iifl-logo

Neetu Yoshi Ltd Board Meeting

111.7
(-4.41%)
Aug 1, 2025|12:00:00 AM

CORPORATE ACTIONS

03/08/2024calendar-icon
03/08/2025calendar-icon
PurposeBoard Meetings DateAnnouncement Date
Board Meeting28 Jul 202524 Jul 2025
Audited Results-Neetu Yoshi Ltdhas informed BSE that the meeting of the Board of Directors of the Company is scheduled on 28/07/2025 ,inter alia, to consider and approve audited financial results of the Company for the half year and year ended 31st March, 2025. Pursuant to Regulation 30 of the SEBI (Listing Obligations and Disclosures Requirements) Regulations, 2015 (LODR Regulations), the meeting of Board of Directors of the Company held today i.e. July 28, 2025 at 19:00 hours and concluded at 23:15 hours, and has inter alia considered and approved the following matter: 1) Audited Standalone and Consolidated Financial Results for the Half Year and Year ended on March 31, 2025, as recommended by the Audit Committee. (As Per BSE Announcement Dated on :28.07.2025)

Neetu Yoshi Ltd: Related News

No Record Found

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.