2013 Corporate Rules and Guidelines
2013 Corporate Rules and Guidelines
NACHA
Operating Rules
& Guidelines
C O R P O R AT E E D I T I O N
No part of this publication may be reproduced, retransmitted, transferred or displayed, in any form or by any means,
electronic or mechanical, including by photocopy, digital transmission, recording or any information storage and
retrieval system, without the prior written permission of NACHA. Requests for permission to make copies or otherwise
reproduce, retransmit or otherwise exploit content of any part of this publication should be mailed or emailed to:
Permissions
NACHA – The Electronic Payments Association
13450 Sunrise Valley Drive, Suite 100
Herndon, VA 20171
[email protected]
This publication is designed to provide accurate and authoritative information in regard to the subject matter covered.
It is sold with the understanding that the author/publisher is not engaged in rendering legal advice or providing any
other professional service, and NACHA does not guarantee or make any representations or warranties of any kind,
either express or implied, including warranties of merchantability and fitness for a particular purpose. If legal advice
or other professional assistance is required, the services of a competent professional person should be sought.
REGIONAL PAYMENTS ASSOCIATIONS
ALABAMA ACH ASSOCIATION NEACH - NEW ENGLAND ACH ASSOCIATION THE CLEARING HOUSE PAYMENTS ASSOCIATION
2 Riverchase Office Plaza, Suite 111 35 Corporate Drive, Suite 190 450 West 33rd Street
Birmingham, AL 35244 Burlington, MA 01803 New York, NY 10001
Phone: (205) 733-0006 Phone: (781) 321-1011 Phone: (800) 875-2242
Email: [email protected] Email: [email protected] Email: [email protected]
EASTPAY SHAZAM, INC. THE PAYMENTS AUTHORITY, INC.
7400 Beaufont Springs Dr., Suite 405 6700 Pioneer Parkway 580 Kirts Blvd., Suite 301
Richmond, VA 23225 Johnston, IA 50131 Troy, MI 48084
Phone: (800) 681-4224 Phone: (800) 537-5427 Phone: (248) 688-9720
Email: [email protected] Email: [email protected] Email: [email protected]
With offices also in:
Birmingham, AL SOUTH CAROLINA ACH ASSOCIATION UPPER MIDWEST ACH ASSOCIATION
Charlotte, NC 7440 Broad River Road 7100 Northland Circle, Suite 407
Longwood, FL Irmo, SC 29063 Brooklyn Park, MN 55428
Phone: (803) 732-1579 Phone: (763) 549-7000
EPCOR Email: [email protected] Email: [email protected]
3100 Broadway, Suite 609
Kansas City, MO 64111 SOUTHERN FINANCIAL EXCHANGE VIEWPOINTE CS & ASSOCIATION SERVICES
Phone: (800) 500-0100 1340 Poydras Street, Suite 2010 5025 North Central Avenue, Suite 427
Email: [email protected] New Orleans, LA 70112 Phoenix, AZ 85012
Phone: (504) 525-6779 Phone: (800) 279-9059
GACHA Email: [email protected] Email: [email protected]
3250 Riverwood Parkway, Suite 150
Atlanta, GA 30339 SWACHA - THE ELECTRONIC PAYMENTS RESOURCE WACHA - THE PREMIER PAYMENTS RESOURCE
Phone: (678) 384-9791 1999 Bryan Street, Suite 3600 W177 N9886 Rivercrest Drive, Suite 112
Email: [email protected] Dallas, TX 75201 Germantown, WI 53022
Phone: (800) 475-0585 Phone: (262) 345-1245
MACHA - THE MID-ATLANTIC PAYMENTS ASSOCIATION Email: [email protected] Email: [email protected]
1344 Ashton Road, Suite 202
Hanover, MD 21076 TENNESSEE ACH ASSOCIATION WESPAY
Phone: (410) 859-0090 1000 NorthChase Dr., Suite 201 300 Montgomery Street, Suite 400
Email: [email protected] Goodlettsville, TN 37072 San Francisco, CA 94104
Phone: (615) 859-4188 Phone: (800) 977-0018
Email: [email protected] Email: [email protected]
Introduction
The NACHA Operating Rules & Guidelines – Corporate Edition is an annual publication produced by
NACHA — The Electronic Payments Association. NACHA manages the development, administration, and
governance of the ACH Network, the backbone for the electronic movement of money and data. The ACH
Network provides a safe, secure, and reliable network for direct account-to-account consumer, business,
and government payments. Annually, it facilitates billions of Direct Deposit via ACH and Direct Payment
via ACH transactions. Used by all types of financial institutions, the ACH Network is governed by a fair
and equitable set of rules that guide risk management and create payment certainty for all participants.
As a not-for-profit association, NACHA represents more than 10,000 financial institutions via 17 regional
payments associations and direct membership. Through its industry councils and forums, NACHA brings
together payments system stakeholders to foster dialogue and innovation to strengthen the ACH Network.
The NACHA Operating Rules (Rules) provide users with the legal framework for the ACH Network,
while the NACHA Operating Guidelines (Guidelines) provide guidance on implementing the Rules.
This rulebook serves as the definitive source of information governing the exchange and settlement of
electronic fund transfers through the ACH Network. In the case of any inconsistency or conflict between
the Rules and the Guidelines, the NACHA Operating Rules govern. The Rules are organized around the
types of participants in the ACH Network and acknowledge the major roles played by originating and
receiving financial institutions, therefore dedicating large sections to each of these roles. The Rules
explicitly recognize that originating financial institutions are the entry points into the ACH Network for
corporate users and Third Parties, and that these financial institutions are responsible for those parties’
compliance with the Rules.
This publication is divided into two sections, the NACHA Operating Rules and the NACHA Operating
Guidelines – Corporate Edition.
The NACHA Operating Rules provides the legal foundation for the ACH Network. The introductory pages
of this section contain the following material.
• NACHA Board of Directors’ Policy Statements: This section provides guidance from the Board of
Directors on topics of importance to the ACH Network.
• Formal Rules Interpretations: This section contains formal interpretations of the NACHA Operating
Rules, as approved and issued by the NACHA Board of Directors. Interpretations contained in this
section are as binding as the NACHA Operating Rules themselves and have been issued to clarify the
provisions of the NACHA Operating Rules or to provide guidance about whether a particular use or
application is consistent with the Rules. Such interpretations may also have been issued for other
purposes, as deemed appropriate by the Board.
• Network Administration Fees: This section details the amounts of both the annual and per-entry fees,
as determined from time to time by the NACHA Board of Directors..
• Revisions to the NACHA Operating Rules & Guidelines: This section summarizes amendments to
the NACHA Operating Rules that have been approved by the NACHA voting membership during
the last year. Read this section first to get an overview of recent developments and their impact on
operations.
INTRODUCTION
• Supplement #2-2012 provides information on the newest ACH rules changes, which will take effect
in 2013. These changes were approved just prior to publication and are not included in the pages of
the NACHA Operating Rules and NACHA Operating Guidelines – Corporate Edition sections.
The body of the NACHA Operating Rules contains language relating to both current rules and rule
changes that will take effect later in the year. This edition of the Rules contains current rule language,
followed immediately by the new rule text, which is in italics and highlighted. Rule changes within the
text are indicated by a marker in the left margin, with approval and effective dates for those changes
noted at the bottom of the page.
Example:
The ODFI must reduce the Originator’s or Third-Party Sender’s return rate for unauthorized
Entries to a rate below one percent within sixty days after receipt of the National Association’s
written request for information and maintain that return rate below one percent for an
additional one hundred eighty days.
u The ODFI must reduce the Originator’s or Third-Party Sender’s return rate for unauthorized
Entries to a rate below one percent within thirty days after receipt of the National Association’s
written request for information and maintain that return rate below one percent for an
additional one hundred eighty days.
Pages in the NACHA Operating Rules section are numbered sequentially beginning with the prefix “OR.”
The NACHA Operating Guidelines – Corporate Edition includes excerpts from the NACHA Operating
Guidelines that are important to corporations. Refer to the Guidelines for originator roles and
responsibilities within the ACH Network and an overview of Standard Entry Class Codes. In addition,
the NACHA Operating Guidelines – Corporate Edition offers details on the legal framework of the Rules,
Third-Party Service Providers, OFAC Compliance, and a brief history of the ACH Network.
Pages in the NACHA Operating Guidelines – Corporate Edition are numbered sequentially beginning with
the prefix “OG.”
TA B L E O F C O N T E N T S
Table of Contents
2 0 1 3 O P E R AT I N G R U L E S & G U I D E L I N E S i
TA B L E O F C O N T E N T S
ARTICLE THREE Rights and Responsibilities of RDFIs and Their Receivers . . . . . . . . . . . . . OR33
ii 2 0 1 3 O P E R AT I N G R U L E S & G U I D E L I N E S
TA B L E O F C O N T E N T S
ARTICLE FIVE Rights and Responsibilities of Gateways for IAT Entries . . . . . . . . . . . . . . . . . . OR48
SECTION 5.1 Responsibilities of Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OR48
SECTION 5.2 Warranties of Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OR49
SECTION 5.3 Gateway Assumes Obligations of Other Participants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OR49
2 0 1 3 O P E R AT I N G R U L E S & G U I D E L I N E S iii
TA B L E O F C O N T E N T S
iv 2 0 1 3 O P E R AT I N G R U L E S & G U I D E L I N E S
TA B L E O F C O N T E N T S
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OR211
2 0 1 3 O P E R AT I N G R U L E S & G U I D E L I N E S v
TA B L E O F C O N T E N T S
vi 2 0 1 3 O P E R AT I N G R U L E S & G U I D E L I N E S
NACHA Operating Rules
N A C H A B O A R D O F D I R E C T O R S P O L I C Y S TAT E M E N T S
The following Data Security Policy Statement was originally adopted by the Board of Directors on
November 13, 1986, and revised on June 9, 2010.
NACHA strongly supports the efforts of ACH Network participants to implement state-of-the-art data
security techniques. On an ongoing basis, ACH Network participants should stay abreast of new data
security techniques and their applicability to the ACH Network to ensure a high level of quality and
reliability to all users of the ACH Network.
2 0 1 3 O P E R AT I N G R U L E S ORi
N A C H A B O A R D O F D I R E C T O R S P O L I C Y S TAT E M E N T S
The following Policy Statement on Fraud Prevention and Risk Management Initiatives was adopted by the
Board of Directors on August 22, 2002.
Fraud and various forms of financial abuse have found their way into every facet of the U.S. payment
systems. The NACHA Board believes that the Automated Clearing House Network must maintain the
highest standards of fraud prevention to retain the integrity of the payment mechanism and the trust and
confidence of its users. Therefore, the NACHA Board resolves and strongly urges that all participants
implement adequate control systems to detect and prevent fraud and abusive financial transactions.
ORii 2 0 1 3 O P E R AT I N G R U L E S
N A C H A B O A R D O F D I R E C T O R S P O L I C Y S TAT E M E N T S
The following Interim Policy Statement on ACH Data Breach Notification Requirements was adopted by
the Board of Directors on September 28, 2007.
POLICY SUMMARY
This interim policy concerns the timely and accurate notification of NACHA and affected RDFIs when
ODFIs or their Originators or third-party service providers know or reasonably suspect (i) that Consumer-
Level ACH Data (defined below) has been lost, stolen or otherwise subject to unauthorized access and
(ii) that misuse of such information has occurred or is reasonably possible. This interim policy is not
intended to address data comparable to that contained in ACH files that is obtained from other sources,
such as check collection.
This interim policy is effective September 28, 2007. Compliance with this interim policy will not be
enforced as a rule until NACHA has adopted a formal rule regarding data breaches; however, the Board
expects that institutions will take advantage of the notification procedures described here in order to
better manage the risk arising out of data breaches that involve Consumer-Level ACH Data. This interim
policy does not supersede any other data breach notification requirements to which ACH Network
participants may be subject under applicable law or regulation.
(2) the customer’s name together with the customer’s social security number
This policy does not apply to information that is received for any other purpose, such as bank routing
numbers and account numbers that are used in check processing. Consumer-Level ACH Data that are
created from checks in connection with ACH check conversion or truncation programs are covered by
this interim policy.
PREVENTION
Each ODFI is responsible for ensuring that it, its Originators, and their respective third party service
providers adopt and implement commercially reasonable policies, procedures and systems to receive,
store, transmit and destroy Consumer-Level ACH Data in a secure manner and to protect against
data breaches.
2 0 1 3 O P E R AT I N G R U L E S ORiii
N A C H A B O A R D O F D I R E C T O R S P O L I C Y S TAT E M E N T S
Those policies and procedures should include escalation of any breach to appropriate personnel within
the organization in a timely fashion, and in the case of Originators and third party service providers,
prompt notice to the designated security contact at the ODFI.
If a data breach is known or suspected, the ODFI and its affected Originator and/or third party service
provider should immediately commence and diligently pursue an investigation of the circumstances to
determine (i) if a data breach has actually occurred, (ii) the scope of the data breach, including the type
and amount of data affected, (iii) the risk that the affected data will be misused, and (iv) what steps are
necessary to prevent further unauthorized access to Consumer-Level ACH Data.
5. The routing and transit numbers (RTNs) of the affected RDFI accounts
7. Organizations that are involved in the breach (this information may be limited to NACHA at the
request of the ODFI).
Other relevant findings that may be included in the notification are as follows:2
9. Any other information the ODFI believes would be relevant to an RDFI’s evaluation of the data
breach and response to it.
NACHA may provide a standardized form that may be used for purposes of notification in accordance
with this policy. If the notice to NACHA is returned undelivered, the ODFI must take reasonable steps to
correct the address and resend promptly.
1
The ODFI, Originator and third-party processor must separately determine whether they have any consumer notification requirements under
applicable law.
2
While these additional findings will be helpful for disclosure purposes, their determination should not delay the required notification.
ORiv 2 0 1 3 O P E R AT I N G R U L E S
N A C H A B O A R D O F D I R E C T O R S P O L I C Y S TAT E M E N T S
The ODFI also should take reasonable steps to notify RDFIs whose accounts may be affected, which
may include, at the option of the ODFI, directly contacting each RDFI, or using a process designated by
NACHA to help enable such contacts.
TIMEFRAME TO NOTIFY
The ODFI must take all appropriate steps to provide initial notice to NACHA and each affected RDFI as
soon as reasonably possible. ODFIs should not wait to complete their investigation before providing
initial notice if sufficient information has been elicited (i) to conclude that a data breach likely occurred
and that misuse of Consumer-Level ACH Data is reasonably possible and (ii) to allow RDFIs to take
meaningful action in response to such notice.
Notice may be delayed or limited if disclosure of the information to ACH Network participants would
impede an on-going criminal investigation.
2 0 1 3 O P E R AT I N G R U L E S ORv
N A C H A B O A R D O F D I R E C T O R S P O L I C Y S TAT E M E N T S
The following Policy Statement on Use of a Terminated Originator Database was adopted by the Board of
Directors on October 21, 2010.
POLICY SUMMARY
This policy addresses the importance of Originating Depository Financial Institution (ODFI) use of
a Terminated Originator Database as a component of an ODFI’s due diligence and risk management
processes, which are essential to the maintenance of a high quality ACH Network. A Terminated
Originator Database provides a mechanism for ODFIs to share information regarding the circumstances
under which ACH processing for specific Originators or Third-Party Senders has been terminated, thus
enabling ODFIs to focus due diligence efforts on Originators and Third-Party Senders whose history may
warrant further review. A Terminated Originator Database can provide an additional tool for ODFIs to
use to supplement their current processes and procedures for evaluating new Originators and Third-Party
Senders and for ongoing monitoring of Originators and Third-Party Senders. In addition, because the
utility of a Terminated Originator Database for all ODFIs grows exponentially with the number of ODFIs
contributing to the Database, the Board of Directors is recommending that ODFIs use NACHA’s preferred
Terminated Originator Database provider. While ODFIs are free to choose the Database or Databases that
they use and to which they contribute, the more institutions that use the preferred Terminated Originator
Database provider, the more useful it will be for each participating ODFI.
This policy is effective March 1, 2011. The Board of Directors encourages ODFIs to use a Terminated
Originator Database in the following ways: 1) ODFIs that have terminated an Originator or Third-Party
Sender for cause should populate the Database with information from their experiences, 2) to help focus
their diligence processes, ODFIs should access the Database prior to onboarding new Originators and
Third-Party Senders to learn about other ODFIs’ experiences with this company, and 3) ODFIs should
periodically check the Database for their current Originators and Third-Party Senders as these entities
might be originating through multiple ODFIs and termination by another ODFI may be indicative of
issues worthy of further review.
Nonetheless, the Terminated Originator Database is not a list of prohibited or disapproved Originators
and Third-Party Senders. Each ODFI should utilize the information they obtain from the Database as part
of their effort to evaluate new and current Originator or Third-Party Sender customers. ODFIs should
independently perform due diligence to determine how this information will factor into their decision-
making and monitoring processes.
The value of a Terminated Originator Database is dependent on data being contributed by ODFIs of
all sizes and types. ODFIs should not only consult a Terminated Originator Database, but also should
contribute their own data in order to provide the most robust service for the benefit of all participating
ODFIs and the ACH Network. To enable the most effective information sharing in this regard, the Board
ORvi 2 0 1 3 O P E R AT I N G R U L E S
N A C H A B O A R D O F D I R E C T O R S P O L I C Y S TAT E M E N T S
of Directors recommends a preferred Terminated Originator Database provider. ODFIs are free to choose
the Database(s) in which they participate, but ODFIs should consider, at a minimum, contributing to
and consulting the preferred Database in order to take advantage of the synergies provided by that
centralized facility.
• ODFIs that terminate an Originator or Third-Party Sender for cause should populate the Terminated
Originator Database with information that allows identification of the Originator or Third-Party
Sender to other ODFIs.
• ODFIs should access the Terminated Originator Database to learn about other ODFIs’ experiences
with Originators and Third-Party Senders. This information sharing will help ODFIs, as gatekeepers
to the Network, to have a more complete risk profile when determining whether or not to begin
origination for an Originator or Third-Party Sender.
• ODFIs should periodically access the Terminated Originator Database as part of their ongoing
monitoring efforts for current Originators and Third-Party Senders to determine whether termination
of other ODFI relationships raises issues warranting further review.
2 0 1 3 O P E R AT I N G R U L E S ORvii
N A C H A B O A R D O F D I R E C T O R S P O L I C Y S TAT E M E N T S
The following Policy Statement on the Importance of Sound Business Practices to Mitigate Corporate
Account Takeover was adopted by the Board of Directors on October 21, 2010.
POLICY SUMMARY
Risks to payment networks are ever-changing. Cyber-thieves are becoming increasingly sophisticated at
exploiting vulnerabilities in corporate systems in order to commit fraud. Corporate Account Takeover, a
type of corporate identify theft in which cyber-thieves steal a business’ valid online banking credentials,
has recently been on the rise and represents a risk to ACH Network participants even though the roots
of this criminal activity are not in banking systems themselves. Accordingly, this policy statement of the
NACHA Board of Directors addresses the importance of Originating Depository Financial Institutions
(ODFIs) utilizing sound business practices to prevent and mitigate the risk of Corporate Account Takeover
within the ACH Network.
POLICY STATEMENT
Corporate Account Takeover is particularly pernicious because once a cyber-thief obtains a company’s
valid online banking credentials; the thief can use those credentials in a variety of ways. The thief may
initiate funds transfers out of the compromised business’ account by ACH or wire transfer to the bank
account of associates within the U.S. or directly overseas. In some cases, the perpetrator may also be
able to gain access to and review the business’ account details, such as account balances, activities and
patterns, enabling the perpetrator to mimic the legitimate users and initiate transactions undetected.
Cyber-thieves employ various methods to obtain access to the banking credentials from legitimate
businesses, including mimicking a legitimate institution’s website, using malware and viruses to
compromise the legitimate business’ system or even using social engineering to defraud employees into
revealing security credentials or other sensitive data. For example, corporate systems may be compromised
by (1) an infected document attached to an e-mail, (2) a link within an e-mail that connects to an infected
website, (3) employees visiting legitimate websites — especially social networking sites — and clicking
on the infected documents, videos or photos posted there, or (4) an employee using a flash drive that
was infected by another computer. In each case, the infected system is then exploited to obtain legitimate
security credentials that can be used to access a company’s corporate accounts.
ODFIs should vigilantly and proactively protect against this type of fraud in various ways, including
implementing systems designed to prevent and detect attempts to access a business’ banking credentials
and actual unauthorized access to the business’ banking accounts, and by keeping their own customers
informed about the importance of implementing their own systems and sound business practices to
protect themselves. Indeed, keeping customers informed of evolving risks can be an effective method to
combat cyber-thieves before they get access to the banking system. The types and significance of the risk
to each ODFI will vary depending on the financial institution, its business and its systems and processes.
It is essential that ODFIs and other ACH participants, such as Originators and Third-Party Senders, take
a risk-based approach tailored to their individual characteristics and their customers to avoid losses
and liability for themselves and other ACH participants. Accordingly, each ODFI should establish and
implement mechanisms aimed to prevent, detect and mitigate risk associated with Corporate Account
Takeover, and work with their customers to also take such a risk based approach — thus acknowledging
ORviii 2 0 1 3 O P E R AT I N G R U L E S
N A C H A B O A R D O F D I R E C T O R S P O L I C Y S TAT E M E N T S
the important role of both the FI and the customer in preventing and detecting Corporate Account
Takeover. Each ODFI should periodically review and update such mechanisms and customer guidance
in response to developments in the methods used by cyber-thieves to perpetrate Corporate Account
Takeover and in the methods used to prevent, detect and mitigate risk associated with such fraud.
2 0 1 3 O P E R AT I N G R U L E S ORix
F O R M A L R U L E S I N T E R P R E TAT I O N S
SUMMARY
NACHA has been requested to issue a formal interpretation of the NACHA Operating Rules (Rules) with
respect to the practice of using the Prearranged Payment and Deposit (“PPD”) format for the conversion
and electronic collection of consumer checks collected at the point of purchase. This interpretation
clarifies that the POP entry and the BOC entry, and the POP Standard Entry Class and the BOC Standard
Entry Class (“SEC”) Codes, are the exclusive entry and class codes for ACH entries based on the conversion
of checks received at the point of purchase.1 The PPD entry and format may not be used for this purpose.
ISSUE
NACHA has been asked whether the practice of using a one-time PPD entry for the conversion of a check
received at the point of purchase rather than processing such a transaction as a POP entry (which was
specifically designed for electronic check conversion) is consistent with the Rules. NACHA understands
that under this practice a retailer receives a consumer’s check at the point of purchase and stamps
the back of the check with authorization language for an electronic debit. The consumer then signs
the authorization on the back of the check. The retailer later processes the check, captures the MICR
information from the check, and originates a PPD debit entry for the amount of the check. The retailer
may also provide the consumer with a copy of the authorization language on the consumer’s receipt or
on another document.
A POP entry is initiated by an Originator based on a written authorization and account information
drawn from a check obtained from a consumer at the point of purchase. The check, which is voided by
the merchant and returned to the consumer at the point of purchase, is used to capture the consumer’s
routing number, account number, and check serial number, which are used to generate the ACH debit
entry to the consumer’s account.
1
The Rules for BOC entries were effective as of March 16, 2007.
2
2013 NACHA Operating Rules § 8.64 (“POP entry”)
2 0 1 3 O P E R AT I N G R U L E S ORxi
F O R M A L R U L E S I N T E R P R E TAT I O N S
POP entries are subject to special requirements under the Rules. For example, authorizations for POP
entries do not need to refer to an ability to revoke the entry, because revocation would not be practical
for POP transactions where the customer obtains the goods or services and then leaves the point of
purchase.3 In addition POP entries are subject to requirements as to the types of checks that can be
converted to POP entries,4 the capture of MICR information,5 and receipts.6 The Rules require that the
POP entry contain specific information, including, but not limited to, the Receiver’s bank routing number,
account number, serial number of the consumer’s source document, and location (city and state) of the
electronic terminal used for the transaction.7
BOC Entries8
A BOC entry is defined as:
A BOC entry is initiated based on (1) notice posted at the point of purchase or manned bill payment
location, informing the Receiver that the check may be converted to an ACH transaction during back
office processing and collected electronically as an ACH debit, and (2) payment information (routing
number, account number, check serial number, and dollar amount of the transaction) obtained from a
check obtained from the Receiver at the point of purchase.
BOC entries are subject to special requirements under the Rules related to the types of checks that can
be converted10, notice and the provision of a copy of such notice language to the Receiver11, the capture
of MICR information12, verification of the identities of both Originator/Third-Party Sender and Receiver13,
documentation on Originators14, maintenance of a customer service telephone number15, and source
document copy, presentation, and secure storage requirements16. The Rules require that the BOC entry
contain specific information, including, but not limited to, the Receiver’s bank routing number, account
number, source document check serial number, and dollar amount of the check.
PPD Entries
A PPD Entry is defined as
Prior to the origination of a PPD entry to the consumer’s account, the consumer must have authorized
the Originator to initiate the entry to such an account. This authorization must be in writing and signed
or similarly authenticated by the consumer, and the consumer must be provided with an electronic or
3
Id. at § 2.5.10.2
4
Id. at § 8.32
5
Id. at § 2.5.10.4
6
Id. at §2.5.10.5
7
Id. at Appendix Three, subpart 3.1.15
8
Id. at § 8.11 (“BOC entry”)
9
Id. at § 8.11
10
Id. at § 8.32
11
Id. at § 2.5.2.2
12
Id. at § 2.5.2.4
13
Id. at § 2.5.2.5
14
Id. at § 2.5.2.5
15
Id. at § 2.5.2.5
16
Id. at § 2.5.2.5
17
Id. at § 8.66
ORxii 2 0 1 3 O P E R AT I N G R U L E S
F O R M A L R U L E S I N T E R P R E TAT I O N S
paper copy of the authorization. The authorization must be readily identifiable as an authorization
and must clearly and conspicuously state its terms, as well as indicate that the Receiver may revoke the
authorization by notifying the Originator in the manner specified in the authorization. The authorization
process must evidence both the consumer’s identity and his or her assent to the transaction. Further, the
Rules require that the PPD entry contain certain information, including, but not limited to, the Receiver’s
bank routing number and account number.18 In addition, the consumer must be provided an electronic
or paper copy of the authorization.19
Rules Analysis
The express language of the Rules strongly suggests that POP and BOC entries are intended to be the
exclusive entries and class codes for ACH entries based on the conversion of checks received at the
point of purchase. The special requirements for POP and BOC entries would be largely unnecessary
if the Rules were interpreted to provide for POP and BOC transactions to be conducted as PPD entries
without compliance with POP and BOC requirements. Nevertheless, it could be argued that the fact
that the definition of PPD entry excludes MTE and POS entries, but does not exclude POP and BOC
entries, means that some, or all, transactions that meet the definition of POP and BOC entries may also
be processed as PPD entries. Similarly, it could be argued that because, for example, the rules for POP
and BOC entries do not require the Originator to provide the Receiver with a copy of the authorization
at the point of sale, the requirements of POP and BOC entries and PPD entries are alternative ways of
accomplishing the same general type of transaction.
Because the express language of the Rules does not conclusively resolve whether or not POP and BOC
entries are the exclusive means of conducting certain transactions, NACHA is issuing this interpretation
under Section 1.3.3 of the Rules.
Interpretation
NACHA intended the rules for POP entries to be the exclusive entry and class code for ACH entries
based on the conversion of checks received at the point of purchase. Recognizing the importance
of providing a legal framework within the Rules that would protect ACH participants with regard to
the initiation of point-of-purchase entries, in March 1999, the NACHA Voting Membership approved an
interim rule designed to expand the definition of the PPD entry format to allow its use in initiating one-
time ACH debit entries for purchases made at the point of purchase. This interim rule was, however,
only intended to be a one-year interim rule to permit the implementation of a newly created Standard
Entry Class Code for point of purchase transactions-the POP entry. Subsequently, in September 2000,
the POP SEC Code and the requirements for POP entries became effective and superseded the use of the
PPD interim rule for point-of-purchase entries.20 As of March 16, 2007, an additional application (BOC)
for the conversion of checks presented at the point of purchase was adopted with a legal framework
and technical requirements designed to protect ACH participants with regard to the initiation of check
conversion entries.
The rules for POP and BOC entries establish the legal framework and requirements that the NACHA
Voting Membership determined were needed to protect ACH participants with respect to check conversion
transactions initiated at the point of purchase. The rules for POP and BOC entries also establish requirements
for the provision of information on the Receiver’s bank account statement to enable the Receiver to
identify the converted check and the location where the payment was made. The POP and BOC
applications were specifically designed to provide Receiver protections and requirements unique to this
type of conversion activity.
18
Id. at Appendix Three, subpart 3.1.17
19
Id. at § 2.3.2.2
20
2000 NACHA Operating Rules, page R2
2 0 1 3 O P E R AT I N G R U L E S ORxiii
F O R M A L R U L E S I N T E R P R E TAT I O N S
These unique requirements were intended to mitigate risk and reduce customer service problems. These
requirements do not apply to PPD entries and therefore the use of PPD entries for conversion of checks
received at the point of sale could result in more risk to ACH participants and customer service issues.
For example, the PPD format cannot accommodate the inclusion of the check serial number from the
Receiver’s source document. Similarly, the rules for PPD entries do not require the placement of this
information on the Receiver’s bank account statement.
CONCLUSION
The practice of receiving checks at the point of purchase and then converting those checks to one-time
PPD entries is inconsistent with the exclusive application of POP entries to such payments under the
Rules. The rules for POP entries and the POP SEC Code and BOC entries and the BOC SEC Code are the
only rules, and the only SEC Codes, that provide for the conversion of checks received in-person. The
use of any other SEC Codes for this purpose is not permissible under the Rules.
ORxiv 2 0 1 3 O P E R AT I N G R U L E S
F O R M A L R U L E S I N T E R P R E TAT I O N S
SUMMARY
This formal interpretation of the NACHA Rules addresses (i) when it is appropriate to aggregate transactions
into a single ACH entry, (ii) what is the most appropriate SEC code to use for specific transaction types
given the method used to obtain consumer authorization, the manner in which an ACH product is used by
the consumer and the information needed by RDFIs and NACHA to manage risk and, in the case of RDFIs,
to manage customer relationships, and (iii) what party should be identified in the “Company Name”
field of the ACH entry. The NACHA Board has determined that (i) transactions may not be aggregated
under the POS or MTE codes, but may be aggregated under the WEB or PPD codes if the transactions
are accumulated for more than fourteen (14) days, (ii) if either the POS or MTE code may apply to a
transaction that otherwise could be characterized as WEB or PPD (including when a Receiver uses his
or her mobile device to initiate a transaction at the point-of-sale), the POS or MTE code, respectively,
must be used, and (iii) the payee of the underlying transaction being settled through the ACH should
be identified in the “Company Name” field. This interpretation does not address the accumulation by
a single merchant of multiple purchases at that merchant (e.g., weekly billing of music purchases at an
internet music site). That is a separate issue that will be separately considered by NACHA.
ISSUE
Some providers of ACH services seek to aggregate transactions that occur during a single day, or over
multiple days, into a single ACH entry. This aggregation may be attempted across multiple merchants
and multiple transactions types (e.g., transactions at retail locations might be combined with ATM
withdrawals). Accordingly, the issue has arisen whether such aggregation is permissible under the Rules,
and if so, how such transactions should be handled within the existing Rules. As a corollary, if more
than one of the POS, MTE, WEB or PPD codes arguably might apply on their face, which code should be
used in which circumstances? Moreover, since the payee of such transactions may be different from the
Originator who obtains the Recipient’s authorization, which name should be included in the “Company
Name” field of the ACH message?
INTERPRETATION
The NACHA Rules do not permit aggregation of transactions under the POS or MTE codes. Each time an
ACH-linked card or other similar ACH service that can be used at multiple payees is used by a consumer
at an electronic terminal in a retail location in the case of the POS code, or at an ATM in the case of the
MTE code, the ODFI must submit a separate ACH entry that is properly formatted using the POS or MTE
SEC codes, respectively. Multiple transactions at one or more electronic terminals may not be aggregated
in a single POS or MTE entry.
Transactions may be aggregated under the WEB or PPD codes only in the following circumstances. The
PPD code may be used for a properly authorized ACH transaction that represents a single payment on a
separate account regardless of whether there have been multiple charges by the consumer to that account
(i.e., for a bill payment), provided that each such payment on account covers at least fourteen (14) days of
transactions. If the original enrollment for an ACH service was performed on the internet, the WEB code
may be used for a properly authorized ACH transaction that represents a single payment on a separate
account regardless of whether there have been multiple charges by the consumer to that account (i.e.,
for a bill payment), provided that each such payment on account covers at least fourteen (14) days of
transactions. This fourteen (14) day window provides a clear dividing line between payments on an
2 0 1 3 O P E R AT I N G R U L E S ORxv
F O R M A L R U L E S I N T E R P R E TAT I O N S
account, such as monthly bill payments (e.g., the monthly payment of a charge card bill), and transactions
that are effectively pass-through debits to a deposit account at an RDFI.
If a consumer has an account that ordinarily is billed in periods of more than fourteen (14) days, and
the consumer separately authorizes an individual payment on account for a period of less than fourteen
days (for example, by logging on to the biller’s website to make an individual interim payment prior to
the close of a monthly billing cycle), the ODFI may process such transaction as a single PPD or WEB
transaction, depending on whether the original enrollment for the ACH service was obtained on the
internet. A separate authorization of payment in this context must be a specific authorization of the
specific total amount to be debited at that time, and a separate specific authorization must be obtained
from the consumer each time another payment of fourteen (14) days or less is made. For clarity, the use
of a debit card at the point-of-sale does not constitute a separate specific authorization for this purpose.
Furthermore, the SEC Code Allocation Chart attached hereto provides guidance on the appropriate SEC
Code to use in connection with transactions based on how an ACH service is being used and how the
original authorization for that service was obtained. For example, if an Originator provides a debit card
to consumers that can be used for a variety of transactions pursuant to a written, standing authorization
to debit the amount of those transactions to a deposit account at an RDFI, the transactions should be
handled as follows: Each use of the debit card at a point-of-sale terminal should be treated as a separate
POS transaction; each use of the debit card at an ATM should be treated as an MTE transaction; and
each use of the debit card to make purchases on the internet should be treated as a PPD transaction. By
contrast, if the Originator obtains the consumer’s original standing authorization for the same product via
the internet, the transactions should be handled as follows: Each use of the debit card at a point-of-sale
terminal still should be treated as a separate POS transaction; each use of the debit card at an ATM still
should be treated as an MTE transaction; but each use of the debit card to make purchases on the internet
should be treated as a WEB transaction. As indicated above, the Originator may not aggregate multiple
transactions across multiple payees. However, if the “account” offered by Originator is only billed to the
consumer for periods of more than fourteen (14) days, then those transactions may be processed as a
single bill payment transaction under the PPD or WEB code, respectively, for the total amount owing at
the end of such period.
Finally, in order to provide appropriate information to the RDFI and NACHA, the party identified in the
“Company Name” field of the ACH Entry in each of these cases should be the party to which the funds
ultimately will be transferred. For example, in the card product above, the ultimate payee is the merchant
or owner of the ATM where the card is used, not the Originator that issues the card. Similarly, in a bill
payment service, the ultimate payee is the biller, not the provider of the bill payment service.
The first row of the Chart addresses products that are physically used at the point-of-sale for retail
purchases. Box A addresses products for which both enrollment and use occurs at the point-of-sale. This
is the quintessential transaction for which the POS code was originally developed.
Box B addresses products for which the original enrollment occurred on the internet, but which are then
used at the physical point-of-sale. The Interpretation requires that such transactions be treated as POS
because this more specific SEC code is more closely related to the nature of the transaction being initiated
by the consumer at the time of use of the card. As noted above, use of this code results in the delivery
ORxvi 2 0 1 3 O P E R AT I N G R U L E S
F O R M A L R U L E S I N T E R P R E TAT I O N S
of appropriate information to RDFIs to enable risk management and customer service, and also enables
NACHA to more effectively conduct its risk management services for the ACH Network. Accordingly,
the POS code should be used when a Receiver uses his or her mobile device enabled with near-field
communication or similar technologies to authorize Entries at the point-of-sale, even if the WEB code also
could technically apply.
Box C addresses products for which enrollment occurred over the telephone, e.g., via the entry of a code
through a VRU, but which are then used at the physical point-of-sale. As with the other boxes in this row,
the POS code is the most directly relevant code, enabling the communication of the individual transaction
data to the RDFI.
Boxes D, E and F address ACH products that are used on the internet. When an ODFI (or Originator)
has a pre-existing standing authorization obtained through another channel (e.g., a physically signed
authorization for insurance payments), the fact that the customer later uses the ODFI’s or Originator’s
internet service to confirm an individual payment does not require conversion of the transaction to a WEB
code. Many of the risks associated with internet-based transmission of the original account information
are not present in such circumstances.
Boxes G, H and I address the use of ACH products at the ATM, and raise issues very similar to the boxes
in the first row of the chart. In short, in order to manage risks associated with access to their accounts at
ATMs, RDFIs need to have the information communicated through the MTE transaction code, regardless
of how the consumer originally enrolled in the service.
Boxes J, K and L address the authorization of ACH transactions over the phone pursuant to a previously
obtained standing ACH authorization or a one-time confirmation of a previously provided written
authorization form.
Similarly, the final row of the chart addresses recurring debits for which enrollment occurred via hard
copy, via the internet or via the telephone. As with the preceding row, the appropriate codes for
transactions relying on hard copy or internet enrollment (including VRU-based acceptance of a hard copy
authorization form) are the general codes that apply based on the form of enrollment for the service —
WEB for internet-based enrollment, and PPD for all others. If the Originator complies with the Rules
for origination of recurring TEL transactions in connection to a telephone-based authorization (including
recorded phone line and written confirmation), the TEL code applies.
2 0 1 3 O P E R AT I N G R U L E S ORxvii
F O R M A L R U L E S I N T E R P R E TAT I O N S
ORxviii 2 0 1 3 O P E R AT I N G R U L E S
F O R M A L R U L E S I N T E R P R E TAT I O N S
2 0 1 3 O P E R AT I N G R U L E S ORxix
N E T W O R K A D M I N I S T R AT I O N F E E S
Financial institutions are required to report and NACHA collects directly the per-entry fees for ACH entries
not sent through the ACH Operators, but that are sent as part of direct send or “on-we” arrangements. A
direct send or “on-we” arrangement is one in which a Participating DFI sends a payment file that uses the
NACHA formats and/or is covered by the NACHA Operating Rules, where that file is not processed by an
ACH Operator, but instead is exchanged with another non-affiliated Participating DFI, either directly or
through another entity. This definition applies regardless of how interbank settlement is accomplished.
Participating DFIs with direct send or “on-we” volume exceeding 5 million entries annually are obligated
to file the requisite reporting with NACHA quarterly. Participating DFIs with direct send volume below
this threshold are obligated to file with NACHA annually. These financial institutions are required to
submit transaction volume data and any associated fees directly to NACHA using Form N-7 (2013).
Any Participating DFI whose direct send or “on we” volume of entries originated or received exceeds
5 million for any quarter ending March 31, June 30, September 30, or December 31, 2013 must submit
the above data and fees on a quarterly basis thereafter. The submission deadlines for quarterly filers are
April 30, July 31, and October 31, 2013, and January 31, 2014. Participating DFIs that exceed the threshold
during the calendar year must aggregate all prior quarters’ fees in their current quarter’s Form N-7 (2013)
payment. Participating DFIs whose direct send volume is below this threshold must submit the above
data and fees for calendar year 2013 by January 31, 2014.
This Schedule of Fees has been established by the NACHA Board of Directors for calendar year 2013
in accordance with the requirements of the NACHA Operating Rules, Article One (General Rules),
Section 1.10 (Network Administration Fees).
ORxx 2 0 1 3 O P E R AT I N G R U L E S
N E T W O R K A D M I N I S T R AT I O N F E E S
Completed forms and payment must be received by NACHA no later than the above deadlines and should
be mailed to: NACHA – The Electronic Payments Association, Attn: Finance Department, 13450 Sunrise
Valley Drive, Suite 100, Herndon, VA 20171. Payment may be made by ACH credit or check (made
payable to NACHA).
To pay by ACH credit, credit must be initiated by the organization filing Form N-7. UPIC Routing & Transit
# 021052053, Acct # 59058945. Use CCD format for single filing. Complete in Batch Header (1) Company
Name (2) Company Entry Description (specify Form N-7 (2013)).
Form Instructions
Line 1. Enter legal name of Participating DFI.
