ICICI Bank UK PLC, Postfach 2175, 26414 Schortens, Germany
ICICI Bank UK PLC, Germany Branch, Frankfurterstrasse 27 , 65760 Eschborn, Germany
ICICI Bank UK PLC., One Thomas More Square, London E1W 1YN, United Kingdom
Board of Directors
Loknath Mishra (CEO)
John W. Burbidge
Sir Alan Collins
Bundesanstalt für Finanzdienstleistungsaufsicht
Graurheindorfer Straße 108
Marie-Curie-Straße 24 - 28,
60439 Frankfurt am Main
60314 Frankfurt am Main
Handelsregister (Commercial Register):
HRB 80517 Amtsgericht Frankfurt am Main
ICICI Bank UK PLC Company Register for England and Wales No.:
Bank Sort Code/ Bankleitzahl:
501 201 00
VAT Identification Number (USt-IdNr.) :
Online Dispute Resolution (ODR):
EU Regulation no. 524/ 2013 on online dispute resolution in consumer affairs provides for the possibility for consumers to settle disputes with companies associated with online service agreements out of court through an online platform (OS platform). It was set up by the European Commission and can be reached via the following link: http://ec.europa.eu/consumers/odr/.
Money2India Europe verifies the identity of all registered users before they can start using the Bank's services. For Customer convenience, Money2India Europe facilitates both online and offline mode of identification.
Documents required for conducting Online User Identification:
- Your passport
- Your Resident Card
If your Resident Card/ passport doesn't have the current overseas address, please keep a copy of any one of the below documents handy, reflecting your current address with your name:
- City registration document
- Electricity-Bill or physical letter from a local electricity provider
- Gas-Bill or physical letter from provider
- A Bank letter, if the Letter is containing the customers address
- Bank statement
- Confirmation or insurance policy issued by a regulated local insurance company (e.g. health insurance)
- Confirmation letter from the current employer in Europe
The above documents must not be older than three months (except the residence permit). If letters are used, these have to be personally addressed. A document will not be accepted if it does not contain the full and correct address.
Online Video Identification:
Money2India Europe has introduced video identification (VideoIdent), the latest evolution to identify its registered users. This identification service is completely online and can be completed within 10 minutes from the comfort of your home. It is not necessary to install specific software on your systems as this video identification can be done using your regular browsers with a stable internet connection.
Money2India Europe uses VideoIdent services provided by IDnow to conduct video identification. To know more about this partner please click here.
Your video identification process consists of four steps:
Step 1: Login to M2I Europe > Initiate your 1st Transfer > select your mode of User Identification
Step 2: You would be taken to our partner's site. Your unique Ident-ID will be displayed on top and bottom of the screen. Choose a device (Smartphone/Tablet or Computer) to initiate the identification process.
For smartphones / tablets, IDnow app can be downloaded from Android and iOS stores using the links provided on the page. Else, you may request for a link to be sent to your mobile device via SMS. Users opting for Computer with webcam do not require any app.
Step 3: Verify your mobile number and provide expiry date of your identification document and click on 'Start Identification'. An automated connection speed test will run to ensure a stable internet connection.
Step 4: A video call will start with the partner's agent. You will be taken though Name and photo verification step followed by ID front and back side scan and security feature verification for which you need to show your identification document to the agent on video.
Please ensure that you have your ID documents (passport, resident card or any address proof) handy before starting the Identification video call. In case your current address is not mentioned on the Resident card, please keep a copy of Utility bill along to show it to the IDNow agents while conducting your online KYC.
Step 5: Once the details are verified, your job is done. You will be sent a confirmation email once your identification is completed.
This Identification service is free of charge for you.
Offline Post Office Identification Process in Germany:
Step 1: Login with your Money2India Europe account and download the Postident coupon.
Step 2: Visit the nearest agent of Deutsche Post AG personally with the Postident coupon and your official ID documents such as passport (Reisepass) or ID card (Personalausweis).
Step 3: Present the Postident coupon as well as your identification document to the postal clerk. The clerk at Deutsche Post AG will capture the data and ask for your signature on the Postident form to confirm the details. The Post office will then send us this form. The details will be updated on Money2India Europe within 2-3 working days. You will receive an email once the process is complete.
This identification process is free of charge and you need not pay the post office.
