iifl-logo

Emkay Tools Ltd Company Summary

999.75
(6.93%)
Jul 28, 2025|12:00:00 AM

Emkay Tools Ltd Summary

Emkay Tools Limited was incorporated on April 25, 2023, as a wholly owned Subsidiary of the Emkay Taps and Cutting Tools Limited. Company filed a declaration of Commencement of Business with the ROC on May 23, 2023.The Scheme of Arrangement between Emkay Taps and Cutting Tools Limited and the Company became effective on November 19, 2024 upon filing of the said Order with the Registrar of Companies, Mumbai. In Emkay Taps and Cutting Tools Limited (ETCTL), the manufacturing business of threading taps and cutting tools division was demerged into the Company as a going concern on April 1, 2024. This demerger was approved by the Board and the National Company Law Tribunal (NCLT). The demerged undertaking was vested in the Company, and shareholders of ETCTL received equity shares of ETL in a 1:1 ratio. Pursuant to the Scheme, the Company had allotted 1 fully paid-up equity shares the face value of Re 1/- each of the Company for every 1 fully paid-up equity shares the face value of Rs 10/- each held in Emkay Taps and Cutting Tools Limited.

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.