compared with the preceding year. □ 2. Supporting documents for consideration under Clause 4 (2): □ (1) Violation record, under the law specified in the Notification, of an applicant, directors, managers and
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
The Office of the Securities and Exchange Commission (Unofficial Translation) PAGE The Office of the Securities and Exchange Commission 12 June 2007 To: Managers All securities companies Circular No
; (3) there shall be controls of unauthorized access to information systems and applications, as follows: (a) control access of users and system administrators to information and application system
the same meaning as defined in the Notification of the Capital Market Supervisory Board governing qualifications and prohibited characteristics of directors and executives of securities company. (2
for Approval of Appointment of Executives of a Securities Company or a Derivatives Business Operator ...........................................................Company O Securities Business O
management; “Connected person” means: (1) Ordinary partnership of which the fund supervisor or its directors, managers or persons with power of management who are responsible for the line of work relating to
” shall have the same meaning as defined in the Notification of the Capital Market Supervisory Board governing qualifications and prohibited characteristics of directors and executives of securities company
fund with multiple investment policies under Section 17 (2) of the Provident Fund Act B.E. 2530 (1987) is concerned, any transaction between each investment policy shall be deemed a transaction with a
Section 104 Securities and Exchange Act B.E. 2535 Section 104. A securities company shall appoint directors or managers or enter into an agreement with other persons, giving the power, either in