In this Privacy Notice:
Data Protection Legislation means (i) before 25 May 2018, the EU Data Protection Directive 95/46 and all national implementing laws (including the UK Data Protection Act 1998); and (ii) on or after 25 May 2018, the EU General Data Protection Regulation 2016/679 ("GDPR"); together with all other applicable and national implementing legislation relating to privacy or data protection; and where we use the terms "personal data", "data subject", "controller", "processor" and "process" (and its derivatives), such terms shall have the meanings given to them in the Data Protection Legislation.
ICICI Bank UK PLC (ICICI Bank) is committed to keeping your personal data private. We shall process any personal data we collect from you in accordance with Data Protection Legislation and the provisions of this Privacy Notice. Please read the following carefully to understand our views and practices regarding your personal data and how we will treat it.
For the purpose of the GDPR ICICI Bank is the data controller of your information. This means that we are responsible for deciding how we hold and use your personal data. We are required under Data Protection Legislation to notify you of the information contained in this Privacy Notice.
DATA PROTECTION OFFICER
We have appointed a Data Protection Officer (DPO) to oversee compliance with this Privacy Notice. If you have any questions about this Privacy Notice or how we handle your personal data, please contact the DPO at the contact details set out below.
COLLECTING INFORMATION FROM YOU
ICICI Bank will collect and process your personal data you provide us through application forms, our website, face-to-face and electronic communication (including telephone conversations) in order to provide our services to you.
THE KIND OF INFORMATION WE MAY HOLD ABOUT YOU
We may collect, store, and use the following categories of personal data about you:
- Personal contact details such as name, title, addresses, telephone numbers, and personal email addresses.
- Date of birth
- Employment status and salary
- Marital status and dependants
- Financial information
- Pay records
- Location of employment or workplace
- Copies of driving licences or other IDs like passports
- Information we obtain from third parties, such as information that we obtain when verifying details supplied by you and information collected from publicly available sources such as Companies House. Such third parties may include fraud prevention agencies, banks, merchants and credit reference agencies.
- Other information about an individual that you or they disclose to us when communicating with us
- CCTV footage and other information obtained through electronic means
- IP addresses
Please note, however, that in certain circumstances it may be still lawful for us to continue processing this information even where consent has been withdrawn, if one of the other legal bases described below is applicable.
We obtain information about your usage of our internet sites through cookie files, which are stored on the hard drive of your computer. Cookies contain information that is transferred to your computer's hard drive. They help us to improve our website and to deliver a better and more personalised service. Money2india.de currently uses the following cookies on our websites:
|These cookies work together to determine a visitor session. utmb takes a timestamp of the exact moment in time when a visitor enters the site, while utmc takes a timestamp of the exact moment in time when a visitor leaves the site.|
|__utma||This cookie keeps track of the number of times a visitor has been to the website, when was their first visit and when did their last visit occur|
|__utmz||To identify the traffic sources as well as to determine the visitor navigation to the website. For instance, this cookie determines what search engine was used, what link was clicked on, what keyword was used and where in the world the user accessed our website from.|
LAWFUL GROUNDS FOR USING YOUR INFORMATION
We are permitted to process your personal data in compliance with Data Protection Legislation by relying on one or more of the following lawful grounds:
- You have explicitly agreed to us processing such information for a specific reason
- The processing is necessary to perform the agreement we have with you or to take steps to enter into an agreement with you
- The processing is necessary for compliance with a legal obligation we have
- The processing is necessary for the purposes of a legitimate interest pursued by us, which might be
- To provide services to you
- To ensure that our customer accounts are well-managed
- To prevent, detect, investigate and prosecute fraud and alleged fraud, money laundering and other crimes and to verify your identity in order to protect our business and to comply with laws that apply to us and/ or where such processing is a contractual requirement of the services or financing you have requested
- To protect our business interests
- To ensure that complaints are investigated
- To evaluate, develop or improve our services; or
- To keep our customers informed about relevant services, unless you have indicated at any time that you do not wish us to do so
PURPOSES OF PROCESSING
Specifically, we and our other group companies may use your information for the following purposes and under the following legal bases:
|How we use your information||Legal basis|
|To provide and manage your account(s) and our relationship with you||
|To give you statements and other information about your account or our relationship||
|To handle enquiries and complaints||
|To provide our services to you||
|For assessment, testing (including systems tests) and analysis (including credit and/ or behaviour scoring), statistical, market and product analysis and market research. We may use this information to prepare statistical reports to be shared internally or with our group companies. We compile these reports from information about you and our other customers. The information in these reports is never personal and you will never be identifiable from them.||
