monitor key management related activities at a regular interval to ensure compliance with the established policy and guideline. 7. Physical and Environmental Security 7.1 Secure Areas Objective: To prevent
such security systems in a good condition on a regular basis; 4. The intermediary should closely monitor and control external party support service personnel working in the secure areas; 5. The
{ font-size: 26.68px; fill: #fff; font-family: Quicksand-Regular, Quicksand; } Icon B
; 4. Online job application; 5. Acceptances and referral of cases; 6. Processes relating to security management of computer and information center and management of SEC internal security; 7. Profiles of
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
information about the cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may
request your consent. The SEC Office complies with appropriate security measures, for example, ISO27001 standards or NIST, etc. In case of any cross-border data transfer to destination country
collaboration for practical application of the I Code among institutional investors. The eight signatories are (1) the Office of Insurance Commission, (2) the Thai Social Security Office, (3) the Thai Government