No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Featured

Considering ACH Payments? Understand the Risks First

Assessing the Fraud Risk Associated with Electronic Transactions

by Jenn Redlich
May 8, 2020
in Featured, Risk
online fraud and credit card icon on digital background

With $43 trillion moving across the network each year, ACH payments are a powerful option for businesses looking to move money in a cost-effective way. Dwolla’s Jenn Redlich offers advice on recognizing and mitigating fraud risk in this area.

In today’s world, efficiency is everything. Companies are tired of lengthy processes, pricey fees and outdated methods for payment transfers. Businesses want to move money quickly, cheaply and, maybe most important, securely.

Because of this, more companies are turning to ACH payments. These electronic, bank-to-bank transactions are a practical option for businesses interested in moving money without the large price tag typically associated with credit cards.

Although the threat of fraud for these programmable payments is low, there are always risks associated with moving money. To help protect your transactions, here is a foundation of knowledge to support a better understanding of the risks associated with leveraging the ACH payment network.

Knowing the Different Types of Fraud

Fraud comes in a multitude of forms, and it’s important to be aware of the different types. Payment fraud and identification fraud are the two most common types. Payment fraud is a false or illegal transaction, while identification fraud focuses on the misuse or theft of an ID.

However, fraud doesn’t have to come from an outside source. Companies can put themselves in danger if they’re not careful. Every state has fraud regulations, varying by the industry, and the federal government has its own set of fraud regulations. Operating businesses across state lines can also mean there may be several laws with which you must comply.

It’s crucial to research which of these regulations apply to your organization, since regulatory violations can lead to the revoking of your business license, hefty fines and even civil or criminal penalties. Without being aware of government regulations, businesses can fall victim to fraud by unknowingly allowing an illegal transaction. Protect yourself from these potential outcomes by looking into a documented anti-fraud program.

Understanding ACH Returns

Although your accounts may be protected from unauthorized personnel, your business is not protected from returns. Returns can happen to anyone in any organization. When it comes to securing your business, transparency is key. The more information you have and provide, the easier the process will be – plus, there could be regulatory issues if you are not compliant.

Returns are a component of any payment type – encompassing everything from credit and debit cards to paper checks to even programmable payments – and they can be issued for various reasons, such as invalid account information, insufficient funds or stopped payments. The ACH Network supports the capacity to return entries for fixed circumstances.

For example, when a transaction is not properly verified or contains inaccurate or false information, the ACH return process allows members in the ACH network to deny and return it to the original host. Additional integrations can assist in decreasing the likeliness that your users or business will receive an ACH return code.

Recognizing the Necessity for a Fraud Monitoring Plan

Before moving money, your business should implement detection and protection processes that aim to prevent and mitigate returns. The most important component of security programs is having a strategic plan to identify, analyze and oversee security risks.

To save time by manually overseeing account activity, many companies choose to create internal monitoring and reporting software or opt for a third party that can supply these services. Monitoring and reporting software can be personalized based on certain criteria – such as IP addresses, transaction routines and average dollar amount transferred – which can offer more security and peace of mind with transactions being initiated through your business. Look out for inconsistencies within the data, as this might assist you in stopping fraudulent activity before it causes your business a loss.

Implementing Two-Factor Authentication

Despite our hopes, passwords are just not enough to protect against fraud. It’s nearly impossible to come up with passwords complex enough to stand as security on their own. Take the extra safety measure by implementing steps such as two-factor authentication (2FA). Multifactor authentication requires a password and will require email verification or will ask for additional documentation. This complex verification process will help you rest assured knowing your accounts are under intense protection from unwanted visitors.

When it comes to keeping your business transactions secure, remember these strategies:

  • Find processes and tools that best fit your business needs.
  • Doing something is always better than doing nothing.

With regard to analyzing the threats of your company’s ACH payments, proactivity is always more beneficial than reactivity. By understanding the potential risks associated with ACH transactions, you can accept the fact that your business is implementing the best practices to secure your programmable payments.


Tags: Data Governance
Previous Post

Quality Sustainability Reporting: It’s Become an Imperative

Next Post

COVID-19 and the Risk of Anti-Competitive Employment Practices

Jenn Redlich

Jenn Redlich

Jenn Redlich is a risk and compliance specialist at Dwolla, the programmable payments platform. She specializes in risk management and loss mitigation and has a passion for protecting consumers and businesses from bad actors and overall financial risk. Jenn previously worked for one of NerdWallet’s top 10 Credit Unions of 2020, First Tech, where she took on various positions, including Senior Collector and Fraud Specialist.

Related Posts

doj building sign with flags

‘Reasonable Steps’: What the DOJ Expects From Your Bulk Data Transfer Compliance Program

by Alexandra P. Moylan, Alisa L. Chestler and Michael J. Halaiko
May 5, 2025

Sample provisions offer blueprint for compliant data brokerage with foreign entities

data security program concept cameras

Your Sensitive Data Is Now a National Security Matter: The DOJ’s New Data Security Program

by Randall Cook, Vince Mekles and Rachel Woloszynski
April 29, 2025

90-day implementation window closing on regulations affecting companies with genomic, biometric, health and other personal information

Electronic Evidence Collection for eDiscovery and Compliance

Electronic Evidence Collection for eDiscovery and Compliance

by Corporate Compliance Insights
March 30, 2025

Are you prepared to manage modern data sources in your compliance program? Whitepaper Electronic Evidence Collection for eDiscovery and Compliance...

examining data on laptop screen

Privacy Rights Surge Forces Rethink of Data Management

by Gal Ringel
March 14, 2025

As global privacy regulations multiply, organizations face mounting pressure to efficiently respond to data subject requests amid complex data environments

Next Post
no-go sign over shaking hands and dollar sign

COVID-19 and the Risk of Anti-Competitive Employment Practices

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights