equipment business, expanding the existing customer base and new customers and increase new products such as Early Warning Score Program (EWS): Program to warn and aware to protect Septicemia, Linkage system
Minority Investors have shown a progress from the previous year. This is because, apart from the existing strict provisions on minority investors protection, more efforts are given to legal amendment to
Minority Investors have shown a progress from the previous year. This is because, apart from the existing strict provisions on minority investors protection, more efforts are given to legal amendment to
Ministry of Commerce, shall be authorized to amend or add wordings in compliance with the Registrar’s directions: Articles of Association of the Company Chapter 2 Shares and Shareholders The Existing
disposition of the existing ordinary shares held in the Planet by the Company, in the number of 4,300,000 shares or 43% of the Planet’s total shares sold, at Baht 5 par value per share to the following
Thai hospitals due to credibility of quality and standard of medical treatment amid upward trend of expatriates and medical tourists; and (iv) plans by existing hospital operators to invest in new
medical devices and equipment business, expanding the existing customer base and new customers and increase new products such as Early Warning Score Program (EWS): Program to warn and aware to protect
instruments for competent businesses. Notably, the Emergency Decree also aims to protect investors by facilitating more precise and adequate disclosure of information for investment decision making, reducing
.................................................................................................................................................................. 17 3.10 Leveraging Existing Certification Schemes .................................................................................................................................... 18 4 Reporting
protect IT assets in accordance with the following criteria: (1) assess security requirement of IT assets based on their results of a risk assessment and criticality; (2) define the secure areas and the