Line 3a. List the number of ACH entries transmitted and received by the Participating DFI that were not
processed by an ACH Operator but were exchanged with another non-affiliated Participating
DFI, either directly or through another entity, for the applicable period. Entries should be sorted
by routing number of the non-affiliated DFI and include debits, credits and entries of non-value.
If there are more routing numbers than spaces available, attach another sheet. Total columns and
add together to calculate the grand total.
2 0 1 3 O P E R AT I N G R U L E S ORxxi
N E T W O R K A D M I N I S T R AT I O N F E E S
Line 5. Multiply line 3b by line 4 [example: (line 3b) 100,000 x (line 4) $.000145 = (line 5) $14.50]
Line 6. Payment due is equal to the amount on line 5. Indicate payment method. If by check, make
check payable to NACHA. If payment by ACH Credit, indicate date of credit to be initiated by
the business. See account information above for ACH Credit. If amount on line 5 is less than one
dollar, submit the completed form only; no payment is due.
ORxxii 2 0 1 3 O P E R AT I N G R U L E S
N E T W O R K A D M I N I S T R AT I O N F E E S
2. Business Address____________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
TOTALS
2 0 1 3 O P E R AT I N G R U L E S ORxxiii
N E T W O R K A D M I N I S T R AT I O N F E E S
6. Payment Due: (Amount on line 5) Check enclosed _______________ or Date of ACH credit _______________
(If less than $1.00, no payment due, submit form only)
I declare that I have examined this form and to the best of my knowledge and belief, it is true, correct
and complete.
Signature_______________________________________________________________________ Date____________________
Printed Name___________________________________________________________________________________________
Title____________________________________________________________________________________________________
ORxxiv 2 0 1 3 O P E R AT I N G R U L E S
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
The 2013 edition of the NACHA Operating Rules & Guidelines contains changes related to four sets
of amendments: IAT Modifications and Refinements; Data Passing; ODFI Return Rate Reporting; and
Incomplete Transactions and the Return of Funding Debit Entries. The effective date for these changes is
March 15, 2013.
This section also includes a technical summary of all changes to the Rules that were implemented in
2012. The text changes were officially communicated via Supplements, but they are summarized here
for reference. Please note that since these changes are already effective, they are not marked within the
text of the Rules.
2 0 1 3 O P E R AT I N G R U L E S ORxxv
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
SUMMARY
The IAT Modifications and Refinements changes clarify and enhance the Rules where appropriate to
support more efficient processing of IAT Entries.
Since implementing IAT, NACHA has received inquiries regarding which return reason code is appropriate
for an RDFI to use to indicate that the return of an IAT Entry was based on an instruction to do so from
OFAC. Under the current Rules, R16 (Account Frozen) provides the closest match, permitting an RDFI to
return an Entry because access to the account is restricted due to specific action taken by the RDFI or
by legal action. This amendment expands the title and description of Return Reason Code R16 (Account
Frozen) to accommodate this code’s use for the RDFI’s return of an Entry based on an instruction from
OFAC.
Return Reason Code and Change Code for Gateway Use with Incorrectly-Coded International Payments
This amendment establishes two new codes – one Return Reason Code and one Change Code – for use
by Gateways to advise ODFIs and Originators that funds related to a domestically-coded Entry (i.e., PPD,
CCD, etc.) are being moved out of the country and that the Entry should have been formatted as an IAT
Entry.
This change defines an additional Return Reason Code for use by Gateways that clearly indicates that
an Entry is being returned because it is part of an international payment transaction and lacks sufficient
information for the Gateway to ensure that it complies with U.S. law. This rule also creates a new NOC
code, to be used only by a Gateway, to notify the Originator/ODFI that the payment has been processed
but that it is part of an international payment transaction and requires appropriate formatting going
forward.
These new codes enable the Gateway to process or return the payment, depending on its risk tolerance,
while conveying critical payment information back to the ODFI.
This amendment also modifies the title of Change Code C09 to adopt the corresponding field name for
IAT Entries.
ORxxvi 2 0 1 3 O P E R AT I N G R U L E S
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
TECHNICAL SUMMARY
The changes to the Rules language, as noted below, represent modifications to the NACHA Operating
Rules.
Return Reason Code and Change Code for Gateway Use with Incorrectly-Coded International Payments
• Appendix Four, Part 4.2 (Table of Return Codes): R85 (Incorrectly Coded Outbound International
Payment) – establishes a new return code for an incorrectly-coded outbound international payment.
• Appendix Five, Part 5.3 (Table of Change Codes for Notification of Change): C14 (Incorrect SEC Code
for Outbound International ACH Transaction) - establishes a new change code for an incorrectly-
coded outbound international payment.
- C04 (Incorrect Individual Name/Receiving company name) – clarifies the description as it relates
to IAT Entries.
- C09 (Incorrect Individual Identification Number) – clarifies the description as it relates to IAT
Entries
2 0 1 3 O P E R AT I N G R U L E S ORxxvii
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
Data Passing
SUMMARY
The Data Passing Rule prohibits sharing of certain customer information by Originators, Third-Party
Service Providers and ODFIs for the purpose of initiating debit Entries that are not covered by the original
authorization.
IMPACT TO PARTICIPANTS
Receivers: The rule is expected to benefit consumer Receivers by protecting their account information
from use in connection with purported authorizations that they do not intend to give.
RDFIs: The rule is expected to reduce RDFIs’ exception processing associated with unauthorized
transactions and other customer service costs due to questionable transactions.
ODFIs, Originators and Third-Party Service Providers: The rule should have little or no effect on ODFIs,
Originators, and Third-Party Service Providers, since most data passing activity is prohibited by The
Restore Online Shoppers’ Confidence Act.
TECHNICAL SUMMARY
Below is a summary of the impact of this rule change on the NACHA Operating Rules. Sections of the
Rules that are affected by this amendment are also included.
rticle Two, Subsection 2.3.4 (Restrictions on Data Passing) – Adds a new subsection to the Rules
• A
on authorization that:
(1) prohibits an ODFI from disclosing the Receiver’s account number or routing number to any
third party for such third party’s use, directly or indirectly, in initiating a debit Entry that is not
covered by the original authorization; and
(2) requires an ODFI to ensure that the Originator and any Third-Party Service Provider acting
on behalf of the Originator or ODFI do not disclose the Receiver’s account number or routing
number to any third party for such third party’s use, directly or indirectly, in initiating a debit
Entry that is not covered by the original authorization.
ORxxviii 2 0 1 3 O P E R AT I N G R U L E S
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
SUMMARY
The modification to the Rules for ODFI Return Rate Reporting will reduce the reporting period from
60 days to 30 days during which the ODFI has to reduce a return rate below the threshold before the
initiation of a rules enforcement proceeding.
IMPACT TO PARTICIPANTS
All Participants: By shortening the deadline by which an excessive rate of return must be resolved by
an ODFI and its Originator, the ACH Network, as a whole, benefits through the introduction of fewer
unauthorized debits into the payments system.
RDFIs: RDFIs should receive fewer unauthorized entries, resulting in lower exception processing costs
associated with the return of unauthorized entries and the response to customer service calls.
ODFIs: Some ODFIs, particularly those with inadequate risk management procedures, may incur
incremental costs associated with development and implementation of additional policies and procedures
to ensure their Originators’ and Third Party Senders’ compliance with the shortened grace period.
Originators and Third-Party Senders: Originators and Third-Party Senders with excessive return rates
will be compelled by their ODFIs to take action more quickly to reduce their return rates and will likely
incur costs in doing so.
TECHNICAL SUMMARY
The changes to the Rules language, as noted below, represent modifications to the NACHA Operating
Rules.
• Article Two, Subsection 2.17.2.1 (Additional ODFI Action and Reporting When the Return Threshold
is Exceeded) and Article Two, Subsection 2.17.2.2 (ODFI Reduction of Return Rate) – Reduces to
30 days from 60 days the time period during which an ODFI may reduce a return rate below the
applicable threshold before a rules enforcement proceeding may be initiated.
• Appendix Ten, Subpart 10.2.2 (National Association Action on Receipt of Information Reported by
ODFI) – Reduces the 60 day time period to 30 days before NACHA may initiate a rules enforcement
proceeding against an ODFI when an Originator’s or Third-Party Sender’s unauthorized Entry return
rate exceeds the threshold.
•
Appendix Ten, Subpart 10.4.3 (Submission Requirements for Rules Enforcement Proceedings
Initiated by the National Association) and Appendix Ten, Subpart 10.4.7.4 (Class 2 Rules Violation)
– Reduces to 30 days the time period during which an ODFI may reduce a return rate below the
applicable threshold before a rules enforcement proceeding may be initiated.
• Appendix Ten, Subpart 10.4.7.4 (Class 2 Rules Violation) - Revises the reference for the ODFI action
time frame from 60 days to 30 days.
2 0 1 3 O P E R AT I N G R U L E S ORxxix
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
SUMMARY
The Incomplete Transactions and the Return of Funding Debit Entries rule allows the return of a debit
Entry to a Consumer Account within 60 days of the Settlement Date for an “Incomplete Transaction.”
IMPACT TO PARTICIPANTS
RDFIs: This amendment explicitly allows RDFIs to return debits related to Incomplete Transactions as
they would any other unauthorized debit to a consumer’s account. Any customer service or processing
impact to the RDFI should be minimal. RDFIs may, however, bear some programming, customer service,
and training costs associated with the expanded uses of the R10 Return Reason Code.
Receivers: Consumer Receivers benefit from the ability to be re-credited for a debit when a corresponding
payment is not made by a Third-Party Sender on the Receiver’s behalf.
ODFIs: ODFIs may need to perform additional due diligence with respect to Third-Party Sender customers
to ensure that the Third-Party Senders have the capabilities to complete transactions. ODFIs may incur
costs associated with training and due diligence costs associated with the expanded use of Return Reason
Code R10.
Originators: Originators are expected to benefit from a better resolution of the interruption of their
customers’ payments. When Originators’ customers are re-credited by their RDFIs, these customers will
be in a position to make alternative payment arrangements with Originators.
Third-Party Senders: Third-Party Senders may be subject to tighter obligations imposed by their ODFIs as
a result of the Rule. Third-Party Senders may also incur programming and training costs associated with
the expanded use of Return Reason Code R10.
TECHNICAL SUMMARY
Below is a summary of the impact of this rule change on the NACHA Operating Rules. Sections of the
Rules that are affected by this amendment are also included below.
• A
rticle Three, Section 3.11 (RDFI Obligation to Recredit Receiver) – Expands this section to require
an RDFI to recredit the accountholder for a debit Entry to a Receiver’s account that is part of an
Incomplete Transaction.
• Article Three, Subsection 3.11.1 (RDFI General Obligation to Recredit Consumer Accounts) - Clarifies
ORxxx 2 0 1 3 O P E R AT I N G R U L E S
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
that the RDFI’s recredit obligation regarding a debit Entry to a Consumer Account that is part of
an Incomplete Transaction does not apply when a partial or erroneous payment was made to the
intended third-party payee;
• A
rticle Three, Subsection 3.12.3 (Incomplete Transaction) – Adds a new subsection defining the
concept of an Incomplete Transaction as it relates to the use of the Written Statement of Unauthorized
Debit.
• A
rticle Three, Subsection 3.12.4 (RDFI Must Accept Written Statement of Unauthorized Debit) –
Requires an RDFI to accept a Written Statement of Unauthorized Debit from a Receiver with respect
to any Incomplete Transaction to a Consumer Account.
• A
rticle Eight, Subsection 8.46 (“Incomplete Transaction”) – Defines the term “Incomplete Transaction”
as “a payment to an intended third-party payee that was not made or completed by the Originator,
Third-Party Sender or ODFI of a corresponding debit Entry authorized by the Receiver for the
purpose of funding the payment to the third-party payee. A partial or erroneous payment to the
intended third-party payee is not an Incomplete Transaction.”
• A
rticle Eight, Subsection 8.98 (“Written Statement of Unauthorized Debit”) – Modifies the definition
of this term to include a written notice by a Receiver to an RDFI requesting recredit for a debit that
was part of an Incomplete Transaction.
• T
able of Return Reason Codes – Revises the descriptions of Return Reason Code R10 to accommodate
the return of a debit Entry that is a part of an Incomplete Transaction.
2 0 1 3 O P E R AT I N G R U L E S ORxxxi
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
The following is a technical summary of the changes to the NACHA Operating Rules implemented during
2012. The amendments are in chronological order based on implementation date. The text changes
were officially communicated via Supplements to the Rules, but they are summarized here for reference.
Please note that since these changes are already effective, they are not marked within the text of the 2013
Rules.
In general, minor impact issues include: 1) editorial changes to address corrections to grammar and
similar errors; 2) changes to correct inconsistencies between various rules; 3) clarifications of intent; 4)
minor modifications to incorporate current practices (e.g., Operator edits, return code descriptions); and
5) changes that involve minor software modifications.
Article Eight, Section 8.88 (Third-Party Sender) – removed references to account types
Refinement of Definition of Return Reason Code R23 – Credit Entry Returned by Receiver
Article Three, Subsection 3.8.3.2 (Timing Requirements for Credit Entries Returned by Receiver) – modified
title and text to replace “returned” with “refused” and to indicate that the time period for return begins
when the Receiver notifies the RDFI that it has refused the entry
Appendix Four, Subpart 4.2 (Table of Return Reason Codes) - updated for corresponding clarifications
to the time frame and cross reference descriptions within Return Reason Code R23.
Appendix Eight, Part 8.2 (Audit Requirements for All Participating DFIs), Item f - added new audit
provision regarding DFI risk management and assessment program requirements
Appendix Eight, Part 8.3 (Audit Requirements for RDFIs), Item i – removed provision regarding RDFIs
returning entries using Return Reason Code R06 – Returned per ODFI’s Request, which lacked a direct
Rules citation
ORxxxii 2 0 1 3 O P E R AT I N G R U L E S
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
Appendix Eight, Part 8.3 (Audit Requirements for RDFIs), Item j – removed provision regarding RDFI
awareness of Return Reason Code R08 – Payment Stopped, which lacked a direct Rules citation
Appendix Eight, Part 8.4 (Audit Requirements for ODFIs), Item a – updated language to reflect Rules
changes effective in June 2010 requiring ODFI origination agreements to include the right of the ODFI
to terminate the agreement, and the right of the ODFI to audit the Originator’s or Third-Party Sender’s
compliance with the agreement and the Rules
Appendix Eight, Part 8.4 (Audit Requirements for ODFIs), Item c – removed outdated language regarding
exposure limits and replaced it with modified language related to the ODFI’s obligations to assess an
Originator’s or Third-Party Sender’s ACH activity and risks; monitor its Originator’s and Third-Party
Sender’s return activity across multiple settlement dates; enforce restrictions on the types of entries that
may be originated; and enforce the exposure limit
Appendix Five, Subpart 5.4.3 (Corporate Entry Detail Record Format for Notification of Change) – revised
the field inclusion requirement and contents for the Number of Addenda Records Field from “N/A” and
“blank” to “R” (required) and “numeric”
Appendix Five, Subpart 5.4.9 (Corporate Entry Detail Record Format for Automated Refused Notification
of Change) – revised the field inclusion requirement for the Number of Addenda Records from “M”
(mandatory) to “R” (required)
This rule provides an option for an RDFI to take advantage of a voluntary exception from the existing
funds availability requirements prescribed within the Rules for an ACH credit when the RDFI reasonably
suspects that the ACH credit is not authorized. The amendment allows an RDFI additional time to
investigate a suspicious credit prior to making funds available to the Receiver. The additional time
increases the likelihood that unauthorized credit entries could be identified and the associated funds
could be recovered before they are withdrawn, at which point the likelihood of recovery significantly
decreases.
The following subsections were amended to allow the RDFI exemption from the funds availability
requirements within the Rules if the RDFI reasonably suspects that a credit entry is unauthorized.
Article Three, Subsection 3.3.1.2 (Availability for Certain Credit PPD Entries)
This amendment revised the excused delay provisions within the Rules so that an interruption or the
suspension of payment by, or unavailability of funds from, a Participating DFI or an ACH Operator is not
2 0 1 3 O P E R AT I N G R U L E S ORxxxiii
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
a condition under which a Participating DFI may claim an excused delay. In addition, the excused delay
provision of the Rules was revised so that a Participating DFI or ACH Operator can make an excused
delay claim only “to the extent” the delay was caused by the circumstances identified in Section 1.5
(Excused Delay) for which delay may be excused.
Article One, Subsection 1.5 (Excused Delay) – Eliminated excused delay by a Participating DFI for the
interruption or the suspension of payment by, or unavailability of funds from, a Participating DFI or
another ACH Operator; and clarified that excused delay is only “to the extent” caused by interruption of
communication or computer facilities.
This amendment changed the NACHA Operating Rules (Rules) to eliminate the ODFI requirement to
establish a separate exposure limit on Originators or Third-Party Senders of WEB Entries. This issue was
identified in the rule-making process as a “pain point;” the amendment eliminated a requirement that no
longer adds value to ACH Network users, and improved ACH processing efficiency.
Article Two, Subsection 2.2.2 (ODFI Risk Management) – incorporated language addressing
“implementation” and “review” of exposure limits established by the ODFI.
Article Two, Subsection 2.5.17.4(c) (Additional ODFI Warranties for WEB Entries – ODFI Exposure Limits)
– removed the ODFI warranty regarding the establishment of a specific exposure limit on an Originator’s
initiation of WEB Entries.
Appendix Eight, Parts 8.4 (c) and (d) (Audit Requirements for ODFIs) – incorporated language addressing
“implementation” and “review” of exposure limits into part (c) and deleted the specific audit requirement
addressing exposure limits for WEB entries under part (d).
The IAT Modifications and Refinements changes clarify and enhance the Rules where appropriate to
support more efficient processing of IAT Entries. Provisions with minimal or no impact on ACH Network
software or processing requirements were effective on March 16, 2012.
Article Two, Subsection 2.5.8.5 (Rules Exceptions for Outbound IAT Entries) – updated the list of rules not
applicable to Outbound IAT Entries and clarified that certain ACH functions apply only to the extent that
they are permitted by the laws and payment system rules of the receiving country.
Article Two, Subsection 2.5.8.6 (Rules Exceptions for Inbound IAT Entries) – established a new subsection
to identify specific rules that do not apply to Inbound IAT Entries.
ORxxxiv 2 0 1 3 O P E R AT I N G R U L E S
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
Article Three, Subsection 3.4.3.3 (Specific Provisions for Outbound IAT Entries) – broadened this
subsection (including the section title) to (1) incorporate an explicit statement that a Participating DFI
acting as a Gateway assumes the responsibilities and warranties of an RDFI for each Outbound IAT Entry
it transmits, with the specific exception of the rights and obligations between the DFI and the foreign
receiver, and (2) update the current list of rules not applicable to Outbound IAT Entries.
Article Five, Subsection 5.1.6 (Gateway Action on Receipt of Notification of Change (NOC) Related to
Inbound IAT Entries) – required Gateways to notify their foreign contacts of any changes requested
through the NOC process to ensure proper processing of future ACH Entries.
Article Five, Subsection 5.1.4 (Gateway Must Obtain Authorization from ODFI or Gateway’s Customer) –
broadened the Gateway authorization requirements to permit parties other than the ODFI to authorize
the Gateway to transmit Outbound IAT Entries to and settle with a Foreign Gateway for further credit to
the foreign receiver’s account.
Appendix Four (Return Entries), Part 4.2 (Table of Return Codes) – revised the description and cross-
reference sections of Return Reason Code R81 to broaden the discussion regarding the lack of necessary
agreements.
Return of Outbound IAT Entry by Foreign Gateway – Transmission of ACH Return by Gateway to ODFI
Article Five, Subsection 5.1.5 (Gateway Obligation to Transmit Return Entries for Outbound IAT Entries
Returned by Foreign Gateway) – added a specific obligation and time frame for a Gateway to transmit a
Return Entry related to an Outbound IAT Entry that was properly returned to it by the Foreign Gateway.
Return Reason Codes R80-R84 – Clarification of Use For Outbound IAT Entries Only
Appendix Four, Part 4.2 (Table of Return Codes) and IAT Record Formats - R80-84 (Return Reason Codes
to be Used by Gateways for Outbound IAT Entries): clarified that these codes are for use by Gateways
only.
2 0 1 3 O P E R AT I N G R U L E S ORxxxv
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
Expansion of Return Reason Code R84 (Entry Not Processed By Gateway Operator)
Appendix Four, Part 4.2 (Table of Return Codes) and IAT Record Formats - R84 (Entry Not Processed by
Gateway): expanded the use of this return code to allow a Gateway to return an IAT Entry when the
foreign payment system does not support the function(s) needed to process the transaction.
This amendment changed the NACHA Operating Rules (Rules) to permit the use of ARC for the conversion
of checks tendered via a delivery service or in person for the payment of a bill at a manned location.
Each section of the Rules listed below was revised to incorporate language permitting a check presented
(1) via a delivery service, or (2) in person for the payment of a bill at a manned location, to be converted
to an ARC entry:
Article Eight, Section 8.1 (“Accounts Receivable Entry” or “ARC Entry” or “ARC”).
The IAT Modifications and Refinements changes clarified and enhanced the Rules where appropriate
to support more efficient processing of IAT Entries. Provisions with a more substantial impact on ACH
software or processing requirements were effective on September 21, 2012.
ORxxxvi 2 0 1 3 O P E R AT I N G R U L E S
R E V I S I O N S T O T H E N A C H A O P E R AT I N G R U L E S A N D G U I D E L I N E S
The Dishonor of Return Entries change amended the Rules to eliminate a “pain point” in the Rules that
required the ODFI or Originator to have suffered a loss before being able to dishonor an untimely return.
This change eliminated a requirement that no longer added value to ACH Network users and therefore
improved ACH processing efficiency.
Article Two, Subsection 2.12.5.1 (Dishonor of Return by ODFI) - removed language in item (a) requiring
either the ODFI or Originator to substantiate a loss was suffered in order to dishonor the untimely return
entry.
2 0 1 3 O P E R AT I N G R U L E S ORxxxvii
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
This supplement provides ACH Network participants with a summary of the key components of each
change, along with details regarding the technical changes to the 2013 Rules language. Because these
amendments were approved just prior to publication of the 2013 edition of the NACHA Operating Rules
& Guidelines, the material contained in this Supplement is not included within the main body of the
publication. To ensure compliance with the most current rules, this Supplement should be used in
conjunction with the 2013 Rules.
2 0 1 3 O P E R AT I N G R U L E S ORxxxix
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
SUMMARY
The ACH Security Framework amendment creates a framework within the NACHA Operating Rules (Rules)
aimed at protecting the security and integrity of certain ACH data throughout its lifecycle. The Security
Framework establishes minimum data security obligations for ACH Network participants to protect ACH
data within their purview. Specifically, the Framework:
• requires non-consumer Originators, Participating DFIs, Third-Party Service Providers and Third-Party
Senders to establish, implement and, as appropriate, update security policies, procedures, and systems
related to the initiation, processing and storage of Entries and resulting Protected Information;
• requires each Participating DFI, Third-Party Service Provider, and Third-Party Sender to verify, as part
of its annual ACH Rules Compliance Audit, that it has established, implemented, and updated the data
security policies, procedures, and systems required by the Rules; and
• requires an ODFI to use a commercially reasonable method to establish the identity of each non-
consumer Originator or Third-Party Sender with which the ODFI enters into an Origination Agreement.
Background
Currently, the NACHA Operating Rules contain a number of data security and authentication requirements
for ACH transactions that are generally based on individual Standard Entry Class (SEC) Codes and/or
triggering events. The marketplace has changed since these security requirements were included in the
Rules many years ago. Sound industry practices now reflect the understanding that certain financial data
should be protected at all times - whether before, during or after transmission, and regardless of the form
of transmission (e.g., by Internet or otherwise). By establishing minimum data security obligations, the
ACH Security Framework changes will benefit the ACH Network by reducing the potential for both out-
of-pocket losses experienced by ACH participants and their customers, and the damaging effect of data
breaches on the reputation of the ACH Network and its participants.
Under this rule, non-consumer Originators, Participating DFIs, Third Party Service Providers, and Third-
Party Senders will be required to establish, implement, and, as appropriate, update security policies,
procedures, and systems related to the initiation, processing, and storage of entries. These policies,
procedures, and systems must:
ORxl 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
(2) protect against anticipated threats or hazards to the security or integrity of Protected
Information; and
(3) protect against unauthorized use of Protected Information that could result in substantial
harm to a natural person.
the non-public personal information, including financial information, of a natural person used
to create, or contained within, an Entry and any related Addenda Record.
The definition of Protected Information not only covers financial information, but also includes sensitive
non-financial information (such as non-financial account information contained in Addenda Records for
bill payments) that may be incorporated into the Entry or any related Addenda Record.
By covering natural persons, the rule on the protection of sensitive data applies to consumer information
only, which is consistent with the approach of aligning the Security Framework with existing industry
regulations and guidance. Impacted ACH participants, however, may apply the rule more broadly so that
it covers all customers.
The security policies, procedures, and systems of ACH participants covered by the Security Framework
must include controls on system access that comply with applicable regulatory guidelines. The impacted
systems include all of those used by the ACH participant to initiate, process, and store entries. Although
it is expected that security policies will be reviewed and approved at a level of responsibility within
an organization that is commensurate with the importance of the subject matter, this amendment does
not include specific requirements regarding the level of approval of such policies and procedures, thus
providing institutions flexibility to accommodate their respective corporate governance structures.
Self-Assessment
The amendment requires each Participating DFI, Third-Party Service Provider, and Third-Party Sender
to verify, as part of the requirements for an annual ACH Rules Compliance Audit, that it has established,
implemented, and updated the data security policies, procedures, and systems required by the ACH
Security Framework.
As with all provisions of the Rules, the annual Rules Compliance Audit applies directly to DFIs and third-
parties, but not directly to Originators. Originators are bound to the NACHA Operating Rules through
their Origination Agreements with their ODFIs. As such, Originators must ensure that they have existing
policies, procedures, and systems in place that will enable compliance with the Security Framework
2 0 1 3 O P E R AT I N G R U L E S ORxli
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
IMPACT TO PARTICIPANTS
Originators: Each non-consumer Originator will incur costs related to an initial effort to determine
whether it has existing policies, procedures, and systems in place that would enable it to comply with
the Security Framework. A non-consumer Originator that is in compliance with existing data security
regulations should also be in compliance with the amendment and will have no to low implementation
costs. Non-consumer Originators that do not have such policies, procedures, and systems will incur costs
in establishing and/or updating such policies, procedures, and systems to ensure compliance with the
Security Framework.
ODFIs: Each ODFI will incur costs related to an initial effort to determine whether it has existing policies,
procedures, and systems in place that would enable it to comply with the amendment. An ODFI that is
in compliance with existing data security regulations should also be in compliance with the amendment
and will have no to low implementation costs. An ODFI that does not have such policies, procedures, and
systems will incur costs in establishing and/or updating such policies, procedures, and systems to ensure
compliance with the Security Framework. Each ODFI also will incur ongoing costs to make commercially
reasonable efforts to verify the identity of its Originators and Third-Party Senders. However, such costs
will only be incremental over the ODFI’s existing costs to the extent that it does not currently conduct
such assessments and verification. Finally, ODFIs would incur minimal incremental costs to add a
verification item to their annual Rules Compliance Audit.
Third-Party Service Providers and Third-Party Senders: Each Third-Party Service Provider and each Third-
Party Sender will incur costs related to an initial effort to determine whether it has existing policies,
procedures, and systems in place that will enable it to comply with the amendment. A Third-Party Service
Provider or Third-Party Sender that is in compliance with existing data security regulations should also
be in compliance with the Security Framework and will have no to low implementation costs. Each
Third-Party Service Provider or Third-Party Sender that does not have such policies, procedures, and
systems will incur costs in establishing and/or updating such policies, procedures, and systems to ensure
compliance with the Security Framework. Third-parties will incur minimal incremental costs to add a
verification item to their annual Rules Compliance Audit.
RDFIs: Each RDFI will incur initial costs to determine whether it has existing policies, procedures,
and systems in place that will allow it to comply with the amendment, to the extent the RDFI receives
Protected Information. An RDFI that is in compliance with existing data security regulations should also
be in compliance with the Rule and will have no to low implementation costs. An RDFI that does not
have such policies, procedures, and systems will incur costs in establishing and/or updating such policies,
procedures, and systems to ensure compliance with the Security Framework. Finally, RDFIs will incur
minimal incremental costs to add a verification item to their annual Rules Compliance Audit.
TECHNICAL SUMMARY
The changes to the Rules language, as noted below, represents modifications to the NACHA Operating
Rules that will become effective on September 20, 2013.
• Article One, Subsection 1.2.2 (Audits of Rules Compliance) - modified to correct language related to
Third-Party Senders for consistency throughout the Rules.
• Article One, Subsection 1.6 (Security Requirements) - new subsection incorporates general ACH
Security Requirements into the NACHA Operating Rules.
• Article Two, Subsection 2.2.1 (ODFI Verification of Originator or Third-Party Sender Identity) - new
subsection creates an obligation for the ODFI to use a commercially reasonable method to establish
the identity of each Originator or Third-Party Sender.
ORxlii 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
• Article Two, Subsection 2.4.1.8 (ODFI has Verified the Identity of Originator or Third-Party Sender
That Uses an Unsecured Electronic Network Dishonor of Return by ODFI) - this subsection is removed
from the Rules.
• Article Eight, Section 8.67 (Protected Information) - adds a definition for the new term “Protected
Information.”
• Appendix Eight, Part 8.2 (Audit Requirements for All Participating DFIs) - adds a new item “f”
that requires annual ACH Rules Compliance Audits to include a verification that the covered ACH
participants (i.e., Participating DFIs, Third-Party Service Providers, and Third-Party Senders) have
established, implemented, and updated (as appropriate) the security policies, procedures, and systems
as required by the Security Requirements provisions.
• Appendix Eight, Part 8.4 (Audit Requirements for ODFIs) - modifies item “i” for consistency with the
new subsection 2.2.1.
• • • •
As approved October 31, 2012, effective September 20, 2013, the Rules are modified as follows for the rule
change related to the ACH Security Framework:
ARTICLE ONE
General Rules
uA Participating DFI must annually conduct, or have conducted, an audit of its compliance with these
Rules in accordance with Appendix Eight (Rule Compliance Audit Requirements). A Third-Party Service
Provider or a Third Party Sender that has agreed with a Participating DFI to process Entries must annually
conduct, or have conducted, an audit of its compliance with these Rules in accordance with Appendix
Eight (Rule Compliance Audit Requirements).
(a) protect the confidentiality and integrity of Protected Information until its destruction;
2 0 1 3 O P E R AT I N G R U L E S ORxliii
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
(c) protect against unauthorized use of Protected Information that could result in substantial
harm to a natural person.
Such policies, procedures, and systems must include controls that comply with applicable regulatory
guidelines on access to all systems used by such non-consumer Originator, Participating DFI, or Third-
Party Service Provider to initiate, process, and store Entries.
An ODFI may dishonor a Return Entry, with the exception of an IAT Return Entry, if:
ARTICLE TWO
uSUBSECTION 2.2.1 ODFI Verification of Originator or Third-Party Sender Identity (new subsection)
The ODFI must utilize a commercially reasonable method to verify the identity of an Originator or Third-
Party Sender at the time the ODFI enters into an Origination Agreement with the Originator or Third-
Party Sender.
SUBSECTION 2.4.1.8 The ODFI has Verified the Identity of Originator or Third-Party Sender That Uses an
uUnsecured Electronic Network (this subsection will be removed from the Rules)
The ODFI has utilized a commercially reasonable method to establish the identity of an Originator or
Third-Party Sender that entered into an Origination Agreement via an Unsecured Electronic Network.
ARTICLE EIGHT
APPENDIX EIGHT
a. Verify that a Record of each Entry is retained for six years from the date the Entry was Transmitted,
except as otherwise expressly provided in these Rules. Verify that a printout or reproduction of
the information relating to the Entry can be provided, if requested by the Participating DFI’s
ORxliv 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
customer or any other Participating DFI or ACH Operator that originated, Transmitted, or received
the Entry. (Article One, subsections 1.4.1 and 1.4.2)
b. When a Record required by these Rules is created or retained in an Electronic form, verify that
the Electronic form (a) accurately reflects the information in the Record, and (b) is capable of
being accurately reproduced for later reference, whether by Transmission, printing, or otherwise.
(Article One, subsection 1.4.3)
c. Verify that the Participating DFI conducted an audit of its compliance with the rules in accordance
with Appendix Eight (Rule Compliance Audit Requirements) for the previous year. (Article One,
subsection 1.2.2)
d. Verify that required encryption or a secure session is used for banking information transmitted via
an Unsecured Electronic Network. (Article One, subsection 1.6)
e. Verify that the Participating DFI has reported and paid to the National Association (a) all annual
fees, and (b) a per-Entry fee for each Entry that is Transmitted or received by the Participating DFI,
including those Entries that are not processed through an ACH Operator but are exchanged with
another non-affiliated Participating DFI. (Article One, subsection 1.10)
f. Verify that the Participating DFI has conducted an assessment of the risks of its ACH activities and
has implemented a risk management program on the basis of such an assessment. (Article One,
subsection 1.2.4)
u g.
Verify that the Participating DFI has established, implemented and updated, as appropriate,
security policies, procedures and systems as required by Article One, Section 1.6. (Article One,
Section 1.6).
a. Verify that the ODFI has entered into Origination Agreements with all Originators or Third-Party
Senders that bind the Originator or Third-Party Sender to these Rules; that authorize the ODFI to
originate entries on behalf of the Originator or Third-Party Sender; that, within such agreements,
the Originator or Third-Party Sender acknowledges that Entries may not be initiated that violate
the laws of the United States; that includes any restrictions on types of Entries that may be
originated; that includes that the Third-Party has entered into an agreement with each Originator/
and that such agreements include the right of the ODFI to terminate or suspend the agreement for
breach of the Rules, and the right of the ODFI to audit the Originator’s, the Third-Party Sender’s
and the Third-Party Sender’s Originators’ compliance with the Origination Agreement and the
Rules. With respect to IAT Entries, verify that agreements contain all necessary provisions. (Article
Two, subsections 2.2.1.1, 2.2.1.2 and 2.5.8.3)1
b. Verify that, if applicable, the ODFI has entered into agreements with all Sending Points that
Transmit Entries on the ODFI’s behalf to an ACH Operator. (Article Two, subsection 2.2.1.3)
c. Verify that the ODFI has assessed the risks of the Originator’s or Third-Party Sender’s ACH activity,
and has established and implemented an exposure limit for each Originator or Third-Party Sender.
1
Article Two, Subsections 2.2.1.1(d), (e) and (f) and 2.2.1.2(d), (e), (f) and (g) are applicable to Origination Agreements that were entered into on
or after June 18, 2010.
2 0 1 3 O P E R AT I N G R U L E S ORxlv
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
Verify that the ODFI has established, implemented, and periodically reviewed procedures to
monitor the Originator’s or Third-Party Sender’s origination and return activity across multiple
Settlement Dates; enforce restrictions on the types of Entries that may be originated; and enforce
the exposure limit. (Article Two, subsection 2.2.2)
d. Verify that the ODFI accepts Return Entries and Extended Return Entries that comply with these
Rules and that are Transmitted by the RDFI within the time limits established by these Rules. Verify
that dishonored Return Entries are Transmitted within five banking days after the Settlement Date
of the Return Entry and that contested dishonored Return Entries are accepted, as required by
these rules. Verify that the ODFI is using return reason codes in an appropriate manner. (Article
Two, subsections 2.12.1, 2.12.5.1, and 2.12.5.2; Appendix Four)
e. Verify that information relating to NOCs and Corrected NOCs is provided to each Originator or
Third-Party Sender within two Banking Days of the Settlement Date of the NOC or Corrected
NOC in accordance with Appendix Five (Notification of Change). Verify that refused NOCs are
Transmitted within fifteen (15) days of receipt of an NOC or corrected NOC. (Article Two,
subsections 2.11.1 and 2.11.2)
f. With the exception of XCK entries, verify that the ODFI provides to the RDFI, upon receipt
of the RDFI’s written request, the original, a copy, or other accurate Record of the Receiver’s
authorization with respect to a Consumer Account within ten banking days without charge.
(Article Two, subsections 2.3.2.5 and 2.5.18.6)
g. Verify that, when agreed to by the ODFI, late Return Entries are accepted in accordance with these
rules. (Article Two, subsection 2.12.6)
h. Verify that the ODFI has provided the Originator with proper notice to ensure compliance with
UCC Article 4A with respect to ACH transactions. (Article Two, subsection 2.3.3.2)
i. Verify that the ODFI has utilized a commercially reasonable method to establish the identity
of each Originator or Third-Party Sender that uses an Unsecured Electronic Network to enter
into an Origination Agreement with the ODFI. When an ODFI has a relationship with a Third-
Party Sender rather than with an Originator directly, also verify that the Third-Party Sender has
utilized a commercially reasonable method to establish the identity of each Originator that uses
an Unsecured Electronic Network to enter into an Origination Agreement with the Third-Party
Sender. (Article Two, subsections 2.4.1.8 and 2.15.2)
u i. Verify that the ODFI has utilized a commercially reasonable method to verify the identity of each
Originator or Third-Party Sender that enters into an Origination Agreement with the ODFI. When
an ODFI has a relationship with a Third-Party Sender rather than with an Originator directly,
also verify that the Third-Party Sender has utilized a commercially reasonable method to establish
the identity of each Originator that enters into an Origination Agreement with the Third-Party
Sender. (Article Two, subsection 2.2.1)
j. Verify that Reversing Entries and Reversing Files are initiated in accordance with the requirements
of these Rules. (Article Two, sections 2.8 and 2.9)
k.
For BOC Entries, verify that the ODFI has (1) established and implemented commercially
reasonable procedures to verify the identity of each Originator or Third-Party Sender of such
entries; and (2) established and implemented procedures to document specific information with
respect to each Originator, as required by these rules, and that, upon request, such information is
provided to the RDFI within the required time frame. (Article Two, subsection 2.5.2.5)
ORxlvi 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
l. Verify that the ODFI has reported Return Rate information on each Originator or Third-Party
Sender, as requested by the National Association. (Article Two, subsection 2.17.2)
m. Verify that the ODFI has (1) registered its Direct Access status with the National Association; (2)
obtained the approval of its board of directors, committee of the board of directors, or its designee
for each Direct Access Debit Participant; (3) provided required statistical reporting for each Direct
Access Debit Participant; and (4) notified the National Association of any change to the information
previously provided with respect to any Direct Access Debit Participant. (Article Two, subsection
2.17.1)
n. Verify that the ODFI has kept Originators and Third-Party Senders informed of their responsibilities
under these rules. (Article Two, section 2.1)
2 0 1 3 O P E R AT I N G R U L E S ORxlvii
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
SUMMARY
The Healthcare Payments via ACH changes amend the NACHA Operating Rules (“Rules”) to support health
plans’ and healthcare providers’ use of the ACH Network for healthcare claims payments and payment
related information. This amendment includes processing enhancements and transaction identification
and formatting requirements specific to healthcare claim payments.
Background
The Patient Protection and Affordable Care Act (ACA) requires the Department of Health and Human
Services (HHS) to adopt a standard for Health Care Electronic Funds Transactions, as well as industry-
vetted operating rules regarding the use of the standard transaction. On January 10, 2012, HHS issued
an Interim Final Rule with Comment2 that:
1) adopted the NACHA Corporate Credit or Debit Entry with Addenda Record (CCD+) as the
standard for Healthcare EFT (electronic funds transfers);
2) adopted the ASC X12 835 TRN Segment (“reassociation number”)3 as the standard for the
data content of the Addenda Record of the CCD+; and
3) discussed NACHA’s role in the development and maintenance of the CCD+ standard through
the Rules.
On August 10, 2012, HHS issued another Interim Final Rule with Comment4 that adopted the Council on
Affordable Quality Healthcare Committee on Operating Rules for Information Exchange (CORE) Phase III
CORE EFT & ERA Operating Rule Set as the industry-vetted operating rules for EFT and ERA (electronic
remittance advice). The CORE rule set includes five Operating Rules, of which the most critical for
financial institutions is the Phase III CORE EFT & ERA Reassociation (CCD+/835) Rule. The EFT & ERA
Reassociation Rule
• requires that the “provider must proactively contact its financial institution to arrange for the
delivery of the CORE-required Minimum CCD+ Data Elements” and obligates health plans
to proactively inform health care providers of this requirement during EFT enrollment; and
• describes the CORE-required Minimum CCD+ Data Elements as three fields in the ACH
CCD record that are used for reassociation of the ACH Entry and the Electronic Remittance
Advice (ERA): 1) the Effective Entry Date field (CCD Record 5, Field 9); 2) the Amount
field (CCD Record 6, Field 6); and 3) the Payment Related Information field (CCD Record
7, Field 3).