|To evaluate, develop and improve our services to you and other customers||
|To protect our business interests and to develop our business strategies||
|To contact you, by post, phone, text, email and other digital methods
This may be:
|To collect any debts owing to us||
|To meet our regulatory compliance and reporting obligations and to prevent, detect, investigate and prosecute fraud and alleged fraud, money laundering and other crimes. We may record your image on CCTV when you visit our premises.||
|To assess any application you make, including carrying out fraud, money laundering, identity, sanctions screening and any other regulatory checks.||
|To assess any application you make, including carrying out fraud, money laundering, identity, sanctions screening and any other regulatory checks.||
|To monitor, record and analyse any communications between you and us, including phone calls||
|To transfer your information to or share it with any third party to whom your account has been or may be transferred following a restructure, sale or acquisition of any group company||
|To share your information with UK or other relevant tax authorities, credit reference agencies, fraud prevention agencies, and UK and overseas regulators and authorities||
|To share your information with our partners and service providers||
AUTOMATED DECISION MAKING
If you apply to us for a product, your application may be processed by an automated decision-making process, which may carry out credit and affordability assessment checks to determine whether your application will be accepted. Where these automated processes suggest that your application should be rejected, we will manually review your application before making a final decision. We may also use automated processes to decide credit limits.
We may also carry out automated anti-money laundering and sanctions checks. This means that we may automatically decide that you pose a fraud or money laundering risk if the processing reveals your behaviour to be consistent with that of known fraudsters or money launderers, is inconsistent with your previous submissions, or you appear to have deliberately hidden your true identity.
If we, or a fraud prevention agency, determine that you pose a fraud or money laundering risk: (i) we may refuse to provide the services you have requested, or we may stop providing existing services to you; and (ii) a record of any fraud or money laundering risk will be retained by the fraud prevention agencies, and may result in others refusing to provide services or employment to you.
If you have any questions about this, please contact us on the details set out below.
We keep all your personal data confidential. However, in order to be able to service your needs to the best of our ability, we may share any information you provide to us with our group companies and their agents, counterparties and support service or data providers, wherever located. If you have provided information to other members of our group, those entities may also share that information with us. We will ensure that if we share such information with third parties, any such disclosure is at all times in compliance with Data Protection Legislation.
To help us provide services, your data will be processed internally and externally by other third parties. We use third parties for [administrative, servicing, monitoring and storage of your data]. We will outsource some services to third parties whom we consider capable of performing the required processing activities so that there is no reduction in the service standard provided to you by us.
The recipients or categories of recipients, of your information may be:
- Any revenue service or tax authority including to HMRC, if obliged to do so under applicable regulations. For Common Reporting Standards and FATCA, we may also have to report your account(s) to the necessary tax authorities
- UK and overseas regulators and authorities in connection with their duties (such as crime prevention)
- Anyone to whom we may transfer our rights and/or obligations
- Any other person or organisation after a restructure, sale or acquisition, as long as that person uses your information for the same purposes as it was originally given to us or used by us (or both)
- Credit reference, identity and address verification organisations who may record and use your information and disclose it to other lenders, financial services organizations and insurers. Your information may be used by those third parties to make assessments in relation to your creditworthiness for debt tracing
- Fraud prevention agencies and law enforcement agencies who will use it to prevent fraud and money-laundering and to verify your identity if false or inaccurate information is provided by you and fraud is identified. We, fraud prevention agencies and law enforcement agencies may access and use your information for example, when:
- Checking details on applications for credit and credit related or other facilities;
- Managing credit and credit related accounts or facilities;
- Recovering debt;
- Checking details on proposals and claims for all types of insurance.
For further information please refer to our product specific terms and conditions and application form.
DETAILS OF DATA TRANSFERS OUTSIDE THE EU
Information about you in our possession may be transferred to other countries outside the European Economic Area (particularly to our parent company in India) for any of the purposes described in this Privacy Notice.
You and they understand and accept that these countries may have differing (and potentially less stringent) laws relating to the degree of confidentiality afforded to the information it holds and that such information can become subject to the laws and disclosure requirements of such countries, including disclosure to governmental bodies, regulatory agencies and private persons, as a result of applicable governmental or regulatory inquiry, court order or other similar process. In addition, a number of countries have agreements with other countries providing for exchange of information for law enforcement, tax and other purposes.
