W20 (3) Educated the staff about IT security and the Computer Crime Act B.E.2550 (2007) as well as monitored their compliance with the IT security policy; (4) Improved the SEC's website (www.sec.or.th
efforts in strengthening corporate governance in the industry. In the year ahead, countless different challenges are bound to arise and test our strengths, but I believe the SEC management and staff will
services are efficient, transparent, and examinable, in a bid to promote confidence towards, and integrity and security of, the overall financial system, and to improve the competitiveness and image of the
conclusion, I wish to express my sincere appreciation to the SEC management and staff who have put in tremendous efforts over the years. I am confident that with everyone’s continued support and commitment
of Commerce, Thai Institute of Directors, State Enterprise Policy Office in the Ministry of Finance, Federation of Accounting Professions, Social Security Office, Government Pension Fund, and
; 4. Online job application; 5. Acceptances and referral of cases; 6. Processes relating to security management of computer and information center and management of SEC internal security; 7. Profiles of
arbitration procedure between investors and market intermediaries, the introduction of regulations that requires all staff of market intermediaries who are in touch with investors to possess professional
Reform Priorities in Asia: Taking Corporate Governance to a Higher Level Taking Corporate Governance to a Higher Level reform priorities in Asia 2011 REFORM PRIORITIES IN ASIA: TAKING CORPORATE GOVERNANCE TO A HIGHER LEVEL 2011 This work is published on the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the Organisation or of the governments of its member countries. This document and any m...
of IT risks and risk mitigation policies, plans, and measures. For example, business continuity management, IT security, incident management, and IT asset management. (4) Proper allocation and https
) CGCodePart02_2 ) Consideration of IT risks and risk mitigation policies, plans, and measures. For example, business continuity management, IT security, incident management, and IT asset management. (4) Proper