Mrs. Pornanong Budsaratragoon, SEC Secretary-General, and the management team convened a meeting with Mr. Chanin Vongkusolkit, TLCA Chairman, and the board members to discuss collaboration in developing and enhancing oversight of listed companies and strategies for preventing and suppressing inappropriate behaviors within listed companies to ensure that they would be able to raise fund from investors and have their securities listed on the Stock Exchange of Thailand (SET), while growing su...
Rules on Application for Obtaining an Approval and Granting to Establish Branch Offices of Intermediaries
Rules on Application for Obtaining an Approval and Granting to Establish Branch Offices of Intermediaries
, telecommunications networks or satellite services. Clause 12 An intermediary shall establish information security of the business continuity management in accordance with the following criteria: (1) determine
, telecommunications networks or satellite services. 7 Clause 12 An intermediary shall establish information security of the business continuity management in accordance with the following criteria: (1) determine
, telecommunications networks or satellite services. 7 Clause 12 An intermediary shall establish information security of the business continuity management in accordance with the following criteria: (1) determine
efficiently. Essentially, the proposed revisions cover the following key domains:(1) Establish multiple levels of expected security controls and oversight techniques that apply differently to licensed
asset custody. The proposal also aimed to determine requirements for digital asset business operators who function as a digital wallet provider to prevent misuse of digital assets as a tool for committing
wipe-out, etc.; (3) determine the types of application services that allow using via mobile devices. Establish a measure for control of access to such application services by taking into consideration
wipe-out, etc.; (3) determine the types of application services that allow using via mobile devices. Establish a measure for control of access to such application services by taking into consideration