ก.ล.ต. จัดสัมมนาเพื่อเตรียมความพร้อมในเรื่องความมั่นคงปลอดภัยทางไซเบอร์และการคุ้มครองข้อมูลส่วนบุคคล (Cyber Security & Data Privacy Protection) ให้กับกรรมการและผู้บริหารระดับสูงของบริษัทหลักทรัพย์
to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
under an approved project, if the assets are secured by security other than rights of mortgage, rights of pledge or rights arising from a suretyship, such rights shall pass to the transferee on each
approved project, if the assets are secured by security other than rights of mortgage, rights of pledge or rights arising from a suretyship, such rights shall pass to the transferee on each transfer through
entitled to inspect his account and name. Section 16. As regards the transfer of assets under an approved project, if the assets are secured by security other than rights of mortgage, rights of pledge or
the transferred assets. A debtor shall be entitled to inspect his account and name. Section 16. As regards the transfer of assets under an approved project, if the assets are secured by security other
impossible for the Group to guarantee that cyber-attacks or other security risks can be avoided by appropriate preventive security measures in every case. The occurrence of any of these risks could result in
restriction, features of bonds, draft terms and conditions and a bondholders' representative appointment agreement (in case of secured bonds/ bonds with a bondholders' representative). - For the offering of
functions in accordance with the defined access rights; (b) control access to information systems and applications by a secured log-on procedure; (c) establish password management systems to ensure security
the defined access rights; (b) control access to information systems and applications by a secured log- on procedure; (c) establish password management systems to ensure security of passwords; (d