No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Featured

Considering ACH Payments? Understand the Risks First

Assessing the Fraud Risk Associated with Electronic Transactions

by Jenn Redlich
May 8, 2020
in Featured, Risk
online fraud and credit card icon on digital background

With $43 trillion moving across the network each year, ACH payments are a powerful option for businesses looking to move money in a cost-effective way. Dwolla’s Jenn Redlich offers advice on recognizing and mitigating fraud risk in this area.

In today’s world, efficiency is everything. Companies are tired of lengthy processes, pricey fees and outdated methods for payment transfers. Businesses want to move money quickly, cheaply and, maybe most important, securely.

Because of this, more companies are turning to ACH payments. These electronic, bank-to-bank transactions are a practical option for businesses interested in moving money without the large price tag typically associated with credit cards.

Although the threat of fraud for these programmable payments is low, there are always risks associated with moving money. To help protect your transactions, here is a foundation of knowledge to support a better understanding of the risks associated with leveraging the ACH payment network.

Knowing the Different Types of Fraud

Fraud comes in a multitude of forms, and it’s important to be aware of the different types. Payment fraud and identification fraud are the two most common types. Payment fraud is a false or illegal transaction, while identification fraud focuses on the misuse or theft of an ID.

However, fraud doesn’t have to come from an outside source. Companies can put themselves in danger if they’re not careful. Every state has fraud regulations, varying by the industry, and the federal government has its own set of fraud regulations. Operating businesses across state lines can also mean there may be several laws with which you must comply.

It’s crucial to research which of these regulations apply to your organization, since regulatory violations can lead to the revoking of your business license, hefty fines and even civil or criminal penalties. Without being aware of government regulations, businesses can fall victim to fraud by unknowingly allowing an illegal transaction. Protect yourself from these potential outcomes by looking into a documented anti-fraud program.

Understanding ACH Returns

Although your accounts may be protected from unauthorized personnel, your business is not protected from returns. Returns can happen to anyone in any organization. When it comes to securing your business, transparency is key. The more information you have and provide, the easier the process will be – plus, there could be regulatory issues if you are not compliant.

Returns are a component of any payment type – encompassing everything from credit and debit cards to paper checks to even programmable payments – and they can be issued for various reasons, such as invalid account information, insufficient funds or stopped payments. The ACH Network supports the capacity to return entries for fixed circumstances.

For example, when a transaction is not properly verified or contains inaccurate or false information, the ACH return process allows members in the ACH network to deny and return it to the original host. Additional integrations can assist in decreasing the likeliness that your users or business will receive an ACH return code.

Recognizing the Necessity for a Fraud Monitoring Plan

Before moving money, your business should implement detection and protection processes that aim to prevent and mitigate returns. The most important component of security programs is having a strategic plan to identify, analyze and oversee security risks.

To save time by manually overseeing account activity, many companies choose to create internal monitoring and reporting software or opt for a third party that can supply these services. Monitoring and reporting software can be personalized based on certain criteria – such as IP addresses, transaction routines and average dollar amount transferred – which can offer more security and peace of mind with transactions being initiated through your business. Look out for inconsistencies within the data, as this might assist you in stopping fraudulent activity before it causes your business a loss.

Implementing Two-Factor Authentication

Despite our hopes, passwords are just not enough to protect against fraud. It’s nearly impossible to come up with passwords complex enough to stand as security on their own. Take the extra safety measure by implementing steps such as two-factor authentication (2FA). Multifactor authentication requires a password and will require email verification or will ask for additional documentation. This complex verification process will help you rest assured knowing your accounts are under intense protection from unwanted visitors.

When it comes to keeping your business transactions secure, remember these strategies:

  • Find processes and tools that best fit your business needs.
  • Doing something is always better than doing nothing.

With regard to analyzing the threats of your company’s ACH payments, proactivity is always more beneficial than reactivity. By understanding the potential risks associated with ACH transactions, you can accept the fact that your business is implementing the best practices to secure your programmable payments.


Tags: Data Governance
Previous Post

Quality Sustainability Reporting: It’s Become an Imperative

Next Post

COVID-19 and the Risk of Anti-Competitive Employment Practices

Jenn Redlich

Jenn Redlich

Jenn Redlich is a risk and compliance specialist at Dwolla, the programmable payments platform. She specializes in risk management and loss mitigation and has a passion for protecting consumers and businesses from bad actors and overall financial risk. Jenn previously worked for one of NerdWallet’s top 10 Credit Unions of 2020, First Tech, where she took on various positions, including Senior Collector and Fraud Specialist.

Related Posts

banks information sharing_f

Sharing Is Caring? Lessons From Dutch Banks’ Data-Sharing Program

by Sukirt Singh
March 22, 2023

With federal investigations pending, the autopsy of Silicon Valley Bank and resulting cascade of bank failures is only just beginning....

risk tunnel

From Regulation to Volume, There Is No Light at the End of the Data Privacy Tunnel

by Jim DeLoach
March 15, 2023

Data proliferation and data privacy regulatory activity across the globe have created the need for focused boardroom discussions. An underpinning...

data breach

Sobering Reality: Drizly Order Indicates Officers May Face Personal Liability for Data Breaches

by Baker Donelson
February 1, 2023

The FTC says Drizly’s CEO James Cory Rellas was alerted to a potential security loophole two years before a data...

minidata_b

Honey, I Shrunk the Data: How to Keep Customer Info on a Need-to-Know Basis

by Parker Poe
November 30, 2022

It may be tempting to hoard the data you have gathered on your customers, but an increasing number of regulations...

Next Post
no-go sign over shaking hands and dollar sign

COVID-19 and the Risk of Anti-Competitive Employment Practices

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT