) tightly restrict and control the use of utility programs and limit access to program source code. Chapter 4 Information Communications Security via Computer Network Systems and Operations Security with
) tightly restrict and control the use of utility programs and limit access to program source code. Chapter 4 Information Communications Security via Computer Network Systems and Operations Security with
from the announcement. Financial structure The Company emphasizes the importance of financial structure management efficiency which should be flexible in difficult circumstances and able to maintain the
soft limit, hard limit (compliance limit) และมีการควบคุมติดตาม ดังนี้ 1) การกำหนด soft limit กำหนดไว้ที่ ร้อยละ 2) การกำหนด hard limit กำหนดไว้ที่ ร้อยละ 3) การควบคุมกรณีเกิน soft limit ลงทุนต่อได้ แต่
10/1. In applying for license, if the applicant requests to restrict the scope of its securities borrowing and lending business in any way, then after license has been given,, the business operator
applicant requests to restrict the scope of its securities borrowing and lending business in any way, then 11 As added by the Notification of the Securities and Exchange Commission No. KorThor 12/2542 Re
applying for license, if the applicant requests to restrict the scope of its securities borrowing and lending business in any way, then 11 As added by the Notification of the Securities and Exchange
starts its operation; (4) not being ordered by the Capital Market Supervisory Board or the Office to restrict its business expansion or cease its operation, or in the process of rectifying its operation by
starts its operation; (4) not being ordered by the Capital Market Supervisory Board or the Office to restrict its business expansion or cease its operation, or in the process of rectifying its operation by
to restrict its business expansion or cease its operation, or in the process of rectifying its operation by the order of the Capital Market Supervisory Board or the Office under Section 141, Section