wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

EFT

profile
Faizan Mansuri
Aug 27, 2022
0 Likes
0 Discussions
157 Reads

ELECTRONIC FUNDS TRANSFER


Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of bank staff.

According to the United States Electronic Fund Transfer Act of 1978 it is "a funds transfer initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer's account".
EFT transactions are known by a number of names across countries and different payment systems. For example, in the United States, they may be referred to as "electronic checks" or "e-checks". In the United Kingdom, the term "bank transfer" and "bank payment" are used, in Canada, "e-transfer" is used, while in several other European countries "giro transfer" is the common term.
Types
• Automated teller machine (ATM) transfers
• Direct deposit payment or withdrawals of funds initiated by the payer
• Direct debit payments for which a business debits the consumer's bank accounts for payment for goods or services
• Transfers initiated by telephone
• Transfers resulting from credit or debit card transactions, whether or not initiated through a payment terminal
• Wire transfer via an international banking network such as SWIFT
• Electronic bill payment in online banking, which may be delivered by EFT or paper check
•Instant payment


Comments ()


Sign in

Read Next

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Race Condition in Operating Theatre

Blog banner

Incident management in ITSM

Blog banner

I/O Management and Disk Scheduling

Blog banner

Decoding Confusion Matrix

Blog banner

semaphores

Blog banner

virtual machines and virtualization

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Scheduling

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Deadlock and Starvation

Blog banner

UniProcessor Scheduling

Blog banner

GIS Bharat Maps

Blog banner

Development Of Modern Operating System

Blog banner

Modern Operating Systems.

Blog banner

Memory Management

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Rain bow

Blog banner

Top 10 Logos and their meanings

Blog banner

Developments in Modern Operating Systems

Blog banner

Network Forensics

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

PHONE TECHNOLOGY

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

About myself

Blog banner

Challenges and risks in service operations

Blog banner

Music

Blog banner

bulk email software

Blog banner

Deadlock in Operating systems

Blog banner

Virtual Machine's

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

social media issue

Blog banner

Benefits of yoga and meditation

Blog banner

Importance Of Time

Blog banner