2
Administrative Simplification: Adoption of Standards for Health Care Electronic Funds Transfers (EFTs) and Remittance Advice, http://www.gpo.gov/
fdsys/pkg/FR-2012-01-10/pdf/2012-132.pdf
3
The reassociation number does not constitute Protected Health Information as defined by HIPAA.
4
Administrative Simplification: Adoption of Operating Rules for Health Care Electronic Funds Transfers (EFT) and Remittance Advice Transactions,
http://www.gpo.gov/fdsys/pkg/FR-2012-08-10/pdf/2012-19557.pdf
ORxlviii 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
Specifically, the new rules require Originators of Health Care EFT Transactions to populate the Company
Entry Description field of the CCD Entry with the value “HCCLAIMPMT”. RDFIs will be able to identify
a CCD Entry with this standard description as a Health Care EFT Transaction. This descriptive statement
is readable, providing healthcare providers with additional information about the payment. Finally, this
standard description enables various ACH participants (including NACHA in cooperation with the ACH
Operators) to have greater data available on the volume of Health Care EFT Transactions.
• Company Name
As is required for all ACH transactions, the Company Name field must be populated with information
that is readily recognized by the Receiver, in this case a healthcare provider. The amendment requires an
Originator of a Health Care EFT Transaction to populate the Company Name field of the CCD Entry with
the name of the health plan. In situations where an organization is self-insured, this field could contain
the name of the organization’s third-party administrator that is recognized by the healthcare provider
and to which the healthcare provider submits its claims. Recognizing that there are other potential
variations in health claims processing models, the overarching intent of NACHA’s existing Company Name
Rule applies – that the Company Name field contain the name of the payor that is known and readily
recognized by the Receiver (healthcare provider).
• Addenda Record and Payment Related Information Requirements for Health Care EFT Transactions
The new rule requires Originators to include an addenda record with each CCD Entry used for a Health
Care EFT Transaction. The rule also requires Originators to populate the Payment Related Information
field of the addenda record with the ANSI ASC X12 Version 5010 835 TRN (Reassociation Trace Number)
data segment. The TRN data segment, along with additional information contained within the Entry,
is needed by healthcare providers to reassociate the Health Care EFT Transaction with the electronic
remittance advice (ERA) that is transmitted separately.
2 0 1 3 O P E R AT I N G R U L E S ORxlix
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
(if such a service is established by the RDFI) or upon the request of a Receiver that is a healthcare
provider, all information contained within the Payment Related Information field of an Addenda Record
transmitted with a CCD Entry that is a Health Care EFT Transaction. The RDFI is required to provide
or make available the Payment Related Information no later than the opening of business on the RDFI’s
second Banking Day following the Settlement Date of the Entry. The rule also requires the RDFI to offer or
make available to the healthcare provider an option to receive or access the Payment Related Information
via a secure, electronic means that provides a level of security that, at a minimum, is equivalent to 128-bit
RC4 encryption technology.
Under this rule, an RDFI’s obligation to provide healthcare EFT payment related information upon the
Receiver’s request is very similar to current requirements for other business-to-business payments. The
rule, however, explicitly incorporates language regarding the “automatic” provision or delivery of payment
related information transmitted with a Health Care EFT Transaction as an option for RDFIs. Any RDFI
that decides to automatically provide this information to Health Care Provider customers, without waiting
for it to be requested, would be in compliance with the rule. The inclusion of the term “automatically”
as an option does not require the RDFI to proactively deliver the information, but recognizes that there
are RDFIs that, either now or in the future, automatically provide the payment related information to
their customers through online access to their account information or other methods. While automatic
delivery of payment related information has always been acceptable for CCD Entries, the addition of
the term “automatically” at this time recognizes this capability, especially as relates to health care, and
acknowledges that the automatic delivery of the data is in compliance with the new rule.
The requirement that an RDFI must offer, or make available, to Health Care Providers an option to
receive the healthcare payment related information electronically via a secure electronic delivery channel
adopts an encryption standard that is consistent with other data security requirements under the NACHA
Operating Rules (see Article One, Section 1.6) regarding the secure transmission of banking information
over unsecured electronic networks. It is consistent with CAQH CORE rules regarding “connectivity” via
the public Internet using SSL/HTTPS-level security. Examples of a secure, electronic delivery channel can
include SSL or HTTPS secure e-mail, online account access, online reports, or file transmissions that meet
the 128-bit RC4 encryption technology minimum standard. Mail, unsecured fax or unsecured e-mail of
payment related information is not considered a secure, electronic delivery method.
Finally, the rule clarifies that the new reassociation information delivery requirements apply to Health
Care EFT Transactions that are sent to Non-Consumer Accounts of Receivers. While the existing rules
have always been based on the presumption that SEC Codes are used correctly (in this case, that CCDs
are business-to-business transactions and directed to business accounts), the rule clarifies that RDFIs will
not incur new obligations if Receivers do not use appropriately designated Non-Consumer Accounts to
receive Health Care EFT Transactions.
6
Appendix Three of the NACHA Operating Rules currently defines the asterisk (“*”) as the delimiter between data segments, and the backslash (“\”) as
the terminator indicating the end of a data segment included within the addenda records of ACK, ATX, CCD, CIE, ENR, IAT, PPD, and WEB Entries.
The proposed addition of the tilde as a valid data segment terminator for health care CCD Entries would also apply to all of these SEC Codes to
ensure consistent processing of remittance information.
ORl 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
Health Care EFT Transaction: a CCD Entry originated by a Health Plan to a Health Care Provider with
respect to a health care claim. Under this definition, a Health Care EFT Transaction must include one
addenda record that contains an ASC X12 Version 5010 835 TRN (Reassociation Trace Number) data
segment within the Payment Related Information field.
Health Plan: an individual or group plan that provides, or pays the cost of, medical care.
Health Care Provider: a provider of medical or health services, and any other person or organization
who furnishes, bills, or is paid for health care in the normal course of business.
CORE-required Minimum CCD+ Reassociation Data Elements: information transmitted by a Health Plan
to a Health Care Provider for the purpose of re-associating a Health Care EFT Transaction with an
electronic remittance advice. The CORE-required Minimum CCD+ Reassociation Data Elements include
the information contained within the Effective Entry Date field, the Amount field, and the Payment
Related Information field of the CCD Entry.
In addition, this adds a definition for Non-Consumer Account to assist ACH Participants in properly
applying rules governing Health Care EFT Transactions. The term Non-Consumer Account is used to
clarify the types of accounts for which the requirements to provide or make available payment related
information apply.
IMPACT TO PARTICIPANTS
Receivers: Receivers (Health Care Providers) should not incur any direct costs as a result of the adoption
of these changes. Existing bank accounts can readily accept the receipt of ACH credit payments. Health
Care Providers that elect to upgrade systems to automatically use the TRN Reassociation Data Segment
to reassociate the ACH payment with the electronic remittance advice transmitted separately may incur
some transition costs.
RDFIs: RDFIs that do not currently offer a secure, electronic means of delivering payment related
information to their business customers will need to establish a means of doing so and make such access
available to Health Care Providers receiving Health Care EFT Transactions. RDFIs with EDI translation
software also may incur programming costs to ensure that the tilde is recognized as a valid data segment
terminator for ACH entries.
ODFIs and Originators of Health Care EFT Transactions: These participants may incur one-time
programming costs if they choose to automate the formatting of Health Care EFT Transactions to include
the required Company Entry Description and the required addenda record.
2 0 1 3 O P E R AT I N G R U L E S ORli
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
TECHNICAL SUMMARY
Below is a summary of the impact of this rule change on the NACHA Operating Rules. Sections of the
Rules that are affected by this amendment are also included below and reflect rule language as it will
read upon implementation.
• Article Two, Subsection 2.5.3 (General Rule for CCD Entries – Corporate Credit or Debit Entry) -
identifies Health Care EFT Transactions as CCD Entries having a mandatory addenda record in which
required health care payment related information must be included.
• Article Three, Subsection 3.1.5.3 (RDFI Must Provide Payment-Related Information to Receivers of
CCD, CTX, CIE and IAT Entries to Non-Consumer Accounts) -
– r equires RDFIs to provide or make available, either automatically or upon the request of a
Receiver that is a Health Care Provider, all information contained within the Payment Related
Information field of an Addenda Record transmitted with a Health Care EFT Transaction.
– r equires RDFIs to offer Health Care Provider Receivers a secure, electronic delivery channel
for the receipt of health care payment related information.
– a dds language recognizing that some RDFIs automatically provide their business customers
with payment related information.
• Article Eight, Subsections 8.19, 8.44, 8.45, 8.46, and 8.57 - new subsections to define the following
terms within the Rules:
• Appendix One, Part 1.2 (Data Specifications for ACH Records) - requires the Company Entry
Description specific to Health Care EFT Transactions to be presented in upper case characters.
• Appendix Three, Subpart 3.1.8 (Sequence of Records for CCD Entries) - adds footnotes specific to
Health Care EFT Transactions to the CCD record layouts.
• Appendix Three, Subpart 3.2.2 (Glossary of Data Elements) - expands the descriptions of the following
fields to accommodate formatting requirements specific to Health Care EFT Transactions:
• • • •
As approved October 31, 2012, effective September 20, 2013, the Rules are modified as follows for the rule
changes related to Healthcare Payments via ACH:
ORlii 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
ARTICLE TWO
SUBSECTION 2.5.3 General Rule for CCD Entries (Corporate Credit or Debit Entry)
A CCD Entry is originated by an Organization to or from the account of that Organization or another
Organization. A CCD Entry may be a credit Entry or a debit Entry, and may provide payment related
information in one Addenda Record. A CCD Entry may also be a Non-Monetary Entry that carries
payment related information in one Addenda Record.
uA CCD Entry that is a Health Care EFT Transaction must include one Addenda Record that contains the
ASC X12 835 TRN (Reassociation Trace Number) data segment in the Payment Related Information field.
ARTICLE THREE
SUBSECTION 3.1.5.3 RDFI Must Provide Payment-Related Information to Receivers of CCD, CTX, CIE and
IAT Entries to Non-Consumer Accounts
Upon the request of a Receiver, an RDFI must provide to the Receiver all information contained within
the Payment Related Information field of an Addenda Record(s) Transmitted with a CCD or CTX Entry, or
a CIE or IAT Entry to a non-Consumer Account. The RDFI must provide this information by the opening
of business on the RDFI’s second Banking Day following the Settlement Date of the Entry.
uUpon the request of a Receiver, an RDFI must provide to the Receiver all information contained within the
Payment Related Information field of an Addenda Record(s) Transmitted with a CCD Entry that is not a
Health Care EFT Transaction, a CTX Entry, or a CIE or IAT Entry to a Non-Consumer Account. The RDFI
must provide this information by the opening of business on the RDFI’s second Banking Day following the
Settlement Date of the Entry.
For a Health Care EFT Transaction to a Non-Consumer Account, an RDFI must, either automatically or
upon the request of a Receiver that is a Health Care Provider, provide or make available all information
contained within the Payment Related Information field of the Addenda Record Transmitted with the
Health Care EFT Transaction. The RDFI must provide or make available the Payment Related Information
by the opening of business on the RDFI’s second Banking Day following the Settlement Date of the Entry.
The RDFI must offer or make available to the Health Care Provider an option to receive or access the
Payment Related Information via a secure, electronic means that provides a level of security that, at a
minimum, is equivalent to 128-bit RC4 encryption technology.
2 0 1 3 O P E R AT I N G R U L E S ORliii
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
ARTICLE EIGHT
APPENDIX ONE
ORliv 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
TYPE OF ALPHABETIC/
NUMERIC
FIELD ALPHAMERIC
0-9, A-Z, a-z, space,
EBCDIC values greater
Valid
than hexadecimal “3F”, 0-9
Characters
ASCII values greater than
hexadecimal “1F”
Empty Field
Space filled Zero filled
Handling
• all alphabetic characters within the Standard Entry Class Code field;
• all alphabetic characters within the Change Code and Refused COR Code fields;
• all alphabetic characters within the Return Reason Code, Dishonored Return Reason Code, and
Contested Dishonored Return Reason Code fields;
• Company Entry Description fields containing the words “REVERSAL,” “RETURN FEE,” “RECLAIM,”
“NONSETTLED,” “AUTOENROLL” (for ENR entries), “REDEPCHECK” (for RCK entries), and “NO
CHECK” (for XCK entries); and
u • C
ompany Entry Description fields containing the words “REVERSAL,” “RETURN FEE,” “RECLAIM,”
“NONSETTLED,” “AUTOENROLL” (for ENR entries), “REDEPCHECK” (for RCK entries), “NO CHECK”
(for XCK entries), and “HCCLAIMPMT” (for Health Care EFT Transactions); and
• Company Name fields containing the words “CHECK DESTROYED” (for XCK entries).
APPENDIX THREE
2 0 1 3 O P E R AT I N G R U L E S ORlv
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
Code Values:
0 No Addenda Record follows the Entry
1 One or more Addenda Records follow the Entry
u CCD: When used for a Health Care EFT Transaction, the value of this field must be “1.”
IAT: The value of this field for all IAT Entries, including IAT Prenotification Entries, will always be “1.”
Zero dollar CCD, CTX, and IAT Entries, Notification of Change, Refused Notification of Change, Return,
Dishonored Return, Contested Dishonored Return, DNE, ENR, MTE, POS, SHR, and TRX Entries: The
value of this field will always be “1”. This is not applicable to MTE, POS, SHR, or TRX Prenotifications.
Company Entry Description: 10 Positions – Company/Batch Header Record – Mandatory (all batches)
The Originator establishes the value of this field to provide the Receiver with a description of the
purpose of the Entry. For example, “Gas bill,” “Reg. Salary,” “ins. prem.,” “Soc. Sec.,” “DTC,” “Trade Pay,”
“PURCHASE,” etc.
This field must contain the word “NONSETTLED” when the batch contains Entries that could not settle.
This field must contain the word “RECLAIM” when the batch contains Reclamation Entries.
This field must contain the words “RETURN FEE” when the batch contains Return Fee Entries
This field must contain the word “REVERSAL” when the batch contains Reversing Entries.
ADV: The Originator, i.e., the Originating ACH Operator, uses this field to describe to the institution
receiving the ADV File the type of activity to which the accounting information relates.
uCCD: This field must contain the word “HCCLAIMPMT” when the batch contains Health Care EFT
Transactions.
ENR: This field must contain the word “AUTOENROLL” when the batch contains Automated Enrollment
Entries.
Company Name: 16 Positions – Company/Batch Header Record – Mandatory (all batches except IAT)
This field identifies the source of the Entry and is used for descriptive purposes for the Receiver. Except
as otherwise noted below, this field must contain the name by which the Originator is known to and
readily recognized by the Receiver of the Entry.
In a transaction in which the Originator of a debit Entry is not the payee of the transaction (the party to
which payment is ultimately being directed), the Company Name field of the debit Entry must contain
the name by which the payee is known to and readily recognized by the Receiver of the Entry. In a
ORlvi 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
transaction in which the Originator of a credit Entry is not the payor of the transaction (the party from
which payment is ultimately being directed), the Company Name field of the credit Entry must contain
the name by which the payor is known to and readily recognized by the Receiver of the Entry.
For Return Fee Entries, this field must contain the same name of the Originator as identified in the
Company Name field of the underlying Entry. For a Return Fee Entry based on the return of a Check, the
Company Name field must contain the name of the payee of the Check.
ADV: The ACH Operator is both the Originator and the ODFI. The ACH Operator originating the ADV
File identifies itself by name in this field.
ARC, BOC: This field identifies the payee of the Eligible Source Document or the payee name indicated
on the bill or invoice.
u CCD: For a Health Care EFT Transaction, this field must contain the name of the Health Plan originating the
Entry, or, where an organization is self-insured, the name of the organization’s third-party administrator
that is recognized by the Health Care Provider and to which the Health Care Provider submits its claims.
CIE: This field contains the bill payment service provider’s name.
MTE: This field identifies the owner of the terminal where the transaction was initiated.
POP, POS, SHR: This field identifies the merchant with whom the Receiver initiated the transaction.
RCK: This field identifies the Originator of the RCK Entry, which is the original payee on the face of the
Check.
XCK: This field must contain the words “CHECK DESTROYED” (left justified).
Payment Related Information: 80 Positions – Addenda Record – Optional (ACK, ATX, CCD, CIE, CTX,
DNE, ENR, IAT, PPD, TRX, WEB)
In the Addenda Records of ACK, ATX, CCD, CIE, ENR, IAT, PPD, and WEB Entries, an asterisk (“*”)
must be used as the delimiter between the data elements, and the backslash (“\”) must be used as the
terminator between the data segments.
uIn the Addenda Records of ACK, ATX, CCD, CIE, ENR, IAT, PPD, and WEB Entries, an asterisk (“*”) must
be used as the delimiter between the data elements, and the backslash (“\”) or tilde (“~”) must be used as
the terminator at the end of a data segment.
ACK, ATX: This field contains the ANSI ASC X12 REF (Reference) data segment. This REF segment is
used to convey the Identification Number contained within the original CCD or CTX Entry, and/or other
information of significance to the Originator.
CCD, PPD, WEB: Addenda Records contain payment related ANSI ASC X12 data segments or NACHA
endorsed banking conventions (i.e., Tax Payment, Third-Party Tax Payments, Child Support, or Electronic
Dealer Drafting).
2 0 1 3 O P E R AT I N G R U L E S ORlvii
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
u CCD,PPD, WEB: Addenda Records contain payment related ANSI ASC X12 data segments or NACHA
endorsed banking conventions (i.e., Tax Payment, Third-Party Tax Payments, Child Support, or Electronic
Dealer Drafting). For CCD Entries that are Health Care EFT Transactions, this field must contain the
ASC X12 835 TRN (Reassociation Trace Number) data segment, which conveys the Reassociation Trace
Number used by the Health Care Provider to match the payment to remittance data.
Example: TRN*1*12345*1512345678*999999999\
Example: TRN*1*12345*1512345678*999999999~
CIE: This field contains payment related ANSI ASC X12 data segments to further identify the payment or
Transmit additional remittance information.
For Example:
N1*BT*JohnDoe\N3*12MainStreet\N4*21070\
CTX: This field contains information formatted in accordance with the syntax of ANSI ASC X12.5 and
X12.6, an ASC X12 transaction set containing a BPR or BPS data segment, or payment related UN/
EDIFACT syntax.
ANSI ASC X12.5 (“Interchange Control Structure”) means the standard to define the control structures
for the electronic interchange of business transactions encoded in ASC X12-based syntax. This standard
provides the interchange envelope of a header and trailer for the electronic interchange through a data
transmission, a structure to acknowledge the receipt and processing of this envelope, and optional,
interchange-level service request structures.
ANSI ASC X12.6 (“Application Control Structure”) means the standard used to define the structure of
business transactions for computer-to-computer interchange. This structure is expressed using a symbolic
representation of X12 data in terms of both the design and use of X12 structures, independent of the
physical representation (e.g., character set encoding).
BPR or BPS Data Segment (“Beginning Segment for Payment Order/Remittance Advice”) means the
beginning segment for the payment order/remittance advice used in ASC X12-based syntax to indicate
the beginning of a payment-related transaction set that contains the necessary banking information to
process the transaction.
DNE: Addenda Records contains the following NACHA endorsed banking convention starting in position
04:
DATE OF DEATH*MMDDYY*CUSTOMERSSN*
#########*AMOUNT*$$$$.cc\
The date of death always appears in positions 18-23. If the Social Security Number (SSN) is not available,
positions 38-46 contain zeros. The amount of the expected beneficiary payment always begins in position
55.
ENR: This field contains the following NACHA endorsed banking convention:
ll information in this field pertains to the account holder on whose behalf the Automated Enrollment
A
Entry is initiated.
ORlviii 2 0 1 3 O P E R AT I N G R U L E S
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
Transaction Code – This field contains the Transaction Code of the account holder’s account. This field
contains “22” (Demand Credit), “27” (Demand Debit), “32” (Savings Credit), or “37” (Savings Debit). (2
positions)
Receiving DFI Identification Number -- This field contains the routing number used to identify the DFI at
which the account holder maintains its account. (8 positions)
Check Digit – This field contains the check digit pertaining to the routing number for the DFI at which
the account holder maintains its account. (1 position)
DFI Account Number – This field contains the account holder’s account number. (1 - 17 positions)
Individual Name (Surname)/Company Name – This field contains the consumer’s surname or the first
fifteen characters of the Company Name. (1 - 15 positions)
Individual Name (First Name)/Company Name – This field contains the consumer’s first name or the next
seven characters of the Company Name. (1 - 7 positions).
Representative Payee Indicator/Enrollee Classification Code – For enrollments for Federal Government
benefit payments, this field contains “0” (zero) meaning “no” or “1” (one) meaning “yes” to denote whether
the authorization is being initiated by someone other than the named beneficiary.
For all other enrollments, this field contains “A” to indicate that the enrollee is a consumer, or “B” to
indicate that the enrollee is a company. (1 position)
For Example:
22*12200004*3*123987654321*777777777*DOE*JOHN*0\
22*12200004*3*987654321123*876543210*ABCCOMPANY**B\
27*12200004*3*987654321123*876543210*ABCELECTRONICIN*DUSTRIE*B\
IAT: This field contains 80 characters of payment related information. (Note: A maximum of two optional
Addenda Records may be used for IAT remittance information.)
When the Transaction Type Code Field within the First IAT Addenda Record contains ARC, BOC, or RCK,
this field must contain the Check Serial Number starting in position 04:
When the Transaction Type Code Field within the First IAT Addenda Record contains POP, this field must
contain the following NACHA-endorsed banking convention starting in position 04:
2 0 1 3 O P E R AT I N G R U L E S ORlix
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
When the Transaction Type Code Field within the First IAT Addenda Record contains MTE, POS, or SHR,
this field must contain the following NACHA-endorsed banking convention starting in position 04:
For example:
TRX: This field contains information formatted in accordance with National Association for Check
Safekeeping syntax.
APPENDIX THREE
u Please
refer to the following Sequence of Records for CCD Entries for changes related to Health Care EFT
Transactions.
ORlx 2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.8 Sequence of Records for CCD Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11
DATA ADDENDA
ELEMENT RECORD TRANSACTION RECEIVING DFI CHECK DFI ACCOUNT IDENTIFICATION RECEIVING DISCRETIONARY RECORD TRACE
NAME TYPE CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER COMPANY NAME DATA INDICATOR NUMBER
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M O R O M M
u Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric1 Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD ADDENDA PAYMENT RELATED ADDENDA ENTRY DETAIL
NAME TYPE CODE TYPE CODE INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M O M M
Length 1 2 80 4 7
u 1 For Health Care EFT Transactions, the Addenda Record Indicator of the CCD Entry must always contain a value of "1."
2 For Health Care EFT Transactions, the Payment Related Information Field of the CCD Entry Addenda Record must always contain the ASC X12 Version 5010 835 TRN Segment.
ORlxi
S U P P L E M E N T # 2 - 2 0 1 2 T O T H E N A C H A O P E R AT I N G R U L E S
ARTICLE ONE – General Rules
2 0 1 3 O P E R AT I N G R U L E S OR1
ARTICLE ONE – General Rules
OR2 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE ONE – General Rules
SUBSECTION 1.4.3 Electronic Record Creation information, be either encrypted or Transmitted via
and Retention a secure session, in either case using a commercially
A Record required by these Rules to be in writing reasonable technology that provides a level of
may be created or retained in an Electronic form security that, at a minimum, is equivalent to 128-bit
that (a) accurately reflects the information in the RC4 encryption technology. Banking information
Record, and (b) is capable of being accurately includes any Entry, routing number, account
reproduced for later reference, whether by number, PIN or other identification symbol. This
Transmission, printing, or otherwise. Section applies to Transmissions between:
2 0 1 3 O P E R AT I N G R U L E S OR3
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
incurred by the National Association in connection SUBSECTION 2.2.1 ODFI Agreement with
with the proceeding if judgment is rendered in Originator, Third Party Sender or Sending Point
the National Association’s favor or if the National SUBSECTION 2.2.1.1 ODFI Must Enter Origination
Association is otherwise dismissed from the Agreement with Originator
proceeding. An ODFI must enter into an Origination Agreement
with each Originator for which the ODFI will
SECTION 1.10 Network Administration originate Entries. The Origination Agreement
Fees must include, at a minimum, each of the following:
A Participating DFI agrees to pay the National
Association (a) an annual fee, and (b) a per-Entry (a) The Originator must authorize the ODFI to
fee for each Entry that is Transmitted or received originate Entries on behalf of the Originator
by the Participating DFI, including those Entries to Receivers’ accounts;
that are not processed through an ACH Operator
(b) The Originator must agree to be bound by
but are exchanged with another non-affiliated
these Rules;
Participating DFI. The annual and per-Entry fees
are established from time-to-time by the Board
(c) The Originator must agree not to originate
of Directors of the National Association and are
Entries that violate the laws of the United
published within the Schedule of Fees part of the
States;
Rules.
(d) Any restrictions on the types of Entries that
may be originated;
ARTICLE TWO
(e)
The right of the ODFI to terminate or
Rights and suspend the agreement for breach of these
OR4 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
(e)
The right of the ODFI to terminate or (ii)
Enforce restrictions on the types of
suspend the agreement, or any Originator Entries that may be originated; and
of the Third-Party Sender, for breach of
these Rules in a manner that permits the (iii) Enforce the exposure limit.
ODFI to comply with these Rules;
SUBSECTION 2.2.2.1 Termination, Suspension, and
(f) The right of the ODFI to audit the Third-Party Audit of Originators and Third-Party Senders
Sender’s and its Originators’ compliance In addition to any other termination or suspension
with the Origination Agreement and these rights in an Origination Agreement, including for
Rules; and breach, if an Originator or Third-Party Sender
breaches these Rules, or causes its ODFI to breach
(g)
The Third-Party Sender must agree that, these Rules, the Origination Agreement may be
before permitting an Originator to originate terminated or suspended by the ODFI upon ten
any Entry directly or indirectly through the Banking Days’ notice, or such shorter notice period
ODFI, it will enter into an agreement with as may be provided in the Origination Agreement.
the Originator that satisfies each of the In addition to any other audit rights that may be
requirements of Subsection 2.2.1.1 (ODFI set forth in an Origination Agreement, the ODFI
Must Enter Origination Agreement with may audit the compliance of the Originator or
Originator). Third-Party Sender with these Rules and the
Origination Agreement, subject to the procedural
SUBSECTION 2.2.1.3 ODFI Agreement with requirements, if any, set forth in the Origination
Sending Points Agreement.
An ODFI must enter into an agreement with each
Sending Point that Transmits Entries on the ODFI’s SUBSECTION 2.2.3 ODFI Board Approval of
behalf to an ACH Operator. The ODFI is liable for Direct Access Debit Participants
each Entry Transmitted by the Sending Point that An ODFI’s board of directors, committee of the
contains the ODFI’s routing number. board of directors, or its designee must approve a
Direct Access Debit Participant relationship prior
SUBSECTION 2.2.2 ODFI Risk Management to the ODFI originating Entries for the Direct
An ODFI must perform due diligence with respect Access Debit Participant.
to the Originator or Third-Party Sender sufficient
to form a reasonable belief that the Originator or SECTION 2.3 Authorization and Notice
Third-Party Sender has the capacity to perform its of Entries
obligations in conformance with these Rules.
SUBSECTION 2.3.1 General Rule – Originator
In addition, the ODFI must: Must Obtain Authorization from Receiver
An Originator must obtain authorization from the
(a)
Assess the nature of the Originator’s or Receiver to originate one or more Entries to the
Third-Party Sender’s ACH activity and the Receiver’s account.
risks it presents;
SUBSECTION 2.3.2 Authorizations and Notices
(b)
Establish, implement, and periodically with Respect to Consumer Accounts
review an exposure limit for the Originator
or Third-Party Sender; and SUBSECTION 2.3.2.1 Credit Entries
Authorization of a credit Entry to a Consumer
(c) Establish and implement procedures to: Account is not required to be in writing. If both
the Originator and Receiver are natural Persons,
(i)
Monitor the Originator’s or Third- no authorization by the Receiver is required, and
Party Sender’s origination and return no warranty with respect to any such authorization
activity across multiple Settlement is made by the ODFI.
Dates;
2 0 1 3 O P E R AT I N G R U L E S OR5
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
SUBSECTION 2.3.2.2 Debit Entries Commerce Act (15 U.S.C. §7001 et seq.). An
(a)
Authorization of a debit Entry to a Electronic authorization must be visually displayed
Consumer Account must be in writing and in a manner that enables the consumer to read the
signed or similarly authenticated by the communication.
Receiver, except as expressly provided in
the authorization sections of these Rules for SUBSECTION 2.3.2.5 Retention and Provision of
specific types of Entries. Where these Rules the Record of Authorization
provide that authorization for an Entry (a)
An Originator must retain the original
may be obtained by notice to the Receiver, or a copy of each written authorization
authorization also may be obtained by of a Receiver, or a readily and accurately
means of a signed written authorization reproducible Record evidencing any
that meets the requirements of Subsection other form of authorization, for two years
2.3.2.3 (Form of Authorization) if all of the from the termination or revocation of the
other requirements for the type of Entry authorization.
are met.
(b) U
pon receipt of an RDFI’s written request,
(b)
An Originator must provide each Receiver the ODFI must provide the original, copy
with an Electronic or hard copy of the or other accurate Record of the Receiver’s
Receiver’s authorization for all debit Entries authorization to the RDFI within ten
to be initiated to a Consumer Account. Banking Days without charge.
SUBSECTION 2.3.2.3 Form of Authorization (c) At the request of its ODFI, the Originator
An authorization must: must provide the original, copy or
other accurate Record of the Receiver’s
(a) be readily identifiable as an authorization; authorization to the ODFI for its use or
for the use of an RDFI requesting the
(b)
have clear and readily understandable information. The Originator must provide
terms. A purported authorization that is not the original, copy or other accurate Record
clear and readily understandable as to its in such time and manner as to enable the
terms (including the amount or timing of ODFI to deliver the authorization to a
debits), or that is otherwise invalid under requesting RDFI within ten Banking Days
applicable Legal Requirements, does not of the RDFI’s request.
satisfy the requirements of this Section 2.3;
and SUBSECTION 2.3.2.6 Notices of Variable Debits to
Consumer Accounts
(c)
provide that the Receiver may revoke Notice of Change in Amount.
(a) If the
the authorization only by notifying the amount of a debit Entry to be initiated
Originator in the time and manner stated to a Consumer Account differs from the
in the authorization. For a Single Entry amount of the immediately preceding debit
scheduled in advance, any such revocation Entry relating to the same authorization, or
right shall afford the Originator a reasonable differs from a preauthorized amount, an
opportunity to act on such revocation prior Originator must send the Receiver written
to the initiation of the Entry. notification of the amount of the Entry and
the date on or after which the Entry will be
SUBSECTION 2.3.2.4 Electronic Authorizations debited at least ten calendar days prior to
The writing and signature requirements of the date on which the Entry is scheduled to
Subsection 2.3.2.2(a) (Authorization and Notices be initiated.
with Respect to Consumer Accounts – Debit
Entries) may be satisfied by compliance with No Notice Required for Change Within
(b)
the Electronic Signatures in Global and National Agreed Range. The Originator is not
required to give the notice in Subsection
OR6 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
2.3.2.6(a) (Notice of Change in Amount) and the ODFI have agreed that the laws of
above if (i) the Originator provides, and another jurisdiction govern their rights and
the Receiver chooses, the option to receive obligations;
such notice only if the amount of the Entry
falls outside a specified range or if the (c) credit given by the RDFI to the Receiver for
Entry differs from the most recent Entry by the Entry is provisional until the RDFI has
more than an agreed upon amount, and (ii) received final settlement through a Federal
the variation in the amount of the Entry Reserve Bank or otherwise has received
is within the tolerance agreed to by the payment as provided for in Section
Receiver. 4A-403(a) of Article 4A; and
SUBSECTION 2.3.3 Agreement and Notice for SECTION 2.4 General Warranties and
Entries to Non-Consumer Accounts
Liabilities of Originating Depository
SUBSECTION 2.3.3.1 Agreement to be Bound Financial Institutions
by the Rules
SUBSECTION 2.4.1 General ODFI Warranties
The Originator must obtain the Receiver’s
An ODFI Transmitting an Entry warrants the
agreement to be bound by these Rules.
following to each RDFI and ACH Operator in
connection with such Entry at the time of the
SUBSECTION 2.3.3.2 Notice by ODFI to Originator
Entry’s Transmission by or on behalf of the ODFI,
for Non-Consumer Credit Entries
unless another effective time frame is provided in
For a credit Entry subject to Article 4A, an ODFI this Subsection 2.4.1.
must provide the Originator with notice, as part of
the Origination Agreement or otherwise, of each
SUBSECTION 2.4.1.1 The Entry is Authorized by the
of the following: Originator and Receiver
(a)
The Entry has been properly authorized
(a) the Entry may be Transmitted through the
by the Originator and the Receiver in
ACH;
accordance with these Rules.
(b) the rights and obligations of the Originator
(b)
The Originator’s authorization has not
concerning the Entry are governed by and
been revoked, the Origination Agreements
construed in accordance with the laws of
concerning the Entry have not been
the State of New York, unless the Originator
terminated, and neither the ODFI, any
2 0 1 3 O P E R AT I N G R U L E S OR7
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
Third-Party Sender, nor the Originator SUBSECTION 2.4.1.6 Debit Entry Satisfies an
has actual knowledge of the revocation Obligation or Corrects an Error
of the Receiver’s authorization or of the The debit Entry is:
termination of the agreement between
the RDFI and the Receiver concerning the (a) for an amount that will be due and owing
Entry. to the Originator from the Receiver on the
Settlement Date;
(c) At the time the Entry is processed by an
RDFI, the authorization for that Entry (b) for a sum specified by the Receiver to be
has not been terminated, in whole or in paid to the Originator; or
part, by operation of law. This Subsection
2.4.1.1(c) shall not apply if the RDFI has (c) to correct a previous credit Entry that was
actual knowledge of the circumstances an Erroneous Entry.
giving rise to such termination at the time
it processes the Entry and the ODFI does SUBSECTION 2.4.1.7 Secure Transmission of
not have such actual knowledge. Banking Information
Banking information for the Entry is Transmitted
SUBSECTION 2.4.1.2 The Entry Complies with in compliance with the requirements of Section
the Rules 1.6 (Secure Transmission of ACH Information Via
The Entry complies with these Rules, including the Unsecured Electronic Networks).
use of the proper Standard Entry Class Code.
SUBSECTION 2.4.1.8 The ODFI has Verified the
SUBSECTION 2.4.1.3 The Entry is Not Transmitted Identity of Originator or Third-Party Sender That
on Behalf of a Suspended Originator or Third Party Uses an Unsecured Electronic Network
Sender The ODFI has utilized a commercially reasonable
The Entry is not Transmitted on behalf of any method to establish the identity of an Originator or
Originator or Third-Party Sender that the ODFI has Third-Party Sender that entered into an Origination
been directed to suspend or that appears on a list Agreement via an Unsecured Electronic Network.
of suspended Originators and Third-Party Senders
issued by the National Association from time to SUBSECTION 2.4.2 ODFI Warranties Do Not
time, in each case in accordance with Appendix Apply to Goods or Services
Ten, Subpart 10.4.7.6 (Suspension). The warranties contained within Subsection 2.4.1
(General ODFI Warranties) and the requirements
SUBSECTION 2.4.1.4 The Entry Contains of Subsection 2.3.1 (General Rule - Originator
Required Information Must Obtain Authorization from Receiver) do not
The Entry contains the Receiver’s correct account apply to the goods or services to which the Entry
number and all other information necessary to relates.
enable the RDFI to comply with the requirements
of Subsection 3.1.5 (RDFI Obligation to Provide SUBSECTION 2.4.3 ODFI Warranties for Entries
Information About Entries), except for information Through its Sending Points
within the purview of the RDFI’s relationship with An ODFI using a Sending Point to Transmit Entries
the Receiver. All information Transmitted with the to an ACH Operator shall be deemed to have made
Entry is related to the payment represented by the the warranties of Subsection 2.4.1 (General ODFI
Entry. Warranties) for each Entry containing the ODFI’s
routing number that is Transmitted by the Sending
SUBSECTION 2.4.1.5 Credit Entry is Timely Point, regardless of whether the Sending Point was
The credit Entry is timely. authorized by the ODFI to Transmit the Entry.
OR8 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
SUBSECTION 2.4.4 General Indemnity by ODFI SUBSECTION 2.5.1.2 Authorization of ARC Entries
by Notification
SUBSECTION 2.4.4.1 Indemnity for Breach of An Originator may satisfy the requirement for
Warranty authorization of an ARC Entry by providing the
An ODFI shall indemnify every RDFI and ACH Receiver a notice meeting the requirements of this
Operator from and against any and all claims, subsection and obtaining the Receiver’s Eligible
demands, losses, liabilities, and expenses, Source Document. The Originator must provide a
including attorneys’ fees and costs, that result conspicuous notice to the Receiver that includes the
directly or indirectly from (a) the breach of any following, or substantially similar, language prior
warranty made to such party by the ODFI under to the receipt of each Eligible Source Document
these Rules, or (b) the debiting or crediting of that is used to initiate an ARC Entry:
an Entry to a Receiver’s account in accordance
with the terms of the Entry, including any claims, “When you provide a check as
demands, losses, liabilities, or expenses, and/or payment, you authorize us either to use
attorneys’ fees and costs that result, either directly information from your check to make a
or indirectly, from the return of one or more items one-time electronic fund transfer from
or Entries of the Receiver due to insufficient funds your account or to process the payment
caused by a debit Entry. as a check transaction.”
SUBSECTION 2.4.4.2 Indemnity for Failure to The Originator must provide a copy of the notice,
Comply with Regulation E or language that is substantially similar, to the
An ODFI shall indemnify every RDFI and ACH Receiver at the time of the transaction when the
Operator from and against any claims, demands, Eligible Source Document for the Entry is provided
losses, liabilities, or expenses, including attorneys’ by the Receiver in-person for payment of a bill at
fees and costs, based on the ground that the failure a manned location.
of the ODFI to comply with any provision of these
Rules resulted, either directly or indirectly, in the The requirements of Subsection 2.3.2.3(c) (Form
violation by an RDFI of the Federal Electronic of Authorization) concerning revocation of
Fund Transfer Act or Federal Reserve Board authorization do not apply to an ARC Entry.
Regulation E.
For an ARC Entry to a non-Consumer Account,
SECTION 2.5 Provisions for Specific Subsection 2.3.3.1 (Agreement to be Bound by the
Types of Entries Rules) does not apply.
SUBSECTION 2.5.1 Specific Provisions for ARC SUBSECTION 2.5.1.3 Eligible Source
Entries (Accounts Receivable Entry) Document Required
An Originator must use an Eligible Source
SUBSECTION 2.5.1.1 General Rule for ARC Entries Document provided by the Receiver as the source
An ARC Entry is a Single Entry debit originated for the Receiver’s routing number, account number,
based on an Eligible Source Document provided Check Serial Number, and dollar amount for an
to an Originator by a Receiver (1) via U.S. mail or ARC Entry.
delivery service, (2) at a dropbox location, or (3) in
person for payment of a bill at a manned location. SUBSECTION 2.5.1.4 Capture of Banking
An ODFI must perform, or ensure that its Originator Information
or Third-Party Sender performs, the requirements An Originator must initially use a reading device
of Subsection 2.5.1.2 (Authorization of ARC Entries to capture the Receiver’s routing number, account
by Notification), Subsection 2.5.1.3 (Eligible Source number, and Check Serial Number from the MICR
Document Required) and Subsection 2.5.1.4 line of the Receiver’s Eligible Source Document.
(Capture of Banking Information) below before The Originator may key-enter such information
permitting the Originator or Third-Party Sender to only to correct errors resulting from MICR
originate an ARC Entry. misreads, misencoding, or processing rejects.
2 0 1 3 O P E R AT I N G R U L E S OR9
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
SUBSECTION 2.5.1.5 Additional ODFI Warranties Entry, clearly marked on its face as a copy,
for ARC Entries to the RDFI within ten Banking Days upon
In addition to the other warranties contained receiving written request from the RDFI,
within these Rules, an ODFI originating an ARC provided that such request is received
Entry warrants to each RDFI and ACH Operator, within two years of the Settlement Date of
that: the ARC Entry.
