ก.ล.ต. จัดสัมมนาเพื่อเตรียมความพร้อมในเรื่องความมั่นคงปลอดภัยทางไซเบอร์และการคุ้มครองข้อมูลส่วนบุคคล (Cyber Security & Data Privacy Protection) ให้กับกรรมการและผู้บริหารระดับสูงของบริษัทหลักทรัพย์
to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
the following matters: (1) sufficient financial resources for the conduct of and risks associated with its operations; (2) safety of its clients’ assets; (3) security measures against electronic crime
) sufficient financial resources for the conduct of and risks associated with its operations; (2) safety of its clients’ assets; (3) security measures against electronic crime, which are capable of protecting
outbreak on listed companies and auditors. For example, extending the deadline for submitting financial statements and facilitating the submission of applications and reports via electronic channels to
derivatives business, both in document or electronic format, are accurate, complete, can be able to efficiently use within appropriate time, including having security system sufficient to prevent an access or
derivatives business, both in document or electronic format, are accurate, complete, can be able to efficiently use within appropriate time, including having security system sufficient to prevent an access or
=digital asset OR "digital asset" OR "electronic property" OR "electronic possession" OR "virtual property" OR "virtual possession"&wt=json&indent=true&facet=true&facet.field=key_filetype&facet.field
=digital asset OR "digital asset" OR "electronic property" OR "electronic possession" OR "virtual property" OR "virtual possession"&wt=json&indent=true&facet=true&facet.field=key_filetype&facet.field