When we, or our permitted third parties, transfer information outside the European Economic Area, we or they will impose contractual obligations on the recipients of that data to protect such information to the standard required in the European Economic Area. We or they may require the recipient to subscribe to international frameworks intended to enable secure data sharing. In the case of transfers by us, we may also transfer your information where the transfer is to a country deemed to provide adequate protection of your information by the European Commission or you have consented to the transfer.
If we transfer your information outside the European Economic Area in other circumstances (for example because we have to provide such information by law), we will use best endeavours to put in place appropriate safeguards to ensure that your information remains adequately protected.
RETENTION AND DISPOSAL OF DATA AND OUTPUT
We will only keep the information we collect about you on our systems or with third parties for as long as required for the purposes set out above or as required to comply with any legal obligations to which we are subject. This will involve us regularly reviewing our files to check that information is accurate and up-to-date and still required.
We will normally destroy or erase data after statutory timelines lapse. However, we may retain your information, or information relating to your account after you cease to be a customer for longer than this, provided it is necessary for a legal, regulatory, fraud prevention or other legitimate business purpose.
For example, Regulatory reasons can be:
Compliance with records retention periods under commercial and tax law, such as the German Commercial Code (Handelsgesetzbuch – HGB); the German Tax Code (Abgabenordnung – AO); the Banking Act (Kreditwesengesetz – KWG); the Money Laundering Act (Geldwäschegesetz – GwG); and the Securities Trading Act (Wertpapierhandelsgesetz – WpHG). The records retention periods prescribed therein range from two to 10 years.
STORAGE OF YOUR PERSONAL DATA AND DATA SECURITY
All information you provide to us is stored in our secure servers. Where we have given you (or where you have chosen) a password which enables you to access certain parts of our website, you are responsible for keeping this password confidential. We ask you not to share your password with anyone.
We have put in place appropriate security measures to prevent your personal data from being accidentally lost, used or accessed in an unauthorised way, altered or disclosed. In addition, we limit access to your personal data to those employees, agents, contractors and other third parties who have a business need to know basis. They will only process your personal data on our instructions and they are subject to a duty of confidentiality.
We have put in place procedures to deal with any suspected data security breach and will notify you and any applicable regulator of a suspected breach where we are legally required to do so.
OUR COMMUNICATION WITH YOU
We may communicate with you via electronic mail (e-mail). We will never ask you for your password or account number.
When you contact us through any of our communication channels including visiting a local branch or calling the telephone banking service, we will verify your identity by asking you a number of questions based on information known to us about you and the transactions on your account. We may record your calls for training, quality and security purposes.
We and other members of our group may use your information from time to time to inform you by letter, telephone, text (or similar) messages, email or other electronic means, about similar services which may be of interest to you or them.
You may, at any time, request that we cease or do not send such information by one, some or all channels, by contacting us using the contact details set out below.
RIGHTS OVER YOUR PERSONAL DATA
Under certain circumstances, by law you have the right to:
- Be informed about the processing of your personal data (i.e. for what purposes, what types, to what recipients it is disclosed, storage periods, any third party sources from which it was obtained, confirmation of whether we undertake automated decision-making, including profiling, and the logic, significance and envisaged consequences)
- Object to your personal data being processed for a particular purpose or to request that we stop using your information
- Request not to be subject to a decision based on automated processing and to have safeguards put in place if you are being profiled based on your personal data
- Ask us to transfer a copy of your personal data to you or to another service provider or third party where technically feasible and otherwise required by applicable regulations
- Withdraw, at any time, any consent that you have previously given to us for our use of your personal data
- Ask us to stop or start sending you marketing messages at any time
- Request access to your personal data (commonly known as a "data subject access request"). This enables you to receive a copy of the personal data we hold about you and to check that we are lawfully processing it
- Request correction of the personal data that we hold about you. This enables you to have any incomplete or inaccurate information we hold about you corrected. It is important that the personal data we hold about you is accurate and current. Please keep us informed if your personal data changes during your working relationship with us
- Request the erasure of your personal data. This enables you to ask us to delete or remove personal data where you think that we do not have the right to process it
Any request for access to or a copy of your personal data must be in writing and we will endeavour to respond within a reasonable period and in any event within one month in compliance with Data Protection Legislation. We will provide this information free of charge unless the request is manifestly unfounded or excessive. We will comply with our legal obligations as regards any individual's rights as a data subject.