(a) Entry Information is Accurate. The SUBSECTION 2.5.2 Specific Provisions for BOC
amount of the ARC Entry, the routing Entries (Back Office Conversion Entry)
number, the account number, and the
Check Serial Number accurately represent SUBSECTION 2.5.2.1 General Rule for BOC Entries
the information on the Eligible Source A BOC Entry is a Single Entry debit originated
Document used to initiate the ARC Entry. based on an Eligible Source Document provided to
an Originator by a Receiver at the point-of-purchase
(b) Eligible Source Document Will Not Be or manned bill payment location for subsequent
Presented for Payment. The Eligible conversion during back-office processing. A BOC
Source Document used to initiate the ARC Entry may be used only for an in-person transaction
Entry will not be presented or returned for which there is no standing authorization with
such that any Person will be required the Originator for the origination of Entries to the
to make payment based on the Eligible Receiver’s account. An ODFI must perform, or
Source Document, unless the ARC Entry is ensure that its Originator or Third-Party Sender
returned by the RDFI. performs, the requirements of Subsection 2.5.2.2
(Authorization of BOC Entries by Notification),
(c)
Retention of Copy of Eligible Source Subsection 2.5.2.3 (Eligible Source Document
Document and Related Payment Data Required), and Subsection 2.5.2.4 (Capture of
by Originator. The Originator will retain Banking Information) below before permitting the
a reproducible and legible copy of the Originator or Third-Party Sender to initiate a BOC
front of the Receiver’s Eligible Source Entry.
Document used to initiate each ARC Entry
for two years from the Settlement Date of SUBSECTION 2.5.2.2 Authorization of BOC Entries
the ARC Entry, and will provide it to the by Notification
ODFI upon request for use in complying An Originator may satisfy the requirement for
with Subsection 2.5.1.5(d) (Provision of authorization of a BOC Entry by providing the
Copy of Eligible Source Document to Receiver a notice meeting the requirements of this
RDFI) below. The Originator will establish subsection and obtaining the Receiver’s Eligible
and implement commercially reasonable Source Document. The Originator must provide a
methods to securely store: conspicuous notice to the Receiver that includes the
following, or substantially similar, language prior
(i)
the Eligible Source Document used to the receipt of each Eligible Source Document
to initiate the ARC Entry until it is that is used to initiate each BOC Entry:
securely destroyed; and
“When you provide a check as
(ii) all banking information relating to the payment, you authorize us either to use
ARC Entry. information from your check to make a
one-time electronic fund transfer from
Provision of Copy of Eligible Source
(d) your account or to process the payment
Document to RDFI. The ODFI will provide as a check transaction. For inquiries,
a copy of the front of the Receiver’s Eligible please call <retailer phone number>.”
Source Document used to initiate the ARC
The Originator must post the notice in a prominent
and conspicuous location and must provide a copy
OR10 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
2 0 1 3 O P E R AT I N G R U L E S OR11
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
(h) Retention of Eligible Source Document and SUBSECTION 2.5.4.2 ODFI to Satisfy Periodic
Related Payment Data by Originator. Each Statement Requirement
Originator will retain a reproducible and An ODFI must provide or make available the
legible copy of the front of the Receiver’s following information with respect to the Consumer
Eligible Source Document used to initiate Account of the Originator of a CIE Entry:
each BOC Entry for two years from the
Settlement Date of the BOC Entry, and will (a) posting date to the Originator’s account;
provide it to the ODFI upon request for
use in complying with Subsection 2.5.2.5(i) (b) dollar amount of the Entry;
(Provision of Copy of Eligible Source
Document to RDFI) below. The Originator (c) payee name;
will establish and implement commercially
reasonable methods to securely store: (d) Entry description;
(i)
the Eligible Source Document used (e) account type;
to initiate the BOC Entry until it is
securely destroyed; and (f) account number;
(ii) all banking information relating to the (g) amount of any charges assessed against the
BOC Entry. account for services related to the Entry;
(i) P
rovision of Copy of Eligible Source (h) balances in the Originator’s account at the
Document to RDFI. The ODFI will provide beginning and at the close of the statement
a copy of the front of the Receiver’s Eligible period; and
Source Document used to initiate the BOC
Entry, clearly marked on its face as a copy, (i) address and telephone number to be used
to the RDFI within ten Banking Days upon for inquiries or notices of errors preceded
receiving written request from the RDFI, by “Direct Inquiries To” or similar language.
provided that such request is received
within two years of the Settlement Date of References to data elements contained in an Entry
the BOC Entry. are further defined in Appendix Three (ACH
Record Format Specifications). The requirements
SUBSECTION 2.5.3 General Rule for CCD Entries of this subsection apply regardless of whether
(Corporate Credit or Debit Entry) Regulation E imposes similar requirements on the
A CCD Entry is originated by an Organization to or ODFI.
from the account of that Organization or another
Organization. A CCD Entry may be a credit Entry SUBSECTION 2.5.4.3 Rules That Do Not Apply to
CIE Entries
or a debit Entry, and may provide payment related
information in one Addenda Record. A CCD Entry The following subsections do not apply to CIE
may also be a Non-Monetary Entry that carries Entries:
payment related information in one Addenda
Record. (a)
Subsection 2.2.1.1 (ODFI Must Enter
Origination Agreement with Originator);
SUBSECTION 2.5.4 Specific Provisions for CIE and
Entries (Customer Initiated Entry)
(b) Subsection 2.2.2 (ODFI Risk Management).
SUBSECTION 2.5.4.1 General Rule for CIE Entries
A CIE Entry is a credit Entry initiated by or on SUBSECTION 2.5.5 General Rule for CTX Entries
behalf of the holder of a Consumer Account to the (Corporate Trade Exchange Entry)
account of a Receiver. A CTX Entry is originated by an Organization to or
from the account of that Organization or another
OR12 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
Organization. A CTX Entry may be a credit Entry SUBSECTION 2.5.8.3 Origination Agreements for
or a debit Entry that provides payment related IAT Entries
information in one or more Addenda Records. A An Origination Agreement between an ODFI and
CTX Entry may also be a Non-Monetary Entry that an Originator or Third-Party Sender for IAT Entries
carries information related to the payment in one must specify, in addition to the requirements of
or more Addenda Records. Subsection 2.2.1 (ODFI Agreement with Originator,
Third Party Sender or Sending Point):
SUBSECTION 2.5.6 General Rule for DNE Entries
(Death Notification Entry) (a) the terms and conditions for the allocation
A DNE Entry is a Non-Monetary Entry that of gains, losses, and the assumption of risk
gives notice by an agency of the United States for foreign exchange conversion; and
Government to an RDFI of the death of a Receiver.
Only an agency of the United States Government (b) the rights and responsibilities of the ODFI
may originate a DNE Entry. in the event of an Erroneous Entry.
SUBSECTION 2.5.7 General Rule for ENR Entries SUBSECTION 2.5.8.4 Additional ODFI Warranties
(Automated Enrollment Entry) for Outbound IAT Entries
An ENR Entry is a Non-Monetary Entry that In addition to the other warranties contained within
enrolls a Person with an agency of the United these Rules, an ODFI initiating an Outbound IAT
States Government that will enable Entries to such Entry warrants to each RDFI, ACH Operator, and
Person’s account at a Participating DFI. An ENR Gateway:
Entry may be originated by a Participating DFI at
the request of an account holder at the Participating (a) Compliance with U.S. Legal Requirements.
DFI to an agency of the United States Government The Originator and ODFI are in compliance
that has agreed to receive the ENR Entry. with U.S. Legal Requirements with respect
to the IAT Entry, including their obligations
SUBSECTION 2.5.8 Specific Provisions for IAT under programs administered by the U.S.
Entries (International ACH Transaction) Department of the Treasury’s Office of
Foreign Assets Control (OFAC) and the
SUBSECTION 2.5.8.1 General Rule Financial Crimes Enforcement Network
An IAT Entry is an Inbound or Outbound debit or (FinCEN).
credit Entry that is part of a payment transaction
involving a Financial Agency’s office that is not (b) Compliance with Foreign Payment System
located in the territorial jurisdiction of the United Rules. The origination of the IAT Entry
States. complies with the laws and payment
system rules of the receiving country.
SUBSECTION 2.5.8.2 Authorization for Outbound
IAT Entries SUBSECTION 2.5.8.5 ODFI Indemnity of Gateway
An Outbound IAT Entry must be authorized for Breach of Warranty
as provided in Subsection 2.3.1 (General Rule An ODFI breaching any of the warranties
- Originator Must Obtain Authorization from contained within Subsection 2.5.8.4 (Additional
Receiver). The form and content of the foreign ODFI Warranties for Outbound IAT Entries) shall
receiver’s authorization, including whether such indemnify each Gateway from and against any
authorization may be oral, electronic or written, is and all resulting claim, demand, loss, liability,
governed by the laws and payment system rules of or expense, including attorneys’ fees and costs,
the receiving country. For an Outbound credit IAT resulting directly or indirectly from the breach of
Entry for which both the Originator and foreign such warranties. The indemnification obligation of
receiver are natural Persons, no authorization is this Subsection 2.5.8.5 is in addition to the ODFI’s
required by these Rules. indemnification obligations under Subsection 2.4.4
(General Indemnity by ODFI).
2 0 1 3 O P E R AT I N G R U L E S OR13
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
SUBSECTION 2.5.8.6 Rules Exceptions for SUBSECTION 2.5.9 Specific Provisions for MTE
Outbound IAT Entries Entries (Machine Transfer Entry)
The following sections do not apply to Outbound
IAT Entries: SUBSECTION 2.5.9.1 General Rule
An MTE Entry is a credit or debit Entry initiated at
(a)
Subsection 2.3.2 (Authorizations and an “electronic terminal,” as that term is defined in
Notices with Respect to Consumer Regulation E, to a Consumer Account maintained
Accounts); with an RDFI (i.e., an ATM cash deposit or
withdrawal).
(b) Subsection 2.3.3.1 (Agreement to be Bound
by the Rules); SUBSECTION 2.5.9.2 PIN Security
An ODFI and any Originator and Third-Party
(c)
Section 2.10 (Reclamation Entries and Sender must comply with the American National
Written Demands for Payment); Standards Institute’s (ANSI) Accredited Standards
Committee (ASC) X9.8 concerning PIN Management
(d) Subsection 2.12.5.1 (Dishonor of Return by and Security with respect to the handling of any
ODFI). personal identification number (PIN) in connection
with the authorization of an MTE Entry.
The following sections apply to Outbound IAT
Entries to the extent supported by the laws and SUBSECTION 2.5.9.3 ODFI Warrants that the
payment system rules of the foreign receiving Originator has Satisfied Applicable PIN Requirements
country: If a personal identification number (PIN) is required
in connection with the authorization for an MTE
(e) Section 2.6 (Prenotifications); Entry, an ODFI warrants that the Originator has
complied with the American National Standards
(f) Section 2.8 (Reversing Files); Institute’s (ANSI) Accredited Standards Committee
(ASC) X9.8 concerning PIN Management and
(g) Section 2.9 (Reversing Entries);
Security. This provision does not apply if a card
issued by the ODFI or Originator of the Entry
(h) Section 2.11 (Notifications of Change);
is used in connection with the authorization for
these Entries.
(i) Subsection 2.12.4 (Reinitiation of Returned
Entries).
SUBSECTION 2.5.9.4 Rules Exceptions for
MTE Entries
The following sections apply to Outbound
IAT Entries only to the extent that the Uniform The following sections do not apply to MTE
Commercial Code Article 4A applies: Entries if the ODFI and the RDFI are parties to
an agreement (other than these Rules) for the
(j)
Subsection 2.3.3.2(c) and (d) (Notice by provision of services related to MTE Entries:
ODFI to Originator for Non-Consumer
Credit Entries). (a) Subsection 2.3.2.5 (Retention and Provision
of the Record of Authorization);
SUBSECTION 2.5.8.7 Rules Exceptions for Inbound
IAT Entries (b) Subsection 2.5.9.2 (PIN Security);
The following subsection applies to Inbound IAT
(c) Subsection 2.5.9.3 (ODFI Warrants that the
Entries to the extent supported by the laws and
Originator has Satisfied Applicable PIN
payment system rules of the foreign originating
Requirements).
country:
The following sections do not apply to MTE Entries
(a)
Subsection 2.11.1 (ODFI and Originator
if a card issued by the ODFI or Originator of the
Action on Notification of Change (NOC)).
OR14 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
Entry is used in connection with the authorization your account or to process the payment
of the MTE Entries: as a check transaction.”
(d) Subsection 2.5.9.2 (PIN Security); The Originator must post the notice in a prominent
and conspicuous location and a copy of such
(e) Subsection 2.5.9.3 (ODFI Warrants that the notice, or language that is substantially similar,
Originator has Satisfied Applicable PIN must be provided to the Receiver at the time of the
Requirements). transaction.
SUBSECTION 2.5.10 Specific Provisions for POP The requirements of Subsection 2.3.2.3(c) (Form
Entries (Point-of-Purchase Entry) of Authorization) concerning revocation of
authorization do not apply to a POP Entry.
SUBSECTION 2.5.10.1 General Rule for
POP Entries For a POP Entry to a non-Consumer Account,
A POP Entry is a Single Entry debit originated Subsection 2.3.3.1 (Agreement to be Bound by the
based on an Eligible Source Document provided Rules) does not apply.
to an Originator by a Receiver at the point-of-
purchase or manned bill payment location for SUBSECTION 2.5.10.3 Eligible Source
conversion at the point-of-purchase or manned bill Document Required
payment location. A POP Entry may be used only An Originator must use an Eligible Source
for an in-person transaction for which there is no Document provided by the Receiver at the point-
standing authorization with the Originator for the of-purchase or a manned bill payment location as
origination of Entries to the Receiver’s account. An the source document for the Receiver’s routing
ODFI must perform, or ensure that its Originator number, account number, and Check Serial
or Third-Party Sender performs, the requirements Number for a POP Entry. For purposes of POP
of Subsection 2.5.10.2 (Authorization of POP Entries, the Eligible Source Document need not be
Entries by Notification and Written Agreement), completed or signed by the Receiver.
Subsection 2.5.10.3 (Eligible Source Document
Required), Subsection 2.5.10.4 (Capture of Banking SUBSECTION 2.5.10.4 Capture of Banking
Information; Voiding of Source Document), and Information; Voiding of Source Document
Subsection 2.5.10.5 (Originator Must Provide (a) An Originator must initially use a reading
Receipts for POP Entries) below before permitting device to capture the Receiver’s routing
the Originator or Third-Party Sender to initiate a number, account number, and Check
POP Entry. Serial Number from the MICR line of the
Receiver’s Eligible Source Document. Such
SUBSECTION 2.5.10.2 Authorization of POP Entries information may not be key-entered by
by Notification and Written Agreement
the Originator. An Originator may key-
An Originator may satisfy the requirement for enter such information only to correct
authorization of a POP Entry by providing the errors resulting from MICR misreads or
Receiver a notice meeting the requirements of this processing rejects.
subsection and obtaining a written authorization
from the Receiver. The Originator must provide a (b) An Originator must void the Eligible Source
conspicuous notice to the Receiver that includes the Document at the time of the transaction
following, or substantially similar, language prior and return it to the Receiver.
to the receipt of each Eligible Source Document
that is used to initiate each POP Entry: SUBSECTION 2.5.10.5 Originator Must Provide
Receipts for POP Entries
“When you provide a check as (a)
An Originator must provide the Receiver
payment, you authorize us either to use a receipt containing the following
information from your check to make a information with respect to each POP
one-time electronic fund transfer from Entry to the Receiver’s account:
2 0 1 3 O P E R AT I N G R U L E S OR15
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
(i) Originator name (merchant); Entry warrants to each RDFI and ACH Operator
that:
(ii) company (merchant)/third-party
service provider telephone number; (a) Return of Voided Source Document to
Receiver. The Originator voided the Eligible
(iii) date of transaction; Source Document used to initiate such POP
Entry and returned it to the Receiver at the
(iv) transaction amount; time of the transaction.
(v)
Check Serial Number of the Eligible (b) Source Document Not Used for Prior POP
Source Document; Entry. The Eligible Source Document
used to initiate the POP Entry has not
(vi)
merchant number (or other unique been provided by the Receiver for use in
number that identifies the location of initiating any prior POP Entry.
the transaction);
SUBSECTION 2.5.11 Specific Provisions for POS
(vii) terminal city, as that term is defined in Entries (Point-of-Sale Entry)
Regulation E; and
SUBSECTION 2.5.11.1 General Rule for POS
(viii) terminal state, as that term is defined Entries
in Regulation E. A POS Entry is a debit Entry initiated at an
“electronic terminal,” as that term is defined
(b)
The National Association strongly in Regulation E, to a Consumer Account of the
recommends, but these Rules do not Receiver to pay an obligation incurred in a point-
require, that the Originator also provide of-sale transaction, or to effect a point-of-sale
the following information on the receipt terminal cash withdrawal.
provided to the Receiver:
SUBSECTION 2.5.11.2 PIN Security
(i) merchant address; An ODFI and any Originator and Third-Party
Sender must comply with the American National
(ii) merchant identification number; Standards Institute’s (ANSI) Accredited Standards
Committee (ASC) X9.8 concerning PIN Management
(iii) Receiver’s financial institution routing and Security with respect to the handling of any
number; personal identification number (PIN) in connection
with the authorization of a POS Entry.
(iv) Receiver’s truncated account number;
SUBSECTION 2.5.11.3 ODFI Warrants that the
(v) Receiver’s truncated identification
Originator has Satisfied Applicable PIN Requirements
number; and
If a personal identification number (PIN) is required
(vi) transaction reference number. in connection with the authorization for an POS
Entry, an ODFI warrants that the Originator has
(c) The Originator must not place the Receiver’s complied with the American National Standards
complete account number or complete Institute’s (ANSI) Accredited Standards Committee
identification number on the receipt. (ASC) X9.8 concerning PIN Management and
Security. This provision does not apply if a card
SUBSECTION 2.5.10.6 Additional ODFI Warranties issued by the ODFI or Originator of the Entry
for POP Entries is used in connection with the authorization for
these Entries.
In addition to the other warranties contained
within these Rules, an ODFI originating a POP
OR16 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
SUBSECTION 2.5.12 General Rule for PPD Receiver a notice meeting the requirements of this
Entries (Prearranged Payment and Deposit Entry) subsection and obtaining the item to which the
A PPD Entry is a credit Entry or debit Entry RCK Entry relates. The Originator must provide a
originated by an Organization to a Consumer conspicuous notice to the Receiver that has clear
Account of a Receiver based on a standing or a and readily understandable terms for initiating
Single Entry authorization from the Receiver. RCK Entries in advance of receiving the item to
An authorization for a debit PPD Entry must be which the RCK Entry relates.
in writing, and signed or similarly authenticated
by the Receiver, as provided in Section 2.3 The requirements of Subsection 2.3.2.3(c) (Form
(Authorization and Notice of Entries). of Authorization) concerning revocation of
authorization do not apply to an RCK Entry.
SUBSECTION 2.5.13 Specific Provisions for RCK
Entries (Re-presented Check Entry) SUBSECTION 2.5.13.3 RCK Eligible Items
An Originator may initiate an RCK Entry only in
SUBSECTION 2.5.13.1 General Rule for RCK relation to an item that:
Entries
An RCK Entry is a debit Entry used to collect the (a) is an item within the meaning of Revised
amount of a Check returned for insufficient or Article 4 of the Uniform Commercial Code
uncollected funds. If an eligible item as described (1990 Official Text);
in Subsection 2.5.13.3 (RCK Eligible Items) is
returned by a Participating DFI, an ODFI may (b)
is a negotiable demand draft drawn on
initiate an RCK Entry. As provided in Section or payable through or at a Participating
8.68 (“RCK Entry”), an RCK Entry is deemed to DFI, other than a Federal Reserve Bank or
be a presentment notice for purposes of Revised Federal Home Loan Bank;
Article 4 of the Uniform Commercial Code (1990
Official Text), receipt of the RCK Entry constitutes (c) contains a pre-printed serial number;
presentment of the item pursuant to Article
4-110, and return of the RCK Entry constitutes (d) is in an amount less than $2,500;
notice of dishonor or non-payment pursuant
to Article 4-301. The provisions of these Rules (e) indicates on the face of the document that
that are applicable to RCK Entries are intended the item was returned due to “Not Sufficient
to constitute a modification of Regulation CC by Funds,” “NSF,” “Uncollected Funds,” or
agreement as provided at 12 C.F.R. Part 229.37 of comparable language;
Federal Reserve Regulation CC.
(f) is dated 180 days or less from the date the
An ODFI must perform, or ensure that its Originator RCK Entry is Transmitted to the RDFI (i.e.,
or Third-Party Sender performs, the requirements of the item to which the RCK Entry relates is
Subsection 2.5.13.2 (Authorization of RCK Entries not stale-dated);
by Notification), Subsection 2.5.13.3 (RCK Eligible
Items), Subsection 2.5.13.4 (RCK Ineligible Items), (g) is drawn on a Consumer Account; and
Subsection 2.5.13.5 (Retention and Provision of a
Copy of Item), Subsection 2.5.13.6 (Agreement of (h) has been previously presented:
Originator That Restrictive Endorsement is Void or
Ineffective), and Subsection 2.5.13.7 (Reinitiation (i) no more than two times through the
of Returned RCK Entries) below before permitting check collection system (as a Check,
the Originator or Third-Party Sender to initiate an substitute check, or image), if the
RCK Entry. Entry is an initial RCK Entry; or
SUBSECTION 2.5.13.2 Authorization of RCK Entries (ii) no more than one time through the
by Notification check collection system (as a Check,
An Originator may satisfy the requirement for substitute check, or image), and
authorization of an RCK Entry by providing the no more than one time as an RCK
2 0 1 3 O P E R AT I N G R U L E S OR17
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
Entry, if the Entry is a reinitiated RCK copy of the item as paid on its face. The
Entry in accordance with Subsection ODFI must provide the copy to the RDFI
2.5.13.7 (Reinitiation of Returned RCK within ten Banking Days of receipt of the
Entries). RDFI’s request for the copy.
(b) Provision of Copy of Item. At the request of (b) Signatures Are Genuine. All signatures on
the ODFI, the Originator must provide the the item to which the RCK Entry relates are
copy of the front and back of the item to the authentic and authorized.
ODFI for its use or for the use of an RDFI
requesting the information in accordance (c) Item Not Altered. The item to which the
with Subsection 3.1.5 (RDFI Obligation RCK Entry relates has not been altered.
to Provide Information About Entries). If
the item has been finally paid prior to the No Defenses. The item to which the RCK
(d)
Originator’s provision of a copy of the item Entry relates is not subject to a defense or
to the ODFI, the Originator must mark the claim in recoupment of any party that can
be asserted against the ODFI.
OR18 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
SUBSECTION 2.5.14 Specific Provisions for SHR (a) Subsection 2.5.9.2 (PIN Security); and
Entries (Shared Network Entry)
(b)
Subsection 2.5.14.3 (ODFI Warrants that
SUBSECTION 2.5.14.1 General Rule for SHR
Entries the Originator has Satisfied Applicable PIN
Requirements).
An SHR Entry is a debit Entry initiated at an
“electronic terminal,” as that term is defined
SUBSECTION 2.5.15 Specific Provisions for TEL
in Regulation E, to a Consumer Account of the
Entries (Telephone-Initiated Entry)
Receiver to pay an obligation incurred in a
point-of-sale transaction, or to effect a point-of- SUBSECTION 2.5.15.1 General Rule for TEL Entries
sale terminal cash withdrawal. SHR Entries are
A TEL Entry is a debit Entry originated based on an
initiated in a shared network where the ODFI and
oral authorization provided to the Originator by a
RDFI have an agreement in addition to these Rules
Receiver via the telephone. A TEL Entry may only
to process such Entries.
be used when there is an Existing Relationship
between the Originator and the Receiver, or, when
2 0 1 3 O P E R AT I N G R U L E S OR19
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
there is not an Existing Relationship between the Receiver with written notice confirming the oral
Originator and the Receiver, when the Receiver authorization prior to the Settlement Date of the
initiates the telephone call. An ODFI must perform, Entry.
or ensure that its Originator or Third-Party Sender
performs, the requirements of Subsection 2.5.15.2 The following minimum information must be
(Authorization of TEL Entries) and Subsection included as part of the authorization of a recurring
2.5.15.3 (Retention of the Record of Authorization TEL Entry:
for TEL Entries) below before permitting the
Originator or Third-Party Sender to initiate a TEL (h) the amount of the recurring transactions, or
Entry. a reference to the method of determining
the amounts of recurring transactions;
SUBSECTION 2.5.15.2 Authorization of TEL Entries
An Originator must satisfy the requirement for (i)
the timing (including the start date),
authorization of a TEL Entry by obtaining oral number, and/or frequency of the electronic
authorization from the Receiver to initiate a debit fund transfers, or other similar reference,
Entry to a Consumer Account of the Receiver. to the Consumer’s account;
The authorization must be readily identifiable as
an authorization and must have clear and readily (j) the Receiver’s name or identity;
understandable terms.
(k) the account to be debited;
The following minimum information must be
included as part of the authorization of a Single (l) a telephone number for Receiver inquiries
Entry TEL Entry: that is answered during normal business
hours; and
(a) the date on or after which the ACH debit to
(m) the date of the Receiver’s oral authorization.
the Receiver’s account will occur;
For an authorization relating to recurring TEL
(b) the amount of the transaction or a reference
Entries, the Originator must comply with the
to the method of determining the amount
requirements of Regulation E for the authorization
of the transaction;
of preauthorized transfers, including the
(c) the Receiver’s name or identity; requirement to send a copy of the authorization
to the Receiver.
(d) the account to be debited;
SUBSECTION 2.5.15.3 Retention of the Record of
(e) a telephone number for Receiver inquiries Authorization for TEL Entries
that is answered during normal business An Originator must retain the original or a copy
hours; of the written notice or the original or a duplicate
audio recording of the oral authorization for two
(f) the date of the Receiver’s oral authorization; years from the date of the authorization of a
and Single Entry TEL Entry. For recurring TEL Entries,
an Originator must retain for two years from the
(g)
a statement by the Originator that the termination or revocation of the authorization (i)
authorization obtained from the Receiver the original or a duplicate audio recording of the
is for a Single-Entry ACH debit, a one-time oral authorization, and (ii) evidence that a copy of
electronic funds transfer, or other similar the authorization was provided to the Receiver in
reference. compliance with Regulation E.
For an authorization relating to a Single Entry TEL SUBSECTION 2.5.15.4 Additional ODFI Warranties
Entry, the Originator must either make an audio for TEL Entries
recording of the oral authorization, or provide the In addition to the other warranties contained
within these Rules, an ODFI originating a TEL
OR20 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
Entry warrants to each RDFI and ACH Operator directly or indirectly from the debiting of the Entry
that: to the deposit account identified in the Entry.
(a) V
erification of Receiver’s Identity. The SUBSECTION 2.5.16.4 Rules Exceptions for TRC
Originator has established and implemented Entries and TRX Entries
commercially reasonable procedures to The following sections do not apply to TRC and
verify the identity of the Receiver. TRX Entries:
(b) V
erification of Routing Numbers. The (a) Section 1.7 (Choice of Law);
Originator has established and implemented
(b) Section 2.2 (Prerequisites to Origination);
commercially reasonable procedures to
verify that routing number used in the TEL (c)
Section 2.3 (Authorization and Notice of
Entry is valid. Entries);
(d)
Section 2.4 (General Warranties and
SUBSECTION 2.5.15.5 Rules Exceptions for TEL Liabilities of ODFIs);
Entries
The requirement that an Electronic authorization (e) Section 2.6 (Prenotifications);
must be visually displayed in a manner that (f) Section 2.9 (Reversing Entries);
enables the consumer to read the communication,
(g)
Section 2.10 (Reclamation Entries and
as required by Subsection 2.3.2.4 (Electronic
Written Demands for Payment);
Authorizations), does not apply to TEL Entries.
(h) Subsection 2.12.4 (Reinitiation of Returned
SUBSECTION 2.5.16 Specific Provisions for Entries);
TRC and TRX Entries (Check Truncation Entry) (i) Section 8.12 (“Banking Day”);
SUBSECTION 2.5.16.1 General Rule for TRC and (j) Section 8.38 (“File”);
TRX Entries (k) Section 8.63 (“Person”);
A TRC or TRX Entry is a debit Entry initiated under
(l) Appendix Four (Return Entries);
a Check Truncation Program. This Subsection
2.5.16 applies to all TRC and TRX Entries initiated (m) Appendix Five (Notification of Change);
under the rules of a Check Truncation Program, (n) Appendix Seven (Compensation Rules);
unless otherwise provided for in the rules of the
Check Truncation Program. A TRC Entry and TRX (o) Appendix Eight (Rule Compliance Audit
Entry also shall constitute a “demand for payment” Requirements);
under Articles 3 and 4 of the UCC. (p) Appendix Nine (Arbitration Procedures).
SUBSECTION 2.5.16.2 TRC Entries and TRX SUBSECTION 2.5.16.5 Conflicts Between Rules and
Entries are Permitted Only to Eligible Participants Check Truncation Program Rules
An ODFI may Transmit a TRC Entry or TRX Entry If there is a conflict between this Subsection 2.5.16
to an RDFI only if the ODFI and RDFI each and the rules of a Check Truncation Program, the
are participants in the same Check Truncation Check Truncation Program’s rules govern.
Program.
SUBSECTION 2.5.17 Specific Provisions for WEB
SUBSECTION 2.5.16.3 Indemnification by ODFI for Entries (Internet-Initiated/Mobile Entry)
Misrouted TRC Entries and TRX Entries
An ODFI that Transmits a TRC Entry or TRX SUBSECTION 2.5.17.1 General Rule for
Entry to an RDFI not participating in the same WEB Entries
Check Truncation Program as the ODFI shall A WEB Entry is a debit Entry to a Consumer
indemnify the RDFI from and against any and all Account originated based on (1) an authorization
claims, demands, losses, liabilities, and expenses, that is communicated, other than by an oral
including attorneys’ fees and costs, resulting communication, from the Receiver to the Originator
2 0 1 3 O P E R AT I N G R U L E S OR21
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
via the Internet or a Wireless Network; or (2) any (a) Fraud Detection Systems. The Originator
form of authorization if the Receiver’s instruction has established and implemented a
for the initiation of the individual debit Entry is commercially reasonable fraudulent
designed by the Originator to be communicated, transaction detection system to screen the
other than by an oral communication, to the WEB Entry.
Originator via a Wireless Network. An ODFI
must perform, or ensure that its Originator or (b)
Verification of Receiver’s Identity.
Third-Party Sender performs, the requirements The Originator has established and
of Subsection 2.5.17.2 (Authorization of WEB implemented commercially reasonable
Entries) and Subsection 2.5.17.3 (WEB Annual methods of authentication to verify the
Audit) below before permitting an Originator or identity of the Receiver of the WEB Entry.
Third-Party Sender to initiate a WEB Entry.
(c) Verification of Routing Numbers. The
SUBSECTION 2.5.17.2 Authorization of Originator has established and implemented
WEB Entries commercially reasonable procedures to
An Originator must satisfy the requirement for verify that the routing number used in the
authorization of a WEB Entry to a Consumer WEB Entry is valid.
Account of the Receiver by (1) obtaining written
authorization from the Receiver via the Internet or SUBSECTION 2.5.18 Specific Provisions for
a Wireless Network; or (2) obtaining the Receiver’s XCK Entries (Destroyed Check Entry)
authorization in any manner permissible under
SUBSECTION 2.5.18.1 General Rule for
Subsection 2.3.2 (Authorizations and Notices with
XCK Entries
Respect to Consumer Accounts), and the Receiver’s
instruction for the initiation of the individual debit An ODFI may originate an XCK entry for an eligible
Entry is communicated, other than by an oral item as described in Subsection 2.5.18.2 (XCK
communication, via a Wireless Network. Eligible Items). Notwithstanding Section 8.33
(“Entry”), an XCK Entry shall not be deemed to be
an item under Article 4 of the Uniform Commercial
SUBSECTION 2.5.17.3 WEB Annual Audit
Code, and neither Transmittal to nor receipt by an
An Originator of the WEB Entry must conduct,
RDFI of an XCK Entry shall constitute presentment
or have conducted on its behalf, annual audits to
of the original item.
ensure that the financial information it obtains
from Receivers is protected by security practices
SUBSECTION 2.5.18.2 XCK Eligible Items
and procedures that include, at a minimum,
adequate levels of: An ODFI may initiate an XCK Entry only in relation
to an item that:
(a)
physical security to protect against theft,
tampering, or damage; (a) is an item within the meaning of Article 4
of the Uniform Commercial Code;
(b)
personnel and access controls to protect
against unauthorized access and use; and (b)
is a negotiable demand draft drawn on
or payable through or at an office of a
(c) network security to ensure secure capture, Participating DFI, other than a Federal
storage, and distribution. Reserve Bank or Federal Home Loan Bank;
OR22 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
is missing part of the MICR line but can SUBSECTION 2.5.18.5 Additional ODFI Warranties
be sufficiently repaired to create an ACH for XCK Entries
Entry; (ii) is an image of an item that cannot In addition to the other warranties contained
be processed through the applicable image within these Rules, an ODFI originating an XCK
exchange, but has sufficient information to Entry warrants to each RDFI and ACH Operator
create an Entry; or (iii) is, in whole or in that:
part, unreadable, obscured, or mutilated in
a manner that prevents automated check (a) Good Title to the Check. The ODFI has
processing or creation of an image that can good title to or is entitled to enforce the
be used to produce a “substitute check” item to which the XCK Entry relates or is
that is the legal equivalent of the original authorized to obtain payment or acceptance
check under the Check Clearing for the on behalf of one who has good title or is
21st Century Act, Pub. L. 108-100, but has entitled to enforce the item.
sufficient information to create an Entry.
(b) Signatures are Genuine. All signatures on
SUBSECTION 2.5.18.3 XCK Ineligible Items the item to which the XCK Entry relates are
Examples of items an ODFI may not use originate authentic and authorized.
an XCK Entry include:
No Alterations. The item to which the XCK
(c)
(a)
noncash items (as defined in Section Entry relates has not been altered.
229.2(u) of Regulation CC);
(d) No Defenses. The item to which the XCK
(b) drafts drawn on the Treasury of the United Entry relates is not subject to a defense or
States, a Federal Reserve Bank, or a Federal claim in recoupment of any party that can
Home Loan Bank; be asserted against the ODFI.
(c) drafts drawn on a state or local government (e) No Knowledge of Insolvency. The ODFI
that are not payable through or at a has no knowledge of any insolvency
Participating DFI; proceeding commenced with respect to
the maker or acceptor or, in the case of an
(d) United States Postal Service money orders; unaccepted draft, the drawer of the item to
which the XCK Entry relates.
(e)
items payable in a medium other than
United States currency; and (f) Item Drawn on RDFI. The item to which
the XCK Entry relates is drawn on, payable
(f) returned items. through, or payable at the RDFI.
SUBSECTION 2.5.18.4 Provision of Copy of Item (g) XCK Entry Accurately Reflects Item. The
to RDFI or Other DFI amount of the item to which the XCK Entry
An ODFI must provide a copy of the item to which relates, the item number, and account
the XCK Entry relates to the RDFI, and to the first number contained on such item have been
DFI to which such item was transferred if different accurately reflected in the XCK Entry.
from the ODFI, within thirty days of receiving a
written request from the RDFI, or such other DFI, (h) Item Has Not Been Presented. Neither the
respectively, provided that such request is received item to which the XCK Entry relates, nor
within six years of the date on which the ODFI any copy (including any image) of such
initiated the XCK Entry. item, has been presented and will not be
presented to the RDFI.
2 0 1 3 O P E R AT I N G R U L E S OR23
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
(i) Authority and Eligibility. The ODFI has SECTION 2.7 Recall by ODFI or
all necessary authority to initiate the XCK Originator
Entry, and the item to which the XCK Entry
Neither an Originator nor an ODFI has the right
relates satisfies the eligibility requirements
to recall an Entry or File, to require the return of
of Subsection 2.5.18.2 (XCK Eligible Items).
or adjustment to an Entry, or to stop the payment
or posting of an Entry, once the Entry or File has
SUBSECTION 2.5.18.6 Rules Exceptions for
been received by the Originating ACH Operator,
XCK Entries
except as allowed by Section 2.8 (Reversing Files),
The following subsections do not apply to XCK Section 2.9 (Reversing Entries), and Section 2.10
Entries: (Reclamation Entries and Written Demands for
Payment).
(a)
Subsection 2.2.1 (ODFI Agreement With
Originator, Third Party Sender or Sending
Point);
SECTION 2.8 Reversing Files
SUBSECTION 2.8.1 General Rule for Reversing
(b)
Section 2.3 (Authorization and Notice of Files
Entries); and
An Originator or an ODFI may initiate a Reversing
File to reverse all Entries of an Erroneous File.
(c) Subsection 2.4.1.1 (The Entry is Authorized
by the Originator and Receiver).
SUBSECTION 2.8.2 Obligation to Initiate
SECTION 2.6 Prenotifications Correcting Files Corresponding to Reversing
Files
SUBSECTION 2.6.1 General Rule for An Originator or ODFI initiating a Reversing File
Prenotifications to correct an Erroneous File must concurrently
Prior to the initiation of the first credit or debit initiate a Correcting File corresponding to the
Entry to a Receiver’s account with an RDFI, an Erroneous File, unless the Erroneous File was a
Originator may originate a Prenotification Entry to duplicate.
the RDFI.
SUBSECTION 2.8.3 Time Limitations on Initiation
SUBSECTION 2.6.2 Six Banking Days’ Delay; of Reversing Files
Return Entries and Notifications of Change An Originator or the ODFI must Transmit
An Originator that has originated a Prenotification each Reversing File and, when appropriate, a
may not originate Entries to a Receiver’s account corresponding Correcting File, to the ACH Operator
sooner than six Banking Days following the within five Banking Days after the Settlement Date
Settlement Date of the Prenotification. If the ODFI of the Erroneous File. The Originator or ODFI must
receives a Return Entry within the six Banking Day Transmit the Reversing File and any corresponding
period indicating that the RDFI will not accept Correcting File to the ACH Operator within twenty-
Entries, then the Originator must not originate four hours of the discovery of the Erroneous File.
such Entries. If the ODFI receives a Notification
of Change within the six Banking Day period SUBSECTION 2.8.4 Indemnification for
indicating that the RDFI requires the requested Reversing Files
changes to be made prior to the initiation of An ODFI that initiates a Reversing File or Correcting
such Entries, the Originator must not initiate such File shall indemnify each Participating DFI and
Entries unless the requested changes have been ACH Operator from and against any and all
made. claims, demands, losses, liabilities, and expenses,
including attorneys’ fees and costs, that result
directly or indirectly from the debiting or crediting
of any Entry in the Reversing File or corresponding
Correcting File to the Receiver’s account.
OR24 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
SUBSECTION 2.8.5 Rules Exceptions for (iii) the credit PPD Entry was Transmitted
Reversing File by the Originator prior to the delivery
The following sections and subsections do not of the Check to the Receiver.
apply to a Reversing File complying with the
requirements of this Section 2.8: The Originator must make a reasonable attempt
to notify the Receiver of the Reversing Entry
(a) Section 2.2 (Prerequisites to Origination); and the reason for the Reversing Entry no later
and than the Settlement Date of the Reversing Entry.
For a credit PPD Entry satisfying the criteria of
(b)
Section 2.4 (General Warranties and Subsection 2.9.1(d) above, the Originator must
Liabilities of Originating Depository notify the Receiver of the Reversing Entry at the
Financial Institutions). time the Check is delivered to the Receiver.
