Earlier, the SEC received tips from the concerned public and stakeholders that unlicensed digital asset business operators, both local and foreign, were soliciting investments and services to the public at a financial technology exhibition held at a shopping center. The SEC thus conducted an on-site investigation to collect evidence. Today, the SEC and the ECD inspected the exhibition booths at the fintech expo and found a number of business operators who may be liable to undertaking securities...
quality of the first draft of financial statements that the auditors receive from the financial statements preparers. There are 3 objectives in this study. 1. To investigate the characteristics of
operator. Noted: Filing a criminal complaint is the commencement of the criminal process. Under the Criminal Procedure Code, after receiving the complaint, the inquiry officer will investigate the case
files a criminal complaint with Economic Crime Suppression Division (ECSD) requesting ECSD to investigate the wrongfully transferred of clients’ assets under control or in possession of BX Company Limited
effective cybersecurity plans. SEC Secretary-General Rapee Sucharitakul said: ?Cyber threats are evolving very fast and becoming more complicated. Preventive measures alone may not be enough. It is therefore
The SEC is also working with the DSI in accordance with the bilateral Memorandum of Understanding for Cooperation to investigate EARTH’s suspicious acquisition of the legal rights over coal mines in
Bitcoins worth approximately 797 million baht. SEC is working closely with the enforcement personnel to investigate further details and examine whether there is any violation of laws governing securities
KITHA shares is classified as acquisition of significant asset and related party transaction, the shareholders? resolution alone was unable to satisfy the requirements under regulations under the
KITHA shares is classified as acquisition of significant asset and related party transaction, the shareholders? resolution alone was unable to satisfy the requirements under regulations under the
ensure business continuity and prevent damage caused by deficient information security ?Currently, operating business of listed companies no longer deals with economic prosperity alone. Rather, managing