Payments Insider 2nd Quarter 2024
The inside scoop on payments for businesses of all sizes.
The adage that “the best defense is a good offense” means being proactive rather than passive can give you an advantage over your opponent—whether with your competition or in processing ACH payments. That’s right! Even when it comes to initiating ACH payments. So, what can your company do to protect itself from potential losses related to disputed ACH debit transactions? First...
Authorizations (refer to the Nacha Operating Rules, Section 2.3, for complete requirements based on the type of ACH debit your company is sending)
You’ve followed the authorization steps and transmitted your ACH debit file to your financial institution, which sent it into the ACH Network for processing to the consumer’s account. Now what happens?
The consumer’s financial institution is responsible for processing ACH payments to the account number in the ACH entry. This means if the account number exists and there are enough funds to cover the debit payment, then it will automatically be processed. And life is good! Or is it?
The consumer is responsible for reviewing their account activity and notifying their financial institution of any errors. If they notice a debit that (1) they did not authorize, (2) they had authorized but have since revoked or (3) they had authorized that was processed incorrectly, such as for the wrong amount, they should contact their institution.
f the consumer’s notification is within 60 calendar days of when the debit posted to their account, their financial institution can return the payment on their behalf. This means no investigation is required to determine if the consumer’s claim is valid or not. Instead, based on the consumer’s signed and completed Written Statement of Unauthorized Debit (WSUD), they can return the payment to your company’s financial institution. Upon receipt, your institution must accept the timely returned entry and may then charge it back to your account. Now what?
If you have a copy of the consumer’s authorization related to the returned payment, you must resolve the dispute directly with the consumer. In addition to having a copy of the authorization, you may ask your financial institution to request a copy of the Written Statement of Unauthorized Debit (WSUD) from the consumer’s institution.
A WSUD is a legal document instructing the consumer’s institution to return the payment. It does not relieve the consumer of any financial obligation to your company. Therefore, you may choose to seek legal counsel to recover any losses associated with the return of the payment. Or, you could work out an alternate payment plan with the consumer. The decision is yours.
Requests for copies of WSUDs must be made within one year from receiving the returned entry. The consumer’s financial institution has ten banking days, which equates to approximately two weeks, to provide the WSUD to your financial institution.
A Third-Party Sender (TPS) has specific ACH Rules obligations, including the requirement to implement an ACH Risk Management Program. An effective ACH Risk Management Program typically begins with the development and implementation of a formal ACH policy demonstrating a TPS’s understanding of its role in the ACH Network and the risks involved with its activities by addressing key ACH Rules obligations of the TPS. Additionally, this policy provides statements, rules or assertions that specify the expected behavior of an organization by defining roles and responsibilities of staff and departments as well as conditions and requirements for products, services and systems. Essentially, the policy communicates an organization’s values, philosophies and culture as it relates to ACH origination.
Having addressed the reason for the policy, let’s talk about the content of the policy. There is no specific content requirement for any given policy. However, there should be enough information contained in the policy to determine which departments or individuals play essential roles in the activities addressed. Most policies will contain some type of scope that defines what the policy is addressing, as well as a strategic objective of the goals a company is striving to achieve. The policy also provides insight into an organization’s risk tolerance levels and helps to ensure staff understand their roles and responsibilities to meet the strategic goals of the organization in an acceptable manner. This is the reason the ACH policy is most often thought of as the cornerstone and formalization of a TPS’s ACH Risk Management Program.
The structure and content of an ACH policy are driven primarily by the organization’s ACH participant role, the type of clients it provides services to and the type of ACH entries that are being processed. If you were to review an ACH policy of a payroll services provider, it most likely would differ in content from that of a TPS providing check conversion services to clients. Policies could also contain information about other activities, such as the data security that has been implemented specific to ACH activities. Also, it may contain information specific to Customer Identification Program (CIP) and Know Your Customer (KYC) requirements. Again, defining the roles and responsibilities for each of these activities is critical.
Also, it is considered acceptable to reference other policies within the ACH policy. For instance, if there is already a robust, comprehensive AML Policy that addresses CIP, KYC and OFAC responsibilities, there is no need to restate that information in the ACH policy. However, it is recommended that the ACH policy clearly make the statement that those activities will be addressed in another specific policy. Such policies are traditionally thought of as requirements of a financial institution to have implemented. One of the key elements noted within the ACH Rules is that a TPS will take on the roles of an ODFI and becomes subject to many of the same Rules and best practices, including the development of various policies and written procedures.
