Contact Address:

Communication Address

ICICI Bank UK PLC, Postfach 2175, 26414 Schortens, Germany

Management Office

ICICI Bank UK PLC, Germany Branch, Frankfurter Strasse 27 , 65760 Eschborn, Germany

Head Office

ICICI Bank UK PLC., One Thomas More Square, London E1W 1YN, United Kingdom

Authorised Representatives:

Board of Directors

Mr. Sriram H. Iyer
Mr. Rajesh Rai
Mr. Raghav Singhal
Mr. Stephen Krag
Mr. Huw Morgan
Mrs. Serena Joseph

Geschäftsleiter Deutschland

Mr. Devdutta Panda
Ms. Dayanara Heisig

Supervisory Authorities

Bundesanstalt für Finanzdienstleistungsaufsicht

Graurheindorfer Straße 108
53117 Bonn


Marie-Curie-Straße 24 - 28,
60439 Frankfurt am Main

Europäische Zentralbank

Sonnemannstraße 20
60314 Frankfurt am Main

Handelsregister (Commercial Register):

HRB 80517 Amtsgericht Frankfurt am Main

ICICI Bank UK PLC Company Register for England and Wales No.:


Bank Sort Code/ Bankleitzahl:

501 201 00

VAT Identification Number (USt-IdNr.) :


Online Dispute Resolution (ODR):

EU Regulation no. 524/ 2013 on online dispute resolution in consumer affairs provides for the possibility for consumers to settle disputes with companies associated with online service agreements out of court through an online platform (OS platform). It was set up by the European Commission and can be reached via the following link:

User Identification

Money2India Europe verifies the identity of all registered users before they can start using the Bank's services. For Customer convenience, Money2India Europe facilitates both online and offline mode of identification.

Documents required for conducting Online User Identification:

  • Your passport
  • Your Resident Card

If your Resident Card/ passport doesn't have the current overseas address, please keep a copy of any one of the below documents handy, reflecting your current address with your name:

  • City registration document
  • Electricity-Bill or physical letter from a local electricity provider
  • Gas-Bill or physical letter from provider
  • A Bank letter, if the Letter is containing the customers address
  • Bank statement
  • Confirmation or insurance policy issued by a regulated local insurance company (e.g. health insurance)
  • Confirmation letter from the current employer in Europe

The above documents must not be older than three months (except the residence permit). If letters are used, these have to be personally addressed. A document will not be accepted if it does not contain the full and correct address.

Online Video Identification:

Money2India Europe has introduced video identification (VideoIdent), the latest evolution to identify its registered users. This identification service is completely online and can be completed within 10 minutes from the comfort of your home. It is not necessary to install specific software on your systems as this video identification can be done using your regular browsers with a stable internet connection.

Money2India Europe uses VideoIdent services provided by IDnow to conduct video identification. To know more about this partner please click here.

Your video identification process consists of four steps:

Step 1: Login to M2I Europe > Initiate your 1st Transfer > select your mode of User Identification

Step 2: You would be taken to our partner's site. Your unique Ident-ID will be displayed on top and bottom of the screen. Choose a device (Smartphone/Tablet or Computer) to initiate the identification process.

For smartphones / tablets, IDnow app can be downloaded from Android and iOS stores using the links provided on the page. Else, you may request for a link to be sent to your mobile device via SMS. Users opting for Computer with webcam do not require any app.

Step 3: Verify your mobile number and provide expiry date of your identification document and click on 'Start Identification'. An automated connection speed test will run to ensure a stable internet connection.

Step 4: A video call will start with the partner's agent. You will be taken though Name and photo verification step followed by ID front and back side scan and security feature verification for which you need to show your identification document to the agent on video.

Please ensure that you have your ID documents (passport, resident card or any address proof) handy before starting the Identification video call. In case your current address is not mentioned on the Resident card, please keep a copy of Utility bill along to show it to the IDNow agents while conducting your online KYC.

Step 5: Once the details are verified, your job is done. You will be sent a confirmation email once your identification is completed.

This Identification service is free of charge for you.

Offline Post Office Identification Process in Germany:

Step 1: Login with your Money2India Europe account and download the Postident coupon.

Step 2: Visit the nearest agent of Deutsche Post AG personally with the Postident coupon and your official ID documents such as passport (Reisepass) or ID card (Personalausweis).

Step 3: Present the Postident coupon as well as your identification document to the postal clerk. The clerk at Deutsche Post AG will capture the data and ask for your signature on the Postident form to confirm the details. The Post office will then send us this form. The details will be updated on Money2India Europe within 2-3 working days. You will receive an email once the process is complete.

This identification process is free of charge and you need not pay the post office.

Privacy Policy

In this Privacy Notice:

Data Protection Legislation means (i) before 25 May 2018, the EU Data Protection Directive 95/46 and all national implementing laws (including the UK Data Protection Act 1998); and (ii) on or after 25 May 2018, the EU General Data Protection Regulation 2016/679 ("GDPR"); together with all other applicable and national implementing legislation relating to privacy or data protection; and where we use the terms "personal data", "data subject", "controller", "processor" and "process" (and its derivatives), such terms shall have the meanings given to them in the Data Protection Legislation.


