to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
covering risks and the detailed operation concerning the risk management. Clause 3 The securities clearing house shall procure adequate financial resources for potential risks arising from the operation of
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
for promoting and maintaining security, credibility, transparency and fairness in derivatives trading, as follows: (1) procure a derivatives trading system capable of supporting expected trading volume
security of information technology in accordance with the criteria prescribed and notified by the SEC Office. Clause 9 The derivatives broker shall ensure that at least one-quarter of the company’s directors
system of control of the operation and security of information technology in accordance with the criteria prescribed and notified by the SEC Office. Clause 9 The derivatives broker shall ensure that at