(a)
is a duplicate of an Entry previously (a)
Subsection 2.3 (Authorization and Notice
initiated by the Originator or ODFI; of Entries); and
(b)
orders payment to or from a Receiver (b) Subsection 2.4.1.1 (The Entry is Authorized
different than the Receiver intended to be by the Originator and Receiver).
credited or debited by the Originator;
SECTION 2.10 Reclamation Entries and
(c) orders payment in a dollar amount different
Written Demands for Payment
than was intended by the Originator; or
SUBSECTION 2.10.1 Prerequisites for a
(d) is a credit PPD Entry satisfying each of the Reclamation Entry or Written Demand for
following criteria: Payment
An Originator or ODFI may initiate a Reclamation
(i)
the credit PPD Entry is for funds Entry or written demand for payment with
related to a Receiver’s employment; respect to a previously Transmitted credit Entry
to a Receiver’s account under the following
(ii)
the value of the credit PPD Entry circumstances:
is fully included in the amount of a
Check delivered to the same Receiver (a) The Receiver has died and the Receiver’s
at or prior to the Receiver’s separation right to receive one or more pension,
from employment; and annuity, or other benefit payments has
2 0 1 3 O P E R AT I N G R U L E S OR25
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
OR26 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
(a)
Subsection 2.3.2.6 (Notices of Variable SUBSECTION 2.11.2 ODFI Right to Refuse
Debits to Consumer Accounts); Notification of Change Entries
An ODFI may refuse an NOC or corrected NOC for
(b) Subsection 2.4.1.1(b) and (c) (The Entry is all Entries except IAT Entries if:
Authorized by the Originator and Receiver);
(a)
the NOC or corrected NOC contains
(c) Subsection 2.4.1.5 (Credit Entry Is Timely); incorrect information;
(d) Subsection 2.4.1.6 (Debit Entry Satisfies an (b) the NOC or corrected NOC does not contain
Obligation or Corrects an Error). all information required by Appendix Five
(Notification of Change); or
SECTION 2.11 Notifications of Change
(c)
the NOC otherwise fails to comply with
SUBSECTION 2.11.1 ODFI and Originator Action Appendix Five (Notification of Change).
on Notification of Change (NOC)
An ODFI must accept a Notification of Change To refuse an NOC or corrected NOC, the ODFI
(also known as “NOC” and “COR Entry”) or a must Transmit a refused NOC complying with
corrected NOC that complies with the requirements Appendix Five (Notification of Change) to its ACH
of Appendix Five (Notification of Change) and is Operator within fifteen days of receipt of the NOC
Transmitted by the RDFI within the time limits or corrected NOC.
established by these Rules, unless otherwise
provided for in this Section 2.11. SECTION 2.12 Return Entries
For each NOC or corrected NOC it receives, an ODFI SUBSECTION 2.12.1 ODFI Acceptance of Timely
must provide the Originator with the following Return Entries and Extended Return Entries
minimum information within two Banking Days of An ODFI must accept Return Entries and Extended
the Settlement Date of the NOC or corrected NOC: Return Entries that comply with these Rules and
that are Transmitted by the RDFI within the time
(a) company name; limits established by these Rules.
(b) company identification;
SUBSECTION 2.12.2 ODFI Request for Return
(c) company Entry description;
An ODFI may, orally or in writing, request an RDFI
(d) effective Entry date; to return an Erroneous Entry initiated by the ODFI.
(e) DFI account number; The RDFI may, but is not obligated to, comply
with this request. For purposes of this subsection,
(f) individual name/receiving company name; an Erroneous Entry has the same meaning as in
(g) individual identification number/ Section 2.9 (Reversing Entries).
identification number;
SUBSECTION 2.12.3 Indemnification by ODFI for
(h) change code;
Requested Returns
(i) original Entry trace number; An ODFI requesting that an RDFI return an
(j) original RDFI identification; and Erroneous Entry indemnifies the RDFI from
and against any and all claims, demands, losses,
(k) corrected data.
liabilities and expenses, including attorneys’ fees
and costs, resulting directly or indirectly from
The Originator must make the changes specified
compliance by the RDFI with such request.
in the NOC or corrected NOC within six Banking
Days of receipt of the NOC information or prior to
initiating another Entry to the Receiver’s account,
whichever is later.
2 0 1 3 O P E R AT I N G R U L E S OR27
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
SUBSECTION 2.12.5 Dishonor of Return Entries SUBSECTION 2.12.5.2 ODFI Must Accept a
Contested Dishonored Return Entry
SUBSECTION 2.12.5.1 Dishonor of Return by ODFI An ODFI must accept a contested dishonored
An ODFI may dishonor a Return Entry, with the Return Entry (i.e., an Entry rejecting the ODFI’s
exception of an IAT Return Entry, if: dishonor of the Return Entry). Any further action
regarding a contested dishonored Return Entry
(a) the RDFI failed to return the Entry within must be pursued outside of the ACH Network.
the time limits established by these Rules;
SUBSECTION 2.12.6 Discretion to Accept
(b) information in one or more of the following Late Returns
fields of the Return Entry is incorrect or An ODFI may agree to accept a late Return Entry
missing: at its discretion.
OR28 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
To refuse an ACK or ATX Entry, the ODFI must “If your payment is returned unpaid,
Transmit a refused ACK or ATX Entry, complying you authorize us to make a one-time
with the requirements of Appendix Six, to the electronic fund transfer from your
Originating ACH Operator within fifteen days of account to collect a fee. The fee will be
receipt of the ACK or ATX Entry. determined [by/as follows]: [ ].”
SECTION 2.14 Return Fee Entries SUBSECTION 2.14.3 Formatting Requirements for
Return Fee Entries
SUBSECTION 2.14.1 General Rule for Return Fee
Entries A Return Fee Entry authorized by notice in
accordance with Subsection 2.14.2 (Authorization
An Originator may originate a Return Fee Entry,
of Return Fee Entries) must use the Standard Entry
to the extent permitted by applicable Legal
Class Code “PPD.” A Return Fee Entry authorized
Requirements, in relation to the return of:
in a manner other than by notice must use the
Standard Entry Class Code appropriate to the
(a) a debit Entry to a Consumer Account of a
manner of authorization.
Receiver;
An Originator must submit Return Fee Entries as
(b)
an ARC, BOC or POP Entry to a non-
a separate batch that contains the words “RETURN
Consumer Account of a Receiver; or
FEE” in the Company Entry Description field of the
Company/Batch Header Record.
(c) an item that was eligible to be converted to
a debit Entry, but was not converted to an
The Company Name field of a Return Fee Entry
Entry.
must contain the same name of the Originator
as identified in the Company Name field of the
For a Return Fee Entry based on the return of
underlying Entry. For a Return Fee Entry based on
an Entry, the Entry must have been returned for
the return of a Check, the Company Name field
insufficient or uncollected funds under the return
must contain the name of the payee of the Check.
codes R01 or R09. For a Return Fee Entry based
on the return of a Check, the returned Check must
SUBSECTION 2.14.4 Other Requirements of
be marked to indicate that it was returned due to
Return Fee Entries
“Not Sufficient Funds, “ NSF,” “Uncollected Funds,”
or comparable language. An Originator may impose only one Return Fee in
relation to an underlying Entry or item that was
SUBSECTION 2.14.2 Authorization of Return Fee returned, whether such Return Fee is collected via
Entries the ACH or otherwise. An Originator may re-initiate
a Return Fee Entry in accordance with Subsection
An Originator may satisfy the requirements for
2.12.4 (Reinitiation of Returned Entries), but an
authorization of the Return Fee Entry by providing
Originator may not originate a Return Fee Entry
notice, at the time that the underlying Entry is
with respect to the return of another Return Fee
authorized or the original item is accepted, of the
Entry.
Return Fee Entry in form, process and content
permissible under Regulation E, regardless of
A Return Fee Entry authorized by notice in
whether the account to be debited is a Consumer
accordance with Subsection 2.14.2 (Authorization
Account or a non-Consumer Account.
of Return Fee Entries) must have a Settlement Date
within 45 days of the Settlement Date of the Return
The notice must include the following, or
Entry of the underlying debit Entry or the return of
substantially similar, language:
the other underlying item.
“If your payment is returned unpaid,
you authorize us to make a one-time SUBSECTION 2.14.5 Additional ODFI Warranty for
Return Fee Entries
electronic fund transfer from your
account to collect a fee of [$ ];” or In addition to the other warranties contained
within these Rules, an ODFI initiating a Return Fee
Entry warrants to each RDFI and ACH Operator
2 0 1 3 O P E R AT I N G R U L E S OR29
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
that the Originator imposing the Return Fee has SUBSECTION 2.15.3 Performance and Warranty
not and will not impose any other Return Fee in of ODFI Obligations by Third-Party Senders
relation to the underlying Entry or item that was To the extent that a Third-Party Sender performs
returned unpaid. any of the obligations of an ODFI under these
Rules, the Third-Party Sender must perform the
SECTION 2.15 Obligations of Third-Party requirements of these Rules otherwise applicable
Senders, and of ODFIs and Originators to the ODFI, and warrants that it is legally able to
That Use Third-Party Senders do so. The performance by a Third-Party Sender
of any of the obligations of the ODFI under these
An ODFI may originate Entries initiated by a
Rules shall not relieve the ODFI of any of its
Third-Party Sender, subject to compliance with
obligations under these Rules.
these Rules, including Section 2.2 (Prerequisites to
Origination).
SUBSECTION 2.15.4 Payment to ODFI by
Third-Party Senders or Originators
SUBSECTION 2.15.1 Identification of Originators
by Third-Party Senders A Third-Party Sender agrees to make payment to
the ODFI for any credit Entries it originates and
A Third-Party Sender must, upon the ODFI’s
for any debit Entries returned by the RDFI. An
request, provide the ODFI with any information
Originator that utilizes a Third-Party Sender to
the ODFI reasonably deems necessary to identify
authorize an ODFI to Transmit Entries agrees to
each Originator for which the Third-Party Sender
make payment to the ODFI for any credit Entries
Transmits Entries. The information must be
originated and for any such Entries returned by the
provided to the ODFI by the Third-Party Sender
RDFI to the extent that the ODFI does not receive
within two Banking Days of receipt of the ODFI’s
payment from the Third-Party Sender.
request.
SUBSECTION 2.15.5 Performance of Originator
SUBSECTION 2.15.2 Warranty of and
Responsibilities by Third-Party Senders
Indemnification by Third-Party Senders
A Third-Party Sender shall be jointly and severally
A Third-Party Sender initiating one or more Entries
liable with each of its Originators for the retention
through an ODFI to a Receiver’s account warrants
and delivery to the ODFI or RDFI, as required by
to the ODFI that the Originator has agreed to
these Rules, of any Records, documentation or
assume the responsibilities of an Originator under
data regarding records of authorization of Entries,
these Rules. In any case where such Originator
copies of items and copies of Eligible Source
fails to perform its obligations as an Originator
Documents.
under these Rules, the Third-Party Sender
authorizing such Entry indemnifies the ODFI from
and against any and all claims, demands, losses, SECTION 2.16 Authorization by ODFI for
liabilities, and expenses, including attorneys’ fees Release of Designated Data
and costs, that result directly or indirectly from the An ODFI authorizes and instructs each ACH
failure of the Originator to perform its obligations Operator to provide to the National Association
as an Originator under these Rules. Designated Data related to Entries Transmitted to
or by the ODFI, and will hold each ACH Operator
In addition to the other warranties contained harmless against any claim by the ODFI arising
within these Rules, a Third-Party Sender also out of the ACH Operator’s compliance with such
makes to the ODFI each of the warranties set forth instructions.
at Subsection 2.4.1 (General ODFI Warranties),
Subsection 2.5.17.4 (Additional ODFI Warranties
for WEB Entries), and Section 5.2 (Warranties of
Gateway).
OR30 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
(a) the ODFI’s name; (d) a statement acknowledging that the ODFI
has no Direct Access Debit Participants.
(b) the ODFI’s routing number(s) provided for
use by a Direct Access Debit Participant; SUBSECTION 2.17.1.3 Direct Access Data
Reporting
(c)
the name, title, telephone number, and An ODFI that has one or more Direct Access Debit
address for a contact person at the ODFI; Participants must provide the following data to the
National Association on a quarterly basis for each
(d)
an identification of whether the Direct relationship, in total and by Standard Entry Class
Access Debit Participant is an Originator, Code:
Third-Party Service Provider, or Third-Party
Sender; (a)
average daily debit Entry origination
volume;
(e) the name, title, address, telephone number,
and taxpayer identification number(s) (b) average daily debit Entry origination dollar
for the Originator, Third-Party Service value;
Provider, or Third-Party Sender; (c) average daily debit Entry return volume;
(f)
the number of Originators Transmitting (d)
average daily debit Entry return dollar
debit Entries through the Third-Party value; and
Service Provider or Third-Party Sender; (e) average daily rates of return.
(g)
the identification of the ACH Operator SUBSECTION 2.17.2 ODFI Return Rate Reporting
through which each Direct Access Debit Upon receipt of a written request by the National
Participant Transmits Entries; and Association to the ODFI’s Chief Operating Officer,
an ODFI must provide, via traceable delivery
(h)
a statement that the ODFI’s board of method, to the National Association within ten
directors, committee of the board of Banking Days the following information for each
directors, or its designee has approved the Originator or Third-Party Sender:
Direct Access Debit Participant.
(a)
the complete legal name; any doing-
An ODFI must provide the National Association business-as name(s); and taxpayer
with updated information following any change to identification number(s) of the Originator
the information previously provided, including any or Third-Party Sender;
termination of the Direct Access Debit Participant.
(b) a statement as to whether the Originator
or Third-Party Sender acts as the ODFI’s
2 0 1 3 O P E R AT I N G R U L E S OR31
ARTICLE TWO – Rights and Responsibilities of ODFIs, Their Originators and Third-Party Senders
Sending Point with direct access to the (a) a detailed plan and timeline for reducing the
ACH Operator; Originator’s or Third-Party Sender’s return
rate for Entries returned as unauthorized to
(c)
the Originator’s or Third-Party Sender’s a rate below one percent for unauthorized
origination volume for the time period Entries within sixty days after receipt of
specified by the National Association; the National Association’s written request
for information, as described within
(d)
the actual return rate for unauthorized Subsection 2.17.2;
Entries, in total and by SEC Code, for the
Originator or Third-Party Sender when u (a) a detailed plan and timeline for reducing
computed by either: the Originator’s or Third-Party Sender’s
return rate for Entries returned as
(i) dividing the number of debit Entries unauthorized to a rate below one percent
returned as unauthorized for the for unauthorized Entries within thirty days
preceding sixty days or two calendar after receipt of the National Association’s
months by the total number of debit written request for information, as
Entries contained within the File(s) described within Subsection 2.17.2;
in which the original Entries were
transmitted; or (b)
the address, telephone number, contact
person of the Originator or Third-Party
(ii) dividing the number of debit Entries Sender, and, when such Originator or Third-
returned as unauthorized for the Party Sender is a privately-held company,
preceding sixty days or two calendar the following additional information:
months by the total number of debit principal owner(s) and officers of the
Entries originated for the preceding Originator or Third-Party Sender;
sixty days or two calendar months,
respectively; and (c) a description of the nature of the business
of the Originator or Third-Party Sender,
(e) a statement either: and the methods used by the Originator(s)
to obtain proper authorization for ACH
(i)
refuting NACHA’s claim that the transactions;
Originator’s or Third-Party Sender’s
return rate for unauthorized Entries (d) the length of the ACH relationship between
exceeded one percent; or the ODFI and the Originator or Third-Party
Sender;
(ii) explaining the reason(s) causing the
Originator’s or Third-Party Sender’s (e) the date of the ODFI’s most recent review
return rate for unauthorized Entries to of the exposure limit for the Originator or
have exceeded one percent. Third-Party Sender pursuant to Subsection
2.2.2 (ODFI Risk Management); and
SUBSECTION 2.17.2.1 Additional Reporting When
the Return Threshold is Exceeded (f) date and proof of completion of the ODFI’s
u SUBSECTION 2.17.2.1 Additional ODFI Action and most recent ACH audit in accordance
Reporting When the Return Threshold is Exceeded with the requirements of these Rules and
When the Originator’s or Third-Party Sender’s Appendix Eight (Rule Compliance Audit
return rate for unauthorized Entries, as calculated Requirements).
in Subsection 2.17.2 (ODFI Return Rate Reporting),
exceeds one percent, the ODFI must also provide
the National Association with the following
information within the ten Banking Day time
frame:
OR32 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
2 0 1 3 O P E R AT I N G R U L E S OR33
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
(h) Balances in the Receiver’s account at the SUBSECTION 3.1.5.2 RDFI Must Provide Entry
beginning and at the close of the statement Information to Receivers of ARC, BOC, or POP
period; Entries to Non-Consumer Accounts
An RDFI must provide or make available to a
(i) For an ARC, BOC, RCK or XCK Entry, or an Receiver the contents of the Check Serial Number
IAT Entry where the Transaction Type Code field of an ARC, BOC, or POP Entry, or an IAT
field contains a value of “ARC,” “BOC,’” or Entry where the Transaction Type Code field
“RCK,” the Check Serial Number; contains a value of “ARC,” “BOC,” or “POP,” to a
non-Consumer Account.
For an MTE, POS or SHR Entry, or an IAT
(j)
Entry where the Transaction Type Code SUBSECTION 3.1.5.3 RDFI Must Provide Payment-
field contains a value of “MTE,” “POS,” or Related Information to Receivers of CCD, CTX, CIE
“SHR,” the: and IAT Entries to Non-Consumer Accounts
Upon the request of a Receiver, an RDFI must
(i)
Terminal identification code and/or provide to the Receiver all information contained
terminal location, as those terms are within the Payment Related Information field of an
defined in Regulation E; Addenda Record(s) Transmitted with a CCD or CTX
Entry, or a CIE or IAT Entry to a non-Consumer
(ii) Terminal city, as that term is defined Account. The RDFI must provide this information
in Regulation E; and by the opening of business on the RDFI’s second
Banking Day following the Settlement Date of the
(iii) Terminal state, as that term is defined Entry.
in Regulation E;
SUBSECTION 3.1.6 RDFI Must Provide Certain
For a POP Entry, or an IAT Entry where
(k) Notices to the Receiver For Credit Entries Subject
the Transaction Type Code field contains a to Article 4A
value of “POP,” the: For a credit Entry subject to Article 4A, an RDFI
must notify the Receiver of each of the following:
(i) Check Serial Number;
(a) the Entry may be Transmitted through the
(ii) Terminal city, as that term is defined ACH;
in Regulation E; and
(b) the rights and obligations of the Receiver
(iii) Terminal state, as that term is defined concerning the Entry are governed by and
in Regulation E; construed in accordance with the laws of
the State of New York, unless the Receiver
(l) Address and telephone number to be used and the RDFI have agreed that the laws of
for inquiries or notices of errors preceded another jurisdiction govern their rights and
by “Direct Inquiries To” or similar language. obligations;
References to data elements contained in an Entry (c) credit given by the RDFI to the Receiver for
are further defined in Appendix Three (ACH Record the Entry as provided by Subsection 3.3.1
Format Specifications). The requirements of this (Availability of Credit Entries to Receivers)
subsection do not apply to a Receiver’s passbook is provisional until the RDFI has received
accounts which may not be accessed by electronic final settlement through a Federal Reserve
funds transfers other than preauthorized credit Bank or otherwise has received payment as
transfers. The requirements of this subsection provided for in Section 4A-403(a) of Article
apply regardless of whether or not Regulation E 4A;
imposes similar requirements on the RDFI.
(d) if the RDFI does not receive such payment
for the Entry, the RDFI is entitled to a
refund from the Receiver in the amount of
OR34 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
the credit to the Receiver’s account, and the under Subsection 1.2 (Participating DFIs Must
Originator will not be considered to have Comply with Rules), Subsection 3.2.1 (General
paid the amount of the credit Entry to the RDFI Warranties), or Subsection 3.4.5 (Specific
Receiver; and Warranties for RCK Entries).
(e)
these Rules do not require the RDFI to SECTION 3.3 Timing Requirements for
provide the Receiver with notice that the RDFI to Make Credit and Debit Entries
RDFI has received the Entry unless the Available
RDFI has agreed to do so.
SUBSECTION 3.3.1 Availability of Credit Entries
This notice may be included as part of an to Receivers
agreement entered into by the Receiver binding
the Receiver to these Rules, or it may be provided SUBSECTION 3.3.1.1 General Rule for Availability
to the Receiver separately. of Credits
An RDFI must make the amount of each credit
SUBSECTION 3.1.7 No RDFI Obligation to Notify Entry received from its ACH Operator available
Receiver of Receipt of Entry to the Receiver for withdrawal no later than the
An RDFI is not required to notify a Receiver of Settlement Date of the Entry, subject to its right
receipt of an Entry unless otherwise provided for to return the Entry under these Rules. An RDFI
in an agreement between the RDFI and Receiver, or that reasonably suspects that a credit Entry is
required by applicable Legal Requirements which unauthorized is exempt from this requirement,
cannot be varied by these Rules or by agreement subject to applicable Legal Requirements. An RDFI
of the parties. invoking such an exemption must promptly notify
the ODFI.
SUBSECTION 3.1.8 Authorization by RDFI for
Release of Designated Data SUBSECTION 3.3.1.2 Availability for Certain Credit
An RDFI authorizes and instructs each ACH PPD Entries
Operator to provide to the National Association For a credit PPD Entry that is made available to
Designated Data related to Entries Transmitted to the RDFI by its ACH Operator by 5:00 p.m. (RDFI’s
or by the RDFI, and will hold each ACH Operator local time) on the Banking Day prior to the
harmless against any claim by the RDFI arising Settlement Date, the RDFI must make the amount
out of the ACH Operator’s compliance with such available to the Receiver for withdrawal at the
instructions. opening of business on the Settlement Date. For
purposes of this subsection, opening of business is
SECTION 3.2 General Warranties and the later of 9:00 a.m. (RDFI’s local time) or the time
Liabilities of RDFIs the RDFI’s teller facilities (including ATMs) are
available for customer account withdrawals. An
SUBSECTION 3.2.1 General RDFI Warranties RDFI that reasonably suspects that a credit Entry
An RDFI warrants to each ODFI and ACH is unauthorized is exempt from this requirement,
Operator that it has the power under applicable subject to applicable Legal Requirements. An RDFI
Legal Requirements to receive Entries as provided invoking such an exemption must promptly notify
in these Rules. the ODFI.
SUBSECTION 3.2.2 Indemnity by the RDFI for SUBSECTION 3.3.1.3 Receiver Must Credit
Breach of Warranty Originator’s Account
An RDFI shall indemnify every ODFI and A Receiver must credit the Originator with the
ACH Operator from and against any and all amount of the Entry credited to the Receiver’s
claims, demands, losses, liabilities, or expenses, account as of the Settlement Date. The Receiver
including attorneys’ fees and costs, that result has a reasonable period of time after the Entry
directly or indirectly from any breach of warranty
2 0 1 3 O P E R AT I N G R U L E S OR35
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
is credited to the Receiver’s account to post the SUBSECTION 3.4.1.2 Rule Exception for CCD and
amount of the credit to the Originator’s account or CTX Entries to Consumer Accounts
return the Entry to the RDFI. For purposes of this The requirements of Subsection 3.1.3 (RDFI May
subsection, a Receiver is considered to act within Rely on Standard Entry Class Codes) do not apply
a reasonable period of time if the Receiver posts when CCD or CTX Entries are to a consumer
the credit or returns the Entry no later than the account.
time at which the Receiver would usually complete
the process of posting credits or returning these SUBSECTION 3.4.2 Specific Provision for
payments. A Receiver that returns an Entry DNE Entry
according to the requirements of this subsection is Receipt of a DNE Entry from a United States
not considered to have accepted the Entry. Government agency constitutes notice of death.
SUBSECTION 3.3.1.4 Credit Entries Subject to SUBSECTION 3.4.3 Specific Provisions for
Article 4A Are Provisional IAT Entries
For a credit Entry subject to Article 4A, credit
given to a Receiver by an RDFI as provided in this SUBSECTION 3.4.3.1 Rule Exception for IAT Entries
Subsection 3.3.1 (Availability of Credit Entries to The requirements of Subsection 3.8.5 (Receipt of
Receivers) is provisional until the RDFI has received Dishonored Returns) do not apply to the return of
final settlement through a Federal Reserve Bank IAT Entries.
or has otherwise received payment as provided
in Section 4A-403(a) of UCC Article 4A. If such SUBSECTION 3.4.3.2 Rule Exception for IAT Entries
settlement or payment is not received, the RDFI to Non-Consumer Accounts
is entitled to a refund from the Receiver of the The requirements of Subsection 3.1.4 (RDFI May
amount credited, and the Originator is considered Request Copy of Receiver’s Authorization of Entry
not to have paid the Receiver the amount of the from ODFI) do not apply to IAT Entries to non-
Entry. This Subsection 3.3.1.4 applies only if the Consumer Accounts.
Receiver has agreed to be bound by the Rules
contained in this Subsection 3.3.1.4. SUBSECTION 3.4.3.3 Specific Provisions for
Outbound IAT Entries
SUBSECTION 3.3.2 Timing of Debit Entries A Participating DFI acting as a Gateway assumes
An RDFI must not debit the amount of any Entry the specific responsibilities and warranties of an
to a Receiver’s account prior to the Settlement Date RDFI for each Outbound IAT Entry it Transmits.
of the Entry, even if the Effective Entry Date (as These Rules do not govern the rights and
defined in Appendix Three (ACH Record Format obligations between the Participating DFI and the
Specifications)) of the Entry is different from the foreign receiver of the Outbound IAT Entry.
Settlement Date of the Entry.
The following sections do not apply to Outbound
SECTION 3.4 Provisions for Receipt of IAT Entries:
Specific Types of Entries
(a) Subsection 3.1.4 (RDFI May Request Copy
SUBSECTION 3.4.1 Specific Provision for of Receiver’s Authorization of Entry from
CCD and CTX Entries ODFI);
OR36 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
(b)
Subsection 3.11 (RDFI Obligation to (j)
Section 3.7 (RDFI Obligation to Stop
Recredit Receiver); and Payment);
(c)
Subsection 3.13 (RDFI Right to Transmit (k)
Section 3.8 (RDFI’s Right to Transmit
Extended Return Entries) Return Entries);
2 0 1 3 O P E R AT I N G R U L E S OR37
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
SECTION 3.5 Specific Provisions for 2.10 (Reclamation Entries and Written
Prenotifications Demands for Payment) and not
returned by the RDFI; or
An RDFI that receives a Prenotification Entry
must verify that the account number contained
(ii)
a written demand for payment from
in the Prenotification is for a valid account. If
the ODFI or Originator and has a
the Prenotification does not contain a valid
reasonable opportunity to act upon
account number, or is otherwise erroneous or
such demand.
unprocessable, then the RDFI must Transmit either
(a) a Return Entry, or (b) a Notification of Change.
If the RDFI makes a payment pursuant to this
Section 3.6 that is subject to a subsequent claim of
SECTION 3.6 Specific Provisions the United States Government under 31 C.F.R. Part
for Reclamation Entries and Written 210, the RDFI is entitled to reimbursement by the
Demands for Payment Originator in accordance with Subsection 2.10.5
(Superiority of United States Government Claims).
SUBSECTION 3.6.1 RDFI Right to Debit a
Receiver’s Account with Respect to Reclamation
SUBSECTION 3.6.4 Alteration of Reclamation
Entry
Provisions by Agreement – RDFI
An RDFI may debit a Receiver’s account with
The liability provisions contained within
respect to a Reclamation Entry that meets the
this Section 3.6 may be altered, amended, or
requirements of Section 2.10 (Reclamation Entries
superseded by a written agreement between the
and Written Demands for Payment) without regard
Originator and RDFI only if the agreement clearly
to any Person other than the Receiver having an
and conspicuously states on its face that it is a
interest in the account identified in the Reclamation
master agreement, that both the Originator and
Entry.
RDFI consider it to be a master agreement, and
that it is applicable to all payments subject to
SUBSECTION 3.6.2 Liability of RDFI for
the this Section 3.6, notwithstanding any other
Reclamation Entries and Written Demands for
Payment provision of these Rules. No provision of these
Rules prevents an RDFI from expressly agreeing
An RDFI shall be liable to the Originator for the
in a master agreement that the liability provisions
amount of each Reclamation Entry or written
of this Section 3.6 may be altered, amended, or
demand for payment properly initiated by the
superseded on a Receiver-by-Receiver basis.
ODFI pursuant to Section 2.10 (Reclamation
Entries and Written Demands for Payment) unless
the Reclamation Entry or Written Demand for SECTION 3.7 RDFI Obligation to Stop
Payment is properly returned by the RDFI. Payment
SUBSECTION 3.7.1 RDFI Obligation to Stop
SUBSECTION 3.6.3 Amount of RDFI Liability for Payment of Entries to Consumer Accounts
Reclamation Entries and Written Demands for
Payment SUBSECTION 3.7.1.1 RDFI Obligation to Stop
An RDFI’s liability under Subsection 3.6.2 (Liability Payment of Recurring Entries
of RDFI for Reclamation Entries and Written An RDFI must honor a stop payment order provided
Demands for Payment) shall be the lesser of: by a Receiver, either verbally or in writing, to
the RDFI at least three Banking Days before the
(a) the amount of any payments to which the scheduled date of any debit Entry to a Consumer
Receiver was not entitled; or Account other than a Single Entry. An RDFI may
in its discretion honor such a stop payment order
(b) the amount in the Receiver’s account at the received within such three Banking Day period.
time the RDFI receives: An RDFI shall have no liability or responsibility to
any Originator, ODFI, or other Person having any
(i)
a Reclamation Entry initiated by the interest in such Entry for honoring a stop payment
ODFI in accordance with Section order in accordance with this subsection.
OR38 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
SUBSECTION 3.7.1.2 RDFI Obligation to Stop payment order prior to acting on the debit Entry.
Payment of Single Entries The RDFI must comply with a verbal stop payment
An RDFI must honor a stop payment order provided order only for a period of fourteen calendar days
by a Receiver, either verbally or in writing, to the unless the order is confirmed in writing within
RDFI at such time and in such manner as to allow that fourteen-day period. A written stop payment
the RDFI a reasonable opportunity to act upon the order regarding any debit Entry initiated or to be
order prior to acting on an ARC, BOC, POP, or RCK initiated to a non-Consumer Account will remain
Entry, or a Single Entry IAT, PPD, TEL, or WEB in effect for six months unless it is renewed in
Entry to a Consumer Account. writing.
SUBSECTION 3.7.1.3 RDFI May Require Written SECTION 3.8 RDFI’s Right to Transmit
Confirmation of Stop Payment Orders Return Entries
An RDFI may require written confirmation of a An RDFI may return an Entry for any reason,
verbal stop payment order under this Subsection except as otherwise provided for in Subsection
3.7.1 within fourteen days of the verbal stop 3.8.1 (Restrictions on RDFI’s Right to Transmit
payment order, provided that the RDFI notifies Return Entries). An RDFI must comply with the
the Receiver of this requirement and provides an requirements of Appendix Four (Return Entries)
address to which the written confirmation should for each Return Entry it initiates.
be sent at the time the verbal order is provided. If
the RDFI requires written confirmation, the verbal An RDFI must Transmit a Return Entry to its ACH
stop payment order will cease to be binding after Operator by the ACH Operator’s deposit deadline
fourteen days. for the Return Entry to be made available to the
ODFI no later than the opening of business on
For an order to stop all future payments relating the second Banking Day following the Settlement
to a specific authorization involving a specific Date of the original Entry, except as otherwise
Originator, an RDFI may require a Receiver to provided in Subsection 3.8.3 (Exceptions to Timing
confirm in writing that the Receiver has revoked Requirements for Return Entries) and Section
the authorization given to the Originator. 3.13 (RDFI Right to Transmit Extended Return
Entries). A Return Entry which is rejected by an
SUBSECTION 3.7.1.4 Effective Period of Stop ACH Operator does not satisfy or extend the timing
Payment Orders requirements contained in this Section 3.8.
A stop payment order will remain in effect until
the earlier of: SUBSECTION 3.8.1 Restrictions on RDFI’s Right
to Transmit Return Entries
(a) the withdrawal of the stop payment order
by the Receiver; or SUBSECTION 3.8.1.1 RDFI May Not Return an
Entry Due to the Type of Entry
(b)
the return of the debit Entry, or, where An RDFI may not return an Entry because it is a
a stop payment order applies to more particular type of Entry, unless expressly provided
than one debit Entry relating to a for in Subsection 3.8.2 (Exceptions to Restrictions
specific authorization involving a specific on RDFI’s Right to Transmit Return Entries).
Originator, the return of all such debit
Entries. SUBSECTION 3.8.1.2 RDFI May Not Return an
Entry Based on MICR Data
SUBSECTION 3.7.2 RDFI Obligation to Stop An RDFI may not return an Entry to a Transaction
Payment of Entries to Non-Consumer Accounts Account based exclusively on data which were
An RDFI must honor a stop payment order regarding accurately obtained from the on-us field of the
any debit Entry initiated or to be initiated to a non- MICR line of a Check for the account, unless the
Consumer Account that is provided by a Receiver RDFI had previously initiated a Notification of
at such time and in such manner as to allow the Change that was not properly acted upon.
RDFI a reasonable opportunity to act upon the stop
2 0 1 3 O P E R AT I N G R U L E S OR39
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
OR40 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
the dishonored Return Entry and must ensure (b) the COR Entry is Transmitted within two
the corrected Return Entry otherwise complies Banking Days of the Settlement Date of the
with the requirements of Appendix Four (Return Entry to which the Notification of Change
Entries). The RDFI must Transmit the corrected relates, except for Notifications of Change
Return Entry to its ACH Operator within two due to merger, acquisition, or other similar
Banking Days after the Settlement Date of the events.
dishonored Return Entry.
SUBSECTION 3.9.2 RDFI May Correct a Refused
SUBSECTION 3.8.5.2 RDFI May Contest Notification of Change
Dishonored Returns If a COR Entry is refused by the ODFI, an RDFI may
An RDFI may Transmit a contested dishonored transmit a corrected COR Entry to the Receiving
Return Entry that corresponds to the reason for ACH Operator within five Banking Days after the
the dishonored Return Entry if: Settlement Date of the refused COR Entry.
(a)
the original Return Entry was, in fact, SUBSECTION 3.9.3 RDFI Warranties for
returned within the time limits established Notifications of Change
by these Rules; In addition to the other warranties contained in
these Rules, an RDFI that transmits a COR Entry,
(b)
the original Return Entry was not a including a corrected COR Entry, warrants to each
duplicate Entry; ODFI and ACH Operator that:
(c) the original Return Entry was complete and (a) the information contained within the COR
contained no errors; or Entry or corrected COR Entry is correct;
and
(d) the dishonored Return Entry was misrouted
or untimely. (b)
if the change relates to the Receiver’s
account number, the Receiver has
The RDFI must Transmit a contested dishonored authorized the change, if authorization is
Return Entry to the ACH Operator within two required, and the RDFI has complied with
Banking Days after the Settlement Date of the any applicable Legal Requirements for
dishonored Return Entry and must ensure the such authorization.
contested dishonored Return Entry otherwise
complies with the requirements of Appendix Four The RDFI’s warranty supersedes and renders
(Return Entries). inoperative any similar warranty (but not any
other warranty) of the ODFI contained within
SECTION 3.9 Notification of Change Subsection 2.4.1 (General ODFI Warranties).
by RDFIs
SUBSECTION 3.9.4 Indemnity by RDFI for Breach
SUBSECTION 3.9.1 General Rule for Notification of Notification of Change Warranties
of Change (COR Entry)
An RDFI shall indemnify every ODFI and ACH
An RDFI may Transmit a Notification of Change Operator from and against any and all claims,
(also known as a COR Entry) to its ACH Operator demands, losses, liabilities, or expenses, including
provided that: attorneys’ fees and costs that result directly or
indirectly from any breach of the warranties
(a)
the COR Entry complies with the contained in Subsection 3.9.3 (RDFI Warranties for
requirements of Appendix Five (Notification Notifications of Change).
of Change); and
2 0 1 3 O P E R AT I N G R U L E S OR41
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
SECTION 3.10 Specific Provisions for accordance with Section 3.12 (Written Statement
Acknowledgment (ACK and ATX) Entries of Unauthorized Debit), and such notification is
received within fifteen calendar days from the date
An RDFI that receives a credit CCD or CTX Entry
the RDFI sends or makes available to the Receiver
may Transmit an ACK or ATX Entry, respectively,
information related to the debit Entry in accordance
complying with the requirements of Appendix Six
with Subsection 3.1.5 (RDFI Obligation to Provide
(Acknowledgment Entries), to its ACH Operator
Information About Entries).
for Transmittal to the appropriate ODFI. The RDFI
must Transmit the ACK or ATX Entry to its ACH
u The RDFI’s obligation to recredit the Receiver’s
Operator by the ACH Operator’s deposit deadline
account for a debit Entry that is part of an
for the ACK or ATX Entry to be made available to
Incomplete Transaction does not apply when a
the ODFI no later than the opening of business on
partial or erroneous payment was made to the
the second Banking Day following the Settlement
intended third-party payee on the Receiver’s behalf.
Date of the CCD or CTX Entry to which the ACK
or ATX Entry relates.
SUBSECTION 3.11.2 RDFI Specific Obligations to
Recredit Accounts for ARC, BOC, POP, RCK and
SECTION 3.11 RDFI Obligation to IAT Debit Entries
Recredit Receiver
An RDFI must recredit the accountholder for SUBSECTION 3.11.2.1 RDFI Obligation to Recredit
Non-Consumer Accounts for ARC, BOC and
a debit Entry that was, in whole or in part, not
POP Entries
properly authorized under these Rules, as required
by these Rules, applicable Legal Requirements, An RDFI must promptly recredit the amount of
or agreement between the RDFI and the account an ARC, BOC, or POP Entry to a non-Consumer
holder. This recredit requirement does not Account of a Receiver if it receives notification
apply if the accountholder is a Receiver that has from the Receiver in accordance with Section 3.12
waived any right to recredit in accordance with (Written Statement of Unauthorized Debit), and
the requirements of Subsection 3.11.4 (Receiver’s such notification is received within fifteen calendar
Waiver of RDFI’s Recredit Obligation). days from the date the RDFI sends or makes
available to the Receiver information related to the
uAn RDFI must recredit the accountholder to the debit Entry in accordance with Subsection 3.1.5
extent provided in this Section 3.11 for (a) a debit (RDFI Obligation to Provide Information About
Entry that was, in whole or in part, not properly Entries).
authorized under these Rules, as required by these
Rules, applicable Legal Requirements, or agreement SUBSECTION 3.11.2.2 RDFI Obligation to Recredit
between the RDFI and the account holder; and for ARC, BOC and RCK Entries Regarding Stop
Payment Orders
(b) a debit Entry to a Receiver’s account that is
part of an Incomplete Transaction. This recredit An RDFI must promptly recredit the amount of
requirement does not apply if the accountholder an ARC, BOC, or RCK Entry to the account of a
is a Receiver that has waived any right to recredit Receiver if, at the time that any such Entry was
in accordance with the requirements of Subsection paid by the RDFI, a stop payment order was in
3.11.4 (Receiver’s Waiver of RDFI’s Recredit force with respect to (a) the Check that was used
Obligation). as an Eligible Source Document for the ARC or
BOC Entry, or (b) the item to which the RCK Entry
SUBSECTION 3.11.1 RDFI General Obligation to relates. The RDFI is not required to obtain a
Recredit Consumer Accounts Written Statement of Unauthorized Debit.
An RDFI must promptly recredit the amount of a
debit Entry to a Consumer Account of a Receiver, SUBSECTION 3.11.2.3 RDFI Obligation to Recredit
for Debit IAT Entries
regardless of the SEC Code of the debit Entry,
if it receives notification from the Receiver in An RDFI must promptly recredit the amount of
a debit IAT Entry to the account of a Receiver
OR42 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
if it receives notification from the Receiver in Except for waivers and exclusions complying
conformance with Section 3.12 (Written Statement with the requirements of this subsection, an
of Unauthorized Debit), and such notification is RDFI may not act on any other purported waiver
received within fifteen calendar days from the of any obligation under these Rules to recredit
date the RDFI sends or makes available to the a Receiver’s account for unauthorized debits. If
Receiver information related to the debit Entry in an Originator delivers a waiver, with a copy, to
accordance with Subsection 3.1.5 (RDFI Obligation the RDFI, the RDFI must acknowledge receipt on
to Provide Information About Entries). An RDFI the copy of the waiver and promptly deliver or
may not recredit a Receiver’s account if doing so provide that copy to the Originator if requested by
is inconsistent with U.S. Legal Requirements, as the Originator in writing.
provided in Subsection 1.2.1 (Effect of Illegality).
