. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
concerned person realise the essential of security of the information technology thoroughly had known the duties and responsibilities and guideline on controlling the various risk which have a content
provide a measure for protecting information security and computer system and network which is sufficient for preventing an unauthorised person from accessing, acknowledging, utilizing or altering such
, utilizing or altering such information or system. Clause 7. The securities company must provide a controlling measure which is sufficient for the developed or modified application software to have a correct
committed an offense under Section 89/25*, for example, taking the assets of the juristic person with dishonest intent, obtaining unlawful gains which damages the juristic person, or altering, shortening
juristic person with dishonest intent, obtaining unlawful gains which damages the juristic person, or altering, shortening or falsifying documents. In addition, SEC has prescribed a procedure for
January 2018 2. The Concerned parties: The Seller: Unique Engineering and Construction Public Company Limited The Buyer: Suphankeeree Company Limited 3. Details of Connected Transaction: Suphankeeree
Earlier, the SEC received tips from the concerned public and stakeholders that unlicensed digital asset business operators, both local and foreign, were soliciting investments and services to the
that “it is a policy of SEC to seek public opinions and learn about problems and obstacles of the concerned parties in every sector of the capital market, including securities business operators and
objectives, directions and strategies take into consideration the interest of the public, investors, business operators, fundraisers, and all parties concerned,? added Mrs. Waratchya