disclosure, modification, removal or destruction of sensitive information stored on media. Provisions in the Notification No. Sor Thor. 37/2559 Clause 17 Information shall be classified in terms of sensitivity
(Translation) PAGE 112 (Translation) Securities and Exchange Act B.E. 2535 (As Amended) _________________ BHUMIBOL ADULYADEJ, REX., Given on the 12th day of March B.E. 2535; Being the 47th Year of the Present Reign. His Majesty King Bhumibol Adulyadej is graciously pleased to proclaim that: Whereas it is expedient to enact a law on the securities and exchange; Be it, therefore, enacted by His Majesty the King, by and with the advice and consent of the National Legislative Assembly functioning as...
period, as previously issued, included a qualified opinion, a disclaimer of opinion, or an adverse opinion and the matter which gave rise to the modification is unresolved ( 2.3.1 corresponding figures are
written by such board of directors. In case of any material amendment, change or modification to such policy and plan, intermediaries shall comply with the requirement set out in the first paragraph (1) or
board to be in charge of the implementation of the business continuity management policy. In case of any material amendment, change or modification to the business continuity plan, the securities company
total revenue from the other clients thereof. 7. Safeguards against independence impairment of the partners in the Audit Firm Please explain the safeguard against independence impairment of the partners
once a year at least. Moreover, for the determination, modification or alteration a value of parameter, it shall notify to concerned person each time. [M] · For the using other tools to inspect the
against unauthorized disclosure, modification, removal or destruction of sensitive information stored on media. Clause 18 An intermediary shall establish physical and environmental security measures to
in sub clause (1) shall be able to prevent: (a) improper modification, disappearance and destruction; (b) using and accessing such stored things wrongfully, inappropriately and unlawfully, especially
verify such stored things within a reasonable time; (2) the system as prescribed in sub clause (1) shall be able to prevent: (a) improper modification, disappearance and destruction; (b) using and