If you would like to contact us in relation to any of the rights set out above please contact us using the following contact details. To protect your privacy and security, we may take reasonable steps to verify your identity before providing you with the details.
Ms. Priti Shetty, The Data Protection Officer, ICICI Bank UK PLC, Germany Branch,. Frankfurterstrasse 27, 65760 Eschborn, Germany
THIS PRIVACY NOTICE
The content or services mentioned on our website may be changed in future and consequently this Privacy Notice may also change. Any changes we may make to this Privacy Notice in the future will be posted on this page and where appropriate, notified to you by email. We recommend that you re-visit this page regularly and inform us if you do not agree to any term mentioned here.
For Payment initiated through Payment Gateways
Our payment funding through payment gateways like Klarna, Trustly and Ideal enables a Registered User of the tracking facility to initiate remittance transaction from their non ICICI Bank account held with Payment gateway provider's compatible bank (click here for list of compatible banks).
"Account" means an Payment gateway provider's compatible local bank account held by the Registered User.
"Adequate Balance" means the minimum amount which must be available in the Account in order to initiate the remittance transaction by using the Service.
"Beneficiary Bank" means the bank in India with which the Registered Beneficiary holds an account.
"Registered User" means a resident of Germany and who is registered with www.money2india.de.
"Registered Beneficiary" means a person who has been registered by the Registered User as the beneficiary with money2india.de and nominated by the Registered User to receive payments through the Service.
"Service" means the tracking facility using the modes of transfer offered by ICICI Bank to the Registered User by which money may be sent to a Registered Beneficiary.
"Transfer" means the payment of funds authorized by Registered User through their Account to be processed and delivered to the Registered Beneficiary.
Limitation of Liability
ICICI Bank will generally rely without further enquiry on the Transfer instructions given by the Registered User's bank unless ICICI Bank has reasonable cause to believe that such instructions are incorrect, unauthorized or fraudulent.
Overview of the tracking facility
To register successfully as a registered user it is necessary to complete a one time registration form. You will be asked to provide your identity details and permanent address.
Registered users can choose a registered user´s ID as part of the registration process. Along with the registered user password, the registered user ID will enable the registered user to
Preconditions for the Use of the Tracking Facility
Fees and Charges
The use of the tracking facility is free of charge.
Use of Information
No Agency or Banking Relationship
Intellectual Property Rights
ICICI Bank is the owner and / or authorized user of any trademark, registered trademark and / or service mark appearing on the website, and is the copyright owner or licensee of the content and / or information on the website including but not limited to any text, links, images, logos, illustrations, audio clips, video clips, screens and product and registered users or any visitor shall not download and / or save a copy of the website or any part thereof including any of the screens or part thereof and/or reproduce, store it in a retrieval system or transmit it in any form or by any means - electronic, electrostatic, magnetic tape, mechanical printing, photocopying, recording or otherwise including the right of translation in any language without the express permission of ICICI Bank (except as otherwise provided on the website or in the terms and conditions for any purpose) or use or modify it in any manner that is likely to cause confusion or deception among persons or in any manner disparages or discredits ICICI Bank or any service providers.
How do you protect me online?
We are committed to providing our customers with a secure online experience. We strive to utilise state-of-the-art technology to protect your information. We also employ a wide range of security features for our website.
For logging into Money2India Europe you need to use your user ID and password. Our login page is a secure page. When you log in successfully to our Money2India Europe website, your web browser will establish a 128-bit secure socket layer (SSL) connection between your computer and our web servers.
SSL stands for 'Secure Socket Layer'. SSL is a protocol used to transmit information securely over the internet. The SSL encrypts sensitive information so it cannot be opened or understood by anyone other than the intended receiver. SSL has been accepted universally as the standard for authenticating and encrypting communication over the web.
The 128-bit SSL gives the most secure encryption available.
You can see whether a web page is secure in two main ways:
- Check the web page URL: Normally, when browsing the web, the URLs (web page addresses) begin with the letters "http". However, over a secure connection the address displayed should begin with "https". Note the "s" at the end.
- Try it! - Visit our home page (http://www.money2india.eu). Note the URL begins with 'https', meaning this page is secured. This means that the user name and password typed in will be encrypted before being sent to our server.
There is a standard among web browsers to display a "lock" icon somewhere in the window of the browser. For example, Microsoft Internet Explorer displays the lock icon at the lower right-hand side of the browser window:
Click (or double-click) the 'padlock' icon of your web browser to see details of the site's security.
This is good to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser. But, you will be able to tell this is a fraudulent site because you won't be able to click the 'padlock'.
The Entrust Digital Certificate
Digital certificates are issued by certification authorities to authenticate a website or elements of a website. The certificate verifies that the site is legitimate. Your web browser automatically accesses the certificate to check its legitimacy. If everything is as it should be, you session will carry on as normal. If there is a problem, your browser will issue a warning and your safest action is to close the website.
Number of login attempts
If you are unable to provide the correct user ID and password, you will not be granted access to website. After three unsuccessful login attempts, your user ID will be blocked automatically by our system. To re-enable your user ID, please contact us. Please click here to view contact details.
Our unique security features continue to protect you once you have logged in successfully. To protect your accounts against unauthorised access, our systems are designed to automatically terminate a secure online session if extended inactivity is detected. Hence if you log in and leave your session inactive for an unduly long period, the session will be terminated. If your session terminates automatically, you can log in again to continue your activities.
In addition, after logging in you cannot use the 'Back', 'Forward' and 'Refresh' buttons on your browser. If you click on any of these buttons, your secure session will be logged out automatically. This is done to ensure that no unauthorised entry can be made in your online banking during your absence from your computer system.
This is one of the security mechanisms we use to protect our systems and your information. Our firewalls use a combination of industrial-strength computer hardware and software designed to protect our servers, computer systems, networks and database from harmful information. During your secure online sessions, firewalls prevent unauthorised internet traffic from entering our website.
Constant updates to our systems
In order to effectively counter the latest security threats, we ensure that our systems are constantly updated to maintain the security of your accounts
How can I protect myself online?
Install and update antivirus software
Always ensure that your PC is updated with the latest antivirus software that's capable of scanning files and emails for viruses. This will prevent your files from being corrupted or lost and also prevent your PC from getting infected with the virus.
Antivirus software protects you from Trojan horses – a 'bug' that usually attacks computer systems through email. They are particularly dangerous because they have the potential to allow others to gain remote control of your computer system, without your knowledge or consent.
A variety of antivirus software packages are available on the market today. Many of these products install antivirus updates to your computer automatically, as long as you have the update feature enabled. Installing an antivirus software package is simple and will save you hours of frustration trying to restore an infected computer system.
Use a personal firewall
Any computer or device connected to the internet should be protected by a personal firewall.
Firewalls will help to protect your computer from malicious internet intrusions and attacks by creating a barrier between your computer and the rest of the internet.
Keep your browser and operating system up-to-date with software updates
Some operating systems and software can be configured to automatically check for software updates. If you have this functionality, make sure it's turned on so that your computer stays as secure as possible.
For more information, or to access current Microsoft Security Updates, please visit Microsoft Security Updates.
Activate a pop-up blocker
A pop-up is a form of online advertising that captures email addresses. Most web browsers let you block pop-ups in the browser security options. Alternatively you can download a pop-up blocker from the web. There are several free versions out there, just run a search in Google for 'pop-up blocker'.
Scan your computer for spyware regularly
Spyware and adware are programs that monitor your internet activity and potentially relay information to a disreputable source. Free spyware removal programmes are available on the internet.
Change your password regularly and keep it confidential
We recommend that you change your passwords regularly - at least every 30 days or so. To change your passwords, log in and go to the 'My Profile' section, then click on the 'Change Password' option at the left of the screen.
Please note: Never tell anyone your password. ICICI Bank officials will never ask you for your passwords.
Look for the padlock symbol
This can be seen on the bottom bar of your browser, showing you that the site is running in secure mode before you enter sensitive information.
Clear your browser's cache
Clear your browser's cache and history after each session so that your account information is removed, especially if you have used a shared computer to access online banking.
Logging on and off recommendations
Access to the ICICI Money2India Europe facility
Always type the address of our website in the address bar of your browser, or access it from your stored list of favourites – don't access it through a link.
Log in frequently
Logging in frequently not only helps you keep track of your status information but also enables you to notice and stop any fraudulent activity quickly.
