intermediaries.? The amendment proposal aims to strengthen IT security protection for intermediaries to cope with potential new types of risk arising from the use of new technologies such as mobile devices and
baht. Of this amount, debentures accounted for 92 percent, and bills of exchange covered 8 percent. ?In developing the bond market, the SEC emphasizes striking the right balance by providing the business
Offeror : NHCT Co.,Ltd. | Date of submission of the Statement of Intention : 05/08/2008
complaint system and making it available 24/7 as well as developing an investor protection search tool - SEC Check First App - to enable investors to check companies providing products or services in the
supervision of subordinated perpetual bonds to strengthen investor protection and simultaneously develop the debt securities market. In this regard, such type of bond to be offered for sale to the general
Presently, several companies are interested to raise fund through digital token offer to finance their investment in office buildings or condominiums which will later be rented for income shared to holders of digital tokens or real estate-backed initial coin offering (ICO). Meanwhile, the regulations have not yet extended to such fund raising method and a smart contract has not yet covered an enforcement of investors’ rights in some issues which are activities occurring outside blockchain...
of Commerce, Thai Institute of Directors, State Enterprise Policy Office in the Ministry of Finance, Federation of Accounting Professions, Social Security Office, Government Pension Fund, and
to Item 11]. 4. Management of the computer network systems and information transfer: - communications security [Referring to Item 9] - information transfer [Referring to Item 9.2] 5. Protection against
Item 11]. 4. Management of the computer network systems and information transfer: - communications security [Referring to Item 9] - information transfer [Referring to Item 9.2] 5. Protection against
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to