iifl-logo

Teledata Technology Solutions Ltd Shareholding Pattern

0.25
(25.00%)
Oct 19, 2012|12:00:00 AM

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Teledata Technology Solutions Ltd SHAREHOLDING

Mar-2012Dec-2011Sep-2011Jun-2011Mar-2011

Promoter

-

-

-

-

-

Foreign

0%

0%

0%

0%

0%

Indian

12.7%

12.7%

12.7%

12.7%

12.7%

Total Promoter

-

-

-

-

-

Institutions

0.37%

0.37%

0.39%

0.39%

4.24%

Non-Institutions

62.55%

62.55%

62.52%

62.52%

43.4%

Total Non-Promoter

62.92%

62.92%

62.92%

62.92%

47.65%

Custodian

24.37%

24.37%

24.37%

24.37%

39.64%

Total

100%

100%

100%

100%

100%

  • Foreign Promoter
  • Indian Promoter
  • Institutions
  • Non Institutions
  • Custodies

Promoter- 0.00%

Foreign: 0.00%

Indian: 12.70%

Non-Promoter- 0.37%

Institutions: 0.37%

Non-Institutions: 62.55%

Custodian: 24.37%

Teledata Technology Solutions Ltd: Related NEWS

No Record Found

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTOR

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.