Check for your last log in time
Log in and look at your date and time of last login.
Always log off
Log off after you complete your online banking session using the 'Logout' link. Do not rely on just closing your browser.
Never fill in any form that you have accessed via a link with sensitive data such as user ID, password, PIN or other account-related information.
Things to avoid
- Avoid downloading programmes from unknown sources. Some sources may have hidden forms of spyware or viruses that could compromise the security of your computer
- Do not open attachments received through email unless you know the sender
- Never open email attachments that have file extensions like .exe, .pif, or .vbs. Such files are usually dangerous
- Do not keep computers online when not in use: either shut the PC off or physically disconnect it from its internet connection
- Do not use shared computers. We recommend that you avoid accessing our website from a public / shared computer such as at an internet cafe
We will never call or email you asking you to confirm your security details. If you receive any of the above claiming to be from ICICI Bank and asking for account information, do not respond to it. Instead please let us know immediately by forwarding the email to firstname.lastname@example.org or call us. In case you have already given such sensitive information, please report this immediately to email@example.com or call us. You may need to change your password, PIN or log in details.
Online thieves often direct you to fraudulent websites via email and pop-up windows to try and collect your personal information. One way to detect a phoney website is to consider how you arrived there. You may have been directed by a link in a fake email requesting your account information. Try typing (or cutting and pasting) the URL into a new web browser window. If it does not take you to a legitimate web site, or you get an error message, it was probably just a cover for a fake site.
How do I identify a fake email/website?
Be wary of any email or website that:
- Asks you for sensitive information: Fake emails often claim that your information has been compromised and your account has been de-activated/suspended. They will ask you to confirm the authenticity of your information/ transactions. Delete these emails and contact ICICI Bank
- Contains spelling mistakes: Very often, 'phishing' emails will contain several spelling mistakes and even the links to the counterfeit websites may contain a URL with spelling mistakes in order to take you to a fake website. Whenever you use a link to access a website, be sure to check for the URL of the website and compare it with the original. We recommend that you type the URL yourself whenever you access www.money2india.eu, or bookmark or store our URL in your 'Favourites'
- Contains prizes or other offers: Some fake emails promise a prize or gift certificate in exchange for completing a survey or answering a few questions. In order to collect the alleged prize, you may be asked to provide your personal information
- Contains fraudulent job offers: Some fake emails appear to be sent by companies to offer you a job. These are often work-at-home positions, which are actually schemes that victimize both the job applicant and other customers. Be sure to confirm that the job offer is from a genuine and reputed company
- Looks like a genuine website: Spoof websites can be difficult to detect, because even the address bar and padlock symbol that appear in your browser window can be faked. To make sure you are on our site, type in www.money2india.eu and see if you get to the same place
Below are some tips for recognising whether you have possibly been a victim of fraud:
- If you did not receive an expected bill or statement by mail
- If unexpected charges occur on your account
- If there are charges on your account from unrecognised vendors
- If the cheque leaves in your cheque book appear out of sequence
- If you get collection calls regarding merchandise or services you did not buy
How do I protect myself from online fraud?
With a few simple steps you can help protect your account and personal information from fake emails and websites:
- Delete suspicious emails without opening them. If you do open a suspicious email, do not open or respond to requests for personal information
- Do not open any attachments or click on any links it may contain
- Never provide sensitive account or personal information over email. If you have entered personal information, report it to us immediately by calling or writing to us using the 'Email us' option on our website
- Maintain the secrecy of your PIN numbers and passwords – see our password-related tips
How do I protect myself from offline fraud?
- Make photocopies of all your sensitive information and store them in a secure location like a safe deposit locker
- Shred financial or personal documents before discarding. Most fraud and identity theft incidences happen as a result of mail theft
- Whenever you or your family are away from home, get the incoming post collected by a trusted acquaintance or arrange to get your mails diverted to an alternate address. Do not leave your incoming post lying around in your absence
Software that detects and removes computer viruses.
A programme that allows a user to find, view, hear and interact with material on the web. Microsoft Internet Explorer and Firefox are examples of popular browsers.
A way to make data unreadable to everyone except the recipient of a message. Encryption is often used to make the transmission of credit card numbers secure for those who are shopping on the internet.
Hardware or software that enforces security on your computer or system. It's like a locked door preventing dangerous material from getting into the room.
Someone who tries to get access to a computer system without authorisation.
