Authorisation of electronic fund transfer, Other Subject

Assignment Help:

AUTHORISATION

EFT transactions necessitate communication between number of parties. When a card is applied at a merchant or Automated teller machine   (ATM), the transaction is first routed to an acquirer, then throughout a number of networks to the issuer where the cardholder's account is detained.

A transaction may be approved offline by several of these entities through a stand-in agreement. Stand-in agreement may be used when a communication link is not existing, or merely to save communication time or cost. Stand-in is subject to the transaction amount being below agreed limits, known as floor limits. These restrictions are calculated based on the possibility of authorizing a transaction offline, and therefore differ between merchants and type of card. Offline transactions may be subject to additional security checks such as inspection the card number against a 'hot card' (stolen card) list, velocity checks (preventive the number of offline transactions permissible by a cardholder) and random online authorization.

previous to online approval was standard practice and credit cards were processed using physical vouchers, every merchant would consent a limit ("floor limit) with his bank above which he must telephone for an approval code. If this was not carried out and the transaction consequently was declined by the issuer ("bounced"), the merchant would not be permitted to a repayment.


Related Discussions:- Authorisation of electronic fund transfer

Modern, Modern, Contemporary, and Postmodern Art: Generally, contempo...

Modern, Contemporary, and Postmodern Art: Generally, contemporary art is described as any form of art in any medium that is generated in the present day. Though, within the a

For the legalization of marijuana, having trouble starting my research pape...

having trouble starting my research paper need to figure out my premises

Need help with a medical billing and coding question, Besides holding respo...

Besides holding responsibility of the ICD-9-CM what are other characteristics of this organization?

Cryptography, Cryptography Information protection uses cryptography to ...

Cryptography Information protection uses cryptography to change usable information into a form that renders it ineffectual by anyone other than an official user; this procedure

Government, what were the articles of conferation and why according to Geor...

what were the articles of conferation and why according to George Washington were they a faluire

America in Vietnam, Ask questionThe Vietnam War was a counterinsurgency tha...

Ask questionThe Vietnam War was a counterinsurgency that involved us in guerilla warfare that was similar, in some ways, to what we face in Afghanistan today. But the way the Vietn

Advantages of an online library system, Advantages of an online library sys...

Advantages of an online library system: I need to prepare a report on Advantages of an online library system. Do you and your experts provide help in topic Advantages of an online

Geography Homework, How can different mountain ranges across the world be u...

How can different mountain ranges across the world be used as tourist attractions?

Explain the principle of particle playground, Question 1: (a) Given tha...

Question 1: (a) Given that you have 2 square objects, Object 1 and Object 2, in a scene and that you are required to make the position property of the Object 1 dependent on th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd