to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
policy(2) Preparing consent forms(3) Selecting and implementing appropriate security safeguards such as access control(4) Producing and managing “Record of Processing Activities (ROP)” that will used to
security for protections of power and telecommunications line in the information processing facilities and put in place a periodic maintenance to prevent damages; 27 3. The intermediary should correctly
utilities (e.g., electricity, telecommunications, ventilation and air conditioning); 2. The intermediary should have measures relating to cabling security for protections of power and telecommunications line
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
Repeal of the Notification of the Office of the Securities and Exchange Commission regarding Operating Control and Information Technology Security of Securities Company
ภาคผนวก 3 : การรักษาความมั่นคงปลอดภัยด้านเทคโนโลยีสารสนเทศ (Information Technology Security) (แนบท้ายประกาศที่ สธ. 38/2565)
Ruenvadee Suwanmongkol, Secretary-General of SEC, remarked: “The enhancement of shareholders’ rights and protections is SEC’s main mission. Scaling up the legal knowledge regarding securities and