wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Electronic Funds Transfer

profile
Heet Parmar
Aug 28, 2022
0 Likes
0 Discussions
93 Reads

Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of bank staff.

According to the United States Electronic Fund Transfer Act of 1978 it is "a funds transfer initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer's account".

EFT transactions are known by a number of names across countries and different payment systems. For example, in the United States, they may be referred to as "electronic checks" or "e-checks". In the United Kingdom, the term "bank transfer" and "bank payment" are used, in Canada, "e-transfer" is used, while in several other European countries "giro transfer" is the common term.


Comments ()


Sign in

Read Next

AI and Cyber Security

Blog banner

Social engineering in cyber security

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Getting started with Android Studio

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Go Daddy

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Threads and concurrency

Blog banner

Know your Processors!

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

Mental Health

Blog banner

OS Assignment 3 Deadlock

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Whatsapp Messenger

Blog banner

Never give up

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Assessing Incident Detection Response Process

Blog banner

"Audit" In Data Science

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Message Passing in OS

Blog banner

MOVEMBER

Blog banner

My favourite food

Blog banner

Importance of self defence for girls

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Scheduling

Blog banner

semaphores in os

Blog banner

ahh wait a min

Blog banner

Blockchain in IoT Applications

Blog banner

breakup? don't worry and learn how to get back your life!

Blog banner

E-Cash (Electronic Cash)

Blog banner

GIS REMOTE SENSING

Blog banner

Direct Memory Access

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

File management

Blog banner

Microsoft powerpoint presentation

Blog banner

BrainGate Technology

Blog banner

Virtual memory

Blog banner