Desktop Marketing Co.,Ltd. Between August 2001 and 22 May 2003, Desktop Marketing Co.,Ltd. with other alleged persons operated securities brokerage business and solicited foreign clients to invest in
. CJB Asia Co., Ltd., and Desktop Marketing Co.,Ltd. violated Section 301. The public prosecutor issued a prosecution order; however, the alleged offender has evaded the arrest and has been pursued for
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
risks to be of significance, which are: accessing to the information and computer system by an unauthorised person, an authorised person is unable to access to the information in the computer system in
to consultation papers and more convenient participation in the hearing process. The website is accessible via multiple devices such as desktop, tablet and mobile phone, to fit the users
. Computer Operation. 8. IT Outsourcing. Policy of Security of the Information Technology. Objective Providing a policy of security of the information technology has an objective for the user and the concerned
Information Technology of a Securities Company. 2. Segregation of Duties. 3. Physical Security. 4. Information and Network Security. 5. Change Management. 6. Backup and IT Contingency Plan. 7. Computer
business sector’s awareness and readiness to handle cyber threats, with guest speakers, i.e., Pol. Col. Naughtakid Phromchan, Director of the Operations Office, Thailand Computer Emergency Response Team
Securities and Exchange Commission 3 Appendix Definitions “IT assets” means (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e
Securities and Exchange Commission Appendix Definitions “ IT assets ” means (1) system assets, i.e., computer network, system software, application software, and information systems; (2) equipment assets, i.e