to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
service. 2. In case of teleworking, the intermediary should establish prudent and sufficient security measures for the information that is accessed, processed, and stored in the operating areas under Clause
service. 2. In case of teleworking, the intermediary should establish prudent and sufficient security measures for the information that is accessed, processed, and stored in the operating areas under Clause
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
. The SEC considers qualifications of securities issuers and supervises the disclosure of information in order for the investors to have sufficient information in making an investment decision
law and standards, considering impact on health, safety of products and services, customer information security, sales conduct, after-sales service throughout the lifespan of products and services, and
their objectives of safeguarding client benefits, enhance their trustworthiness, and maintain overall market integrity, but also reflect their self-discipline which would further reduce chances of law
whether the code of conduct is complied: 1.3.1 Monitoring and assessment by an internal audit unit or a compliance unit; 1.3.2 Self -assessment by executives and employees; 1.3.3 Assessment by independent