From the 18th of December, 2024 to the 2nd of January, 2025, financing rates will remain the same. By freezing the financing rates we are aiming to protect our clients from potentially aggressive market movements over the holiday period.

If you have any questions please contact our customer services team.

Dismiss close
Security practices hero
How we protect our customers
2 Factor Authentication (2FA)

We strongly encourage you to enable 2FA on your accounts. 2FA is designed to protect your account and funds from unauthorised access. Find out more about 2FA.

Comprehensive security coverage

We have invested significant resources into creating a security coverage that will ensure your data is kept secure and private. We achieve this via:

An internal security team
Partnerships with multiple industry-leading security firms
Round-the-clock monitoring by a security operations centre
Alignment with stringent regulatory expectations and industry-standard certifications
Ethical disclosure programme
Report security issue

Found a security issue in one of our products or platforms? Let us know via our HackerOne page.

Safe harbour

Providing your activities are conducted in a manner consistent with the policy as outlined below, we commit to:

Consider your activity as authorised conduct
Not initiate legal action against you
Take steps to make it known that your actions were conducted in compliance with this policy, should a third party initiate legal actions against you.
Programme guidelines

We kindly request that security researchers:

Make a good faith effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction of data
Only interact with accounts you own, or with explicit permission of the account holder
Conduct analysis limited to the Demo (Practice) environment
Use exploits only to the extent necessary to confirm the presence of a vulnerability and once established, do not abuse the vulnerability further
Do not exfiltrate data, establish command line access and/or persistence or pivot to other systems
Use the defined communication channels (as identified on this page) to report vulnerability information to us
Keep information about any suspected or resolved security issues you’ve discovered confidential between yourself and OANDA until we provide express consent
Follow HackerOne’s disclosure guidelines
Have a security question?

Reach out to us at