SECTION 3.12 Written Statement of
SUBSECTION 3.11.3 RDFI’s Recredit Obligation Unauthorized Debit
Not Exclusive
An RDFI’s obligation to recredit a Receiver under SUBSECTION 3.12.1 Unauthorized Debit Entry
this Section 3.11 is in addition to any other For purposes of this Section 3.12, a debit Entry
obligation provided under Regulation E of the was not authorized by the Receiver if:
Board of Governors of the Federal Reserve System
or other applicable Legal Requirements. (a) the authorization requirements of Section
2.3 (Authorization and Notice of Entries)
SUBSECTION 3.11.4 Receiver’s Waiver of RDFI’s were not met;
Recredit Obligation
An RDFI shall have no obligation to recredit a (b) the debit Entry was initiated in an amount
Receiver if it has received a waiver signed by the different than that authorized by the
Receiver, and complying with the requirement Receiver; or
of this subsection, in sufficient time and in such
manner for the RDFI to reasonably act on it, subject (c) the debit Entry was initiated for settlement
to Legal Requirements. Such a waiver with respect earlier than authorized by the Receiver.
to one or more specific debit Entries initiated to
the Receiver’s account must: An unauthorized debit Entry does not include a
debit Entry initiated with fraudulent intent by the
(a)
be in writing in a document entitled Receiver or any Person acting in concert with the
“WAIVER WITH RESPECT TO PRE- Receiver.
ARRANGED DEBIT”;
SUBSECTION 3.12.2 Improper ARC, BOC, POP
(b) specify the amount of each Entry to which and RCK Debit Entries
the waiver applies; For purposes of this Section 3.12, a debit Entry
was improper if it was:
(c)
specify the approximate date on which
each Entry was initiated by the Originator; (a) an ARC, BOC or POP Entry for which:
2 0 1 3 O P E R AT I N G R U L E S OR43
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
(i)
notice was not provided by the SUBSECTION 3.12.4 RDFI Must Accept Written
Originator in accordance with Statement of Unauthorized Debit
Subsection 2.5.1.2 (Authorization An RDFI must accept a Written Statement of
of ARC Entries by Notification) or Unauthorized Debit from a Receiver with respect
Subsection 2.5.2.2 (Authorization to any:
of BOC Entries by Notification), as
applicable; or (a) unauthorized or improper debit Entry to a
Consumer Account;
(ii)
the amount of the Entry was not
accurately obtained from the Eligible (b) any unauthorized or improper ARC, BOC,
Source Document; or POP Entry to a non-Consumer Account;
and
(c) an RCK Entry for which:
(c) any unauthorized IAT Entry.
(i)
notice stating the terms of the RCK
Entry policy was not provided by u (a) unauthorized or improper debit Entry to a
the Originator in accordance with Consumer Account;
Subsection 2.5.13.2 (Authorization of
RCK Entries by Notification); (b)
unauthorized or improper ARC, BOC, or
POP Entry to a non-Consumer Account;
(ii)
the item to which the RCK Entry
relates is not an eligible item; (c) unauthorized IAT Entry; and
u SUBSECTION 3.12.3 Incomplete Transaction (e) Receiver’s printed name and signature;
For purposes of this Section 3.12, a transaction is
an Incomplete Transaction if it involves a debit (f) Receiver’s account number;
Entry authorized by a Receiver for the purpose of
(g)
Identity of the party (i.e., the payee)
funding a corresponding payment to a third-party
debiting the account, as provided to the
payee, but the Originator, Third-Party Sender or
Receiver;
ODFI of the debit Entry failed to make or complete
the corresponding payment to the intended third-
u (g) Identity of the party (i.e., the payee) debiting
party payee. An Incomplete Transaction does not
the account, as provided to the Receiver,
include a partial or erroneous payment made to
and, if different, the name of the intended
the intended third-party payee.
third-party payee;
OR44 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE THREE – Rights and Responsibilities of RDFIs and Their Receivers
(h) Date the Entry was posted to the account; SECTION 3.13 RDFI Right to Transmit
Extended Return Entries
(i) Dollar amount of Entry;
SUBSECTION 3.13.1 RDFI May Transmit
(j) Reason for return; Extended Return Entries
An RDFI may Transmit an Extended Return
(k) Signature date; Entry with respect to any debit Entry for which
it recredits a Receiver’s account in accordance
(l)
Receiver assertion that the Written
with Section 3.11 (RDFI Obligation to Recredit
Statement of Unauthorized Debit is true
Receiver), provided that:
and correct; and
(a)
no error was made by the RDFI in the
(m)
Receiver assertion that the Receiver is
debiting of the original Entry to the
an authorized signer or has corporate
Receiver’s account, except with respect to
authority to act on the account.
a stop payment order; and
The Written Statement of Unauthorized Debit must
(b)
the RDFI Transmits the Extended Return
be dated on or after the Settlement Date of the
Entry to its ACH Operator by its deposit
Entry(ies) for which recredit is requested.
deadline for the Extended Return Entry to
More than one unauthorized debit Entry from a be made available to the ODFI no later than
single Originator may be documented on a Written the opening of business on the Banking
Statement of Unauthorized Debit, provided that all Day following the sixtieth calendar day
of the information detailed above is provided for following the Settlement Date of the
each debit Entry for which the Receiver is seeking original Entry.
recredit.
The Extended Return Entry must comply with the
requirements of Appendix Four (Return Entries).
SUBSECTION 3.12.5 Retention of Written
Statement of Unauthorized Debit
SUBSECTION 3.13.2 RDFI Warranty for Extended
An RDFI must retain the original or a reproducible
Return Entries
copy of each Written Statement of Unauthorized
In addition to the other warranties contained in
Debit for at least one year from the Settlement Date
these Rules, an RDFI Transmitting an Extended
of the Extended Return Entry(ies) to which the
Return Entry in accordance with this Section
Written Statement of Unauthorized Debit relates.
3.13 warrants to each ODFI, ACH Operator, and
Gateway that, prior to initiating the Extended
SUBSECTION 3.12.6 Copy of Written Statement
of Unauthorized Debit Return Entry, the RDFI obtained from the Receiver
a Written Statement of Unauthorized Debit
An RDFI Transmitting an Extended Return Entry as
complying with Section 3.12 (Written Statement of
provided in Section 3.13 (RDFI Right to Transmit
Unauthorized Debit). This Subsection 3.13.2 does
Extended Return Entries) must provide to an ODFI
not apply to Extended Return Entries related to an
a copy of the Written Statement of Unauthorized
RDFI’s recredit obligation in Subsection 3.11.2.2
Debit obtained from the Receiver in accordance
(RDFI Obligation to Recredit for ARC, BOC and
with this Section 3.12 within ten Banking Days
RCK Entries Regarding Stop Payment Orders).
after receiving a written request from the ODFI,
provided that such request is received by the RDFI
SUBSECTION 3.13.3 Indemnity of RDFI for
within one year of the date of the initiation of the
Breach of Extended Return Entries Warranty
Extended Return Entry.
An RDFI shall indemnify every ODFI, ACH
Operator, and Gateway from and against any
and all claims, demands, losses, liabilities, or
2 0 1 3 O P E R AT I N G R U L E S OR45
ARTICLE FOUR – Rights and Responsibilities of ACH Operators
expenses, including attorneys’ fees and costs, SUBSECTION 4.1.4 ACH Operator Must Conduct
resulting directly or indirectly from the breach of Risk Management
the warranty contained in Subsection 3.13.2 (RDFI An ACH Operator must evaluate the credit-
Warranty for Extended Return Entries). worthiness of, and apply risk control measures to,
each of its Participating DFIs.
SUBSECTION 4.1.1 ACH Operator Must Enter SUBSECTION 4.1.7 ACH Operator Must Allow
Agreement with National Association Inter-Operator Exchanges
An ACH Operator that is not a Federal Reserve An ACH Operator must exchange Files and Entries
Bank must execute an agreement annually with with all other ACH Operators.
the National Association in which the ACH
Operator agrees to perform all the functions of an SECTION 4.2 Processing Obligations of
ACH Operator and comply with all the obligations ACH Operators
of an ACH Operator described in these Rules.
An ACH Operator must promptly process and edit
Files and Entries in accordance with these Rules.
SUBSECTION 4.1.2 ACH Operator Must Comply
With the Rules
SUBSECTION 4.2.1 Settlement Date
An ACH Operator must comply with these Rules
(except to the extent that the Rules are inconsistent A Receiving ACH Operator must insert the
with the policies or practices of the Federal Reserve appropriate Settlement Date.
Banks) and applicable Legal Requirements.
SUBSECTION 4.2.2 Return or Rejection
SUBSECTION 4.1.3 ACH Operator Must Enter An ACH Operator must return any Entry that does
Agreements with Participating DFIs not meet the acceptance criteria of Appendix
An ACH Operator must execute agreements with Two (Specifications for Data Acceptance by ACH
a minimum of twenty independent Participating Operators), or reject the entire batch or File
DFIs (not owned or controlled by the same containing such Entry.
holding company) that bind them to the ACH
Operator’s rules and these Rules, provided that an SUBSECTION 4.2.3 Timely Delivery
ACH Operator that is a Federal Reserve Bank is An ACH Operator must Transmit or otherwise
not required to bind a Participating DFI to any make available Entries to the appropriate ACH
provision of these Rules that is not incorporated Operator or Participating DFI in accordance with
by the Federal Reserve Banks Operating Circular 4 agreed upon processing and delivery schedules.
on Automated Clearing House Items.
SUBSECTION 4.2.4 File Repair – Other ACH
Operator
An Originating ACH Operator must remake any File
rejected by another ACH Operator in accordance
with Subsection 4.2.2 (Return or Rejection).
OR46 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE FOUR – Rights and Responsibilities of ACH Operators
SUBSECTION 4.2.5 File Repair – RDFI SUBSECTION 4.3.3 Time Limitations on Initiation
A Receiving ACH Operator must remake any File of Reversing Files
rejected by an RDFI. An ACH Operator must Transmit each Reversing
File and, if applicable, a corresponding Correcting
SUBSECTION 4.2.6 Return and Rejection of TRC File, within twenty-four hours of the discovery of
Entries or TRX Entries the duplication or error, and also in time to be
An Originating ACH Operator must reject any Transmitted to the RDFI within five Banking Days
batch of Entries identified by the TRC or TRX after the Settlement Date of the Erroneous File.
Standard Entry Class Code that is not originated
by an ODFI that is a participant in a Check SUBSECTION 4.3.4 Notification by ACH Operator
Truncation Program and must promptly notify the of Reversing Files
ODFI of such action. A Receiving ACH Operator A Receiving ACH Operator initiating a Reversing
must return any Entry identified by the TRC or File must notify each Originating ACH Operator
TRX Standard Entry Class Code if the RDFI is directly concerned of the duplication or error at or
not a Check Truncation Program participant. An prior to the time of initiation of the Reversing File.
ACH Operator must determine whether an ODFI An Originating ACH Operator initiating a Reversing
or RDFI is a participant in a Check Truncation File must notify each ODFI directly concerned of
Program solely from the information provided to the duplication or error at or prior to the time of
the ACH Operator by the administrator of each initiation of the Reversing File.
Check Truncation Program.
SUBSECTION 4.3.5 Indemnification for
SUBSECTION 4.2.7 Debit and Credit Totals Reversing Files
An ACH Operator must total the debit and credit An ACH Operator that initiates a Reversing File or
activity received from and Transmitted to each Correcting File shall indemnify each Participating
other ACH Operator and Participating DFI during DFI and ACH Operator from and against any and all
each Banking Day. claims, demands, losses, liabilities, and expenses,
including attorneys’ fees and costs, that result
SUBSECTION 4.2.8 Calculation of Settlement directly or indirectly from the debiting or crediting
Amounts of any Entry in the Reversing File or corresponding
An ACH Operator must calculate the settlement Correcting File to the Receiver’s account.
amounts for each Banking Day for all Entries
processed under these Rules. SECTION 4.4 ACH Operator Not Agent of
Participating DFI
SECTION 4.3 Reversing Files An ACH Operator is not an agent of a Participating
DFI. For a credit Entry subject to Article 4A, where
SUBSECTION 4.3.1 General Rule for Reversing the terms of the Entry originated by the ODFI differ
Files
from the terms of the Entry received by the RDFI,
An ACH Operator may initiate a Reversing File the ODFI is obligated for the Entry it originated.
if it has mistakenly initiated an Erroneous File. This section does not affect the liability of an ACH
A Reversing File must reverse all Entries of an Operator as otherwise provided in these Rules.
Erroneous File.
SECTION 4.5 ACH Operator Must Retain
SUBSECTION 4.3.2 Obligation to Initiate Records of Entries
Correcting Files Corresponding to Reversing
Files An ACH Operator must retain a Record of all
An ACH Operator initiating a Reversing File to Entries, Return Entries, and Extended Return
correct an Erroneous File must concurrently Entries received or Transmitted by it for one
Transmit a Correcting File corresponding to the year from the date the Entry was received or
Erroneous File, unless the Erroneous File was a Transmitted. The ACH Operator must provide a
duplicate. printout or other reproduction of the information
2 0 1 3 O P E R AT I N G R U L E S OR47
A R T I C L E F I V E – R i g h t s a n d R e s p o n s i b i l i t i e s o f G a t e w a y s f o r I AT E n t r i e s
OR48 2 0 1 3 O P E R AT I N G R U L E S
A R T I C L E F I V E – R i g h t s a n d R e s p o n s i b i l i t i e s o f G a t e w a y s f o r I AT E n t r i e s
information from the payment transaction within SUBSECTION 5.1.6 Gateway Action on Receipt of
five banking days of blocking or rejecting the Notification of Change (NOC) Related to Inbound
payment transaction: IAT Entries
A Gateway must provide any corrected data
• the names and complete addresses of all contained within an NOC related to an Inbound
parties to the payment transaction; IAT Entry to the Foreign Gateway within two
banking days of the Settlement Date of the NOC.
• the amount of the payment transaction; and
SUBSECTION 5.1.7 ACH Operator May Not
• the date of the payment transaction. Process Debit Inbound IAT Entries
An ACH Operator acting as a Gateway must not
SUBSECTION 5.1.4 Gateway Must Obtain process debit Inbound IAT Entries, except for
Authorization from ODFI or Gateway’s Customer Reversing Entries.
A Gateway must obtain authorization from either
(i) an ODFI or (ii) a customer of the Gateway SECTION 5.2 Warranties of Gateway
that instructs the Gateway to receive Outbound
IAT Entries on its behalf for re-Transmission to a SUBSECTION 5.2.1 Warranties for Outbound
foreign country to: IAT Entries
A Gateway that Transmits an Outbound IAT Entry
(a)
Transmit such ODFI’s or customer’s warrants to the ODFI and each ACH Operator
Outbound IAT Entries to a Foreign Gateway; of the Entry that it has edited and processed the
Entry in accordance with the requirements of
(b) arrange for settlement of such Entries with these Rules.
the Foreign Gateway; and
SUBSECTION 5.2.2 Warranties for Inbound
(c)
arrange for further Transmission of such IAT Entries
Entries to the “foreign RDFI” and settlement A Gateway that Transmits an Inbound IAT Entry
of the amount of such Entries to or from warrants to the RDFI and each ACH Operator of
the “foreign Receiver’s” account. the Entry that it has edited and processed the
Entry in accordance with these Rules.
For purposes of this subsection, the references to
the terms “foreign RDFI” and “foreign Receiver”
are intended to refer to foreign Persons that
SECTION 5.3 Gateway Assumes
perform substantially similar functions as RDFIs Obligations of Other Participants
and Receivers, respectively, and are not intended A Participating DFI acting as a Gateway assumes
to confer any of the rights and responsibilities the specific responsibilities and warranties of
assigned to RDFIs and Receivers under these Rules. an ODFI set forth in Article Two (Rights and
Responsibilities of ODFIs, Their Originators and
SUBSECTION 5.1.5 Gateway Obligation to Third-Party Senders) for each Inbound IAT Entry
Transmit Return Entries for Outbound IAT Entries it processes. Each Participating DFI acting as a
Returned by Foreign Gateway Gateway assumes the specific responsibilities
A Gateway must Transmit a Return Entry for any and warranties of an RDFI set forth in Article
Outbound IAT Entry that is returned to it by the Three (Rights and Responsibilities of RDFIs and
Foreign Gateway in accordance with the foreign Their Receivers) for each Outbound IAT Entry it
law or foreign payment system rules by which the Transmits.
Gateway is bound. The Gateway must Transmit
such a Return Entry in such a time and manner as
to be made available to the ODFI no later than the
opening of business on the second Banking Day
after the Gateway’s receipt of the valid return from
the Foreign Gateway.
2 0 1 3 O P E R AT I N G R U L E S OR49
ARTICLE SIX – Rights and Responsibilities of the National Association
(c)
to the National Association’s Board of
ARTICLE SIX Directors, committees, employees, agents,
contractors, and Associations in connection
Rights and with a permitted use under Subsection
6.1.1 (Use of Designated Data), provided
Responsibilities that such disclosure is limited to the type,
amount, and elements of Designated Data
of the National that are necessary for such Person(s)
to perform their respective designated
Association functions;
(d)
to the extent otherwise permitted by
SECTION 6.1 Use and Disclosure applicable Legal Requirements, including
of Designated Data by the National the Federal Right to Financial Privacy Act
Association and Title V of the Gramm-Leach-Bliley
Act, to a financial institution regulatory
SUBSECTION 6.1.1 Use of Designated Data agency with authority with respect to a
The National Association may use Designated Data Participating DFI to which Designated
solely for the following purposes: Data relate;
(a)
to the ACH Operator from which the (b)
protect against any anticipated threats
Designated Data were obtained; or hazards to the security or integrity of
Designated Data;
(b)
to any Participating DFI involved in an
Entry to which Designated Data relate;
OR50 2 0 1 3 O P E R AT I N G R U L E S
ARTICLE SEVEN – Settlement
(c) protect against unauthorized access to or directly or indirectly from the breach of the
use of Designated Data that could result in National Association’s obligations under Section
substantial harm to any such Participating 6.1 (Use and Disclosure of Designated Data by the
DFI, Originator, or Receiver; and National Association).
(d) ensure the proper disposal of Designated SECTION 6.3 Limitation of Liability
Data.
Notwithstanding any other provision of these
Rules, no ACH Operator or Participating DFI shall
SUBSECTION 6.1.4.2 National Association Must
Comply with Data Breach Policy
have any liability for the acts or omissions of the
National Association, its employees, agents, or
The National Association must comply with
contractors with respect to Designated Data.
the Interim Policy on Data Breach Notification
Requirements, and any revision or replacement
thereof, to the same extent as an ODFI in
possession of Designated Data. ARTICLE SEVEN
SUBSECTION 6.1.4.3 National Association Must Settlement
Comply with Privacy Laws
The National Association must comply with all
applicable Legal Requirements governing the SECTION 7.1 Maintenance of Reserve
confidentiality and security of Designated Data. Bank Accounts
To the extent such Legal Requirements require A Participating DFI must maintain, or have the
the National Association to respond to or provide use through a correspondent of, an account with a
notice to Originators or Receivers about a data Federal Reserve Bank.
security or data privacy breach with respect to
Designated Data in the control of the National
SECTION 7.2 ACH Operators Establish
Association, the National Association is solely
Settlement Procedures
responsible for providing the response or notice,
provided that the National Association coordinates An ACH Operator is responsible for establishing
with the affected Participating DFI. The ACH the procedures under which Entries are settled
Operators have no responsibility or liability with and settlement balances are to be adjusted.
respect to any data security or data privacy breach
related to Designated Data in the control of the SECTION 7.3 Settlement
National Association. An ACH Operator is responsible for effecting
settlement among Participating DFIs for all Entries
SUBSECTION 6.1.5 Other Data Transmitted in accordance with these Rules by
Nothing in this Section 6.1 affects the National crediting and debiting the Participating DFIs’, or
Association’s rights or obligations with respect their designated correspondents’, accounts with
to information or data other than Designated the Federal Reserve Banks. An ACH Operator must
Data it receives in accordance with Section 4.6 effect settlement of Entries in accordance with
(Requirement to Provide Designated Data to these Rules, applicable operating circulars of the
National Association). Federal Reserve Banks, and any other applicable
agreements.
SECTION 6.2 Indemnity by National
Association of ACH Operators SECTION 7.4 Effect of Settlement
The National Association shall indemnify each Settlement of Entries does not preclude a
ACH Operator from and against any and all Participating DFI from pursuing any available
claims, demands, losses, liabilities, and expenses, legal rights or remedies, including any right or
including attorneys’ fees and costs, that result
2 0 1 3 O P E R AT I N G R U L E S OR51
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
remedy arising out of a Return Entry or Extended for which the RDFI cannot complete settlement.
Return Entry Transmitted after the time frames An ODFI must accept a Return Entry from an ACH
established by these Rules. Operator relating to a Non-Settled Entry and may
not dishonor that Return Entry. The ODFI may not
SECTION 7.5 Accountability for Entries reinitiate a Non-Settled Entry.
An RDFI is accountable for the amount of all debit
SUBSECTION 7.8.2 ACH Operator Must Reverse
Entries received that are not returned in accordance
Entries Received from an ODFI that Cannot Settle
with these Rules, except as provided for in Section
An ACH Operator must create and Transmit to
3.13 (RDFI Right to Transmit Extended Return
the RDFI a Reversing Entry complying with the
Entries), regardless of whether the ODFI complies
requirements of Appendix Three (ACH Record
with the provisions of Subsection 2.12.5 (Dishonor
Format Specifications) for each debit or credit
of Return Entries). This Section 7.5 does not apply
Entry Transmitted to an RDFI for which the ODFI
to Outbound IAT Entries, TRC Entries, and TRX
cannot complete settlement. An RDFI must accept
Entries.
a Reversing Entry from an ACH Operator relating
to a Non-Settled Entry and may not return that
SECTION 7.6 Effect of RDFI Closing on Reversing Entry.
Settlement Date
If the scheduled Settlement Date of a debit Entry
is not a Banking Day for an RDFI but is a day on
which the applicable office of the Federal Reserve
ARTICLE EIGHT
Bank described in Section 7.1 (Maintenance of
Reserve Bank Accounts) is open, settlement will
Definitions of Terms
occur on the scheduled Settlement Date, unless
the RDFI has previously advised the Federal
Used in These Rules
Reserve Bank that settlement for the Entry should
be deferred until the RDFI’s next Banking Day. If
SECTION 8.1 “Accounts Receivable
the RDFI has provided such notice to the Federal
Reserve Bank, settlement for the debit Entry will
Entry” or “ARC Entry” or “ARC”
occur on the RDFI’s next Banking Day, and the a Single Entry debit initiated by an Originator to
RDFI must pay the float charge assessed by the the account of a Receiver based on an Eligible
Federal Reserve Bank. Source Document provided to the Originator by
the Receiver (1) via U.S. mail or delivery service,
SECTION 7.7 Effect of ODFI Closing on (2) at a dropbox location, or (3) in person for
Settlement Date payment of a bill at a manned location.
OR52 2 0 1 3 O P E R AT I N G R U L E S
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
2 0 1 3 O P E R AT I N G R U L E S OR53
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
SECTION 8.18 “Consumer Account” of the Receiver; and (c) data requested by NACHA
to investigate and respond to a specific incident
an account held by a Participating DFI and
involving potential violation of these Rules or risk
established by a natural person primarily for
to Participating DFIs, Originators, or Receivers.
personal, family or household use and not for
The term “Designated Data” does not include
commercial purposes.
the Participating DFI account number, individual
name, and individual identification number fields
SECTION 8.19 “Corporate Credit or of Entry detail Records.
Debit Entry” or “CCD Entry” or “CCD”
a credit Entry, a debit Entry, or a Non-Monetary SECTION 8.25 “Destroyed Check Entry”
Entry originated by an Organization to or from or “XCK Entry” or “XCK”
the account of that Organization or another
a debit Entry initiated with respect to an item
Organization.
described in Subsection 2.5.18.2 (XCK Eligible
Items).
SECTION 8.20 “Corporate Trade
Exchange Entry” or “CTX Entry” or
SECTION 8.26 “Direct Access”
“CTX”
a situation in which an Originator, Third-Party
a credit Entry, debit Entry or Non-Monetary
Sender, or a Third-Party Service Provider Transmits
Entry originated by an Organization to or from
credit or debit Entries directly to an ACH Operator
the account of that Organization or another
using an ODFI’s routing number and settlement
Organization and accompanied by one or more
account.
Addenda Records, up to a maximum of 9,999.
OR54 2 0 1 3 O P E R AT I N G R U L E S
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
2 0 1 3 O P E R AT I N G R U L E S OR55
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
SECTION 8.35 “Erroneous File” point from a country other than the United States
for payment transactions. Also known as a “Foreign
a File that is a duplicate of a previously submitted
Gateway Operator” or “FGO.”
File, or a File in which each Entry, or each Entry in
one or more batches contained in such File, is an
Erroneous Entry. SECTION 8.42 “Gateway”
an ACH Operator or a Participating DFI that acts
SECTION 8.36 “Existing Relationship” as an entry point to or exit point from the United
States for ACH payment transactions. Also known
any point in time that: (a) a written agreement
as a “Gateway Operator” or “GO.”
between an Originator and a Receiver is in effect;
or (b) the Receiver has purchased goods or
services from the Originator within the two-year SECTION 8.43 “Herein”, “Hereinafter”,
period immediately preceding such point in time. “Hereof” or any other similar term
whether capitalized or not, as used in these Rules
SECTION 8.37 “Extended Return Entry” refer to the entire Rules and not to any particular
an Entry initiated by an RDFI in accordance with section or subsection of these Rules.
Section 3.13 (RDFI Right to Transmit Extended
Return Entries) that returns a previously originated SECTION 8.44 “Inbound IAT Entry”
debit Entry to an ODFI. An Extended Return Entry an IAT Entry that originates in a country other
must comply with the requirements of Appendix than the United States and is Transmitted to the
Four (Return Entries). United States.
OR56 2 0 1 3 O P E R AT I N G R U L E S
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
that is credited or debited as part of the payment SECTION 8.53 “Non-Monetary Entry”
transaction, (b) receives payment directly from a
any notice or data complying with the requirements
Person or makes payment directly to a Person as
of Appendix Three (ACH Record Format
part of the payment transaction, or (c) serves as an
Specifications) that is not an order or request for
intermediary in the settlement of any part of the
the transfer or withdrawal of funds.
payment transaction.
SECTION 8.54 “Non-Settled Entry”
SECTION 8.48 “Internet-Initiated/Mobile
Entry” or “WEB Entry” or “WEB” a credit or debit Entry for which settlement cannot
be completed.
a debit Entry initiated by an Originator to a
Consumer Account of the Receiver based on (1)
an authorization that is communicated, other than
SECTION 8.55 “Notification of Change”
by an oral communication, from the Receiver
or “NOC” or “COR Entry” or “COR”
to the Originator via the Internet or a Wireless a Non-Monetary Entry Transmitted by an RDFI for
Network, or (2) any form of authorization if the purpose of identifying incorrect information
the Receiver’s instruction for the initiation of contained within an Entry and providing correct
the individual debit Entry is designed by the data to be used on future Entries. An NOC is also
Originator to be communicated, other than by known by the SEC Code “COR.” The SEC Code
an oral communication, to the Originator via a “COR” is also used by the ODFI to create a refused
Wireless Network. Notification of Change to refuse an NOC Entry
containing incorrect or incomplete information.
SECTION 8.49 “Legal Requirements” An NOC or refused NOC must comply with the
requirements of Appendix Five (Notification of
any law, statute, rule or regulation, or any
Change).
binding published interpretation of any of the
foregoing, issued by any government authority
(including courts), and any judicial, governmental,
SECTION 8.56 “Organization”
or administrative order, judgment, decree or a corporation, partnership, association or other
ruling, in each case as applicable to the subject entity, governmental or private, or a natural person,
matter and the parties at issue, and as amended, provided that, in the case of a natural person,
supplemented, modified or replaced from time to any account of such natural person to be debited
time. or credited in respect of an Entry is maintained
primarily for commercial and not for personal,
SECTION 8.50 “Machine Transfer Entry” family or household purposes.
or “MTE Entry” or “MTE”
a credit or debit Entry initiated at an “electronic
SECTION 8.57 “Originating Automated
terminal,” as that term is defined in Regulation E,
Clearing House Operator” or
to a Consumer Account maintained with an RDFI, “Originating ACH Operator”
i.e., an ATM cash deposit or withdrawal. an ACH Operator that receives Entries from an
ODFI with which it has an agreement. In the
SECTION 8.51 “MICR” event Entries are Transmitted between an ODFI
and an RDFI through a single ACH Operator, the
a magnetic ink character recognition technology
term refers to that ACH Operator.
adopted to facilitate the processing of Checks.
2 0 1 3 O P E R AT I N G R U L E S OR57
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
to an RDFI, and (b) on which it is designated as Source Document provided to the Originator by
the ODFI in accordance with Appendix Three the Receiver at the point-of-purchase or manned
(ACH Record Format Specifications). An RDFI bill payment location.
is not considered an ODFI solely by reason of
its initiation of Acknowledgment Entries, Return SECTION 8.65 “Point of Sale Entry” or
Entries, Extended Return Entries, or Notifications “POS Entry or “POS”
of Change.
a debit Entry initiated at an “electronic terminal,” as
that term is defined in Regulation E, to a Consumer
SECTION 8.59 “Origination Agreement” Account of the Receiver to pay an obligation
a written agreement between an ODFI and an incurred in a point-of-sale transaction, or to effect
Originator or Third-Party Sender (on behalf of a point-of-sale terminal cash withdrawal. Also an
an Originator with which the Third-Party Sender adjusting or other credit Entry related to such debit
has an agreement) that authorizes the ODFI to Entry, transfer of funds, or obligation.
Transmit Entries to a Receiver’s account and that
meets all other applicable requirements set forth in SECTION 8.66 “Prearranged Payment
Subsection 2.2.1.1 (ODFI Must Enter Origination and Deposit Entry” or “PPD Entry” or
Agreement with Originator) and/or Subsection “PPD”
2.2.1.2 (ODFI Must Enter Origination Agreement
with Third-Party Sender). a credit or debit Entry initiated by an Organization
to a Consumer Account of a Receiver based on a
standing or a Single Entry authorization from the
SECTION 8.60 “Originator” Receiver.
a Person that has authorized an ODFI (directly or
through a Third Party Sender) to Transmit, for the SECTION 8.67 “Prenotification Entry” or
account of that Person, a credit Entry, debit Entry, “Prenotification” or “Prenote”
or Non-Monetary Entry to the Receiver’s account
at the RDFI. a Non-Monetary Entry initiated by an Originator
to an RDFI prior to the initiation of the first credit
or debit Entry to a Receiver’s account with the
SECTION 8.61 “Outbound IAT Entry”
RDFI. A Prenotification notifies the RDFI that the
an IAT Entry that originates in the United States Originator intends to initiate one or more credit or
and is Transmitted to another country. debit Entries to a Receiver’s account with that RDFI
in accordance with the Receiver’s authorization.
SECTION 8.62 “Participating Depository
Financial Institution” or “Participating SECTION 8.68 “Re-presented Check
DFI” Entry” or “RCK Entry” or “RCK”
a financial institution that (a) is authorized by a Single Entry debit constituting a presentment
applicable Legal Requirements to accept deposits, notice of an item eligible under Subsection
(b) has been assigned a routing number by Accuity, 2.5.13.3 (RCK Eligible Items). An RCK Entry is an
and (c) has agreed to be bound by these Rules. item as that term is defined by Revised Article 4 of
the Uniform Commercial Code (1990 Official Text)
SECTION 8.63 “Person” only for the limited purposes of presentment as set
a natural person or an Organization. forth in Article 4-110(c) and notice of dishonor as
set forth in Article 4-301(a)(2).
SECTION 8.64 “Point-of-Purchase
Entry” or “POP Entry” or “POP” SECTION 8.69 “Receiver”
a Person that has authorized an Originator to
a Single Entry debit initiated by an Originator to
initiate a credit Entry, debit Entry, or Non-Monetary
an account of the Receiver based on an Eligible
Entry to the Receiver’s account at the RDFI. With
respect to debit Entries, the term “Receiver”
OR58 2 0 1 3 O P E R AT I N G R U L E S
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
means all Persons whose signatures are required Funds Availability Act (12 U.S.C §§ 4001-4010) and
to withdraw funds from an account for purposes the Check Clearing for the 21st Century Act (12
of the warranty provisions of Subsection 2.4.1 U.S.C §§ 5001-5018).
(General ODFI Warranties).
SECTION 8.76 “Regulation D”
SECTION 8.70 “Receiving Automated the regulations adopted by the Board of Governors
Clearing House Operator” or “Receiving of the Federal Reserve System at 12 C.F.R. Part 204
ACH Operator” from time to time to implement certain sections
an ACH Operator that distributes Entries to an of the Federal Reserve Act, including Section 19
RDFI with which it has an agreement. In the event thereof, (12 U.S.C. § 3105 et seq.) and Section 7 of
Entries are Transmitted between an ODFI and an the International Banking Act of 1978 (12 U.S.C.
RDFI through a single ACH Operator, the term § 3105 et seq.).
refers to that ACH Operator.
SECTION 8.77 “Regulation E”
SECTION 8.71 “Receiving Depository the regulations adopted by the Board of Governors
Financial Institution” or “RDFI” of the Federal Reserve System at 12 C.F.R. Part 205
a Participating Depository Financial Institution from time to time to implement the Electronic
with respect to Entries (a) it receives from its ACH Fund Transfer Act (15 U.S.C. §§ 1693 et seq.).
Operator to the accounts of Receivers, and (b) on
which it is designated as the RDFI in accordance SECTION 8.78 “Reject”
with Appendix Two (ACH Record Format the return of a failed Entry or Return Entry by
Specifications). An ODFI is not considered an RDFI an ACH Operator to another ACH Operator, an
solely by reason of its receipt of Acknowledgement ODFI (or its Transmitting Point), or an RDFI (or its
Entries, Return Entries, Extended Return Entries, Receiving Point).
or Notifications of Change.
SECTION 8.79 “Return Entry” or
SECTION 8.72 “Receiving Point” “Return”
an Organization that receives Entries from an ACH a credit or debit Entry initiated by an RDFI or
Operator on behalf of an RDFI. A Receiving Point ACH Operator, that returns a previously originated
may be an RDFI acting on its own behalf, or a credit or debit Entry, to the ODFI within the time
Participating DFI or Third-Party Service Provider frames established by these Rules. A Return Entry
acting on behalf of one or more RDFIs. must comply with the requirements of Appendix
Four (Return Entries). For all Entries except IAT
SECTION 8.73 “Reclamation Entry” Entries, an ODFI may dishonor a Return Entry.
a debit Entry initiated by an Originator to reclaim A dishonored Return Entry must comply with
from an RDFI any amounts received by a Recipient Subsection 2.12.5 (Dishonor of Return Entries)
after death or legal incapacity or the death of a and Appendix Four (Return Entries). For all
beneficiary of the Recipient. Entries except IAT Entries, an RDFI may create a
corrected or contested dishonored Return Entry
SECTION 8.74 “Record” in compliance with Subsection 3.8.5 (Receipt of
Dishonored Returns) and Appendix Four (Return
information that is inscribed on a tangible medium
Entries).
or that is stored in an Electronic or other medium
and is retrievable in perceivable form.
SECTION 8.80 “Return Fee”
SECTION 8.75 “Regulation CC” A fee charged by an Originator to a Receiver for
a debit Entry or other item that was returned for
the regulations adopted by the Board of Governors
insufficient or uncollected funds, to the extent
of the Federal Reserve System at 12 C.F.R. Part 229
permitted by applicable Legal Requirements.
from time to time to implement the Expedited
2 0 1 3 O P E R AT I N G R U L E S OR59
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
OR60 2 0 1 3 O P E R AT I N G R U L E S
A R T I C L E E I G H T – D e f i n i t i o n s o f Te r m s U s e d i n T h e s e R u l e s
2 0 1 3 O P E R AT I N G R U L E S OR61
APPENDIX ONE – ACH File Exchange Specifications
PART 1.1 Electronic Transmission • Company Name fields containing the words
Requirements “CHECK DESTROYED” (for XCK entries).
A Participating DFI and its ACH Operator need to
address operating details (testing, implementation PART 1.3 Sequence of Records in
and contingency plans) to ensure compatibility in ACH Files
Electronic File Transmission.
Each ACH File begins with a File Header Record.
After the File Header Record may be any number
PART 1.2 Data Specifications for of batches. Each batch is identified by a Company/
ACH Records Batch Header Record and contains one or more
The following table shows the data specifications Entry Detail Records. The number of addenda
for ACH Records. records that accompany each Entry is dependent
upon the Standard Entry Class Code. At the end
of each batch is a Company/Batch Control Record.
TYPE OF ALPHABETIC/ Each File ends with a File Control Record.
NUMERIC
FIELD ALPHAMERIC
0-9, A-Z, a-z, space,
EBCDIC values greater
The records in ACH files must be in the following
Valid
than hexadecimal “3F”, 0-9 sequence:
Characters
ASCII values greater than
hexadecimal “1F”
File Header Record
Justification Left Right
Batch #1
Empty Field
Handling
Space filled Zero filled Company/Batch Header Record
Special
Certain fields require the use Must be unsigned Entry Detail Records or Corporate Entry
of UPPER CASE characters (Neither positive (+) or
Notes Detail Records (with/without optional
– see below. negative (–) signage.)
Addenda Records)
Company/Batch Control Record
UPPER CASE characters must be used for all of the
following: Batch #2
Company/Batch Header Record
• all alphabetic characters within the Standard
Entry Class Code field; Entry Detail Records or Corporate Entry
Detail Records (with/without optional
• all alphabetic characters within the File ID Addenda Records)
Modifier field; Company/Batch Control Record
OR62 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX ONE – ACH File Exchange Specifications
Any other sequence will cause the File to be Prenotifications are identical to the basic Entry
rejected (see diagrams on the following pages). format but contain appropriate Transaction Codes
and zeros in the Amount field. Prenotifications
PART 1.4 File Structure can be batched with other dollar entries or batched
separately.
File Header Record
The File Header Record designates File Zero dollar CCD, CTX, and IAT Entries are identical
characteristics and identifies the immediate origin to the basic Entry format but contain appropriate
(Sending Point or ACH Operator) and destination Transaction Codes and zeros in the Amount field.
(Receiving Point or ACH Operator) of the Entries Zero dollar CCD, CTX, and IAT Entries can be
contained within the File or within the Transmitted batched with other CCD, CTX, and IAT dollar
batched data. In addition, this Record includes Entries or batched separately. A zero dollar CCD,
date, time, and File identification fields, which can CTX Entry must be accompanied by at least one
be used to identify the File uniquely. Addenda Record. A zero dollar IAT Entry must
be accompanied by at least the seven mandatory
Company/Batch Header Record Addenda Records.
The Company/Batch Header Record identifies
Return Entries are distinguished by special
the Originator and briefly describes the purpose
Transaction Codes and must be batched separately
of the Entry. For example, “Gas Bill” or “REG
from other dollar entries.
SALARY” indicates the reason for the transaction
originated by the Originator. The Company/Batch
Addenda Records
Header Record contains the routing number of the
ODFI for settlement, routing of Returns, and other Originators can use Addenda Records to supply
control purposes. In addition, the Company/Batch additional information about Entry Detail Records
Header Record indicates the intended Effective that will pass from the ODFI through the ACH
Entry Date of all transactions within the batch. Operator to the RDFI. Addenda Records associated
The information contained in the Company/Batch with the original Entry Detail Record or Corporate
Header Record applies uniformly to all subsequent Entry Detail Record are not included with any
Entry Detail Records in the batch. Entry Detail Record being returned, with the
exception of IAT Entries. Only NACHA sanctioned
Entry Detail Record/Corporate Entry Detail formats are permitted, as specified by the Addenda
Record Type Code. Addenda Record information may only
be used for the purpose of Transmitting payment
Entry Detail Records contain that information
related information. Any other use is prohibited.
sufficient to relate the Entry to the Receiver,
Each application, with its corresponding number
i.e., Receiver’s account number at the RDFI,
of addenda records, is listed in the chart on the
identification number, name, amount, and debit or
following page.
credit, as indicated by the Transaction Code.
