wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

EFT

profile
Faizan Mansuri
Aug 27, 2022
0 Likes
0 Discussions
157 Reads

ELECTRONIC FUNDS TRANSFER


Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of bank staff.

According to the United States Electronic Fund Transfer Act of 1978 it is "a funds transfer initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer's account".
EFT transactions are known by a number of names across countries and different payment systems. For example, in the United States, they may be referred to as "electronic checks" or "e-checks". In the United Kingdom, the term "bank transfer" and "bank payment" are used, in Canada, "e-transfer" is used, while in several other European countries "giro transfer" is the common term.
Types
• Automated teller machine (ATM) transfers
• Direct deposit payment or withdrawals of funds initiated by the payer
• Direct debit payments for which a business debits the consumer's bank accounts for payment for goods or services
• Transfers initiated by telephone
• Transfers resulting from credit or debit card transactions, whether or not initiated through a payment terminal
• Wire transfer via an international banking network such as SWIFT
• Electronic bill payment in online banking, which may be delivered by EFT or paper check
•Instant payment


Comments ()


Sign in

Read Next

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Socket Programming in Java

Blog banner

Street foods

Blog banner

OS- Assignnment 1

Blog banner

An Overivew Of Cache Memory

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Process Creation

Blog banner

Oracle Corporation

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

10 Interesting facts you should know!!!

Blog banner

Why we should do reading

Blog banner

geographic information system (GIS)

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Mumbaicha Dabbawalla

Blog banner

Internet of Things

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Deadlock

Blog banner

Deadlock

Blog banner

INTRODUCTION

Blog banner

Business Engineering

Blog banner

Memory Management

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Apple

Blog banner

SQL Injection Techniques

Blog banner

Memory Management

Blog banner

Types of Threads

Blog banner

Deadlocks in Operating Systems

Blog banner

Interrupts

Blog banner

Rain

Blog banner

Deadlock

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Virtualisation

Blog banner

Mobile Survey

Blog banner

What is metaverse?

Blog banner

MOVEMBER

Blog banner

Social Media.

Blog banner

Internet of Things and cyber security

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Deadlock and Starvation

Blog banner