PERSONAL LOANS
A bouquet of products that caters all your personal needs
WHAT IS PERSONAL LOAN ?
Personal loans, at the very minimum, impose interest. We've carefully curated a series of personal loan products with more benefits to make your life easy. A personal loan, unlike a credit card, provides borrowers with a onetime cash payment.

Disclaimer
By clicking the link you will be redirected to the website of the third party. The third party website is not owned or controlled by Bank of India and contents thereof are not sponsored, endorsed or approved by Bank of India. Bank of India does not vouch or guarantee or take any responsibility for any of the contents of the said website including transactions, product, services or other items offered through the website. While accessing this site, you acknowledge that any reliance on any opinion, advice, statement, memorandum, or information available on the site shall be at your sole risk and consequences.
The Bank of India and its affiliates, subsidiaries, employees, officers, directors and agents shall not be liable for any loss, claim or damage whatsoever including in the event of deficiency in the service of such third party websites and for any consequences of error or failure of internet connection equipment hardware or software used to access the third party website through this link , slowdown or breakdown of third party website for any reason including and resulting from the act or omission of any other party involved in making this site or the data contained therein available to you including for any misuse of the Password, login ID or other confidential security information used to login to this website or from any other cause relating to your access to, inability to access, or use of the site or these materials in accordance thereto Bank of India and all its related parties described hereinabove stand indemnified from all proceedings or matters arising thereto.
By preceding further to access the said website it is presumed that you have agreed to the above and also the other terms and conditions applicable.
BENEFITS OF PERSONAL LOAN
Personal loans, at the very minimum, impose interest. We've carefully curated a series of personal loan products with more benefits to make your life easy. A personal loan, unlike a credit card, provides borrowers with a onetime cash payment.

Low Interest Rates
Best class rates in the market

No Hidden Charges
Trouble Free Loan Closure

Minimal Documentation
Get your loan with less paper work

Apply Online
Finish up the process in 15 minutes
ALL PRODUCTS





Disclaimer
- Individuals: Salaried/Self-employed/Professionals
- Non-individualsTrust is not eligible under the scheme
- Group of permanent/ confirmed/ permanent employees
- Age: Maximum age 70 years at the time of final repayment
- Maximum Loan Amount:Know Your Eligibility
Images/videos on Personal loan process & steps


Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
- Phishing Attacks
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
- Other Phishing techniques-
- Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
- Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
- Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
- Phishing Attacks
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
- Other Phishing techniques-
- Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
- Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
- Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
- Phishing Attacks
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
- Other Phishing techniques-
- Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
- Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
- Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
- Phishing Attacks
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
- Other Phishing techniques-
- Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
- Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
- Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
- Phishing Attacks
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
- Other Phishing techniques-
- Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
- Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
- Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
- Phishing Attacks
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
- Other Phishing techniques-
- Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
- Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
- Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
- Phishing Attacks
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
- Other Phishing techniques-
- Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
- Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
- Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
- Phishing Attacks
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
- Other Phishing techniques-
- Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
- Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
- Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).
- Phishing Attacks
Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.
- Other Phishing techniques-
- Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
- Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
- Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.
Malware is short form for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a standalone computer or a networked pc. So, wherever a malware term is used it means a program which is designed to damage your computer. Strong Anti-Malware solution should be used to prevent spread of Malware.
Your computer may be infected if you recognize any of these malware symptoms:
- Slow computer performance
- Erratic computer behaviour
- Unexplained data loss
- Frequent computer crashes
This is a form of malware that locks computer files of users to demand ransom for access to those files. Ransomware spreads through phishing, Pirated Software and malicious websites. You can avoid being victim of Ransomware, If you do not click on suspicious links, do not install pirated/illegal software and ensure that your data is backed up on a regular basis.
Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Before clicking on any link/attachment in mail, verify sender detail.
Installing Application from unknown sources, granting mobile applications excessive permission, using open Wi-Fi network and sharing OTP may lead to loss of sensitive information and financial loss. We should not enable remote sharing on mobile applications and suitable anti-malware solution should be used.
Cybercriminals use USB charging ports available at public places to install malware, steal data or even take complete control of your device. This is referred to as Juice Jacking. We should disable data transfer feature on your mobile phone while charging.
A device called card skimmer is used to copy information from Credit Card/Debit Card. This information is used for online purchases or to clone the card for cash withdrawal. We should be careful while using your card at ATMs, public places and sharing card detail online.
Victims of Money Mule are used by fraudsters to transfer illegally obtained money through victim's Account. You should not receive money in your account from unknown sources. If money is received in your account accidently, you should inform your Bank and any reversal should be initiated by The Bank crediting money in your account. You should not return money directly to the person who claims to have accidently deposited in your account, instead "the person" contact his own bank.