to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
79.5 4.6 5.8 Cleaning service expenses 58.0 50.4 7.6 15.0 Bad and doubtful debts expenses 35.6 65.1 (29.5) (45.3) Security guard expense 31.4 29.7 1.7 5.7 Property tax 10.5 18.3 (7.8) (42.6) Others 666.7
reference. Notification of the Security and Exchange Commission No. Sor Jor. 41/2559 Re: Application for and Approval of Offer for Sale of Newly Issued Shares By virtue of Clause 21 of the Notification of the
Brokerage: Investment Units, failed to comply with the rules, conditions and procedures as specified in the notification by failing to specify the extent and procedure of outsource function related to
Repeal of the Notification of the Office of the Securities and Exchange Commission regarding Operating Control and Information Technology Security of Securities Company