) Chapter 2: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6
: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6
person, as well as the nature of such control. To the extent known to the issuer, indicate whether the issuer is directly or indirectly owned or controlled by another corporation, by any foreign government
entity or natural person, as well as the nature of such control. To the extent known to the issuer, indicate whether the issuer is directly or indirectly owned or controlled by another corporation, by any
สำนักงานสั่งพักการดำเนินธุรกิจ No records to display. Last Updated 30 April 2023 Last Reviewed 30 April 2023
structure 11. Corporate governance 12. Social responsibility 13. Internal control and risk management 14. Related party transactions 2.4 Financial position and operating results 15. Important financial
Requirements | - |- Online Submission | - |- Standard Practices | - |- Risk Control | - |- Compliance / Internal control | - |- Conflict of interest | - |- Complaint Handling | - |- Information Technology
: Operational Control and Security for Information Technology of a Licensed Derivatives Broker. By virtue of the second paragraph of Clause 7 of the Notification of the Securities and Exchange Commission No
: Operational Control and Security for Information Technology of a Licensed Derivatives Broker. By virtue of the second paragraph of Clause 7 of the Notification of the Securities and Exchange Commission No
Securities and Exchange Commission No. SorThor. 8/2548 Re: Operational Control and Security for Information Technology of a Licensed Derivatives Broker. By virtue of the second paragraph of Clause 7 of the