and the country’s economy. This public hearing is the result from the reasons thereof, which proposes the revision of the report forms of
legal requirement on minimum face value of debentures may be too high and hinder retail investors to access debt markets, or the prohibition of set-off can cause unnecessary procedures and fees to issuer
ภาคผนวก 3 : การรักษาความมั่นคงปลอดภัยด้านเทคโนโลยีสารสนเทศ (Information Technology Security) (แนบท้ายประกาศที่ สธ. 38/2565)
Repeal of the Notification of the Office of the Securities and Exchange Commission regarding Operating Control and Information Technology Security of Securities Company