wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

EFT

profile
Faizan Mansuri
Aug 27, 2022
0 Likes
0 Discussions
157 Reads

ELECTRONIC FUNDS TRANSFER


Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of bank staff.

According to the United States Electronic Fund Transfer Act of 1978 it is "a funds transfer initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer's account".
EFT transactions are known by a number of names across countries and different payment systems. For example, in the United States, they may be referred to as "electronic checks" or "e-checks". In the United Kingdom, the term "bank transfer" and "bank payment" are used, in Canada, "e-transfer" is used, while in several other European countries "giro transfer" is the common term.
Types
• Automated teller machine (ATM) transfers
• Direct deposit payment or withdrawals of funds initiated by the payer
• Direct debit payments for which a business debits the consumer's bank accounts for payment for goods or services
• Transfers initiated by telephone
• Transfers resulting from credit or debit card transactions, whether or not initiated through a payment terminal
• Wire transfer via an international banking network such as SWIFT
• Electronic bill payment in online banking, which may be delivered by EFT or paper check
•Instant payment


Comments ()


Sign in

Read Next

Evolution of Operating System

Blog banner

Yoga in INDIA and ABROAD

Blog banner

File Management

Blog banner

The functions of operating system

Blog banner

Virtual Machine

Blog banner

Processing Crime and Incident Scenes

Blog banner

Types Of scheduling

Blog banner

Layers Of Blockchain

Blog banner

Fashion marketing in india

Blog banner

VIRTUAL MACHINES

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Operating System Objectives and Functions

Blog banner

Mental Health

Blog banner

Models of Information Security.

Blog banner

Excel records

Blog banner

What are Virtual Machines

Blog banner

Explain website hacking issues

Blog banner

Raid

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

PHISHING

Blog banner

SQL Injection practice on DVWA

Blog banner

OS assignment 3

Blog banner

"Audit" In Data Science

Blog banner

BIRYANI ! The history you never knew about

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Article on Zoho Corporation

Blog banner

Cache Memory

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Direct Memory Access

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Risk factors in service transistion

Blog banner

Photorec - media recovery tool

Blog banner

Love is in air.....

Blog banner

Interrupts

Blog banner

A Weekend at Oak Tree Hotel: The Best Hotel Experience in Arcadia, Florida

Blog banner

Uniprocessor Scheduling

Blog banner

Benefits and drawback of web security.

Blog banner