2 0 1 3 O P E R AT I N G R U L E S OR63
APPENDIX ONE – ACH File Exchange Specifications
MAXIMUM NUMBER
OPTIONAL/
SEC CODE CONTENTS REFERENCE ADDENDA
MANDATORY
RECORDS
ANSI ASC X12 REF (Reference) Appendix Six, Subpart 6.4.2; Optional
ACK 1
data segment Appendix Three, Subpart 3.2.2
ANSI ASC X12 REF (Reference) Appendix Six, Subpart 6.4.3; Optional
ATX 1
data segment Appendix Three, Subpart 3.2.2
Payment Related ANSI ASC X12 Appendix Three, Subpart 3.1.9 Optional
CIE 1
data segments and Subpart 3.2.2
COR/Refused COR
Appendix Five, Part 5.4;
(Notification of Corrected Data 1 Mandatory
Appendix Three, Subpart 3.2.2
Change)
ANSI ASC X12.5 or X12.6
syntax, an ASC X12 transaction
Appendix Three, Subpart 3.1.10 Optional
CTX set containing a BPR or BPS 9,999
and Subpart 3.2.2
data segment, or payment
related UN/EDIFACT syntax
OR64 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX ONE – ACH File Exchange Specifications
Company/Batch Control Record the number of batches within the File (or batched
The Company/Batch Control Record contains the data Transmitted to a single destination).
counts, hash totals, and total dollar controls for the
preceding Entries within the batch. PART 1.5 Trace Number Sequence in
ACH Files
All Entry Detail Records are hashed. Both Entry Individual Entry Detail Records within individual
Detail Records and Addenda Records are included batches must be in ascending Trace Number order
in the Entry/addenda counts; Batch Header and (although Trace Numbers need not necessarily be
Batch Control Records are not included. consecutive). The Trace Number in an Addenda
Record is the same as that of the Entry Detail Record
File Control Record with which the Addenda Record is associated.
The File Control Record contains dollar, Entry,
and hash total accumulations from the Company/ Addenda Records must be in consecutive ascending
Batch Control Records in the File. This Record order by the Addenda Sequence Number.
also contains counts of the number of blocks and
2 0 1 3 O P E R AT I N G R U L E S OR65
APPENDIX ONE – ACH File Exchange Specifications
DIAGRAM OF SEQUENCE OF RECORDS FOR ACK, ARC, ATX, BOC, CCD, COR, CIE,
DNE, MTE, POP, POS, PPD, RCK, SHR, TEL, AND WEB ENTRIES
File Header Record One per file — first logical record on file
}
First Entry Each entry detail may have an optional
Detail Record Addenda record
Second Entry
Detail Record
• Batch 1
•
•
Last Entry
Detail Record
Company/Batch
One per batch
Control Record
•
•
Batches 2 through n-1
•
Company/Batch
}
Header Record
First Entry
Detail Record
•
• Batch n
•
Last Entry
Detail Record
Company/Batch
Control Record
OR66 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX ONE – ACH File Exchange Specifications
Company/Batch
Header Record
First (Corporate) Entry Detail
Record
Addenda Record
#1
Addenda Record
#2
Addenda Record
#3
Addenda Record
#n
Second (Corporate) Entry Detail
Record
Addenda Record
#1
Addenda Record
#2
Batches 2 through n
9999....99999
2 0 1 3 O P E R AT I N G R U L E S OR67
APPENDIX TWO – Specifications for Data Acceptance by ACH Operators
g. Total Debit Entry Dollar Amount in File • The File Header Record does not contain
h. Total Credit Entry Dollar Amount in File the number of a valid Sending Point or ACH
Operator (as defined on the ACH Operator
i. File Batch Count.
routing table file).
The acknowledgment also contains the date and
• The File is “out-of-balance,” i.e., one or more
time the File was processed by the ACH Operator
of the following conditions exist:
and, if the File was rejected, the reason for the
rejection. If the File was not rejected, but one or
– the summation of the counts, hash totals,
more batches were rejected by the ACH Operator,
and total dollars on Company/Batch
the acknowledgment will also contain the following
Control Records does not agree with the
information about each rejected batch:
File Control Record.
OR68 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX TWO – Specifications for Data Acceptance by ACH Operators
– the actual number of blocks or batches in • The Trace Numbers on the File are not in
the File does not agree with the File Control ascending sequence within a batch.
Record counts.
• The Transaction Code in an Entry Detail
• Mandatory fields in the File Header Record Record is invalid.
are not valid:
• The ODFI of a TRC/TRX batch is not a
– File ID Modifier is not uppercase A-Z or participant in a check truncation program.
0-9.
• The Amount field in an Entry Detail Record is
– Record size is not 094.
non-numeric.
– Blocking Factor is not 10.
– Format Code is not 1. • The sequence of records in the batch is
incorrect.
• The sequence of records in the File is
incorrect. • The batch is “out-of-balance,” i.e., the counts,
hash totals, or dollars in the Company/
• The Immediate Origin, File Creation Date, Batch Control Records do not agree with the
File Creation Time, and File ID Modifier are summation of the Entries for the batch.
equal to that of a previously accepted file.
• The Company Name is all spaces or all zeros.
PART 2.4 Automatic Batch or File • The Company Entry Description is all spaces
Rejection Criteria or all zeros.
A Sending Point must choose either a batch level
reject option or a File level reject option for any • The Company Identification is all spaces or
batch(es) within the File that meets one or more of all zeros.
the error conditions defined below. If the Sending
Point chooses the File level reject option, the ACH • The Originator Status Code is not equal to “2”
Operator will reject the entire File containing the for DNE if the Transaction Code is 23 or 33.
erroneous batch(es). If the Sending Point chooses
the batch level reject option, those specific batches • The Standard Entry Class Code in the
with an erroneous condition will be rejected, but Company/Batch Header Record is not a valid
the remaining batches within the File will be code.
accepted and processed by the ACH Operator.
• The Service Class Code in the Company/
The ACH Operator will reject a batch or the entire Batch Control Record is not the same as that
File, depending on the reject option selected, if any in the Company/Batch Header Record.
batch meets any of the following error conditions:
• The first eight positions of the Trace
• The batch contains invalid characters (i.e., Number in an Entry Detail Record are not
characters not specified in Appendix One, the same as the ODFI Routing Number in
ACH File Exchange Specifications). the corresponding (immediately preceding)
Company/Batch Header Record.
• Except for Files coming from another ACH
Operator, the ODFI Identification in the • The Transaction Code in an Entry Detail
Company/Batch Header Record is not the Record is not valid for the Service Class
routing number of a valid ODFI. Code in the Company/Batch Header Record.
Either a debit Transaction Code is in a credit
• The Service Class Code in a Company/Batch batch, or a credit Transaction Code is in a
Header Record is not a valid code. debit batch.
2 0 1 3 O P E R AT I N G R U L E S OR69
APPENDIX TWO – Specifications for Data Acceptance by ACH Operators
• The Transaction Code in an Entry Detail PART 2.5 Automatic Entry Detail
Record is not valid for the Standard Entry Rejection Criteria
Class Code in the Company/Batch Header
ACH Operators use Return Reason Codes for the
Record. For Standard Entry Class Code COR,
following error conditions. These error conditions
the Transaction Code must be 21, 26, 31, 36,
will never cause the entire File or batch to be
41, 46, 51, or 56. For Standard Entry Class
rejected but will always cause the Entry Detail
Code DNE, the Transaction Code must be 21,
Record to be returned using an Addenda Record
23, 31, or 33.
with an Addenda Type Code of “99.” Return Entries
must comply with the requirements of Appendix
• Forward Entries and Return Entries are in
Four (Return Entries).
the same batch.
R13 Invalid ACH Routing Number
• Return, dishonored Return, and/or contested
dishonored Return Entries are in the same
• Entry contains a Receiving DFI Identification
batch.
or GO Identification that is not a valid ACH
routing number.
• The Batch Number in the Company/Batch
Header Record is non-numeric.
R18 Improper Effective Entry Date
• The Batch Number in the Company/Batch
• The Effective Entry Date for a credit Entry
Control Record is non-numeric.
is more than two Banking Days after the
Banking Day of processing as established by
• The Batch Number in the Company/Batch
the Originating ACH Operator.
Control Record is not the same as the Batch
Number in the Company/Batch Header
• The Effective Entry Date for a debit entry
Record.
is more than one Banking Day after the
processing date.
• The Foreign Exchange Indicator is all spaces
or all zeros (IAT Entries).
R19 Amount Field Error
• The ISO Destination Country Code is all
• Amount field is non-numeric.
spaces or all zeros (IAT Entries).
• Amount field is not zero in a Prenotification,
• The Originator Identification is all spaces or
DNE, ENR, Notification of Change, refused
all zeros (IAT Entries).
Notification of Change, or zero dollar Entry.
• The ISO Originating Currency Code is all
• Amount field is zero in an Entry other than
spaces or all zeros (IAT Entries).
a Prenotification, DNE, ENR, Notification
of Change, refused Notification of Change,
• The ISO Destination Currency Code is all
Return, dishonored Return, contested
spaces or all zeros (IAT Entries).
dishonored Return, or zero dollar Entry.
• The GO Identification/Originating DFI
• Amount field is greater than $25,000 for ARC,
Identification in the Company/Batch Header
BOC, and POP Entries.
Record is not the routing number of a valid
Gateway Operator or ODFI (IAT Entries).
R25 Addenda Error
OR70 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX TWO – Specifications for Data Acceptance by ACH Operators
• Addenda Record Indicator value is 1 but no • Total number of Addenda Records exceeds
Addenda Record follows. the maximum number allowable (9,999) per
Entry Detail Record (CTX, ENR, or TRX).
• Addenda Record Indicator on a CTX, ENR,
IAT, or TRX Entry is 0 and Number of • Total number of Addenda Records exceeds
Addenda Records is not zero. Addenda the maximum allowable (12) per Entry Detail
Record Indicator is 1 and Number of Addenda Record (IAT).
Records is 0.
• The number of Addenda Records exceeds
• The Addenda Record Indicator for one (1) for CCD, CIE, DNE, MTE, POS, PPD,
Notifications of Change, refused Notifications SHR, WEB, Notifications of Change, refused
of Change, Returns, dishonored Returns, Notifications of Change, Returns, dishonored
contested dishonored Returns, DNE, ENR, Returns, and contested dishonored Returns.
MTE, POS, SHR, TRX, and zero dollar Entries
other than Prenotifications is not equal to • Addenda Sequence Number is not valid.
“1.” The Addenda Record Indicator for IAT
Entries, including Prenotification Entries, is • The actual number of Addenda Records is
not equal to “1.” not equal to the number of Addenda Records
in the Corporate Entry Detail Record (CTX)
• Addenda Type Code is not valid if not equal or the Entry Detail Record (ENR, IAT, TRX).
to “02” for MTE, POS, or SHR Entries; “05” for
ACK, ATX, CCD, CIE, CTX, DNE, ENR, PPD, • For IAT forward Entries and IAT Returns,
TRX, or WEB Entries; “98” on Notification of the Entry Detail Sequence Number does
Change or refused Notification of Change; not correspond to the Trace Number on the
or “99” on Return, dishonored Return, or preceding IAT Entry Detail Record.
contested dishonored Return Entries.
R26 Mandatory Field Error
• For IAT Entries, Addenda Type Code is not
valid if not equal to “10,” “11,” “12,” “13,” “14,” • Individual Name contains all spaces or all
“15,” “16,” “17,” or “18.” Addenda Type Code zeros (MTE, TEL, and WEB Entries).
for an IAT Return is not valid if not equal to
“10,” “11,” “12,” “13,” “14,” “15,” “16,” or “99.” • For IAT Entries, any mandatory field contains
Addenda Type Code for an IAT Notification all spaces or all zeros.
of Change is not valid if not equal to “98.”
• Individual Identification Number contains
• For IAT forward Entries and IAT Returns, all spaces or all zeros (MTE Entries or CIE
Addenda Type Codes 10-16 are not in Entries).
appropriate sequential order.
• Check Serial Number contains all spaces
• One or more mandatory Addenda Records or all zeros (ARC, BOC, POP, RCK, or XCK
for IAT forward Entries, Returns, and Entries).
Notifications of Change is missing.
• Terminal City contains all spaces or all zeros
• For IAT forward Entries and IAT Returns, the (POP Entries only).
Entry contains more than one of each of the
following Addenda Types: “10,” “11,” “12,” • Terminal State contains all spaces or all zeros
“13,” “14,” “15,” and “16.” (POP Entries only).
• For IAT forward Entries, the Entry contains • Card Transaction Type Code is not a valid
more than two Addenda Records for code as specified in Appendix Three (ACH
Remittance Information (Addenda Type Code Record Format Specifications) (POS and SHR
17). Entries only).
2 0 1 3 O P E R AT I N G R U L E S OR71
APPENDIX TWO – Specifications for Data Acceptance by ACH Operators
• Number of Addenda Records in a Corporate Code is not a currently assigned value for
Entry Detail Record or IAT Entry Detail dishonored Returns.
Record is not numeric.
• In a contested dishonored Return with
• The Return Reason Code field for Return Contested Dishonored Return Reason Code
Entries, the Dishonored Return Reason R73 (timely original Return), the Original
Code field for dishonored Returns, or the Settlement Date is not a valid Julian date in
Contested Dishonored Return Reason Code the range 001-366, or the Date Original Entry
field for contested dishonored Returns does Returned is not a valid date.
not contain a valid code as specified in
Appendix Four (Return Entries). R27 Trace Number Error
• Dishonored Return Entries, contested • Original Entry Trace Number is not present
dishonored Return Entries, and refused COR in the Addenda Record on a Return or
Entries are not permitted for use with the IAT Notification of Change Entry.
Standard Entry Class Code.
• Trace Number of an Addenda Record is
• The Change Code field for Notification of not the same as the Trace Number of the
Change Entries or the Refused COR Code field preceding Entry Detail Record.
for refused Notification of Change Entries
does not contain a valid code as specified in R28 Routing Number Check Digit Error
Appendix Five (Notification of Change).
• The Check Digit for a routing number is not
• On a Notification of Change or Refused valid.
Notification of Change, the Corrected Data
field is blank, or on a refused Notification RDFI Not Participant in Check Truncation
R30
of Change, the Change Code is not a Program
currently assigned value (see Appendix Five,
Notification of Change) or the COR Trace R32 RDFI Non-Settlement
Sequence Number field is not numeric. A
refused Notification of Change is denoted • The RDFI is not able to settle the Entry.
by a valid Refused COR Code in the Refused
COR Code field. See Appendix Five for a list R34 Limited Participation DFI
of valid codes.
• The RDFI’s participation has been limited by
• In a dishonored Return or contested a federal or state supervisor.
dishonored Return, the Return Trace Number
is not numeric, the Return Settlement Date is R35 Return of Improper Debit Entry
not a valid Julian Date in the range 001-366,
or the Return Reason Code is not a currently • ACH debit Entries (with the exception of
assigned value for Returns. Reversals) are not permitted for use with the
CIE Standard Entry Class Code.
• In a dishonored Return bearing Return
Reason Code R69 (Field Error), the Addenda • ACH debit Entries (with the exception of
Information Field contains all spaces or all Reversals) are not permitted to loan accounts.
zeros.
R36 Return of Improper Credit Entry
• In a contested dishonored Return, the
Dishonored Return Trace Number is not • ACH credit Entries (with the exception of
numeric, the Dishonored Return Settlement Reversals) are not permitted for use with the
Date is not a valid Julian Date in the range following Standard Entry Class Codes: ARC,
001-366, or the Dishonored Return Reason BOC, POP, RCK, TEL, WEB, and XCK.
OR72 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
2 0 1 3 O P E R AT I N G R U L E S OR73
SUBPART 3.1.1 ACH File Record Format for All Entries
OR74
ALL ENTRIES FILE HEADER RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
Field
Inclusion
Requirement M R M M M O M M M M O O O
UPPER
CASE A-Z
Contents
NUMERIC
‘1’ Numeric bTTTTAAAAC bTTTTAAAAC YYMMDD HHMM 0-9 ‘094’ ‘10’ ‘1’ Alphameric Alphameric Alphameric
Length 1 2 10 10 6 4 1 3 2 1 23 23 8
Position 01-01 02-03 04-13 14-23 24-29 30-33 34-34 35-37 38-39 40-40 41-63 64-86 87-94
FIELD 1 2 3 4 5 6 7 8
Field
Inclusion
Requirement M M M M M M M N/A
Length 1 6 6 8 10 12 12 39
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.2 ACH Batch Record Format for All Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
STANDARD
DATA RECORD SERVICE COMPANY ENTRY COMPANY COMPANY EFFECTIVE SETTLEMENT ORIGINATOR ORIGINATING
ELEMENT TYPE CLASS COMPANY DISCRETIONARY COMPANY CLASS ENTRY DESCRIPTIVE ENTRY DATE STATUS DFI BATCH
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE CODE NAME DATA IDENTIFICATION CODE DESCRIPTION DATE DATE (JULIAN) CODE IDENTIFICATION NUMBER
Field
Inclusion Inserted by
Requirement M M M O M M M O R ACH Operator M M M
Contents ‘5’ Numeric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric TTTTAAAA Numeric
Length 1 3 16 20 10 3 10 6 6 3 1 8 7
Position 01-01 02-04 05-20 21-40 41-50 51-53 54-63 64-69 70-75 76-78 79-79 80-87 88-94
FIELD 1 2 3 4 5 6 7 8 9 10 11
Field
Inclusion
Requirement M M M M M M R O N/A M M
Contents ‘8’ Numeric Numeric Numeric $$$$$$$$$$¢¢ $$$$$$$$$$¢¢ Alphameric Alphameric Blank TTTTAAAA Numeric
Length 1 3 6 10 12 12 10 19 6 8 7
Position 01-01 02-04 05-10 11-20 21-32 33-44 45-54 55-73 74-79 80-87 88-94
OR75
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.3 Company/Batch Header Record Format for International ACH Transaction (IAT) Entries
OR76
IAT COMPANY/BATCH HEADER RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
GO
FOREIGN ISO STANDARD ISO ISO IDENTIFICATION/
DATA RECORD SERVICE FOREIGN EXCHANGE FOREIGN DESTINATION ENTRY COMPANY ORIGINATING DESTINATION EFFECTIVE SETTLEMENT ORIGINATOR ORIGINATING
ELEMENT TYPE CLASS IAT EXCHANGE REFERENCE EXCHANGE COUNTRY ORIGINATOR CLASS ENTRY CURRENCY CURRENCY ENTRY DATE STATUS DFI BATCH
NAME CODE CODE INDICATOR INDICATOR INDICATOR REFERENCE CODE IDENTIFICATION CODE DESCRIPTION CODE CODE DATE (JULIAN) CODE IDENTIFICATION NUMBER
Field
Inserted by
Inclusion M M O M R R M M M M M M R M M M
ACH Operator
Requirement
Contents ‘5’ Numeric Alphameric Alphameric Numeric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric TTTTAAAA Numeric
Length 1 3 16 2 1 15 2 10 3 10 3 3 6 3 1 8 7
Position 01-01 02-04 05-20 21-22 23-23 24-38 39-40 41-50 51-53 54-63 64-66 67-69 70-75 76-78 79-79 80-87 88-94
APPENDIX THREE – ACH Record Format Specifications
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.4 ACH File Record Format for ADV Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M R M M M O M M M M M M O
UPPER CASE
Contents A-Z
‘1’ Numeric bTTTTAAAAC bTTTTAAAAC YYMMDD HHMM NUMERIC 0-9 ‘094’ ‘10’ ‘1’ Alphameric Alphameric Alphameric
Length 1 2 10 10 6 4 1 3 2 1 23 23 8
Position 01-01 02-03 04-13 14-23 24-29 30-33 34-34 35-37 38-39 40-40 41-63 64-86 87-94
FIELD 1 2 3 4 5 6 7 8
Field
Inclusion
Requirement M M M M M M M N/A
Length 1 6 6 8 10 20 20 23
OR77
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.5 Sequence of Records for ADV Entries (continued)
OR78
ADV COMPANY/BATCH CONTROL RECORD
FIELD 1 2 3 4 5 6 7 8 9
DATA
ELEMENT RECORD TYPE SERVICE CLASS ENTRY/ADDENDA TOTAL DEBIT ENTRY TOTAL CREDIT ENTRY ACH OPERATOR ORIGINATING DFI
NAME CODE CODE COUNT ENTRY HASH DOLLAR AMOUNT DOLLAR AMOUNT DATA IDENTIFICATION BATCH NUMBER
Field
Inclusion
Requirement M M M M M M O M M
Contents ‘8’ Numeric Numeric Numeric $$$$$$$$$$$$$$$$$$¢¢ $$$$$$$$$$$$$$$$$$¢¢ Alphameric TTTTAAAA Numeric
Length 1 3 6 10 20 20 19 8 7
Position 01-01 02-04 05-10 11-20 21-40 41-60 61-79 80-87 88-94
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
ROUTING JULIAN DATE SEQUENCE
DATA RECORD DFI ADVICE ACH ADDENDA NUMBER ON WHICH NUMBER
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT ROUTING FILE OPERATOR INDIVIDUAL DISCRETIONARY RECORD OF ACH THIS ADVICE WITHIN
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER IDENTIFICATION DATA NAME DATA INDICATOR OPERATOR IS CREATED BATCH
Field
Inclusion
Requirement M M M M R M M O O R O M M M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$$$¢¢ Numeric Alphameric Alphameric Alphameric Alphameric Numeric TTTTAAAA Numeric Numeric
Length 1 2 8 1 15 12 9 5 1 22 2 1 8 3 4
Position 01-01 02-03 04-11 12-12 13-27 28-39 40-48 49-53 54-54 55-76 77-78 79-79 80-87 88-90 91-94
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.6 Sequence of Records for ARC Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11
INDIVIDUAL
NAME/
DATA RECORD RECEIVING ADDENDA
2 0 1 3 O P E R AT I N G R U L E S
ELEMENT TYPE TRANSACTION RECEIVING DFI DFI ACCOUNT CHECK SERIAL COMPANY DISCRETIONARY RECORD TRACE
NAME CODE CODE IDENTIFICATION CHECK DIGIT NUMBER AMOUNT NUMBER NAME DATA INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M M O O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
OR79
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.7 Sequence of Records for BOC Entries
OR80
BOC ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11
Field Inclusion
Requirement M M M M R M M O O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
APPENDIX THREE – ACH Record Format Specifications
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.8 Sequence of Records for CCD Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11
DATA ADDENDA
ELEMENT RECORD TRANSACTION RECEIVING DFI CHECK DFI ACCOUNT IDENTIFICATION RECEIVING DISCRETIONARY RECORD TRACE
NAME TYPE CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER COMPANY NAME DATA INDICATOR NUMBER
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M O R O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD ADDENDA PAYMENT RELATED ADDENDA ENTRY DETAIL
NAME TYPE CODE TYPE CODE INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M O M M
Length 1 2 80 4 7
OR81
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.9 Sequence of Records for CIE Entries
OR82
CIE ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11
Field
Inclusion
Requirement M M M M R M R M O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD TYPE ADDENDA TYPE PAYMENT RELATED ADDENDA ENTRY DETAIL
NAME CODE CODE INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M O M M
Length 1 2 80 4 7
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.10 Sequence of Records for CTX Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
RECEIVING
DATA RECORD DFI NUMBER OF COMPANY ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT TOTAL IDENTIFICATION ADDENDA NAME/ID DISCRETIONARY RECORD TRACE
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS NUMBER RESERVED DATA INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M O M R N/A O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Numeric Alphameric Blank Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD ADDENDA ADDENDA ENTRY DETAIL
NAME TYPE CODE TYPE CODE PAYMENT RELATED INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M O M M
Length 1 2 80 4 7
OR83
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.11 Sequence of Records for DNE Entries
OR84
DNE ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11
Field
Inclusion
Requirement M M M M R M O R O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD ADDENDA PAYMENT RELATED ADDENDA ENTRY DETAIL
NAME TYPE CODE TYPE CODE INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M O M M
Length 1 2 80 4 7
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.12 Sequence of Records for ENR Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
NUMBER RECEIVING
DATA RECORD OF COMPANY ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK DFI ACCOUNT IDENTIFICATION ADDENDA NAME/ID DISCRETIONARY RECORD TRACE
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS NUMBER RESERVED DATA INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M O M R N/A O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric 0000000000 Alphameric Numeric Alphameric Blank Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD ADDENDA PAYMENT RELATED ADDENDA ENTRY DETAIL
NAME TYPE CODE TYPE CODE INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M R M M
Length 1 2 80 4 7
OR85
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.13 Sequence of Records for IAT Entries
OR86
IAT ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
FOREIGN
RECEIVER’S GATEWAY
GO NUMBER ACCOUNT OPERATOR SECONDARY
DATA RECORD IDENTIFICATION/ OF NUMBER/ OFAC OFAC ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ADDENDA DFI ACCOUNT SCREENING SCREENING RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT RECORDS RESERVED AMOUNT NUMBER RESERVED INDICATOR INDICATOR INDICATOR NUMBER
Field
Inclusion M M M M M N/A M M N/A O O M M
Requirement
Contents ‘6’ Numeric TTTTAAAA Numeric Numeric Blank $$$$$$$$¢¢ Alphameric Blank Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 4 13 10 35 2 1 1 1 15
Position 01-01 02-03 04-11 12-12 13-16 17-29 30-39 40-74 75-76 77-77 78-78 79-79 80-94
APPENDIX THREE – ACH Record Format Specifications
FIELD 1 2 3 4 5 6 7 8
Field
Inclusion M M R R O M N/A M
Requirement
Length 1 2 3 18 22 35 6 7
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.13 Sequence of Records for IAT Entries (continued)
FIELD 1 2 3 4 5 6
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion M M M M N/A M
Requirement
Length 1 2 35 35 14 7
FIELD 1 2 3 4 5 6
Field
Inclusion M M M M N/A M
Requirement
Length 1 2 35 35 14 7
OR87
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.13 Sequence of Records for IAT Entries (continued)
OR88
FOURTH IAT ADDENDA RECORD
FIELD 1 2 3 4 5 6 7 8
Field
Inclusion M M M M M M N/A M
Requirement
Length 1 2 35 2 34 3 10 7
FIELD 1 2 3 4 5 6 7 8
RECEIVING RECEIVING
DATA RECEIVING DFI IDENTIFICATION DFI ENTRY DETAIL
ELEMENT RECORD TYPE ADDENDA TYPE DFI NUMBER RECEIVING DFI BRANCH SEQUENCE
NAME CODE CODE NAME QUALIFIER IDENTIFICATION COUNTRY CODE RESERVED NUMBER
Field
Inclusion M M M M M M N/A M
Requirement
Length 1 2 35 2 34 3 10 7
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.13 Sequence of Records for IAT Entries (continued)
FIELD 1 2 3 4 5 6
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion M M O M N/A M
Requirement
Length 1 2 15 35 34 7
FIELD 1 2 3 4 5 6
Field
Inclusion M M M M N/A M
Requirement
Length 1 2 35 35 14 7
OR89
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.13 Sequence of Records for IAT Entries (continued)
OR90
IAT ADDENDA RECORD FOR REMITTANCE INFORMATION
FIELD 1 2 3 4 5
Field
Inclusion M M O M M
Requirement
Length 1 2 80 4 7
NOTE: A maximum of two optional remittance addenda records may be included with each IAT entry.
FIELD 1 2 3 4 5 6 7 8 9
FOREIGN
CORRESPONDENT FOREIGN FOREIGN
FOREIGN BANK CORRESPONDENT CORRESPONDENT ENTRY
DATA CORRESPONDENT IDENTIFICATION BANK BANK ADDENDA DETAIL
ELEMENT RECORD TYPE ADDENDA TYPE BANK NAME NUMBER IDENTIFICATION BRANCH SEQUENCE SEQUENCE
NAME CODE CODE QUALIFIER NUMBER COUNTRY CODE RESERVED NUMBER NUMBER
Field
Inclusion M M M M M M N/A M M
Requirement
Contents ‘7’ ‘18’ Alphameric Alphameric Alphameric Alphameric Blank Numeric Numeric
Length 1 2 35 2 34 3 6 4 7
Position 01-01 02-03 04-38 39-40 41-74 75-77 78-83 84-87 88-94
NOTE: Each Foreign Correspondent Bank involved in the processing of an IAT entry must be identified within an Addenda Record for IAT Foreign Correspondent Bank Information.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.14 Sequence of Records for MTE Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M M M O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5 6 7 8 9 10 11 12
Field
Inclusion
Requirement M M R O R R R R R R R M
Contents ‘7’ ‘02’ Alphameric Alphameric Alphameric Alphameric MMDD HHMMSS Alphameric Alphameric Alphameric Numeric
Length 1 2 7 3 6 6 4 6 27 15 2 15
Position 01-01 02-03 04-10 11-13 14-19 20-25 26-29 30-35 36-62 63-77 78-79 80-94
OR91
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.15 Sequence of Records for POP Entries
OR92
POP ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
INDIVIDUAL
NAME/
DATA RECORD DFI CHECK RECEIVING ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT SERIAL TERMINAL TERMINAL COMPANY DISCRETIONARY RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER CITY STATE NAME DATA INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M M M M O O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 9 4 2 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-48 49-52 53-54 55-76 77-78 79-79 80-94
APPENDIX THREE – ACH Record Format Specifications
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.16 Sequence of Records for POS Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M O R M M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5 6 7 8 9 10 11 12
AUTHORIZATION
DATA RECORD ADDENDA TERMINAL TRANSACTION CODE OR CARD
ELEMENT TYPE TYPE REFERENCE REFERENCE IDENTIFICATION SERIAL TRANSACTION EXPIRATION TERMINAL TERMINAL TERMINAL TRACE
NAME CODE CODE INFORMATION #1 INFORMATION #2 CODE NUMBER DATE DATE LOCATION CITY STATE NUMBER
Field
Inclusion
Requirement M M O O R R R O R R R M
Contents ‘7’ ‘02’ Alphameric Alphameric Alphameric Alphameric MMDD Alphameric Alphameric Alphameric Alphameric Numeric
Length 1 2 7 3 6 6 4 6 27 15 2 15
Position 01-01 02-03 04-10 11-13 14-19 20-25 26-29 30-35 36-62 63-77 78-79 80-94
OR93
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.17 Sequence of Records for PPD Entries
OR94
PPD ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11
Field
Inclusion
Requirement M M M M R M O R O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD ADDENDA PAYMENT RELATED ADDENDA ENTRY DETAIL
NAME TYPE CODE TYPE CODE INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M O M M
Length 1 2 80 4 7
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.18 Sequence of Records for RCK Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M M R O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
OR95
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.19 Sequence of Records for SHR Entries
OR96
SHR ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12
Field
Inclusion
Requirement M M M M R M R R R M M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ MMYY Numeric Numeric Numeric Numeric Numeric
Length 1 2 8 1 17 10 4 11 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-43 44-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5 6 7 8 9 10 11 12
Field
Inclusion
Requirement M M O O R R R O R R R M
Contents ‘7’ ‘02’ Alphameric Alphameric Alphameric Alphameric MMDD Alphameric Alphameric Alphameric Alphameric Numeric
Length 1 2 7 3 6 6 4 6 27 15 2 15
Position 01-01 02-03 04-10 11-13 14-19 20-25 26-29 30-35 36-62 63-77 78-79 80-94
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.20 Sequence of Records for TEL Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M O M O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
OR97
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.21 Sequence of Records for TRC Entries
OR98
TRC ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12
Field
Inclusion
Requirement M M M M R M O R R O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 6 16 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-60 61-76 77-78 79-79 80-94
APPENDIX THREE – ACH Record Format Specifications
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.22 Sequence of Records for TRX Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
RECEIVING
DATA RECORD DFI NUMBER OF COMPANY ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT TOTAL IDENTIFICATION ADDENDA NAME/ID ITEM TYPE RECORD TRACE
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS NUMBER RESERVED INDICATOR INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M O M R N/A O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Numeric Alphameric Blank Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD ADDENDA PAYMENT RELATED ADDENDA ENTRY DETAIL
NAME TYPE CODE TYPE CODE INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M O M M
Length 1 2 80 4 7
OR99
APPENDIX THREE – ACH Record Format Specifications
SUBPART 3.1.23 Sequence of Records for WEB Entries
OR100
WEB ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11
Field
Inclusion
Requirement M M M M R M O M R M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD ADDENDA PAYMENT RELATED ADDENDA ENTRY DETAIL
NAME TYPE CODE TYPE CODE INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M O M M
Length 1 2 80 4 7
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 3.1.24 Sequence of Records for XCK Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11 12
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M M R R O M M
Contents ‘6’ Numeric TTTTAAAA Numeric Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 17 10 15 6 16 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-60 61-76 77-78 79-79 80-94
OR101
APPENDIX THREE – ACH Record Format Specifications
APPENDIX THREE – ACH Record Format Specifications
PART 3.2 Glossary of ACH Record Addenda Information is associated with the
Format Data Elements immediately preceding Entry Detail Record.
SUBPART 3.2.1 Field Inclusion Requirements The Addenda Information field of a Return Entry is
The following information defines the requirements used by the RDFI to relay explanatory information
for the inclusion of certain data fields in ACH that is required with the use of Return Reason
Entries. This involves the standardization of three Codes “R11” (Check Truncation Return) and “R17”
definitions: Mandatory, Required, and Optional. (File Record Edit Criteria).
Mandatory for ACH Operator Processing. A The Addenda Information Field of a Dishonored
“Mandatory” field is necessary to ensure the Return Entry is a mandatory field when the
proper routing and/or posting of an ACH Entry. Dishonored Return bears Return Reason Code R69
Any “Mandatory” field not meeting required data (Field Errors). When using Return Reason Code
specifications will cause that Entry, batch, or File R69, the ODFI must insert the appropriate code(s)
to be Rejected by the ACH Operator. A Rejected from the list below, separated by an asterisk (*),
Entry will be returned to the ODFI by the ACH within the Addenda Information Field of the
Operator. A Rejected batch or Rejected File will Addenda Record Format for Dishonored Returns
be reported to the ODFI or Sending Point by the to indicate the field(s) in which the errors occur:
ACH Operator.
01 Return Contains Incorrect DFI Account
Required for RDFI Processing. The omission of Number
a “Required” field will not cause an Entry Reject at 02 Return Contains Incorrect Original Entry
the ACH Operator, but may cause a reject at the Trace Number
RDFI and may result in the return of the Entry.
An example is the DFI Account Number field in 03 Return Contains Incorrect Dollar Amount
the Entry Detail Record. If this field is omitted 04 Return Contains Incorrect Individual
by an ODFI, the RDFI may return the Entry as Identification Number/Identification
nonpostable. Data classified as “Required” should Number
be included by the Originator and ODFI to avoid
05 Return Contains Incorrect Transaction
processing and control problems at the RDFI.
Code
Optional. The inclusion or omission of an 06 Return Contains Incorrect Company
“Optional” data field is at the discretion of the Identification Number
Originator and ODFI. However, if a DFI does 07 Return Contains an Invalid Effective Entry
originate Files using optional data fields, the RDFI Date
must return these fields to the ODFI if the Entry
is returned. For example: 01*03*06
SUBPART 3.2.2 Glossary of Data Elements Addenda Record Indicator: 1 Position - Entry
ACH Operator Data: 19 Positions - Company/ Detail Record and Corporate Entry Detail Record
Batch Control Record – Optional (ADV); 1 Position – Mandatory (ACK, ADV, ARC, ATX, BOC, CCD,
- Entry Detail Record – Optional (ADV) CIE, CTX, DNE, ENR, IAT, MTE, POP, POS, PPD,
RCK, SHR, TEL, TRC, TRX, WEB, XCK, refused
This field is used as specified by the ACH Operator. ACK, refused ATX, Returns, dishonored Returns,
contested dishonored Returns, COR, refused COR)
Addenda Information: 44 Positions – Addenda
Record – Optional (Returns except IAT); 34 This field indicates the existence of an Addenda
positions – Addenda Record – Optional (IAT Record.
Returns); 21 positions – Addenda Record –
Optional/Mandatory (dishonored Returns)
OR102 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
The Addenda Type Code defines the specific The RDFI posts the amount to the appropriate
interpretation and format for the addenda account authorized by the Receiver. A zero Amount
information contained in the Entry. is acceptable only with specific Transaction Codes.
2 0 1 3 O P E R AT I N G R U L E S OR103
APPENDIX THREE – ACH Record Format Specifications
Authorization Code: 6 Positions – Addenda Card Transaction Type Code: 2 Positions – Entry
Record – Optional (POS, SHR) Detail Record – Mandatory (POS, SHR, Returns,
dishonored Returns, contested dishonored
POS, SHR: This field indicates the code that a card Returns)
authorization center has furnished to the merchant.
POS, SHR: This code is used by card processors to
Batch Count: 6 Positions – File Control Record – identify the type of transaction, such as a purchase,
Mandatory (all Files) cash advance, or reversal. Values for this field are
assigned by the major card Organizations.
The value of this field must be equal to the number
of Company/Batch Header Records in the File. Code Values:
01 Purchase of goods or services
Batch Number: 7 Positions – Company/Batch
Header Record and Company/Batch Control 02 Cash
Record – Mandatory (all batches) 03 Return Reversal
The ODFI or its Sending Point assigns this number 11 Purchase Reversal
in ascending sequence to each batch in a File of 12 Cash Reversal
Entries. The batch number in the Company/Batch
13 Return
Header Record and the Company/Batch Control
Record must be the same. 21 Adjustment
99 Miscellaneous Transaction
Block Count: 6 Positions – File Control Record –
Mandatory (all Files) Change Code: 3 Positions – Addenda Record –
Mandatory (COR, refused COR)
The Block Count contains the number of blocks (a
block is 940 characters) in the File, including both A code used by the RDFI to describe the reason
the File Header and File Control Records. for Transmitting a Notification of Change. See
Appendix Five (Notification of Change) for a
Blocking Factor: 2 Positions – File Header Record complete listing of Change Codes.
– Mandatory (all Files)
Check Digit: 1 Position – Entry Detail Record,
The Blocking Factor defines the number of Records Corporate Entry Detail Record – Mandatory (all
within a block (a block is 940 characters). For all entries)
Files moving between a DFI and an ACH Operator
(either way), the value “10” must be used. If the The Check Digit is computed using Modulus 10 as
number of Records within the File is not a multiple follows:
of ten, the remainder of the block must be filled
with “9’s.” (1) Multiply each digit in the Routing number by
a weighting factor. The weighting factors for
Card Expiration Date: 4 Positions – Entry Detail each digit are:
Record – Required (SHR); 6 Positions – Addenda
Record – Optional (POS, SHR) Position: 12345678
Weights: 37137137
POS, SHR: This code is used by cardholder
processors and cardholder Financial Institutions to (2) Add the results of the eight multiplications.
verify that the card remains valid and that certain
security procedures required by various card (3)
Subtract the sum from the next highest
authorization systems have been met. multiple of 10. The result is the Check Digit.
OR104 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
2 0 1 3 O P E R AT I N G R U L E S OR105
APPENDIX THREE – ACH Record Format Specifications
ENR: This field must contain the word Except as otherwise noted below, this field must
“AUTOENROLL” when the batch contains contain the name by which the Originator is
Automated Enrollment Entries. known to and readily recognized by the Receiver
of the Entry.
RCK: This field must contain the word
“REDEPCHECK”. In a transaction in which the Originator of a debit
Entry is not the payee of the transaction (the party
TRX: This field contains the routing number of the to which payment is ultimately being directed),
keeper. the Company Name field of the debit Entry must
contain the name by which the payee is known
XCK: This field must contain the words “NO to and readily recognized by the Receiver of the
CHECK”. Entry. In a transaction in which the Originator of
a credit Entry is not the payor of the transaction
Company Identification: 10 Positions – Company/ (the party from which payment is ultimately being
Batch Header Record – Mandatory (all batches directed), the Company Name field of the credit
except IAT); 10 Positions – Company/Batch Control Entry must contain the name by which the payor is
Record – Required (all batches) known to and readily recognized by the Receiver
of the Entry.
The Company Identification is an alphameric code
used to identify an Originator. The Company For Return Fee Entries, this field must contain the
Identification Field must be included on all Entries. same name of the Originator as identified in the
Company Name field of the underlying Entry. For
The Company ID may begin with an ANSI one- a Return Fee Entry based on the return of a Check,
digit Identification Code Designator (ICD), the Company Name field must contain the name of
followed by the identification number. The ANSI the payee of the Check.
Identification Numbers and related Identification
Code Designators (ICD) are: ADV: The ACH Operator is both the Originator and
the ODFI. The ACH Operator originating the ADV
IRS Employer Identification Number (EIN) “1.” File identifies itself by name in this field.
Data Universal Numbering Systems (DUNS)
“3.” ARC, BOC: This field identifies the payee of the
Eligible Source Document or the payee name
User Assigned Number “9.” indicated on the bill or invoice.
CIE: This field contains the bill payment service CIE: This field contains the bill payment service
provider’s identification number. provider’s name.
IAT: For IAT Entries, the Company Identification MTE: This field identifies the owner of the terminal
Field within the Company/Batch Control Record where the transaction was initiated.
must contain the information found within
positions 41-50 (Originator Identification) of the POP, POS, SHR: This field identifies the merchant
IAT Company/Batch Header Record. with whom the Receiver initiated the transaction.
