to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
protection Customer (KYC), fit and proper personnel, standard sales process, management of customers’ digital assets and related data, and capital adequacy. There are also new provisions about the
strengthen investor protection Customer (KYC), fit and proper personnel, standard sales process, management of customers’ digital assets and related data, and capital adequacy. There are also new provisions
protection Customer (KYC), fit and proper personnel, standard sales process, management of customers’ digital assets and related data, and capital adequacy. There are also new provisions about the
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
March this year.The key changes to the rules include: - To re-define the term, ?patron? as any person who makes contribution to the issuer clearly and continuously, or any person who has a potential to
), which could subsequently cause irregular trading after the securities listing. The proposed key changes concerning IPO share allocation are: 1. To redefine the term, ?patron? as any person who makes
ภาคผนวก 3 : การรักษาความมั่นคงปลอดภัยด้านเทคโนโลยีสารสนเทศ (Information Technology Security) (แนบท้ายประกาศที่ สธ. 38/2565)