ก.ล.ต. จัดสัมมนาเพื่อเตรียมความพร้อมในเรื่องความมั่นคงปลอดภัยทางไซเบอร์และการคุ้มครองข้อมูลส่วนบุคคล (Cyber Security & Data Privacy Protection) ให้กับกรรมการและผู้บริหารระดับสูงของบริษัทหลักทรัพย์
to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
institution, the securities company may comply with the policy of security of the information technology of such financial institution. [M] · Reviewing and modify updatable by having a risk assessment once a
financial institution, the securities company may comply with the policy of security of the information technology of such financial institution. [M] o Reviewing and modify updatable by having a risk
Re: Operational Control and Information Technology Security of Securities Companies Whereas in these days securities companies widely accept information technology as an instrument for securities
Re: Operational Control and Information Technology Security of Securities Companies Whereas in these days securities companies widely accept information technology as an instrument for securities
been a change in the necessary circumstances as provided in the first paragraph, the Minister upon the recommendation of the SEC may modify or change the conditions already specified.
been a change in the necessary circumstances as provided in the first paragraph, the Minister upon the recommendation of the SEC may modify or change the conditions already specified.
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT