intermediaries.? The amendment proposal aims to strengthen IT security protection for intermediaries to cope with potential new types of risk arising from the use of new technologies such as mobile devices and
Bangkok, 15 May 2018 ? The SEC will conduct a public hearing on draft regulations to be issued by virtue of the Royal Decree on the Digital Asset Businesses B.E. 2561 (2018), which became effective
In recent times, investment management companies are significant and connected to country’s economic system and have been growing continuously. By the end of June 2018, the net asset value, including the mutual funds, private funds, and provident funds, is approximately 7.08 trillion Thai baht, or about 44 percent in comparison to the overall GDP of the country. Therefore, if there were any events leading to fluctuations in the investment management business, a significant impact could pro...
Offeror : NHCT Co.,Ltd. | Date of submission of the Statement of Intention : 05/08/2008
. If issues arise, investors should be able to seek remedies and solutions from protection mechanism, depending on the types of risks and the types of products and their providers. Effective investor
sectors convenience for issuing debt securities for fund mobilization while putting in place an appropriate mechanism for investor protection as debt securities is indeed an investment choice. Hence, the
supervision of subordinated perpetual bonds to strengthen investor protection and simultaneously develop the debt securities market. In this regard, such type of bond to be offered for sale to the general
Presently, several companies are interested to raise fund through digital token offer to finance their investment in office buildings or condominiums which will later be rented for income shared to holders of digital tokens or real estate-backed initial coin offering (ICO). Meanwhile, the regulations have not yet extended to such fund raising method and a smart contract has not yet covered an enforcement of investors’ rights in some issues which are activities occurring outside blockchain...
and training for all staff together with clear-cut staff performance measurements; (6) customer data management that takes into account appropriate customer data security and privacy; (7) effective and
to Item 11]. 4. Management of the computer network systems and information transfer: - communications security [Referring to Item 9] - information transfer [Referring to Item 9.2] 5. Protection against