to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
, maintenance of data security systems, and risk management against cyber crime. The approved operator must also conduct Know-Your-Customer (KYC) and Customer-Due-Diligence (CDD) and set up preventive measures
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
other benefits with value exceeding those traditionally acceptable from persons or juristic persons who have stakes in the SEC operation. This is to ensure that the SEC operation is reliable, transparent
investors joined forces today comprising the Social Security Office (SSO), the Government Pension Fund (GPF), the Association of Investment Management Companies (AIMC), the Association of Thai Securities
necessary. The regulations under this Notification set a standard for operation of derivatives clearing houses so that their services are efficient, transparent, and examinable, in a bid to promote confidence
ภาคผนวก 3 : การรักษาความมั่นคงปลอดภัยด้านเทคโนโลยีสารสนเทศ (Information Technology Security) (แนบท้ายประกาศที่ สธ. 38/2565)
Repeal of the Notification of the Office of the Securities and Exchange Commission regarding Operating Control and Information Technology Security of Securities Company