ICICI Bank UK PLC (ICICI Bank) is committed to keeping your personal data private. We shall process any personal data we collect from you in accordance with Data Protection Legislation and the provisions of this Privacy Notice. Please read the following carefully to understand our views and practices regarding your personal data and how we will treat it.


For the purpose of the GDPR ICICI Bank is the data controller of your information. This means that we are responsible for deciding how we hold and use your personal data. We are required under Data Protection Legislation to notify you of the information contained in this Privacy Notice.


We have appointed a Data Protection Officer (DPO) to oversee compliance with this Privacy Notice. If you have any questions about this Privacy Notice or how we handle your personal data, please contact the DPO at the contact details set out below.


ICICI Bank will collect and process your personal data you provide us through application forms, our website, face-to-face and electronic communication (including telephone conversations) in order to provide our services to you.


We may collect, store, and use the following categories of personal data about you:

  • Personal contact details such as name, title, addresses, telephone numbers, and personal email addresses.
  • Date of birth
  • Gender
  • Employment status and salary
  • Marital status and dependants
  • Financial information
  • Pay records
  • Location of employment or workplace
  • Copies of driving licences or other IDs like passports
  • Information we obtain from third parties, such as information that we obtain when verifying details supplied by you and information collected from publicly available sources such as Companies House. Such third parties may include fraud prevention agencies, banks, merchants and credit reference agencies.
  • Other information about an individual that you or they disclose to us when communicating with us
  • CCTV footage and other information obtained through electronic means
  • Photographs
  • IP addresses
  • Cookies

Please note, however, that in certain circumstances it may be still lawful for us to continue processing this information even where consent has been withdrawn, if one of the other legal bases described below is applicable.


We obtain information about your usage of our internet sites through cookie files, which are stored on the hard drive of your computer. Cookies contain information that is transferred to your computer's hard drive. They help us to improve our website and to deliver a better and more personalised service. currently uses the following cookies on our websites:

Cookie Current Use
These cookies work together to determine a visitor session. utmb takes a timestamp of the exact moment in time when a visitor enters the site, while utmc takes a timestamp of the exact moment in time when a visitor leaves the site.
__utma This cookie keeps track of the number of times a visitor has been to the website, when was their first visit and when did their last visit occur
__utmz To identify the traffic sources as well as to determine the visitor navigation to the website. For instance, this cookie determines what search engine was used, what link was clicked on, what keyword was used and where in the world the user accessed our website from.

You may refuse to accept cookies by activating the setting on your browser, which allows you to refuse the setting of cookies. However, if you select this setting you may be unable to access certain parts of our website. Unless you have adjusted your browser setting so that it will refuse cookies, our system will issue cookies when you log on to our site. Please note that our advertisers may also use cookies over which we have no control. We recommend the following site for further information on how to control and/or disable cookies:


We are permitted to process your personal data in compliance with Data Protection Legislation by relying on one or more of the following lawful grounds:

  • You have explicitly agreed to us processing such information for a specific reason
  • The processing is necessary to perform the agreement we have with you or to take steps to enter into an agreement with you
  • The processing is necessary for compliance with a legal obligation we have
  • The processing is necessary for the purposes of a legitimate interest pursued by us, which might be
  • To provide services to you
  • To ensure that our customer accounts are well-managed
  • To prevent, detect, investigate and prosecute fraud and alleged fraud, money laundering and other crimes and to verify your identity in order to protect our business and to comply with laws that apply to us and/ or where such processing is a contractual requirement of the services or financing you have requested
  • To protect our business interests
  • To ensure that complaints are investigated
  • To evaluate, develop or improve our services; or
  • To keep our customers informed about relevant services, unless you have indicated at any time that you do not wish us to do so


Specifically, we and our other group companies may use your information for the following purposes and under the following legal bases:

How we use your information Legal basis
To provide and manage your account(s) and our relationship with you
  • Where necessary for the performance of our agreement or to take steps to enter into an agreement with you
  • Where the law requires this
  • Where it's in our legitimate interests to ensure that our customer accounts are well-managed, so that our customers are provided with a high standard of service, to protect our business interests and the interests of our customers
To give you statements and other information about your account or our relationship
  • Where necessary for the performance of our agreement or to take steps to enter into an agreement with you
  • Where the law requires this
To handle enquiries and complaints
  • Where necessary for the performance of our agreement or to take steps to enter into an agreement with you
  • Where the law requires this
  • Where it's in our legitimate interests to ensure that complaints are investigated, for example, so that our customers receive a high standard of service and so that we can prevent complaints from occurring in future
  • In the case of sensitive information, such as medical information, where you have agreed
To provide our services to you
  • Where necessary for the performance of our agreement or to take steps to enter into an agreement with you
  • Where the law requires this
For assessment, testing (including systems tests) and analysis (including credit and/ or behaviour scoring), statistical, market and product analysis and market research. We may use this information to prepare statistical reports to be shared internally or with our group companies. We compile these reports from information about you and our other customers. The information in these reports is never personal and you will never be identifiable from them.
  • Where the law requires this
  • Where it's in our legitimate interests to develop, build, implement and run business models and systems which protect our business interests and provide our customers with a high standard of service
To evaluate, develop and improve our services to you and other customers
  • Where it's in our legitimate interests continually to evaluate, develop or improve our products as well as the experiences of users of our sites, so that our customers are provided with a high standard of service
To protect our business interests and to develop our business strategies
  • Where it's in our legitimate interests to protect our people, business and property and to develop our strategies
  • Where necessary for the performance of our agreement or to take steps to enter into an agreement with you
  • Where the law requires this
  • In the case of sensitive information, such as medical information, where you have agreed
To contact you, by post, phone, text, email and other digital methods

This may be:
  • To help you manage your accounts
  • To meet our regulatory obligations
  • To keep you informed about products and services you hold with us and to send you information about products or services (including those of other companies) which may be of interest to you
  • Where it's in our legitimate interests to protect our people, business and property and to develop our strategies
  • Where necessary for the performance of our agreement or to take steps to enter into an agreement with you
  • Where the law requires this
  • In the case of sensitive information, such as medical information, where you have agreed
To collect any debts owing to us
  • Where it's in our legitimate interests to collect any debts owing to us
  • In the case of sensitive information, such as medical information, where you have agreed
To meet our regulatory compliance and reporting obligations and to prevent, detect, investigate and prosecute fraud and alleged fraud, money laundering and other crimes. We may record your image on CCTV when you visit our premises.
  • Where the law requires this
  • Where it's in our legitimate interests to prevent and investigate fraud, money laundering and other crimes
  • Where such processing is a contractual requirement of the services or financing you have requested
To assess any application you make, including carrying out fraud, money laundering, identity, sanctions screening and any other regulatory checks.
  • Where you have made data public
  • Where such actions are in our legitimate interests, for the protection of our business interests
  • Where the law requires this
  • In the case of sensitive information, such as medical information, where you have agreed
To assess any application you make, including carrying out fraud, money laundering, identity, sanctions screening and any other regulatory checks.
  • Where you have made data public
  • Where such actions are in our legitimate interests, for the protection of our business interests
  • Where the law requires this
  • In the case of sensitive information, such as medical information, where you have agreed
To monitor, record and analyse any communications between you and us, including phone calls
  • Where it's in our legitimate interests, to check your instructions to us, to prevent and detect fraud and other crime, to analyse, assess and improve our services to customers, and for training, for the enhancement of our customer service provision and protection of our business interests
  • In the case of sensitive information, such as medical information, where you have agreed
To transfer your information to or share it with any third party to whom your account has been or may be transferred following a restructure, sale or acquisition of any group company
  • Where necessary for the performance of our agreement with you
  • Where we have a legitimate interest in restructuring or selling part of our business
To share your information with UK or other relevant tax authorities, credit reference agencies, fraud prevention agencies, and UK and overseas regulators and authorities
  • Where the law requires this
  • Where we have a legitimate interest in performing certain credit checks so that we can make responsible business decisions. As a responsible organisation, we need to ensure that we only provide certain products to companies and individuals where the products are appropriate, and that we continue to manage the services we provide, for example if we consider that you may have difficulties making a payment to us
  • Where we have a legitimate interest in assisting with the prevention and detection of fraud and other crime
  • Where we have a legitimate interest in assisting UK and overseas regulators, who monitor banks to ensure that they comply the law and regulations
  • More detail on our data sharing with these organisations is set out below
To share your information with our partners and service providers
  • Where necessary for the performance of our agreement
  • Where we have a legitimate interest in using third parties to provide some services for us or on our behalf


If you apply to us for a product, your application may be processed by an automated decision-making process, which may carry out credit and affordability assessment checks to determine whether your application will be accepted. Where these automated processes suggest that your application should be rejected, we will manually review your application before making a final decision. We may also use automated processes to decide credit limits.

We may also carry out automated anti-money laundering and sanctions checks. This means that we may automatically decide that you pose a fraud or money laundering risk if the processing reveals your behaviour to be consistent with that of known fraudsters or money launderers, is inconsistent with your previous submissions, or you appear to have deliberately hidden your true identity.

If we, or a fraud prevention agency, determine that you pose a fraud or money laundering risk: (i) we may refuse to provide the services you have requested, or we may stop providing existing services to you; and (ii) a record of any fraud or money laundering risk will be retained by the fraud prevention agencies, and may result in others refusing to provide services or employment to you.

If you have any questions about this, please contact us on the details set out below.


We keep all your personal data confidential. However, in order to be able to service your needs to the best of our ability, we may share any information you provide to us with our group companies and their agents, counterparties and support service or data providers, wherever located. If you have provided information to other members of our group, those entities may also share that information with us. We will ensure that if we share such information with third parties, any such disclosure is at all times in compliance with Data Protection Legislation.