The first page on a website, which introduces the site.
The mechanical devices that make up a computer system, such as the central processing unit, monitor, keyboard and mouse, as well as other equipment like printers and speakers.
ISP (Internet Service Provider)
A company that sells direct access to the internet, either through a broadband connection or dial up.
Identity theft (ID Theft)
A criminal activity where a thief steals vital information such as your name, birth date, account number or credit card number without your knowledge.
Hardware device or a software program that records each keystroke made on a particular computer. Marketed as a way for parents to monitor their children's activities on a computer, keystroke loggers are sometimes downloaded unwittingly by users. The keystroke logger then records the keystrokes and periodically uploads the information over the internet. See also 'Spyware' and 'Trojan horse'.
A word, phrase or image highlighted in a document to get someone from one place to another – typically on the internet, but also within a document.
A mule is an unwitting participant in the frauds who is recruited by fraudsters to launder stolen money across the globe.
The main programme that runs on a computer. An operating system allows other software to run and prevents unauthorised users from accessing the system. Major operating systems include Vista, XP or MAC OS X.
A software update meant to fix problems with a computer programme. This can range from fixing bugs, to replacing graphics or improving the usability or performance of a previous version.
The criminal process of electronically gathering and selling the personal and financial information of multiple users through the use of phishing (see below).
An online identity theft scam. Typically, criminals send emails that look like they're from legitimate sources, but are not. The fake messages generally include a link to phoney or spoof websites where victims are asked to provide sensitive personal information. The information goes to criminals rather than the legitimate business. See also 'spoofing'.
Pop-up ads (Pop-ups)
Unsolicited advertising that appears as a 'pop-up' window on a computer screen. Sometimes these can be created to look like a financial institution's request for personal information.
The policy under which a company operating a website handles the personal information collected from visitors to the site.
Secure Socket Layer (SSL)
SSL technology encodes information that is sent over the internet, helping to ensure that the information remains confidential.
A software programme that corrects known bugs or problems, or adds new features to a software programme already installed on your computer.
Is a method of capturing information contained in the magnetic strip of a card through a skimmer to be stored on an attached computer. This information is then used for online shopping or to make counterfeit credit cards.
A computer programme that enables computer hardware to work.
Software installed that's designed to enhance or repair a previously installed computer programme.
Unsolicited junk email sent to large numbers of people to promote products or services.
An online identity theft scam. Typically, criminals send emails that look like they're from legitimate sources, but are not (see also 'phishing'). The fake messages generally include a link to phoney or spoof websites where victims are asked to provide sensitive personal information. The information goes to criminals rather than the legitimate business. See also 'phishing'.
A programme that's loaded onto your computer without your knowledge. These programmes gather information from your computer activities and send them to an unknown source. If these programs often try to capture financial information that can be used to commit fraud.
An apparently legitimate software that appears to perform a desirable function but instead allows unauthorised access to your computer. See also 'Spyware'.
A programme that's loaded onto your computer without your knowledge. Viruses can make copies of themselves, quickly using up all available memory. Some viruses can transmit themselves across networks.
Vishing is a combination of Voice over Internet Protocol (VoIP) and Phishing. Fraudsters feigning to represent real companies, such as a bank, call customers to provide personal details over phone.
Typically, a malicious programme that reproduces itself over a network and uses up computer resources or shuts down the system.
Germany Bank Holiday List 2022
Please note that no transaction processing takes place on Saturday, Sunday and banking holidays in Germany, as well as in remittance country and India. We recommend that you consult your account holding bank for information on local bank holidays.
Information about banking holidays in India is published by Reserve Bank of India. Kindly note, that credit to beneficiary account is subject to bank holiday in the city of account holding branch. Please click here (https://www.rbi.org.in/scripts/holidaymatrixdisplay.aspx) to find information about banking holidays in India.
ICICI Bank Germany is a branch of ICICI Bank UK PLC (The Bank, Company No. 04663024), a wholly owned subsidiary of ICICI Bank Limited. ICICI Bank UK PLC offers retail, corporate, investment and transaction banking services in the UK and Europe. The Bank delivers its products and services through branches located in UK and its branch in Eschborn, Germany as well as through internet and telephone banking.
Money2India Europe offers a convenient, economical and trusted platform for transferring funds from any bank account in Germany to any bank account in India.
Scroll To Top
Scroll To Top