iifl-logo

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

sidebar image

Sandhar Technologies Limited - Updates

11 Jan 2022 , 12:00 AM

Sandhar Technologies Limited has informed the Exchange regarding This is further to our letter dated 3rd November, 2021 intimating the allotment of Equity Share in the Sandhar Amkin Industries Private Limited ( SAIPL ) SAIPL is a JV Company established pursuant to Joint Venture (JV) Agreement dated 4th September 2017, between Sandhar Technologies Limited ( STL ) and Amkin Group Private Limited ( AGPL). We are pleased to further inform that STL has infused additional fund of Rs. 3,00,00,000/- (Rupees Three Crore only) in SAIPL and has been allotted 30,00,000 Equity shares of the SAIPL on Right Basis at a price of Rs. 10/- each on January 10th , 2022. Subsequent to the above mentioned conversion, the Shareholding of STL in SAIPL stands increased as mentioned hereunder: Sr. No. Shareholding Pattern % of Shareholding 1 Sandhar Technologies Limited 72.68 2 Amkin Group Private Limited 27.32 .

Related Tags

  • Announcements
  • BSE
sidebar mobile

BLOGS AND PERSONAL FINANCE

Read More
Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.