prevention of the conflict of interest and Chinese wall. - demonstrate in detail on the above mentioned measure, at least in the following matters: (a) an organization chart and scope of power, duty and
(%) ……………………. ………………… ……………………. ……………………. ………………… ……………………. ……………………. ………………… ……………………. O no 5.2 Being an employee, officer, advisor with permanent salary or power of control of a company, parent company, subsidiary, affiliate or being a person who may be in conflict: O yes (please
The Derivatives Act The Derivatives Act B.E. 2546 SECTION 18. In order to protect customers, maintain stability of the financial system or control the risks arising from derivatives, the SEC shall
within the period. Remarks : Persons or businesses related to the auditor and the audit firm include: (a) spouse and child dependent on or under the care of the auditor; (b) business with power of control
, executives, employees and others 8. Report on key operating results related to corporate governance 28 9. Internal control and related party transactions 33 Part 3: Financial Statements 36 Part 4
directly or indirectly holds shares of the other party in the amount exceeding fifty percent of total issued and paid-up shares; or (2) In the case where the party that manages funds has the power to control
3.2 Investment management system 3.3 Back office supporting system 3.4 Compliance system 3.5 Documentary preparation and record keeping system Chapter 4 Internal Control System Chapter 1 Organisational
person who is authorized by a management company to have power to make decisions on investments for a fund; “Association” means any association relating to securities business, which has been approved by
exchanges in a foreign country which is a member of the International Organization of Securities Commissions (IOSCO). Clause 4 For the purpose of regulating securities brokerage business undertaken by a
) Chapter 2: IT Security with the following details: 2.1 Information Security Policy; 2.2 Organization of Information Security; 2.3 Human Resource Security; 2.4 Asset Management; 2.5 Access Control 2.6