SEC Secretary-General Ruenvadee Suwanmongkol said that SEC and the related agencies had discussed the COVID-19 situation and acknowledged limitations on the AGM holding of listed companies. The meeting concluded with primary suggestions as follows: (1) proxy voting: shareholders are advised to consider proxy voting through independent directors instead of in-person voting at the meeting. If the meeting’s notice has not been sent, listed companies are requested to inform s...
Case of Possible Impact on the Holding of Juristic Person’s Meeting B.E. 2563 (2020), dated 4 March 2020,
along with financial advocate, chief financial officer (CFO), for example. The SEC will work on curriculum design, volunteer mentors, and employers? human resource staff training to become financial
against securities and exchange law. This seminar is the starting point to help lawyers to be preparedness and extend their ability to advocate or advise investors on legal requirements and procedures
economy. In this regard, the AIMC will consider various suitable fund models and benefit proposals in the future. Furthermore, the SEC will advocate for the integration of the country's pension systems and
Thailand (SET) to discuss possible solutions to the AGM holding of listed companies amid the spread of COVID-19, SEC has disseminated the circular and frequently asked questions to inform all listed
recommendations in the Principles will apply but others may be less relevant. We also acknowledge different investment strategies, for example as employed by passive or active funds, and advocate that shareholders
the financial statements (paragraph number........) ( 2.2 The auditor is unable to obtain sufficient appropriate audit evidence on which to base the opinion, but the auditor concludes that the possible
monitoring and coordinating with the business operators, we have found that they have implemented their BCP to manage possible impacts of COVID-19 and opened an alternative site or installed remote working
the consistency and cybersecurity that is appropriate and sufficient to protect against possible risks from cyber threats. _____________________________