iifl-logo

SGN Telecoms Ltd AGM

0.68
(1.49%)
Oct 7, 2025|12:00:00 AM

SGN Telecoms CORPORATE ACTIONS

09/10/2024calendar-icon
09/10/2025calendar-icon
PurposeAGM DateAnnouncement Date
AGM29 Sep 20254 Sep 2025
This is to inform you under Regulation 30 and any other regulations of SEBI (Listing Obligations and Disclosure Requirements) Regulations, 2015 that the Board of Directors of the Company at its meeting held today September 04 2025 inter-alia has taken the following decisions:- 1. The Board of Directors of the Company have considered and approved the Report of Board of Directors for the financial year ended as on March 31, 2025 under section 134 of the Companies Act, 2013. 2. The Board of Directors of the Company have considered and approved the Notice of 39th Annual General Meeting of the Company. * OTHER DETAILS AS PER ATTACHMENT
AGM30 Sep 202417 Sep 2024
AGM 30/09/2024 Voting Results & Scurtinizers Report (As Per BSE Announcement dated on 01.10.2024)

SGN Telecoms: Related News

No Record Found

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016, BSE Enlistment Number (RA): 5016
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.