SEC Deputy Secretary-General Tipsuda Thavaramara revealed that SEC has launched an automated data distribution system, or SEC API, to enable easy access to SEC’s information or third party
SEC requests that business operators implement the BCP that must cover key work systems, including the trading system, the risk control system in compliance with the Net Capital Rules and the investment management system. This includes providing a communication channel that facilitates notifying and clarifying information to clients in case of major changes to service provision.“After continuous monitoring and coordinating with the business operators, we have found that they have implemen...
Bangkok, September 25, 2015 ? The SEC aims to promote the use of technology to provide more access to the capital market for fund mobilizers and investors through crowdfunding and automated
handle their complaints sufficiently and efficiently while protecting the clients’ best interest. ____________________
business sector’s awareness and readiness to handle cyber threats, with guest speakers, i.e., Pol. Col. Naughtakid Phromchan, Director of the Operations Office, Thailand Computer Emergency Response Team
OR "computerized actual" OR "automated real" OR "automated genuine" OR "digital real" OR "digital genuine"&wt=json&indent=true&facet=true&facet.field=key_filetype&facet.field=key_sitemap&facet.field
Pursuant to the existing regulations on standard conduct of business, a securities and derivatives business operator intending to have a third party handle its partial business functions may do so in
website: www.globalinvestments.net and www.Qropdirect.com to lure investing public that it had a team of experienced and expert investment consultants to handle suitable portfolios for investors through
handle suitable portfolios for investors through different company names such as Global Investments Far East Limited and Global Investments International Limited. The aforesaid person jointly operated
operated. General controls are implemented to ensure that all automated applications are developed, implemented, and maintained properly, and in addition, that the integrity of program and data files and of