covers draft operational procedures rules in case of failure to meet the requirement. The draft amendments aim to (1) support intermediaries in maintaining sufficient capital suitable for the nature of
cryptographic keys through their whole lifecycle. There should be an established guideline on cryptographic algorithm, key length, usage practices and secure process for key management. 25 The intermediary should
be appeared on the computer screen when unattended or not in use. 8. Operations security 8.1 Operational procedures and responsibilities Objective: To ensure correct and secure operation relating to
control approaches. Control can be defined in either financial (financial control) or operational (operational control) terms. Construction & Engineering insurance: insurance protection that provides
Bangkok, February 23, 2015 ? The SEC is seeking public comment on proposed revision of rules governing operational control and information technology (IT) security of the securities companies and
operational strategies, aiming to reduce obstacles and enhance business operations to strengthen confidence in the Thai capital market. The meeting was held at the SEC Building on 21 December 2023.Mrs
) was Bt7,004mn -7.5% YoY and -0.9% QoQ. 2020 Outlook In February, AIS won the bid of spectrum band for 5G development to secure long term leadership and to build new revenue stream in the future as well
) was Bt7,004mn -7.5% YoY and -0.9% QoQ. 2020 Outlook In February, AIS won the bid of spectrum band for 5G development to secure long term leadership and to build new revenue stream in the future as well
secure or satisfy the obligations incurred incidental to or resulted from derivatives transaction for the account of a customer, it shall, in compliance with the rules specified in the notification of the
secure or satisfy the obligations incurred incidental to or resulted from derivatives transaction for the account of a customer, it shall, in compliance with the rules specified in the notification of the