Bangkok, December 23, 2015 ? The SEC is seeking public opinions on a draft amendment to the regulations on information technology security management of securities companies and derivatives
Offeror : NHCT Co.,Ltd. | Date of submission of the Statement of Intention : 05/08/2008
custody are safe. Essentially, digital asset business operators are required to establish a cybersecurity system in accordance with the regulations specified by the SEC and arrange for IT security audit and
่6 หนา้ 6 7. ตรวจสอบความสมบรูณข์องการติดตัง้ โดยเรียกใชง้านโปรแกรม Internet Explorer - คลิกเมน ูTools > Internet Options > Tab “Security” > เลือก “Trusted sites” มีการตัง้ค่า Trusted Sites ใหก้บัโดเมน
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
security as well as supervise, monitor and examine compliance with such policies, measures, and operating systems, and review the suitability thereof regularly; In the interest of meeting the aforesaid
request your consent. The SEC Office complies with appropriate security measures, for example, ISO27001 standards or NIST, etc. In case of any cross-border data transfer to destination country
; 4. Online job application; 5. Acceptances and referral of cases; 6. Processes relating to security management of computer and information center and management of SEC internal security; 7. Profiles of
this regard, the SEC Office complies with appropriate security measures, for example, ISO27001 standards or NIST, etc. In case of any cross-border data transfer to another country, international
information about the cookies we use, please see our Cookies page. Necessary cookies Necessary cookies enable core functionality such as security, network management, and accessibility. You may