iifl-logo

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Karvy Customer: For activating your account click here.
Download App

ITC Limited - Acquisition

7 Dec 2022 , 12:00 AM

Further to our letter dated 13th November, 2019, we write to advise, pursuant to Regulation 30 of the SEBI (Listing Obligations and Disclosure Requirements) Regulations, 2015, that the Company has acquired on 6th December, 2022, in the fourth tranche, 1,967 Compulsorily Convertible Preference Shares of Rs. 10/- each of Delectable Technologies Private Limited (Delectable).With the aforesaid acquisition, the Company???s shareholding in Delectable aggregates 33.42% of its share capital on a fully diluted basis.

Related Tags

  • Announcements
  • BSE
Download App

BLOGS AND PERSONAL FINANCE

Read More
Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2026, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132 (Member ID - NSE: 10975 BSE: 179 MCX: 55995 NCDEX: 01249), DP SEBI Reg. No. IN-DP-185-2016, PMS SEBI Regn. No: INP000002213, IA SEBI Regn. No: INA000000623, Merchant Banker SEBI Regn. No. INM000010940, RA SEBI Regn. No: INH000000248, BSE Enlistment Number (RA): 5016, AMFI-Registered Mutual Fund Distributor & SIF Distributor
ARN NO : 47791 (Date of initial registration – 17/02/2007; Current validity of ARN – 08/02/2027), PFRDA Reg. No. PoP 20092018, IRDAI Corporate Agent (Composite) : CA1099

ISO certification icon
We are ISO/IEC 27001:2022 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.