Skip to Content

Schedule B to Part 46

Court Rules



RDC Rule 48.40

To [insert name of person or body to whom the notice is addressed]

TAKE NOTICE that [insert name and address]

claims to be beneficially entitled to an interest in the following securities — [specify the securities, giving the name(s) in which they stand]

This Notice requires you to refrain from:

1. registering a transfer of the securities specified above; or

2. paying any dividend or interest in respect of the securities [delete if inappropriate]; without first giving 14 days’ notice in writing to the said [insert name] of the above address.


Privacy Policy

The Dispute Resolution Authority and all its affiliates are committed to preserve the confidentiality, integrity and availability of client data and personal information.

Dispute Resolution Authority and all its affiliates employees, vendors, contract workers, shall follow Information Security Management System in all the processes and technology.

  1. DRA's Top Management is committed to secure information of all our interested parties.
  2. Information security controls the policies, processes, and measures that are implemented by DRA in order to mitigate risks to an acceptable level, and to maximize opportunities in order to achieve its information security objectives.
  3. DRA and all its affiliates shall adopt a systematic approach to risk assessment and risk treatment.
  4. DRA is committed to provide information security awareness among team members and evaluate the competency of all its employees.
  5. DRA and all its affiliates shall protect personal information held by them in all its form.
  6. DRA and all its affiliates shall comply with all regulatory, legal and contractual requirements.
  7. DRA and all its affiliates shall provide a comprehensive Business Continuity Plan encompassing the locations within the scope of the ISMS.
  8. Information shall be made available to authorised persons as and when required.
  9. DRA’s Top Management is committed towards continual improvement in information security in all our processes through regular review of our information security management system.