SEC Secretary-General Ruenvadee Suwanmongkol said that SEC and the related agencies had discussed the COVID-19 situation and acknowledged limitations on the AGM holding of listed companies. The meeting concluded with primary suggestions as follows: (1) proxy voting: shareholders are advised to consider proxy voting through independent directors instead of in-person voting at the meeting. If the meeting’s notice has not been sent, listed companies are requested to inform s...
(s) (i.e. relevance, materiality), the motivation for the SPT(s) (i.e. ambition level, consistency with overall strategic planning and benchmarking approach), the potential change of bond financial and
potential change in the securities price is deemed to be taking an unfair advantage of other people. Such action is in violation of Section 241 and liable to the penalties under Section 296 of the Securities
possible successor(s). (b) “CIS” means a collective investment scheme. (c) “Covered Entity” means a Covered Fund and/or Covered Management Company. (d) “Covered Fund” means a Thai CIS and/or a Hong Kong CIS
Case of Possible Impact on the Holding of Juristic Person’s Meeting B.E. 2563 (2020), dated 4 March 2020,
Thailand (SET) to discuss possible solutions to the AGM holding of listed companies amid the spread of COVID-19, SEC has disseminated the circular and frequently asked questions to inform all listed
significantly alter the returns and risks of the fund, for example, the calculation and announcement of asset value, unit value, subscription and redemption prices. The consultation paper can be
the financial statements (paragraph number........) ( 2.2 The auditor is unable to obtain sufficient appropriate audit evidence on which to base the opinion, but the auditor concludes that the possible
monitoring and coordinating with the business operators, we have found that they have implemented their BCP to manage possible impacts of COVID-19 and opened an alternative site or installed remote working
the consistency and cybersecurity that is appropriate and sufficient to protect against possible risks from cyber threats. _____________________________