_____________________________________________________________________ I/We have duly examined the information contained in this application form hereto and declare that to the best of our knowledge and belief all information given in this application form and the
/We have duly examined the information contained in this application form hereto and declare that to the best of our knowledge and belief all information given in this application form and the documents
_____________________________________________________________________ I/We have duly examined the information contained in this application form hereto and declare that to the best of our knowledge and belief all information given in this application form and the
_____________________________________________________________________ I/We have duly examined the information contained in this application form hereto and declare that to the best of our knowledge and belief all information given in this application form and the
and belief all information given in this application form and the documents enclosed are true, accurate, and complete. The text of each document is the same as that previously submitted to the
information and privacy of customers1 in angle of the BCP on cyber security PAGE
provider which shall include the outsourced function; (c) information security, confidentiality and privacy regarding information of the intermediary and clients ; (d) service provider shall comply with the
(Translation) PAGE 112 (Translation) Securities and Exchange Act B.E. 2535 (As Amended) _________________ BHUMIBOL ADULYADEJ, REX., Given on the 12th day of March B.E. 2535; Being the 47th Year of the Present Reign. His Majesty King Bhumibol Adulyadej is graciously pleased to proclaim that: Whereas it is expedient to enact a law on the securities and exchange; Be it, therefore, enacted by His Majesty the King, by and with the advice and consent of the National Legislative Assembly functioning as...
ให้บริการต้องไม่มีลักษณะอย่างใดอย่างหนึ่งดังต่อไปนี้ (1) เป็นสินทรัพย์ดิจิทัลที่ไม่ชอบด้วยกฎหมาย (2) เป็นสินทรัพย์ดิจิทัลที่มีการปกปิดข้อมูลการทำธุรกรรม (privacy coin) โดยมีลักษณะอย่างใดอย่างหนึ่งดังนี้