Additionally, policies are not meant to remain a static document that, once developed, approved and implemented, become just another document provided when requested. Policies should be reviewed at least annually to determine if they still contain relevant information of the TPS’s processing environment. Policy changes should be documented to better determine when a new statement or requirement has been added. Updated policies should also be provided to any stakeholders that are subject to the requirements of the policy. Some organizations will also require staff to formally acknowledge the receipt and review of updated policies.
To assist TPSs, EPCOR has developed a new publication, the Sample Third-Party Sender ACH Management Policy. This sample policy covers ACH Rules and various other policy best practices impacting essential ACH processes such as ACH origination, Nested Third-Party Sender relationships, Originator strategies and onboarding requirements. Our team of experts is also prepared to help in any way we can! Reach out to EPCOR at advisoryservices@epcor.org to learn how we can help you enhance your TPS risk management practices.
In today’s digital age, where technology permeates nearly every aspect of our lives, the threat of identity theft looms larger than ever before. Did you know that more than 40 million U.S. consumers fell victim to some form of identity theft in 2021 alone?
Shockingly, according to Javelin’s research, traditional identity fraud losses surged to a staggering $24 billion in 2021, marking a disturbing 79% increase over the previous year. When combined with losses from scams where individuals unwittingly provide personal information, the total losses soared to a staggering $52 billion.
Identity theft occurs when someone unlawfully uses your personally identifiable information (PII) for their own gain. This includes sensitive data such as social security numbers, credit card details and dates of birth. With our lives increasingly intertwined with the digital realm, protecting this information has never been more critical. Whether it’s healthcare data, financial details or even the identities of our children; no one is immune to the risks posed by malicious actors lurking in the virtual shadows.
Understanding the various forms of identity theft is the first step towards safeguarding yourself and your loved ones. From medical and financial identity theft to the alarming rise of synthetic identity theft, where fraudsters create fictitious identities using fragments of real information, the threats are multifaceted and ever-evolving.
So, what can you do to minimize the risk of falling victim to these insidious crimes? Here are ten proactive measures you can take to fortify your defenses against identity theft:
While we cannot completely eradicate the threat of identity theft, staying informed and proactive can significantly reduce the risk. By implementing these measures and remaining vigilant, you can fortify your defenses against cyber threats and mitigate potential losses.
Stay safe, stay informed, and together, we can combat the scourge of identity theft in our increasingly interconnected world.
Source: BanksNeverAskThat.com
In 2024, several significant amendments to the ACH Rules will take effect, impacting the way companies process ACH payments. It’s essential for corporate Originators and Third-Party Senders to understand these changes to ensure compliance and efficiency in their payment processing operations.
One of the key updates impacts Notifications of Change (NOCs), effective starting June 21, 2024. Under this amendment, if the account information provided by a payee is erroneous or outdated, their financial institution may manually process the payment and send an NOC to the initiator. Corporate Originators need to update the information promptly for recurring payments and have discretion for one-time payments.
Another significant change taking effect on June 21, 2024, is the expanded use of Prenotification Entries. Previously limited to verifying account validity before the first payment, this amendment allows companies to send prenotes at their discretion or as required by financial institutions.
Return Reason Code updates take effect on October 1, 2024. This Rule change opens up Return Reason Code R17 to cover situations where the transaction is believed to be initiated under “false pretenses,” addressing concerns related to fraud.
Similarly, Return Reason Code R06 will allow financial institutions to request returns for fraudulent payments. While this use case is not mandatory, this amendment provides a means for recovering funds lost to fraud.
Looking ahead to 2026, there are further changes regarding Standard Company Entry Descriptions and Origination Fraud Monitoring. The former outlines specific descriptions for payroll and online retail purchases, while the latter introduces requirements for companies to establish risk-based processes to identify and prevent unauthorized or fraudulent transactions.
In light of these updates, corporate Originators and Third-Party Senders must prepare by updating policies, procedures and systems to ensure compliance and mitigate fraud risks effectively.
For more information on these changes, download this 2024 ACH Rules Update for Corporate Originators and Third-Party Senders document.
EPCOR is a not-for-profit payments association which provides payments expertise through education, advice and member representation. EPCOR assists banks, credit unions, thrifts and affiliated organizations in maintaining compliance, reducing risk and enhancing the overall operational efficiency of the payment systems. Through our affiliation with industry partners and other associations, EPCOR fosters and promotes improvement of the payments systems which are in the best interest of our members. For more information on EPCOR, visit www.epcor.org.
Our team of dedicated professionals are here to support you.