business operator who is a wallet provider to enable identification of the clients who make transactions in the system; (3) To prohibit the digital asset business operator from providing
there were nothing related, (3) showing registered capital as high as 20,000 million baht. In addition, it was found that an executive holds several identification cards under various names and used those
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
Operation. 8. IT Outsourcing. (Translation) -2- Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the
Change (Please specify all information on change of first name / last name since becoming sui juris and attach documents indicating such change) 1.2 Type of Card [ ] Identification Card [ ] Passport (only
and responsibilities of high-level management Chapter 2 Availability of competent personnel Chapter 3 Fund management operation system 3.1 Accepting of purchase or redemption orders of investment units
responsibilities of high-level management Chapter 2 Availability of competent personnel Chapter 3 Fund management operation system 3.1 Accepting of purchase or redemption orders of investment units 3.2 Investment
system to prevent damage caused by risk arising from business operation to the extent that it does not have an adverse affect on the business operation of the securities company. Risk to be taken into
to prevent conflict of interest; (2) risk management system to prevent damage caused by risk arising from business operation to the extent that it does not have an adverse affect on the business
caused by risk arising from business operation to the extent that it does not have an adverse affect on the business operation of the securities company. Risk to be taken into appraisal in risk management