Table of Content

A demat account is like a bank account for your shares and stocks in which the shares/stocks are held in an electronic format. Demat accounts make it much easier to own and trade stocks, shares, mutual funds, ETFs by eliminating paperwork. Note that a Demat account and trading account are not the same. A trading account is used to buy and sell shares while a Demat account is used to hold them. Similar to a bank account, where money is debited and credited, shares are debited and credited from a Demat account.
*A Depository Participant (DP) is a link between the account holder and a depository such as the CDSL (Central Depository Services Limited) or the NSDL (National Securities Depository Limited). A DP can be a bank, a financial institution, brokerage house or similar entity. To be eligible, it must be registered with SEBI.
Here are the documents required for opening a Demat Account:
There are some details you should keep an eye on, and make sure to collect these from your DP:
These are the basics you need to know about Demat accounts. Armed with the basics, it will be easy for you to open your Demat account with a trusted financial partner like IIFL Capital Demat Account App and begin trading in shares and securities.
IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000
IIFL Capital Services Support WhatsApp Number
+91 9892691696
IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132 (Member ID - NSE: 10975 BSE: 179 MCX: 55995 NCDEX: 01249), DP SEBI Reg. No. IN-DP-185-2016, PMS SEBI Regn. No: INP000002213, IA SEBI Regn. No: INA000000623, Merchant Banker SEBI Regn. No. INM000010940, RA SEBI Regn. No: INH000000248, BSE Enlistment Number (RA): 5016, AMFI-Registered Mutual Fund Distributor & SIF Distributor
ARN NO : 47791 (Date of initial registration – 17/02/2007; Current validity of ARN – 08/02/2027), PFRDA Reg. No. PoP 20092018, IRDAI Corporate Agent (Composite) : CA1099

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.