to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
criteria: (1) establish conditions and controls relating to information security in an agreement signed by both parties; (2) monitor, evaluate, review and audit service delivery of the outsourcee regularly
) establish conditions and controls relating to information security in an agreement signed by both parties; (2) monitor, evaluate, review and audit service delivery of the outsourcee regularly; (3) re-assess
) establish conditions and controls relating to information security in an agreement signed by both parties; (2) monitor, evaluate, review and audit service delivery of the outsourcee regularly; (3) re-assess
market force in the capital market, and 5 large sized PVDs, the Government Pension Fund (GPF) and the Social Security Fund, have proclaimed to implement the I Code. Furthermore, SEC and Association of
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2013 1 Security IPO AKP Feb 7 2013 12:00AM 0 0 2023-09-09 2013 1 Security IPO EA
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2013 1 Security IPO AKP Feb 7 2013 12:00AM 0 0 2023-09-09 2013 1 Security IPO EA