investment decision accurately; (b) protection of the service user’s confidentiality; (c) handling of the service user’s complaints; (d) sufficient management of information technology risk and cyber risk by
the business of the other party and the nature of such controlling power shall be depicted; and (b) The party that owns the funds does not want to obtain the legal protection under the provisions
per share. In case of having securities listed elsewhere, identify the name of the Stock Exchange. (2) In case of having other types of share such as preferred share whose rights or terms differ from
........ Year ............. Year ............. Year ............ Total assets Total liabilities Shareholders’ equity Total income Cost Net profits Earnings per share (EPS) Debt/equity ratio (D/E ratio) Return on
such services; (12) clients’ asset An intermediary shall arrange adequate protection for clients’ assets when it is responsible for them; (13) relations with regulators An intermediary shall deal with
[Referring to Item 4.2]; - backup [Reference to Item 8.3]; - cryptographic control [Referring to Item 6]. 3. Supervision of the operating personnel: - end user controls, for example: - protection of unattended
ordinary shares and _________ preferred shares (if any), at ___________ baht per share. In case of having securities listed elsewhere, identify that Stock Exchange. 1.4.2 In case of having other types of
to make the management that are entrusted for the management of investments work on the basis of integrity and prudence with knowledge and expertise of the professional to ensure the full protection of
clearly determined and tangible e.g. fund performance, management company’s performance, market share, etc. The long-term plan should demonstrate the direction of the business and the future plan such as
Law on Derivatives ; (17) derivatives business operator under the Law on Agricultural Futures Trading; (18) international financial institution; (19) Deposit Protection Agency; (20) Stock Exchange of