To help us provide services, your data will be processed internally and externally by other third parties. We use third parties for [administrative, servicing, monitoring and storage of your data]. We will outsource some services to third parties whom we consider capable of performing the required processing activities so that there is no reduction in the service standard provided to you by us.

The recipients or categories of recipients, of your information may be:

  • Any revenue service or tax authority including to HMRC, if obliged to do so under applicable regulations. For Common Reporting Standards and FATCA, we may also have to report your account(s) to the necessary tax authorities
  • UK and overseas regulators and authorities in connection with their duties (such as crime prevention)
  • Anyone to whom we may transfer our rights and/or obligations
  • Any other person or organisation after a restructure, sale or acquisition, as long as that person uses your information for the same purposes as it was originally given to us or used by us (or both)
  • Credit reference, identity and address verification organisations who may record and use your information and disclose it to other lenders, financial services organizations and insurers. Your information may be used by those third parties to make assessments in relation to your creditworthiness for debt tracing
  • Fraud prevention agencies and law enforcement agencies who will use it to prevent fraud and money-laundering and to verify your identity if false or inaccurate information is provided by you and fraud is identified. We, fraud prevention agencies and law enforcement agencies may access and use your information for example, when:
  • Checking details on applications for credit and credit related or other facilities;
  • Managing credit and credit related accounts or facilities;
  • Recovering debt;
  • Checking details on proposals and claims for all types of insurance.

For further information please refer to our product specific terms and conditions and application form.


Information about you in our possession may be transferred to other countries outside the European Economic Area (particularly to our parent company in India) for any of the purposes described in this Privacy Notice.

You and they understand and accept that these countries may have differing (and potentially less stringent) laws relating to the degree of confidentiality afforded to the information it holds and that such information can become subject to the laws and disclosure requirements of such countries, including disclosure to governmental bodies, regulatory agencies and private persons, as a result of applicable governmental or regulatory inquiry, court order or other similar process. In addition, a number of countries have agreements with other countries providing for exchange of information for law enforcement, tax and other purposes.

When we, or our permitted third parties, transfer information outside the European Economic Area, we or they will impose contractual obligations on the recipients of that data to protect such information to the standard required in the European Economic Area. We or they may require the recipient to subscribe to international frameworks intended to enable secure data sharing. In the case of transfers by us, we may also transfer your information where the transfer is to a country deemed to provide adequate protection of your information by the European Commission or you have consented to the transfer.

If we transfer your information outside the European Economic Area in other circumstances (for example because we have to provide such information by law), we will use best endeavours to put in place appropriate safeguards to ensure that your information remains adequately protected.


We will only keep the information we collect about you on our systems or with third parties for as long as required for the purposes set out above or as required to comply with any legal obligations to which we are subject. This will involve us regularly reviewing our files to check that information is accurate and up-to-date and still required.

We will normally destroy or erase data after statutory timelines lapse. However, we may retain your information, or information relating to your account after you cease to be a customer for longer than this, provided it is necessary for a legal, regulatory, fraud prevention or other legitimate business purpose.

For example, Regulatory reasons can be:

Compliance with records retention periods under commercial and tax law, such as the German Commercial Code (Handelsgesetzbuch – HGB); the German Tax Code (Abgabenordnung – AO); the Banking Act (Kreditwesengesetz – KWG); the Money Laundering Act (Geldwäschegesetz – GwG); and the Securities Trading Act (Wertpapierhandelsgesetz – WpHG). The records retention periods prescribed therein range from two to 10 years.


All information you provide to us is stored in our secure servers. Where we have given you (or where you have chosen) a password which enables you to access certain parts of our website, you are responsible for keeping this password confidential. We ask you not to share your password with anyone.

We have put in place appropriate security measures to prevent your personal data from being accidentally lost, used or accessed in an unauthorised way, altered or disclosed. In addition, we limit access to your personal data to those employees, agents, contractors and other third parties who have a business need to know basis. They will only process your personal data on our instructions and they are subject to a duty of confidentiality.

We have put in place procedures to deal with any suspected data security breach and will notify you and any applicable regulator of a suspected breach where we are legally required to do so.


We may communicate with you via electronic mail (e-mail). We will never ask you for your password or account number.

When you contact us through any of our communication channels including visiting a local branch or calling the telephone banking service, we will verify your identity by asking you a number of questions based on information known to us about you and the transactions on your account. We may record your calls for training, quality and security purposes.


We and other members of our group may use your information from time to time to inform you by letter, telephone, text (or similar) messages, email or other electronic means, about similar services which may be of interest to you or them.

You may, at any time, request that we cease or do not send such information by one, some or all channels, by contacting us using the contact details set out below.


Under certain circumstances, by law you have the right to:

  • Be informed about the processing of your personal data (i.e. for what purposes, what types, to what recipients it is disclosed, storage periods, any third party sources from which it was obtained, confirmation of whether we undertake automated decision-making, including profiling, and the logic, significance and envisaged consequences)
  • Object to your personal data being processed for a particular purpose or to request that we stop using your information
  • Request not to be subject to a decision based on automated processing and to have safeguards put in place if you are being profiled based on your personal data
  • Ask us to transfer a copy of your personal data to you or to another service provider or third party where technically feasible and otherwise required by applicable regulations
  • Withdraw, at any time, any consent that you have previously given to us for our use of your personal data
  • Ask us to stop or start sending you marketing messages at any time
  • Request access to your personal data (commonly known as a "data subject access request"). This enables you to receive a copy of the personal data we hold about you and to check that we are lawfully processing it
  • Request correction of the personal data that we hold about you. This enables you to have any incomplete or inaccurate information we hold about you corrected. It is important that the personal data we hold about you is accurate and current. Please keep us informed if your personal data changes during your working relationship with us
  • Request the erasure of your personal data. This enables you to ask us to delete or remove personal data where you think that we do not have the right to process it

Any request for access to or a copy of your personal data must be in writing and we will endeavour to respond within a reasonable period and in any event within one month in compliance with Data Protection Legislation. We will provide this information free of charge unless the request is manifestly unfounded or excessive. We will comply with our legal obligations as regards any individual's rights as a data subject.

If you would like to contact us in relation to any of the rights set out above please contact us using the following contact details. To protect your privacy and security, we may take reasonable steps to verify your identity before providing you with the details.

Ms. Priti Shetty, The Data Protection Officer, ICICI Bank UK PLC, Germany Branch,. Frankfurter Strasse 27, 65760 Eschborn, Germany


The content or services mentioned on our website may be changed in future and consequently this Privacy Notice may also change. Any changes we may make to this Privacy Notice in the future will be posted on this page and where appropriate, notified to you by email. We recommend that you re-visit this page regularly and inform us if you do not agree to any term mentioned here.

Terms of use

For Payment initiated through Payment Gateways

Our payment funding through payment gateways like Klarna, Trustly and Ideal enables a Registered User of the tracking facility to initiate remittance transaction from their non ICICI Bank account held with Payment gateway provider's compatible bank (click here for list of compatible banks).


"Account" means an Payment gateway provider's compatible local bank account held by the Registered User.

"Adequate Balance" means the minimum amount which must be available in the Account in order to initiate the remittance transaction by using the Service.

"Beneficiary Bank" means the bank in India with which the Registered Beneficiary holds an account.

"Registered User" means a resident of Germany and who is registered with

"Registered Beneficiary" means a person who has been registered by the Registered User as the beneficiary with and nominated by the Registered User to receive payments through the Service.

"Service" means the tracking facility using the modes of transfer offered by ICICI Bank to the Registered User by which money may be sent to a Registered Beneficiary.

"Transfer" means the payment of funds authorized by Registered User through their Account to be processed and delivered to the Registered Beneficiary.

Terms of use

Limitation of Liability

ICICI Bank will generally rely without further enquiry on the Transfer instructions given by the Registered User's bank unless ICICI Bank has reasonable cause to believe that such instructions are incorrect, unauthorized or fraudulent.

General Money2India Europe Terms of Use

These terms of use ("Terms of Use") apply to the whole website including the Money2India tracking facility provided by ICICI Bank UK PLC, Germany Branch, Frankfurter Strasse 27, 65760 Eschborn, Germany ("ICICI Bank"). ICICI Bank is a branch of ICICI Bank UK PLC, One Thomas More Square, London E1W 1YN, United Kingdom which is authorised as bank in the United Kingdom. With the registration for the Money2India tracking facility the user accepts these terms and conditions.

Overview of the tracking facility


Registration Information

To register successfully as a registered user it is necessary to complete a one time registration form. You will be asked to provide your identity details and permanent address.

Registered users can choose a registered user´s ID as part of the registration process. Along with the registered user password, the registered user ID will enable the registered user to

Preconditions for the Use of the Tracking Facility

Fees and Charges

The use of the tracking facility is free of charge.

Use of Information

No Agency or Banking Relationship



ICICI Bank reserves the right to change the content of the website, these terms of use and the privacy policy at any time. In the event of a change, ICICI Bank will indicate the change to the registered user in an appropriate way and provide an updated version of these terms of use or the privacy policy on the website.

Intellectual Property Rights

ICICI Bank is the owner and / or authorized user of any trademark, registered trademark and / or service mark appearing on the website, and is the copyright owner or licensee of the content and / or information on the website including but not limited to any text, links, images, logos, illustrations, audio clips, video clips, screens and product and registered users or any visitor shall not download and / or save a copy of the website or any part thereof including any of the screens or part thereof and/or reproduce, store it in a retrieval system or transmit it in any form or by any means - electronic, electrostatic, magnetic tape, mechanical printing, photocopying, recording or otherwise including the right of translation in any language without the express permission of ICICI Bank (except as otherwise provided on the website or in the terms and conditions for any purpose) or use or modify it in any manner that is likely to cause confusion or deception among persons or in any manner disparages or discredits ICICI Bank or any service providers.


