iifl-logo

Norben Tea & Exports Ltd EGM

39.9
(5.00%)
Apr 2, 2025|03:56:04 PM

Norben Tea CORPORATE ACTIONS

02/04/2024calendar-icon
02/04/2025calendar-icon
PurposeAnnouncement DateMeeting Date
EGM4 Dec 202430 Dec 2024
Convening the Extra Ordinary General Meeting of the Company: Notice of Extra-Ordinary General Meeting of Norben Tea & Exports Ltd to be held on Monday, 30th December, 2024 The Company has fixed 23rd December, 2024 as the cut-off date for e-voting for the Extra-Ordinary General Meeting to be held on 30th December, 2024. (As Per BSE Announcement dated on 06.12.2024) Norben Tea & Exports Limited has informed the Exchange that Record date for the purpose of Meeting is 23-Dec-2024. (As Per NSE Announcement Dated on: 06/12/2024) Summary Proceedings of the Extra-Ordinary General Meeting of the Company held on Monday, 30th December, 2024. Voting Results of Extra-Ordinary General Meeting and Consolidated Scrutinizers Report. (As per BSE Announcement Dated on 30/12/2024)

Norben Tea: Related News

No Record Found

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Securities Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.