in an audiovisual format in a bid to respond to the changing behaviors of investors, who tend to use the Internet more as a channel to receive information and do not spend as much time on reading
public offerings and exchange listing of state enterprises. Two state enterprises, PTT Public Company Limited (PTT) and Internet Thailand Public Company Limited (INET), were successfully listed on the SET
; 4. Online job application; 5. Acceptances and referral of cases; 6. Processes relating to security management of computer and information center and management of SEC internal security; 7. Profiles of
Association 12% 3% 41% 8% 13% 5% 18% Market Participation Dealers-to-Clients 30% 70% Non-dealer License Social Security Fund and Government Pension Fund Mutual Funds Insurance Companies Domestic Companies
W20 (3) Educated the staff about IT security and the Computer Crime Act B.E.2550 (2007) as well as monitored their compliance with the IT security policy; (4) Improved the SEC's website (www.sec.or.th
Annual Report 2004 S h a p i n g t h e T h ai C a p i t a l M a r k e t A n n u a l R e p o r t 2 0 0 4 S E C U R I T I E S A N D E X C H A N G E C O M M I S S I O N , T H A I L A N D This year’s annual report features Benjarong ceramics. Benjarong, meaning five colours, gained popularity in the royal court and the high society of Siam in the late Ayudhya period (A.D. 1350 - 1767). But it was during the early Rattanakosin period (A.D. 1782 - present), in the reigns of King Rama II and King Rama...
Reform Priorities in Asia: Taking Corporate Governance to a Higher Level Taking Corporate Governance to a Higher Level reform priorities in Asia 2011 REFORM PRIORITIES IN ASIA: TAKING CORPORATE GOVERNANCE TO A HIGHER LEVEL 2011 This work is published on the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the Organisation or of the governments of its member countries. This document and any m...
of IT risks and risk mitigation policies, plans, and measures. For example, business continuity management, IT security, incident management, and IT asset management. (4) Proper allocation and https
) CGCodePart02_2 ) Consideration of IT risks and risk mitigation policies, plans, and measures. For example, business continuity management, IT security, incident management, and IT asset management. (4) Proper
services are efficient, transparent, and examinable, in a bid to promote confidence towards, and integrity and security of, the overall financial system, and to improve the competitiveness and image of the