Bangkok, December 23, 2015 ? The SEC is seeking public opinions on a draft amendment to the regulations on information technology security management of securities companies and derivatives
Offeror : NHCT Co.,Ltd. | Date of submission of the Statement of Intention : 05/08/2008
network is used to transmit data and to share information, resources and services. The network also typically establishes a layer of logical security for certain computing resources within the organization
network connection security, for example, limiting access to certain application services if connecting to external networks, etc.; (4) encrypt critical data stored on mobile devices and transmitted via
network connection security, for example, limiting access to certain application services if connecting to external networks, etc.; (4) encrypt critical data stored on mobile devices and transmitted via
Held Before Acquisition/ Disposition 2 % Group of Held Acquisition/ Disposition 2 % Group of Held After Acquisition/ Disposition 2 Remark 3 File No BCP SOCIAL SECURITY OFFICE Disposition Stock 15.0384
safety of clients’ digital assets in protection of digital asset traders. Recent news reports on cyber attack on a foreign decentralized finance platform, which resulted in tremendous loss of clients
digital assets and keys* and ensure safety of clients’ assets. The regulations cover the following requirements: (1) Policy and guidelines for overseeing risk management and management of digital
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to
with Chapter 1; (2) establishment of policies, measures, and management arrangement concerning information security in accordance with Chapter 2; (3) management of IT assets and the access control to