: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6
) Chapter 2: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6
the website of the SEC Office: (a) certifying that such audit firm has a audit quality control system under Clause 11(1) and giving consent for an inspection by a representative of the SEC Office; (b
Control Board (NCB), etc. In the case where no wrongdoing is detected, the SEC Office will not store such data; Data for authentication from the Department of Administrative Affairs which will be stored in
owners tend to maintain control over firms and to be reluctant to disclose information, raising concern for good corporate governance. It was highlighted that significant challenges for family-controlled
ครอบคลุมการดำเนินการอย่างน้อย ดังนี้ (ก) กำหนดผู้รับผิดชอบต่อความเสี่ยง หรือเจ้าของความเสี่ยง (risk owner) (ข) ระบุการควบคุมที่มีอยู่ในปัจจุบัน (existing control) (ค) วิเคราะห์โอกาสหรือความถี่ที่จะเกิด
No. OrThor/Nor. 5/2547 Re: Operational Control and Security of the Information Technology of Securities Company For the purpose of rendering the securities companies to efficiently comply with the
: Operational Control and Security of the Information Technology of Securities Company For the purpose of rendering the securities companies to efficiently comply with the Notification of the Office of Securities
entity or natural person, as well as the nature of such control. To the extent known to the issuer, indicate whether the issuer is directly or indirectly owned or controlled by another corporation, by any
29 percent of shares of NYKT (“NYKT Shares”) from Artlion Development Limited (“ArtLion”) which is a subsidiary of and under the control of NYK Group. The purchase of NYKT Shares is regarded as a