wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

EFT

profile
Faizan Mansuri
Aug 27, 2022
0 Likes
0 Discussions
157 Reads

ELECTRONIC FUNDS TRANSFER


Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of bank staff.

According to the United States Electronic Fund Transfer Act of 1978 it is "a funds transfer initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer's account".
EFT transactions are known by a number of names across countries and different payment systems. For example, in the United States, they may be referred to as "electronic checks" or "e-checks". In the United Kingdom, the term "bank transfer" and "bank payment" are used, in Canada, "e-transfer" is used, while in several other European countries "giro transfer" is the common term.
Types
• Automated teller machine (ATM) transfers
• Direct deposit payment or withdrawals of funds initiated by the payer
• Direct debit payments for which a business debits the consumer's bank accounts for payment for goods or services
• Transfers initiated by telephone
• Transfers resulting from credit or debit card transactions, whether or not initiated through a payment terminal
• Wire transfer via an international banking network such as SWIFT
• Electronic bill payment in online banking, which may be delivered by EFT or paper check
•Instant payment


Comments ()


Sign in

Read Next

Constrains in service design

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Ransomware

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Threads

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

geographic information system (GIS)

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

How to feel Happy everyday day

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Man VS Nature

Blog banner

Honeypot in cyber security

Blog banner

BUFFER OVERFLOW_142

Blog banner

Compromising Mobile Platforms

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Vulnerability Assessment

Blog banner

Virtual Machine

Blog banner

How to tie a Tie

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Social Engineering Attacks

Blog banner

Answer

Blog banner

Hosting basics

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Footprinting

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

LIMITED EDITION

Blog banner

virtual machine

Blog banner

Direct Memory Access

Blog banner

The Role of cryptography in cyber security

Blog banner

38_Exploring The Honeynet Project

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Loneliness

Blog banner

"Audit" In Data Science

Blog banner

Multiple processor scheduling

Blog banner

Delhi city

Blog banner

OPERATING SYSTEM

Blog banner