to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
conducted sustainably, will help push forward the achievement of the 2030 SDG Agenda, which is increasingly becoming more urgent.” She added, “We are thrilled to have worked with the Security and Exchange
financial service users to facilitate the financial sector’s smooth compliance with the Personal Data Protection Act and the achievement of the intended outcomes in accordance with the true intention of
control system for goals and objectives achievement, compliance with applicable laws and regulations, safeguarding of the assets from frauds and damage, and preparing reliable accounts and reports. The
push forward the achievement of the 2030 SDG Agenda, which is increasingly becoming more urgent.” She added, “We are thrilled to have worked with the Security and Exchange Commission of Thailand, UNDP
-Year National Strategy and contributes to the achievement of the UN Sustainable Development Goals, especially SDG 5 Gender Equality.The SEC has been collaborating with UN Women on the promotion of the
audited and made publicly available. The achievement of the targets will be reviewed by an external auditor. This opinion is based on the review of the information provided by the Issuer, according to our