• First Reference
  • About us
  • Contact us
  • Blog Signup 📨

First Reference Talks

Discussions on Human Resources, Employment Law, Payroll and Internal Controls

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies
You are here: Home / Business / Sure you know EFTs, but do you know EFTs?

By Adam Gorley | 2 Minutes Read June 16, 2011

Sure you know EFTs, but do you know EFTs?

No doubt you’ve heard that a chain is only as strong as its weakest link. In the world of electronic funds transfers (EFTs), this maxim holds doubly true. It applies to security systems and the networks they run on (including the Internet) as well as the users of those systems and networks. A security system can only defend a network if it offers sufficient coverage and controls. Absent such controls, users can, intentionally or accidentally, access, change or steal data that they are not authorized to see.
After all, it’s just bits of data travelling super-fast across transmission wires—or even through the air if there’s a wireless component along the way—in and out of servers…

Image: www.emvco.com
Image: www.emvco.com

In just one simple example, I know I feel a bit strange when I insert my “chip” credit card to pay for something and don’t need to sign for it; and I feel downright uneasy when I simply pass my card over the reader and don’t even have to enter my PIN. I do it anyway. My uneasiness isn’t due to a lack of trust in the systems in place. I understand there are significant potential risks associated with these activities, but I don’t understand those risks particularly well. Moreover, I don’t understand the systems themselves. Imagining expanding the example above across the entire Internet.
Increasingly, businesses and consumers are being asked to undertake transactions using interfaces that they do not understand. There is no easy way around this, since most people don’t even understand the basic workings of the computers, cellphones and kitchen gadgets they use on a daily basis. But that doesn’t mean organizations can’t implement controls to prevent or reduce the risk of data and financial loss and identity theft. In fact, businesses are bound by law to protect their data and that of their customers.
Regardless of their legal obligations, organizations need to control their paper and electronic financial transactions for the sake of their operations. As with controlling paper transactions, the two main reasons for keeping track of EFTs are accuracy and security. Accuracy is mainly a matter of accounting controls; security requires authorization and other technical controls. With paper transactions, we’re usually confident that our cash is not counterfeit and that the signatures on cheques haven’t been forged.
Unfortunately, conducting transactions electronically makes both accuracy and security more challenging. Accuracy with EFTs still comes down to accounting, but electronic security is an uphill battle against criminals both organized and unorganized, but all with various nefarious intentions.
The latest sample policy in Finance & Accounting PolicyPro offers a clear outline of EFT transmission procedures, including initiation, authorization and confirmation, as well as an EFT Requisition and Authorization Form and a template for an EFT payment record rubber stamp. FAPP offers numerous other sample policies to control all aspects of accounting. Information Technology PolicyPro, another key volume in First Reference’s Internal Controls Library, provides detailed sample policies on network security and other salient issues related to electronic commerce and operations.
Adam Gorley
First Reference Internal Controls, Human Resources and Compliance Editor

  • About
  • Latest Posts
Follow me
Adam Gorley
Editor at First Reference Inc.
Adam Gorley is a copywriter, editor and researcher at First Reference. He contributes regularly to First Reference Talks, Inside Internal Controls and other First Reference publications. He writes about general HR issues, accessibility, privacy, technology in the workplace, accommodation, violence and harassment, internal controls and more.
Follow me
Latest posts by Adam Gorley (see all)
  • Can you implement a mandatory vaccine policy or ask employees if they have been vaccinated? - June 10, 2021
  • Do you know the latest on terminations? Find out at the Ontario Virtual Employment Law Conference - May 11, 2021
  • Announcing the 2021 Virtual Ontario Employment Law Conference - April 15, 2021

Article by Adam Gorley / Business, Finance and Accounting, Privacy / chip card, credit card, debit card, EFT, electronic funds transfers, FAPP, Finance and Accounting PolicyPro, forging, identification, Information Technology PolicyPro, ITPP, paper transactions, PIN, signature, theft, transaction controls

Share with a friend or colleague

Get the Latest Posts in your Inbox for Free!

Electronic monitoring

About Adam Gorley

Adam Gorley is a copywriter, editor and researcher at First Reference. He contributes regularly to First Reference Talks, Inside Internal Controls and other First Reference publications. He writes about general HR issues, accessibility, privacy, technology in the workplace, accommodation, violence and harassment, internal controls and more.

Footer

About us

Established in 1995, First Reference is the leading publisher of up to date, practical and authoritative HR compliance and policy databases that are essential to ensure organizations meet their due diligence and duty of care requirements.

First Reference Talks

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

Main Menu

  • About First Reference
  • Resources
  • Contact us
  • 1 800 750 8175

Stay Connected

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

We welcome your comments on our blog articles. However, we do not respond to specific legal questions in this space.
We do not provide any form of legal advice or legal opinion. Please consult a lawyer in your jurisdiction or try one of our products.


Copyright © 2009 - 2023 · First Reference Inc. · All Rights Reserved
Legal and Copyright Notices · Publisher's Disclaimer · Privacy Policy · Accessibility Policy