Online security

How do you protect me online?

We are committed to providing our customers with a secure online experience. We strive to utilise state-of-the-art technology to protect your information. We also employ a wide range of security features for our website.

These include:

Secure login

For logging into Money2India Europe you need to use your user ID and password. Our login page is a secure page. When you log in successfully to our Money2India Europe website, your web browser will establish a 128-bit secure socket layer (SSL) connection between your computer and our web servers.

SSL stands for 'Secure Socket Layer'. SSL is a protocol used to transmit information securely over the internet. The SSL encrypts sensitive information so it cannot be opened or understood by anyone other than the intended receiver. SSL has been accepted universally as the standard for authenticating and encrypting communication over the web.

The 128-bit SSL gives the most secure encryption available.

You can see whether a web page is secure in two main ways:

  • Check the web page URL: Normally, when browsing the web, the URLs (web page addresses) begin with the letters "http". However, over a secure connection the address displayed should begin with "https". Note the "s" at the end.
  • Try it! - Visit our home page ( Note the URL begins with 'https', meaning this page is secured. This means that the user name and password typed in will be encrypted before being sent to our server.

There is a standard among web browsers to display a "lock" icon somewhere in the window of the browser. For example, Microsoft Internet Explorer displays the lock icon at the lower right-hand side of the browser window:

Click (or double-click) the 'padlock' icon of your web browser to see details of the site's security.

This is good to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser. But, you will be able to tell this is a fraudulent site because you won't be able to click the 'padlock'.

The Entrust Digital Certificate

Digital certificates are issued by certification authorities to authenticate a website or elements of a website. The certificate verifies that the site is legitimate. Your web browser automatically accesses the certificate to check its legitimacy. If everything is as it should be, you session will carry on as normal. If there is a problem, your browser will issue a warning and your safest action is to close the website.

Number of login attempts

If you are unable to provide the correct user ID and password, you will not be granted access to website. After three unsuccessful login attempts, your user ID will be blocked automatically by our system. To re-enable your user ID, please contact us. Please click here to view contact details.

Timed logout

Our unique security features continue to protect you once you have logged in successfully. To protect your accounts against unauthorised access, our systems are designed to automatically terminate a secure online session if extended inactivity is detected. Hence if you log in and leave your session inactive for an unduly long period, the session will be terminated. If your session terminates automatically, you can log in again to continue your activities.

In addition, after logging in you cannot use the 'Back', 'Forward' and 'Refresh' buttons on your browser. If you click on any of these buttons, your secure session will be logged out automatically. This is done to ensure that no unauthorised entry can be made in your online banking during your absence from your computer system.


This is one of the security mechanisms we use to protect our systems and your information. Our firewalls use a combination of industrial-strength computer hardware and software designed to protect our servers, computer systems, networks and database from harmful information. During your secure online sessions, firewalls prevent unauthorised internet traffic from entering our website.

Constant updates to our systems

In order to effectively counter the latest security threats, we ensure that our systems are constantly updated to maintain the security of your accounts

How can I protect myself online?

Install and update antivirus software

Always ensure that your PC is updated with the latest antivirus software that's capable of scanning files and emails for viruses. This will prevent your files from being corrupted or lost and also prevent your PC from getting infected with the virus.

Antivirus software protects you from Trojan horses – a 'bug' that usually attacks computer systems through email. They are particularly dangerous because they have the potential to allow others to gain remote control of your computer system, without your knowledge or consent.

A variety of antivirus software packages are available on the market today. Many of these products install antivirus updates to your computer automatically, as long as you have the update feature enabled. Installing an antivirus software package is simple and will save you hours of frustration trying to restore an infected computer system.

Use a personal firewall

Any computer or device connected to the internet should be protected by a personal firewall.

Firewalls will help to protect your computer from malicious internet intrusions and attacks by creating a barrier between your computer and the rest of the internet.

Keep your browser and operating system up-to-date with software updates

Some operating systems and software can be configured to automatically check for software updates. If you have this functionality, make sure it's turned on so that your computer stays as secure as possible.

For more information, or to access current Microsoft Security Updates, please visit Microsoft Security Updates.

Activate a pop-up blocker

A pop-up is a form of online advertising that captures email addresses. Most web browsers let you block pop-ups in the browser security options. Alternatively you can download a pop-up blocker from the web. There are several free versions out there, just run a search in Google for 'pop-up blocker'.

Scan your computer for spyware regularly

Spyware and adware are programs that monitor your internet activity and potentially relay information to a disreputable source. Free spyware removal programmes are available on the internet.

Change your password regularly and keep it confidential

We recommend that you change your passwords regularly - at least every 30 days or so. To change your passwords, log in and go to the 'My Profile' section, then click on the 'Change Password' option at the left of the screen.

Please note: Never tell anyone your password. ICICI Bank officials will never ask you for your passwords.

Look for the padlock symbol

This can be seen on the bottom bar of your browser, showing you that the site is running in secure mode before you enter sensitive information.

Clear your browser's cache

Clear your browser's cache and history after each session so that your account information is removed, especially if you have used a shared computer to access online banking.

Logging on and off recommendations

Access to the ICICI Money2India Europe facility
Always type the address of our website in the address bar of your browser, or access it from your stored list of favourites – don't access it through a link.

Log in frequently
Logging in frequently not only helps you keep track of your status information but also enables you to notice and stop any fraudulent activity quickly.

Check for your last log in time
Log in and look at your date and time of last login.

Always log off
Log off after you complete your online banking session using the 'Logout' link. Do not rely on just closing your browser.

Be vigilant

Never fill in any form that you have accessed via a link with sensitive data such as user ID, password, PIN or other account-related information.

Things to avoid

  • Avoid downloading programmes from unknown sources. Some sources may have hidden forms of spyware or viruses that could compromise the security of your computer
  • Do not open attachments received through email unless you know the sender
  • Never open email attachments that have file extensions like .exe, .pif, or .vbs. Such files are usually dangerous
  • Do not keep computers online when not in use: either shut the PC off or physically disconnect it from its internet connection
  • Do not use shared computers. We recommend that you avoid accessing our website from a public / shared computer such as at an internet cafe

Fraudulent emails

We will never call or email you asking you to confirm your security details. If you receive any of the above claiming to be from ICICI Bank and asking for account information, do not respond to it. Instead please let us know immediately by forwarding the email to or call us. In case you have already given such sensitive information, please report this immediately to or call us. You may need to change your password, PIN or log in details.

Counterfeit websites

Online thieves often direct you to fraudulent websites via email and pop-up windows to try and collect your personal information. One way to detect a phoney website is to consider how you arrived there. You may have been directed by a link in a fake email requesting your account information. Try typing (or cutting and pasting) the URL into a new web browser window. If it does not take you to a legitimate web site, or you get an error message, it was probably just a cover for a fake site.

How do I identify a fake email/website?

Be wary of any email or website that:

  • Asks you for sensitive information: Fake emails often claim that your information has been compromised and your account has been de-activated/suspended. They will ask you to confirm the authenticity of your information/ transactions. Delete these emails and contact ICICI Bank
  • Contains spelling mistakes: Very often, 'phishing' emails will contain several spelling mistakes and even the links to the counterfeit websites may contain a URL with spelling mistakes in order to take you to a fake website. Whenever you use a link to access a website, be sure to check for the URL of the website and compare it with the original. We recommend that you type the URL yourself whenever you access, or bookmark or store our URL in your 'Favourites'
  • Contains prizes or other offers: Some fake emails promise a prize or gift certificate in exchange for completing a survey or answering a few questions. In order to collect the alleged prize, you may be asked to provide your personal information
  • Contains fraudulent job offers: Some fake emails appear to be sent by companies to offer you a job. These are often work-at-home positions, which are actually schemes that victimize both the job applicant and other customers. Be sure to confirm that the job offer is from a genuine and reputed company
  • Looks like a genuine website: Spoof websites can be difficult to detect, because even the address bar and padlock symbol that appear in your browser window can be faked. To make sure you are on our site, type in and see if you get to the same place

Below are some tips for recognising whether you have possibly been a victim of fraud:

  • If you did not receive an expected bill or statement by mail
  • If unexpected charges occur on your account
  • If there are charges on your account from unrecognised vendors
  • If the cheque leaves in your cheque book appear out of sequence
  • If you get collection calls regarding merchandise or services you did not buy

How do I protect myself from online fraud?

With a few simple steps you can help protect your account and personal information from fake emails and websites:

  • Delete suspicious emails without opening them. If you do open a suspicious email, do not open or respond to requests for personal information
  • Do not open any attachments or click on any links it may contain
  • Never provide sensitive account or personal information over email. If you have entered personal information, report it to us immediately by calling or writing to us using the 'Email us' option on our website
  • Maintain the secrecy of your PIN numbers and passwords – see our password-related tips

How do I protect myself from offline fraud?

  • Make photocopies of all your sensitive information and store them in a secure location like a safe deposit locker
  • Shred financial or personal documents before discarding. Most fraud and identity theft incidences happen as a result of mail theft
  • Whenever you or your family are away from home, get the incoming post collected by a trusted acquaintance or arrange to get your mails diverted to an alternate address. Do not leave your incoming post lying around in your absence



Antivirus software

Software that detects and removes computer viruses.



A programme that allows a user to find, view, hear and interact with material on the web. Microsoft Internet Explorer and Firefox are examples of popular browsers.





A way to make data unreadable to everyone except the recipient of a message. Encryption is often used to make the transmission of credit card numbers secure for those who are shopping on the internet.



Hardware or software that enforces security on your computer or system. It's like a locked door preventing dangerous material from getting into the room.




Someone who tries to get access to a computer system without authorisation.


The first page on a website, which introduces the site.


The mechanical devices that make up a computer system, such as the central processing unit, monitor, keyboard and mouse, as well as other equipment like printers and speakers.


ISP (Internet Service Provider)

A company that sells direct access to the internet, either through a broadband connection or dial up.

Identity theft (ID Theft)

A criminal activity where a thief steals vital information such as your name, birth date, account number or credit card number without your knowledge.



Keystroke logger

Hardware device or a software program that records each keystroke made on a particular computer. Marketed as a way for parents to monitor their children's activities on a computer, keystroke loggers are sometimes downloaded unwittingly by users. The keystroke logger then records the keystrokes and periodically uploads the information over the internet. See also 'Spyware' and 'Trojan horse'.



A word, phrase or image highlighted in a document to get someone from one place to another – typically on the internet, but also within a document.



A mule is an unwitting participant in the frauds who is recruited by fraudsters to launder stolen money across the globe.



Operating system

The main programme that runs on a computer. An operating system allows other software to run and prevents unauthorised users from accessing the system. Major operating systems include Vista, XP or MAC OS X.



A software update meant to fix problems with a computer programme. This can range from fixing bugs, to replacing graphics or improving the usability or performance of a previous version.


The criminal process of electronically gathering and selling the personal and financial information of multiple users through the use of phishing (see below).


An online identity theft scam. Typically, criminals send emails that look like they're from legitimate sources, but are not. The fake messages generally include a link to phoney or spoof websites where victims are asked to provide sensitive personal information. The information goes to criminals rather than the legitimate business. See also 'spoofing'.

Pop-up ads (Pop-ups)

Unsolicited advertising that appears as a 'pop-up' window on a computer screen. Sometimes these can be created to look like a financial institution's request for personal information.

Privacy policy

The policy under which a company operating a website handles the personal information collected from visitors to the site.




Secure Socket Layer (SSL)

SSL technology encodes information that is sent over the internet, helping to ensure that the information remains confidential.

Service Pack

A software programme that corrects known bugs or problems, or adds new features to a software programme already installed on your computer.


Is a method of capturing information contained in the magnetic strip of a card through a skimmer to be stored on an attached computer. This information is then used for online shopping or to make counterfeit credit cards.


A computer programme that enables computer hardware to work.

Software update

Software installed that's designed to enhance or repair a previously installed computer programme.


Unsolicited junk email sent to large numbers of people to promote products or services.


An online identity theft scam. Typically, criminals send emails that look like they're from legitimate sources, but are not (see also 'phishing'). The fake messages generally include a link to phoney or spoof websites where victims are asked to provide sensitive personal information. The information goes to criminals rather than the legitimate business. See also 'phishing'.


A programme that's loaded onto your computer without your knowledge. These programmes gather information from your computer activities and send them to an unknown source. If these programs often try to capture financial information that can be used to commit fraud.


Trojan horse

An apparently legitimate software that appears to perform a desirable function but instead allows unauthorised access to your computer. See also 'Spyware'.




A programme that's loaded onto your computer without your knowledge. Viruses can make copies of themselves, quickly using up all available memory. Some viruses can transmit themselves across networks.


Vishing is a combination of Voice over Internet Protocol (VoIP) and Phishing. Fraudsters feigning to represent real companies, such as a bank, call customers to provide personal details over phone.



Typically, a malicious programme that reproduces itself over a network and uses up computer resources or shuts down the system.




Germany Bank Holiday List 2024

Date Day Holiday Name
01-Jan-24 Monday New Year’s Day
29-March-24 Friday Good Friday
01-April-24 Monday Easter Monday
01-May-24 Monday Labour Day
09-May-24 Thursday Ascension Day
20-May-24 Monday Whit Monday
03-Oct-24 Tuesday Day of German Unity
24-Dec-24 Tuesday Christmas Eve
25-Dec-24 Wednesday Christmas Day
26-Dec-24 Thursday Boxing Day
31-Dec-24 Tuesday New Year’s Eve

Please note that no transaction processing takes place on Saturday, Sunday and banking holidays in Germany, as well as in remittance country and India. We recommend that you consult your account holding bank for information on local bank holidays.

Information about banking holidays in India is published by Reserve Bank of India. Kindly note, that credit to beneficiary account is subject to bank holiday in the city of account holding branch. Please click here ( to find information about banking holidays in India.

About Us


ICICI Bank Germany is a branch of ICICI Bank UK PLC (The Bank, Company No. 04663024), a wholly owned subsidiary of ICICI Bank Limited. ICICI Bank UK PLC offers retail, corporate, investment and transaction banking services in the UK and Europe. The Bank delivers its products and services through branches located in UK and its branch in Eschborn, Germany as well as through internet and telephone banking.

Money2India Europe offers a convenient, economical and trusted platform for transferring funds from any bank account in Germany to any bank account in India.

Cookie Policy

Cookies are small text files that are placed on your device by websites that you visit. They are widely used in order to make websites work, or work more efficiently, as well as to provide information to the owners of the site. Cookies we capture are Essential, Performance, Statistical and Targeting. Click OK to continue else click Manage to change your preferences.

Scroll To Top