wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

EFT

profile
Faizan Mansuri
Aug 27, 2022
0 Likes
0 Discussions
157 Reads

ELECTRONIC FUNDS TRANSFER


Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of bank staff.

According to the United States Electronic Fund Transfer Act of 1978 it is "a funds transfer initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer's account".
EFT transactions are known by a number of names across countries and different payment systems. For example, in the United States, they may be referred to as "electronic checks" or "e-checks". In the United Kingdom, the term "bank transfer" and "bank payment" are used, in Canada, "e-transfer" is used, while in several other European countries "giro transfer" is the common term.
Types
• Automated teller machine (ATM) transfers
• Direct deposit payment or withdrawals of funds initiated by the payer
• Direct debit payments for which a business debits the consumer's bank accounts for payment for goods or services
• Transfers initiated by telephone
• Transfers resulting from credit or debit card transactions, whether or not initiated through a payment terminal
• Wire transfer via an international banking network such as SWIFT
• Electronic bill payment in online banking, which may be delivered by EFT or paper check
•Instant payment


Comments ()


Sign in

Read Next

What is thread and alse multithreading

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Game via listing method

Blog banner

Real-time Scheduling - 53003230061

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Deadlocks in Operating Systems

Blog banner

Secure Hypertext transfer protocol

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Embedded Operating System

Blog banner

Evolution of the Microprocesor

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Cache Memory(142)

Blog banner

Swiggi

Blog banner

Amazon

Blog banner

KAHAWA TEA

Blog banner

College Life

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Virtual machine

Blog banner

Security requirements for Safe E-Payments

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Os(Computer security threats)

Blog banner

Tools to support CSI activities

Blog banner

Child labour

Blog banner

My 1stNull Puliya session

Blog banner

Service transition principles

Blog banner

Save Environment

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

12 Principles of Animation

Blog banner

Supervised and unsupervised learning

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Os Virtual Memory

Blog banner

How China Regained It's World's Largest Growing Economy Status

Blog banner

Deadlock

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Teenagers of Today

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

File management

Blog banner

Computer security techniques

Blog banner

Odoo

Blog banner

UniProcessor Scheduling

Blog banner