to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
rights, construct, purchase, provide, sell, dispose, rent lease, hire purchase, grant of hire purchase, borrow, lend accept pledge, accept mortgage, exchange, transfer, accept transfer, or take any action
rights, construct, purchase, provide, sell, dispose, rent lease, hire purchase, grant of hire purchase, borrow, lend accept pledge, accept mortgage, exchange, transfer, accept transfer, or take any action
information about the cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
Repeal of the Notification of the Office of the Securities and Exchange Commission regarding Operating Control and Information Technology Security of Securities Company
ภาคผนวก 3 : การรักษาความมั่นคงปลอดภัยด้านเทคโนโลยีสารสนเทศ (Information Technology Security) (แนบท้ายประกาศที่ สธ. 38/2565)
The rules on margin lending (margin account) which have been in effect since 1997 permit SC to lend money to its customer only for the purpose of purchasing listed securities on a condition that