Standard Procedures for Electronic Transmission of Information as well as the laws and subordinate regulations that are currently effective or will be in the future. For example, the Computer Crimes Act B.E
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
การใช้เครื่องมืออัตโนมัติ (Automated monitoring) ในการติดตามการทำงานของผู้ปฏิบัติงานที่เกี่ยวกับความมั่นคงปลอดภัยของระบบเทคโนโลยีสารสนเทศ เพื่อให้มั่นใจว่าผู้ปฏิบัติงานดังกล่าว ปฏิบัติงานตามหลักการแบ่ง
to collect, use or disclose personal information on the legal basis of public interest in accordance with Section 24(4), Paragraph 1(2) of Section 25, and Section 27 of the Personal Data Protection Act
to collect, use or disclose personal information on the legal basis of public interest in accordance with Section 24(4), Paragraph 1(2) of Section 25, and Section 27 of the Personal Data Protection Act
received more automated system work, thus unable to control the installation time as projected in some projects. - Other income decreased 88.05% from the same period of last year due to in 2017, the Company
quarter of 2017 to 8.51% in the second quarter of 2018 due to The company has an automated system that is never done before, so it is not possible to control the installation time as expected. - Other
to The company has an automated system that is never done before, so it is not possible to control the installation time as expected. - Other income decreased 88.46% from the same quarter of last year
Article 4(1)(39) of MiFID II • Algorithmic trading (AT): trading in financial instruments where a computer algorithm automatically determines individual parameters of orders such as whether to initiate the