MTE (Credits): The ODFI is the company/ RCK: This field identifies the Originator of the RCK
Originator. Entry, which is the original payee on the face of
the Check.
Company Name: 16 Positions – Company/Batch
Header Record – Mandatory (all batches except TRC: This field identifies the name of the keeper.
IAT)
XCK: This field must contain the words “CHECK
This field identifies the source of the Entry and DESTROYED” (left justified).
is used for descriptive purposes for the Receiver.
OR106 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
Contested Dishonored Return Reason Code: contested dishonored Returns, COR, refused COR);
3 Positions – Addenda Record – Mandatory 15 Positions – Entry Detail Record – Required
(contested dishonored Returns) (ADV)
A standard code used by the RDFI to describe the The DFI Account Number is the RDFI’s customer’s
reason for contesting a Dishonored Return. See account number. It is usually obtained from: (1)
Appendix Four (Return Entries) for a complete the “on-us” field of the MICR line of a Check; (2)
listing of Contested Dishonored Return Reason account statement; (3) passbook; or (4) other
Codes. source document provided by the RDFI that
specifically designates the account number to be
Corrected Data: 29 Positions – Addenda Record used for ACH purposes. A DFI that does not use
– Mandatory (all COR, refused COR entries except the MICR line of its Checks/share drafts for ACH
those related to IAT); 35 Positions – Addenda routing purposes (routing number and account
Record – Mandatory (COR entries related to IAT) number) is advised to print clearly the correct
routing information on the face of the Check/
The Corrected Data field is used by the RDFI to share draft.
relay corrected customer information (i.e., DFI
Account Number, Transaction Code, etc.) back to When obtaining information from the on-us
the Originator of that Entry. The Corrected Data field of the MICR line of a Check, left justify the
field in a Refused Notification of Change is copied information and enter only numbers (0 through 9)
from the Corrected Data field of the original and hyphens (-). If information is obtained from
Notification of Change. another source, alpha characters may be included.
COR Trace Sequence Number: 7 positions – If the Receiver’s account number contains
Addenda Record – Mandatory (refused COR) more than 17 valid characters, the leftmost
17 characters are inserted in the DFI Account
The last seven digits of the Trace Number contained Number field and the remaining characters
in the original Notification of Change. truncated, e.g., “012345678901234567” will appear
“01234567890123456”. If fewer than 17 characters,
Date of Death: 6 Positions – Addenda Record – left justify and leave the unused spaces blank.
Optional (Returns) Spaces within the Receiver account number must
be ignored when the Entry is formatted, e.g., “0123
The date of death is to be supplied on Entries 456789” would appear as “0123456789” and “0123-
being returned for reason of death (return reason 4 56789” would appear as “0123-456789.” Exact
codes R14 and R15). formatting of the DFI Account Number Field is
essential to ensure standard positioning of account
Date Original Entry Returned: 6 positions – number characters when Entries are received for
Addenda Record – Mandatory with R73, otherwise processing by the RDFI.
Optional (contested dishonored Returns)
ADV: Contains a 15 character DFI Account Number.
This field contains the date the RDFI initiated the
original Return. The Date Original Entry Returned ENR: Contains information provided by the
is used when a Dishonored Return Entry is Federal Government Agency participating in the
contested on the grounds that the original Return Automated Enrollment program.
was untimely (R73).
Discretionary Data: 2 Positions – Entry Detail
DFI Account Number: 17 Positions – Entry Detail Record, Corporate Entry Detail Record – Optional
Record – Required (ACK, ADV, ARC, ATX, BOC, (ACK, ADV, ARC, ATX, BOC, CCD, CIE, CTX, DNE,
CCD, CIE, CTX, DNE, ENR, MTE, POP, POS, PPD, MTE, POP, PPD, RCK, XCK, Returns, dishonored
RCK, SHR, TEL, TRC, TRX, WEB, XCK, refused Returns, contested dishonored Returns, COR,
ACK, refused ATX, Returns, dishonored Returns, refused COR)
2 0 1 3 O P E R AT I N G R U L E S OR107
APPENDIX THREE – ACH Record Format Specifications
This field in the Entry Detail Record allows ODFIs Document Reference Number: 11 Positions –
to include codes, of significance to them, to enable Entry Detail Record – Required (SHR)
specialized handling of the Entry. There is no
standardized interpretation for the value of this This field further defines the transaction in the
field. It can either be a single two-character code, event of a Receiver’s inquiry. An example is an
or two distinct one-character codes, according to Electronic sequence number.
the needs of the ODFI and/or Originator involved.
This field must be returned intact for any returned Effective Entry Date: 6 Positions – Company/
Entry. Batch Header Record – Required (all batches)
CCD, CTX: When an Acknowledgment Entry is The Effective Entry Date is the date specified by the
requested by an Originator, this field contains Originator on which it intends a batch of Entries
“AK”. to be settled. For credit Entries, the Effective Entry
Date must be either one or two Banking Days
Dishonored Return Reason Code: Addenda following the Banking Day of processing by the
Record; 3 Positions – Addenda Record – Mandatory Originating ACH Operator (the processing date).
(dishonored Return Entry); 2 Positions – Addenda For debit Entries, the Effective Entry Date must be
Record – Mandatory (contested dishonored Return one Banking Day following the processing date.
Entry)
Batches of Entries containing an Effective Entry
A standard code used by the ODFI to describe Date beyond the designated number of days
the reason for dishonoring a Return Entry. In a allowed are Rejected by the ACH Operator and
Contested Dishonored Return Entry, this field returned to the ODFI. If this field is blank or
contains only the numeric portion of the code. zero, or partially blank or partially non-numeric,
See Appendix Four (Return Entries) for a complete or contains an incomplete date, day numbers
listing of Dishonored Return Reason Codes. higher than 31 or month numbers higher than 12,
the Originating ACH Operator inserts the Banking
Dishonored Return Settlement Date: 3 Positions Day after the processing date as the Effective Entry
– Addenda Record – Mandatory (contested Date.
dishonored Returns)
ENR: For Automated Enrollment Entries, this field
The Dishonored Return Settlement Date is used must be space filled.
in the Contested Dishonored Return format. Data
for this field is obtained from the Settlement Date Return Entries, COR, TRC, TRX: The ACH Operator
field of the Dishonored Return Company/Batch does not edit this field.
Header Record.
The scheduled Settlement Date is inserted by the
Dishonored Return Trace Number: 15 Positions Receiving ACH Operator. See the definition of
– Addenda Record – Mandatory (contested “Settlement Date” in this Appendix Three.
dishonored Returns)
Entry/Addenda Count: 6 Positions – Company/
The Dishonored Return Trace Number is used in Batch Control Record – Mandatory (all batches);
the Contested Dishonored Return format. The 8 Positions – File Control Record – Mandatory (all
data for this field is obtained from positions 80 - Files)
94 of the Addenda Record or positions 80 - 94 of
the Entry Detail Record of the Dishonored Return This count is a tally of each Entry Detail Record
Entry. and each Addenda Record processed, within either
the batch or File, as appropriate.
OR108 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
Entry Detail Sequence Number: 7 Positions – File Creation Date: 6 Positions – File Header
Addenda Record – Mandatory (ACK, ATX, CCD, Record – Mandatory (all Files)
CIE, CTX, DNE, ENR, IAT, PPD, TRX, WEB, IAT
Returns) The File Creation Date is expressed in a
“YYMMDD” format. The File Creation Date is the
This field contains the ascending sequence number date on which the File is prepared by an ODFI
section of the Entry Detail or Corporate Entry (ACH input Files) or the date (exchange date) on
Detail Record’s trace number. This number is the which a File is Transmitted from ACH Operator to
same as the last seven digits of the trace number of ACH Operator, or from ACH Operator to RDFIs
the related Entry Detail Record or Corporate Entry (ACH output Files).
Detail Record.
File Creation Time: 4 Positions – File Header
Entry Hash: 10 Positions – Company/Batch Record – Optional (all Files)
Control Record and File Control Record –
Mandatory (all Files) The File Creation Time is expressed in an “HHMM”
(24 hour clock) format.
The Receiving DFI Identification in each Entry
Detail Record is hashed to provide a check File Identification: 5 Positions – Entry Detail
against inadvertent alteration of data contents due Record – Optional (ADV)
to hardware failure or program error. (NOTE:
Addenda Records are not hashed.) This field contains the File Creation Date and
File ID Modifier associated with the Automated
Company/Batch Control Record: The Entry Hash is Accounting Advice Entry.
the sum of all of the Receiving DFI Identification
fields contained within the Entry Detail Records File ID Modifier: 1 Position – File Header Record
in a batch. The Receiving DFI Identification Field – Mandatory (all Files)
contains the 8-digit routing number of the RDFI.
The hash is the sum of the 8-digit routing numbers. The File ID Modifier is provided in the File Header
Record to permit multiple Files created on the
Example #1: same date and between the same participants to be
distinguished. Only upper case A-Z and numeric
05600507 + 05140225 + 11400065 = 22140797. 0-9 are permitted.
This sum, 22140797, is placed within the Entry
Hash Field. ADV: The number in this field reflects, in
chronological order, the number of advices given
If the sum exceeds 10 characters, the Entry Hash in a particular cycle. The highest numbered advice
field must be populated with the rightmost 10 is the last advice of the cycle.
characters.
Foreign Correspondent Bank Branch Country
Example #2: Code: 3 positions – Addenda Record – Mandatory
(IAT)
If the sum of the Receiving DFI Identification
fields within a batch is 123456789012, the This field contains a 2-character code as
Entry Hash field would be populated with approved by the International Organization for
3456789012. Standardization (ISO) used to identify the country
in which the branch of the Foreign Correspondent
File Control Record: The Entry Hash is the sum Bank is located.
of the Entry Hash fields contained within the
Company/Batch Control Records of the File. If
the sum exceeds 10 characters, the field must be
populated with the rightmost 10 characters (see
example above).
2 0 1 3 O P E R AT I N G R U L E S OR109
APPENDIX THREE – ACH Record Format Specifications
This field identifies the name of the Foreign This field contains a code used to indicate the
Correspondent Bank. content of the Foreign Exchange Reference Field.
Code values for this field are:
Foreign Exchange Indicator: 2 Positions –
Company/Batch Header Record – Mandatory (IAT, 1 - Foreign Exchange Rate;
Returns, COR)
2 - Foreign Exchange Reference Number; or
This field contains a code used to indicate the 3 - Space Filled.
foreign exchange conversion methodology applied
to an IAT Entry. Use may be dependent on the Foreign Payment Amount: 18 Positions – Addenda
particular exchange services offered by a Gateway Record – Required (IAT, Returns)
Operator. Code values for this field are:
For Inbound IAT Entries, this field contains the
“FV” Fixed-to-Variable – Entry is originated amount for which the Entry was originated by
in a fixed-value amount and is to be the Foreign ODFI in the currency denomination
received in a variable amount resulting expressed in the Originating Currency Code
from the execution of the foreign Field of the Company/Batch Header Record. For
exchange conversion. Inbound IAT Entries returned by a U.S. RDFI,
this field is copied from the original Entry Detail
Variable-to-Fixed – Entry is originated
“VF” Record to the Entry Detail Record for IAT Returns.
in a variable-value amount based on
a specific foreign exchange rate for For Outbound IAT Entries originated using a
conversion to a fixed-value amount in Foreign Exchange Indicator of “FV” (fixed-to-
which the Entry is to be received. variable), this field is zero-filled. For Outbound
IAT Entries using a Foreign Exchange Indicator
OR110 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
of “VF” (variable-to-fixed) or “FF” (fixed-to-fixed), For Outbound IAT Entries, this field contains the
this field contains the amount for which the Entry standard routing number, as assigned by Accuity,
is to be received by the Foreign Receiver in the that identifies the U.S. ODFI initiating the Entry.
currency denomination expressed in the ISO
Destination Currency Code Field of the Company/ GO Identification/Receiving DFI Identification:
Batch Header Record. For Outbound IAT Entries 8 Positions – Entry Detail Record – Mandatory
returned by a U.S. Gateway Operator, this field (IAT, Returns, COR)
contains the Entry amount returned to the original
ODFI. This amount will be different from the For Outbound IAT Entries, this field contains the
amount for which the original Entry was originated routing number of the U.S. Gateway Operator.
if the same rate was not used for both the forward For Inbound IAT Entries, this field contains the
and Return Entry foreign exchange conversions. standard routing number, as assigned by Accuity,
that identifies the U.S. RDFI at which the Receiver
Foreign Receiver’s Account Number/DFI maintains his account.
Account Number: 35 Positions – Entry Detail
Record – Mandatory (IAT) IAT Indicator: 16 positions – Company/Batch
Header Record – Optional (IAT, Returns); 16
For Inbound IAT Entries, this field contains the positions – Company/Batch Header Record –
U.S. Receiver’s account number. Mandatory (COR entries related to IAT)
For Outbound IAT Entries, this field contains the For forward IAT Entries, this field is left blank. For
foreign Receiver’s account number. Notifications of Change related to IAT Entries, this
field must contain the value “IATCOR.”
Foreign Trace Number: 22 Positions – Addenda
Record – Optional (IAT) Identification Number: 15 Positions – Entry Detail
Record/Corporate Entry Detail Record – Optional
For Inbound IAT Entries, this field contains (CCD, CTX, ENR, TRX, Returns, dishonored Returns,
the trace number assigned to the Entry in the contested dishonored Returns, COR, refused COR)
originating national payments system.
This field may be used by the Originator to insert
Format Code: 1 Position – File Header Record – its own number for tracing purposes.
Mandatory (all Files)
ENR: For Federal Government automated
This field must contain a value of “1.” enrollment Entries, this field is space filled.
This field indicates the results of a Gateway This field contains the routing number of the ACH
Operator screen for OFAC compliance. A value Operator or Receiving Point to which the File is
of “0” indicates that the Gateway Operator has not being Transmitted. The 10 character field begins
found a potential blocked party, as identified by with a blank in the first position, followed by the
OFAC on its list of Specially Designated Nationals four digit Federal Reserve Routing Symbol, the
(“SDN list”). A value of “1” indicates the potential four digit ABA Institution Identifier, and the Check
presence of a blocked party. This field must be Digit (bTTTTAAAAC).
space filled if no screening has been conducted.
Immediate Destination Name: 23 Positions – File
GO Identification/Originating DFI Header Record – Optional (all Files)
Identification: 8 positions – Company/Batch
Header Record – Mandatory (IAT, Returns, COR) This field contains the name of the ACH Operator
or Receiving Point for which that File is destined.
For Inbound IAT Entries, this field contains the
routing number of the U.S. Gateway Operator.
2 0 1 3 O P E R AT I N G R U L E S OR111
APPENDIX THREE – ACH Record Format Specifications
Immediate Origin: 10 Positions – File Header update accounts receivable Records. It should
Record – Mandatory (all Files) be the number shown on an invoice, statement,
billhead, notice or other communication as the
This field contains the routing number of the ACH reference. Numbers may be policy, customer,
Operator or Sending Point that is Transmitting the invoice, meter, sequence and/or alphanumeric
File. The 10 character field begins with a blank combinations. Field 8, rather than Field 7, of the
in the first position, followed by the four digit Entry Detail Record is used for the Individual
Federal Reserve Routing Symbol, the four digit Identification Number.
ABA Institution Identifier, and the Check Digit
(bTTTTAAAAC). MTE: Field 8, rather than Field 7, of the Entry Detail
Record is used for the Individual Identification
NOTE: This field may also be mutually defined Number.
between the ODFI and Originator. For example,
the ODFI may ask its Originator to put its tax PPD: For a Return Fee Entry related to an ARC,
identification number in this field; however, the BOC, POP, or RCK Entry or to an item that was
field must contain the routing number of the eligible to be converted to a debit Entry but was
Sending Point when the File is Transmitted to the not converted, this field must contain the check
ACH Operator. serial number contained within the ARC, BOC,
POP, or RCK Entry or item.
Immediate Origin Name: 23 Positions – File
Header Record – Optional (all Files) Individual Name: 22 positions – Entry Detail
Record – Mandatory (TEL, WEB, and Returns,
This field contains the name of the ACH Operator dishonored Returns, and contested dishonored
or Sending Point that is Transmitting the File. Returns for TEL and WEB); 22 Positions – Entry
Detail Record – Required (ADV, DNE, POS, PPD,
Individual Card Account Number: 22 Positions – RCK, Returns, dishonored Returns, contested
Entry Detail Record – Required (SHR) dishonored Returns, COR, refused COR); 22
Positions – Entry Detail Record – Optional (ARC,
The Individual Card Account Number is the number BOC, POP); 15 Positions – Entry Detail Record –
assigned by the card issuer and is obtained from Required (CIE); 15 Positions – Entry Detail Record
the card itself. – Mandatory (MTE)
Individual Identification Number: 15 Positions Except as noted below, this field is entered by the
– Entry Detail Record – Optional (DNE, POS, PPD, Originator to provide additional identification of
TEL, WEB, Returns, dishonored Returns, contested the Receiver and may be helpful in identifying
dishonored Returns, COR, refused COR); 22 returned Entries.
Positions – Entry Detail Record – Mandatory (CIE,
MTE) ADV: This field contains the name associated with
the Advice Routing Number in positions 40-48 of
Except as otherwise noted below, this field contains the Entry Detail Record.
the accounting number by which the Receiver is
known to the Originator. It is included for further ARC, BOC, POP: This field may contain the
identification and for descriptive purposes. The Receiver’s name or a reference number,
RDFI should assume no specific format to be identification number, or code that the merchant
present (e.g., presence or absence of dashes), but needs to identify the particular transaction or
can assume that the field is pre-edited so that it is customer.
suitable for description as is (including blanks in
unused positions). CIE: This field is entered by the ODFI to provide
additional identification for the Receiver and may
CIE: This field contains the accounting number be helpful in identifying returned Entries. Field 7,
by which the Originator (payor) is known to the rather than Field 8, of the Entry Detail Record is
Receiver (payee). It is used by the Receiver to used for the Individual Name.
OR112 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
MTE: Field 7, rather than Field 8, of the Entry Message Authentication Code (MAC): 19
Detail Record is used for the Individual Name. Positions – Company/Batch Control Record –
Optional (all batches)
ISO Destination Country Code: 2 Positions –
Company/Batch Header Record – Mandatory (IAT, The MAC is an eight character code derived
Returns, COR) from a special key used in conjunction with the
DES algorithm. The MAC is used to validate the
This field contains the two-character code, as authenticity of ACH Entries. The DES algorithm
approved by the International Organization for and key message standards must be in accordance
Standardization (ISO), to identify the country in with standards adopted by the American National
which the Entry is to be received. Standards Institute. The remaining eleven
characters of this field are blank.
ISO Destination Currency Code: 3 Positions –
Company/Batch Header Record – Mandatory (IAT, Network Identification Code: 3 Positions –
Returns, COR) Addenda Record – Optional (MTE)
This field contains the three-character code, as This field uniquely identifies an ATM network and
approved by the International Organization for allows for processing of MTE transactions between
Standardization (ISO), to identify the currency DFIs belonging to different networks.
denomination in which the Entry is to be received.
Number of Addenda Records: 4 Positions –
ISO Originating Currency Code: 3 Positions – Corporate Entry Detail Record/Entry Detail Record
Company/Batch Header Record – Mandatory (IAT, – Mandatory (ATX, CTX, ENR, IAT, TRX, COR (IAT
Returns, COR) entries), refused ATX); 4 Positions – Corporate
Entry Detail Record – Required (COR (except IAT),
This field contains the three-character code, as refused COR)
approved by the International Organization for
Standardization (ISO), to identify the currency CTX: This number represents the number of
denomination in which the Entry was first Addenda Records associated with the Corporate
originated. Entry Detail Record. This field will be zero filled if
Field 12 (Addenda Record Indicator Value) of the
Item Research Number: 16 Positions – Entry related Corporate Entry Detail Record contains a
Detail Record – Required (TRC, XCK) value of “0.”
This field contains the MICR locator number for ATX, ENR, IAT, TRX: This number represents the
Check item research. number of Addenda Records associated with the
Entry Detail Record.
Item Type Indicator: 2 Positions – Entry Detail
Record – Optional (TRC, TRX) Original Entry Trace Number: 15 Positions –
Addenda Record – Mandatory (Returns, dishonored
This field indicates the type of items being Returns, contested dishonored Returns, COR,
truncated. refused COR, ACK, refused ACK, ATX, refused
ATX)
Code Values:
01 NACS Truncated Items This field contains the Trace Number as originally
included on the forward Entry or Prenotification.
Julian Date on Which Advice is Created: 3 The RDFI must include the Original Entry Trace
positions – Entry Detail Record – Mandatory (ADV) Number in the Addenda Record of an Entry being
returned to an ODFI, in the Addenda Record of an
This field contains the Julian date on which an NOC, within an Acknowledgment Entry, or with an
Automated Accounting Advice is created. RDFI request for a copy of an authorization.
2 0 1 3 O P E R AT I N G R U L E S OR113
APPENDIX THREE – ACH Record Format Specifications
OR114 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
the foreign financial institution initiating the identification of the Originator to the ODFI. When
payment transaction, as identified within the used, this code must appear in the first position of
Originating DFI Identification field of the this field, followed by the Originator Identification,
Fourth IAT Addenda Record. as defined above.
• For Outbound IAT Entries, this field must When the ODFI has a contractual relationship with
contain the name of the U.S. ODFI. a Third-Party Sender rather than the Originator
itself, the value of this field may identify either the
Originator City and State/Province: 35 Positions Originator or the Third-Party Sender.
– Addenda Record – Mandatory (IAT)
Originator Name: 35 Positions – Addenda Record
This field contains the city and, if applicable, the – Mandatory (IAT)
state or province of the Originator. An asterisk
(“*”) must be used as the delimiter between the This field contains the name of the Originator of
data elements, and the backslash (“\”) must be the transaction.
used as the terminator following the last data
element. Originator Status Code: 1 Position – Company/
Batch Header Record – Mandatory (all batches)
Originator Country and Postal Code: 35 Positions
– Addenda Record – Mandatory (IAT) This code refers to the ODFI initiating the Entry.
This field contains the country and postal code of Code Values:
the Originator. An asterisk (“*”) must be used as 0 ADV File prepared by an ACH Operator.
the delimiter between the data elements, and the
backslash (“\”) must be used as the terminator 1
This code identifies the Originator as a
following the last data element. depository financial institution.
2
This code identifies the Originator as a
Originator Identification: 10 Positions – Federal Government entity or agency.
Company/Batch Header Record – Mandatory (IAT,
Returns, COR) ADV: This field must contain “0”.
2 0 1 3 O P E R AT I N G R U L E S OR115
APPENDIX THREE – ACH Record Format Specifications
contained within the original CCD or CTX Entry, DNE: Addenda Records contains the following
and/or other information of significance to the NACHA endorsed banking convention starting in
Originator. position 04:
OR116 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
2 0 1 3 O P E R AT I N G R U L E S OR117
APPENDIX THREE – ACH Record Format Specifications
located to the right of the account number in the Receiving Company Name/ID Number: 16
on-us field of the MICR line and is sometimes Positions – Corporate Entry Detail Record –
called a transaction code. Required (ATX, CTX, ENR, TRX, refused ATX,
Returns, dishonored Returns, contested dishonored
Receiver City and State/Province: 35 Positions – Returns, COR, refused COR)
Addenda Record – Mandatory (IAT)
This field identifies the Receiver and can be used
This field contains the city and, if applicable, the for descriptive purposes. The field may contain
state or province of the Receiver. An asterisk (“*”) the Receiving Company’s name or an identifying
must be used as the delimiter between the data number for that Company.
elements, and the backslash (“\”) must be used
as the terminator following the last data element. ENR: This field contains the name of the Federal
Government agency participating in the Automated
Receiver Country and Postal Code: 35 Positions Enrollment program. (Federal Government
– Addenda Record – Mandatory (IAT) Agencies will provide this information to DFIs
initiating Automated Enrollment Entries.)
This field contains the country and postal code
of the Receiver. An asterisk (“*”) must be used Receiving Company Name/Individual Name: 35
as the delimiter between the data elements, and Positions – Addenda Record – Mandatory (IAT)
the backslash (“\”) must be used as the terminator
following the last data element. This field identifies the Receiver of the transaction.
Receiver Identification Number: 15 Positions – Receiving DFI Branch Country Code: 3 Positions
Addenda Record – Optional (IAT) – Addenda Record – Mandatory (IAT)
This field may be used by the Originator to insert This field contains a 2-character code, as
its own number for tracing purposes. approved by the International Organization for
Standardization (ISO), to identify the country in
Receiver Street Address: 35 Positions – Addenda which the branch of the bank that receives the
Record – Mandatory (IAT) Entry is located.
This field contains the physical street address of Receiving DFI Identification: 8 Positions – Entry
the Receiver. Detail Record – Mandatory (ACK, ADV, ARC, ATX,
BOC, CCD, CIE, CTX, DNE, ENR, MTE, POP, POS,
Receiving Company Name: 22 positions – Entry PPD, RCK, SHR, TEL, TRC, TRX, WEB, XCK, refused
Detail Record – Required (ACK, CCD, refused ACK, ACK, refused ATX, Returns, dishonored Returns,
Returns, dishonored Returns, contested dishonored contested dishonored Returns, COR, refused COR);
Returns, COR, refused COR); 22 Positions – Entry 34 positions – Addenda Record – Mandatory (IAT)
Detail Record – Optional (ARC, BOC, POP)
The standard routing number as assigned by
This field is entered by the Originator to provide Accuity (with Check Digit) is used to identify the
additional identification of the Receiver and may DFI in which the Receiver maintains his account or
be helpful in identifying Return Entries. a routing number assigned to a Federal Government
agency by the Federal Reserve. For IAT Entries,
ARC, BOC, POP: This field may contain the this field contains the bank identification number
Receiver’s name or a reference number, of the DFI at which the Receiver maintains his
identification number, or code that the merchant account.
needs to identify the particular transaction or
customer. ENR: This field contains the routing number
assigned to a Federal Government agency for the
purpose of the automated enrollment process. Any
Entry with a dollar value directed to that routing
OR118 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
number in error is not subject to compensation Reference Information #1: 7 Positions – Addenda
rights as provided in these Rules. Record – Optional (POS, SHR)
Receiving DFI Identification Number Qualifier: This field may be used for additional reference
2 Positions – Addenda Record – Mandatory (IAT) numbers, identification numbers, or codes that
the merchant needs to identify the particular
This field contains a 2-digit code that identifies transaction or customer.
the numbering scheme used in the Receiving DFI
Identification Number field. Code values for this Reference Information #2: 3 Positions – Addenda
field are: Record – Optional (POS, SHR)
01 National Clearing System Number; This field may be used for additional reference
numbers, identification numbers, or codes that
02 BIC Code; or
the merchant needs to identify the particular
03 IBAN. transaction or customer.
This field is reserved for information pertinent to Return Settlement Date: 3 Positions – Addenda
the Originator. Record – Mandatory (dishonored Returns,
contested dishonored Returns)
ADV: This field must contain “ADV FILE”.
The Return Settlement Date is used in the
Dishonored Return format. The data for this field
2 0 1 3 O P E R AT I N G R U L E S OR119
APPENDIX THREE – ACH Record Format Specifications
is obtained from the Settlement Date field in the Settlement Date: 3 Positions – Company/Batch
Company/Batch Header of the Return Entry. Header Record – Inserted by Receiving ACH
Operator (all batches)
Return Trace Number: 15 Positions – Addenda
Record – Mandatory (dishonored Returns, The Settlement Date (a 3-digit Julian date) for
contested dishonored Returns) a batch of Entries is inserted by the Receiving
ACH Operator. This is the date on which the
The Return Trace Number is used in the Dishonored Participating DFI or its correspondent is scheduled
Return format. The data for this field is obtained to be debited or credited by the Federal Reserve.
from positions 80 - 94 of the Addenda Record or
positions 80 -94 of the Entry Detail Record of the The Settlement Date inserted by the Receiving
Return Entry. ACH Operator is the same as the Effective Entry
Date designated by the Originator unless the
Routing Number of ACH Operator: 8 positions – Effective Entry Date is the same as or earlier than
Entry Detail Record – Mandatory (ADV) the Originating ACH Operator’s processing date
(the Banking Day of processing). In these cases,
This field contains the routing number of the ACH the scheduled Settlement Date will be the Banking
Operator that is Transmitting the File. Day following the Banking Day of processing.
Secondary OFAC Screening Indicator: 1 Position Returns, dishonored Returns, and contested
– Entry Detail Record – Optional (IAT) dishonored Returns are settled by the ACH
Operator no earlier than the Effective Entry Date
This field indicates the results of a Third-Party contained within the original Entry, as it appears in
Service Provider screen for OFAC compliance. A the Return Entry Company/Batch Header Record.
value of “0” indicates that the Third-Party Service The return of an Entry that contains an invalid or
Provider has not found a potential blocked party, stale Effective Entry Date will be settled by the
as identified by OFAC on its list of Specially ACH Operator at the earliest opportunity (i.e., the
Designated Nationals (“SDN list”). A value of “1” Banking Day of processing or the next Banking
indicates the potential presence of a blocked party. Day).
This field must be space filled if no screening has
been conducted. Notifications of Change and TRC/TRX Entries
will be settled at the earliest opportunity, i.e., the
Sequence Number Within Batch: 4 positions – Banking Day of processing or the next Banking
Entry Detail Record – Mandatory (ADV) Day.
This field contains the sequence number of an Standard Entry Class Code: 3 Positions –
Entry Detail Record within a batch of Entries. Company/Batch Header – Mandatory (all batches)
Service Class Code: 3 Positions – Company/ This field contains a three-character code used to
Batch Header Record and Company/Batch Control identify various types of Entries.
Record – Mandatory (all batches)
CK: ACH Payment Acknowledgment –
A
The Service Class Code (BAI Specifications) The code that identifies a Non-Monetary
identifies the general classification of dollar Entry initiated by an RDFI to provide an
Entries to be exchanged. ACH Entries are assigned acknowledgment of receipt by the RDFI of a
Service Class Code series 200-299. corporate credit payment originated using the
CCD format.
Code Values:
200 ACH Entries Mixed Debits and Credits ADV: Automated Accounting Advice – The
code that identifies a Non-Monetary Entry
220 ACH Credits Only that is used by an ACH Operator to provide
225 ACH Debits Only
280 ACH Automated Accounting Advices
OR120 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
2 0 1 3 O P E R AT I N G R U L E S OR121
APPENDIX THREE – ACH Record Format Specifications
Originator to the Receiver’s account based on RC: Check Truncation Entry – The code that
T
an Eligible Source Document provided to the identifies a debit Entry initiated pursuant to
Originator by the Receiver at the point-of- a Check Truncation Program that permits the
purchase or manned bill payment location to Truncation of a single Check drawn on the
transfer funds from the Receiver’s account. paying bank.
OR122 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
Terminal Location: 27 Positions – Addenda Transmission (File Creation) Date, and File ID
Record – Required (MTE, POS, SHR) Modifier, the Trace Number uniquely identifies an
Entry within a specific File. For Addenda Records,
This field identifies the specific location of a the Trace Number is identical to the Trace Number
terminal (i.e., street names of an intersection, in the associated Entry Detail Record.
address, etc.) in accordance with the requirements
of Regulation E. Throughout the entire processing cycle (from
ODFI to RDFI) the Trace Number is retained with
Terminal State: 2 Positions – Addenda Record – the Entry. The Trace Number is critical in routing
Required (MTE, POS, SHR); 2 Positions – Entry returned Entries from the RDFI back to the ODFI
Detail Record – Mandatory (POP) through the ACH.
This field identifies the state of the United States in Since it is possible, although undesirable, for an
which an Electronic terminal is located. ODFI to duplicate Trace Numbers on separate
Files or within different batches submitted during
Total Amount: 10 Positions – Corporate Entry the same processing date, the File ID Modifier
Detail Record – Mandatory (ATX, CTX, TRX, contained in the ODFI’s File Header Record should
refused ATX, Returns, dishonored Returns, also be referenced when the ODFI is tracing
contested dishonored Returns, COR, refused COR) returned Entries.
The net dollar value of all items paid to the same
The Trace Number is constructed as follows:
business is the total amount. The RDFI posts this
total amount to the appropriate account.
Positions
ATX: The value of this field must always be zero. 01 - 08
Routing number of ODFI (the
Originating DFI Identification).
Total Debit or Credit Entry Dollar Amount (all
Files): 12 positions – Company/Batch Control and 09 - 15 E
ntry Detail Sequence Number –
File Control Records – Mandatory (all Standard The number assigned in ascending
Entry Class Codes except ADV); 20 positions – order to each Entry within each
Company/Batch Control and File Control Records batch. Provisions should be made
– Mandatory (ADV) by the ODFI to avoid duplication of
Trace Numbers if multiple data Files
These fields contain accumulated Entry Detail debit are prepared on the same day. Trace
and credit totals within a specific batch (Company/ Numbers are not required to be
Batch Control Record) and accumulated Company/ contiguous.
Batch Control Record debit and credit totals within
a specific File (File Control Record). Transaction Code: 2 Positions – Entry Detail
Record – Mandatory (ACK, ADV, ARC, ATX, BOC,
Trace Number: 15 Positions – Entry Detail Record, CCD, CIE, CTX, DNE, ENR, IAT, MTE,POP, POS,
Corporate Entry Detail Record, and Addenda PPD, RCK, SHR, TEL, TRC, TRX, WEB, XCK, refused
Records – Mandatory (ACK, ARC, ATX, BOC, CCD, ACK, refused ATX, Returns, dishonored Returns,
CIE, CTX, DNE, ENR, IAT, MTE, POP, POS, PPD, contested dishonored Returns, COR, refused COR)
RCK, SHR, TEL, TRC, TRX, WEB, XCK, refused
ACK, refused ATX, Returns, dishonored Returns, Transaction Codes identify various types of debit
contested dishonored Returns, COR, refused COR) and credit Entries.
2 0 1 3 O P E R AT I N G R U L E S OR123
APPENDIX THREE – ACH Record Format Specifications
22 Demand Credit
Financial Institution General Ledger Debit
23 Prenotification of Demand Credit; Death Records
Notification (non-dollar); Automated 46 Return or Notification of Change for
Enrollment Entry (non-dollar) original transaction code 47, 48, or 49
24 Zero dollar with remittance data (for 47 General Ledger Debit
CCD, CTX, and IAT Entries only); 48 Prenotification of General Ledger Debit
Acknowledgment Entries (ACK and ATX (non-dollar)
Entries only) 49 Zero dollar with remittance data (for CCD
and CTX only)
Demand Debit Records (for checking, NOW,
and share draft accounts) Loan Account Credit Records
25 Reserved 51 Return or Notification of Change for
26 Return or Notification of Change for original transaction code 52, 53, or 54
original transaction code 27, 28, or 29 52 Loan Account Credit
27 Demand Debit 53 Prenotification of Loan Account Credit
28 Prenotification of Demand Debit (non- (non-dollar)
dollar) 54 Zero dollar with remittance data (for CCD
29 Zero dollar with remittance data (for CCD, and CTX Entries only)
CTX, and IAT Entries only)
Loan Account Debit Records (for Reversals
Savings Account Credit Records
Only)
30 Reserved
31 Return or Notification of Change for 55 Loan Account Debit (Reversals Only)
original transaction code 32, 33, or 34 56 Return or Notification of Change for
32 Savings Credit original transaction code 55
33 Prenotification of Savings Credit; Death
Accounting Records (for use in ADV Files only)
Notification (non-dollar); Automated
Enrollment Entry (non-dollar) These transaction codes represent accounting
34 Zero dollar with remittance data (for Entries.
CCD, CTX, and IAT Entries only);
Acknowledgment Entries (ACK and ATX 81 Credit for ACH debits originated
Entries only) 82 Debit for ACH credits originated
83 Credit for ACH credits received
Savings Account Debit Records 84 Debit for ACH debits received
35 Reserved 85 Credit for ACH credits in Rejected batches
36 Return or Notification of Change for 86 Debit for ACH debits in Rejected batches
original transaction code 37, 38, or 39 87 Summary credit for respondent ACH
37 Savings Debit activity
38 Prenotification of Savings Debit (non- 88 Summary debit for respondent ACH
dollar) activity
39 Zero dollar with remittance data (for CCD,
CTX, and IAT Entries only) Transaction Date: 4 Positions – Addenda Record
– Required (MTE, POS, SHR)
Financial Institution General Ledger Credit
Records This date, expressed MMDD, identifies the date on
41 Return or Notification of Change for which the transaction occurred.
original transaction code 42, 43, or 44
42 General Ledger Credit Transaction Description: 7 Positions – Addenda
43 Prenotification of General Ledger Credit Record – Required (MTE)
(non-dollar)
44 Zero dollar with remittance data (for CCD This field describes the transaction in accordance
and CTX Entries only) with Regulation E. Possible descriptions include:
OR124 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX THREE – ACH Record Format Specifications
2 0 1 3 O P E R AT I N G R U L E S OR125
APPENDIX FOUR – Return Entries
OR126 2 0 1 3 O P E R AT I N G R U L E S
PART 4.2 Table of Return Reason Codes
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R01 Insufficient The available and/or cash RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8
Funds reserve balance is not Non-Consumer - RDFI’s Right to Transmit
sufficient to cover the dollar Return Entries.
value of the debit Entry.
R02 Account Closed A previously active account RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8
has been closed by action of Non-Consumer - RDFI’s Right to Transmit
2 0 1 3 O P E R AT I N G R U L E S
the customer or the RDFI. Return Entries.
R03 No Account/ The account number RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8 This Return Reason Code may
Unable to structure is valid and it Non-Consumer - RDFI’s Right to Transmit not be used to return ARC,
Locate Account passes the Check digit Return Entries. BOC, or POP Entries solely
validation, but the account because they do not contain the
number does not correspond Receiver’s name in the Individual
to the individual identified Name/Receiving Company
in the Entry, or the account Name Field.
number designated is not an
existing account.
R04 Invalid Account The account number RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8 The Entry may fail the Check
Number structure is not valid. Non-Consumer - RDFI’s Right to Transmit digit validation or may contain an
Structure Return Entries. incorrect number of digits.
R05 Unauthorized CCD or CTX debit Entry was RDFI Extended Consumer ** 60 Calendar Days Yes Article Three, Section 3.13
Debit to transmitted to a Consumer Return - RDFI Right to Transmit
Consumer Account of the Receiver and Extended Return Entries.
Account Using was not authorized by the Article Three, Subsection
Corporate SEC Receiver. 3.12.1 - Unauthorized Debit
Code Entry.
Article Three, Subsection
3.4.1.2 -Rule Exception for
CCD and CTX Entries to
Consumer Accounts.
R06 Returned per The ODFI has requested that RDFI Return Consumer or Not defined, No Article Two, Subsection 2.12.2 If the RDFI agrees to return the
ODFI’s Request the RDFI return an Erroneous Non-Consumer determined by ODFI - ODFI Request for Return. Entry, the ODFI must indemnify
Entry. and RDFI. the RDFI according to Article
Two, Subsection 2.12.3.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR127
APPENDIX FOUR – Return Entries
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
OR128
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R07 Authorization The RDFI’s customer (the RDFI Extended Consumer ** 60 Calendar Days Yes Article Three, Section 3.13 This Return Reason Code may
Revoked by Receiver) revoked the Return - RDFI Right to Transmit not be used for ARC, BOC, POP,
Customer authorization previously Extended Return Entries. or RCK Entries..
provided to the Originator for Article Three, Subsection
this debit Entry. 3.12.1 - Unauthorized Debit
Entry
R08 Payment The Receiver has placed a RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.7 A stop payment order may be
Stopped stop payment order on this Non-Consumer - RDFI Obligation to Stop placed on one or more debit
debit Entry. Payment. Entries.
APPENDIX FOUR – Return Entries
R09 Uncollected A sufficient ledger balance RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8
Funds exists to satisfy the dollar Non-Consumer - RDFI’s Right to Transmit
value of the transaction, Return Entries.
but the available balance is
below the dollar value of the
debit Entry.
R10 Customer The RDFI has been notified RDFI Extended Consumer; for ** 60 Calendar Days Yes Article Three, Subsection May be used for any Entry
Advises Not by the Receiver that the Entry Return ARC, BOC, IAT, 3.12.1 - Unauthorized Debit except CCD or CTX Entries
Authorized, is unauthorized, improper, or or POP, Entries Entry. For CCD or CTX Entries to
Improper, or ineligible. may also be a Article Three, Subsection Consumer Accounts, see R05.
u Ineligible The RDFI has been notified Non-Consumer. 3.12.2 - Improper ARC, BOC, For CCD or CTX to Non-
Customer by the Receiver that the Entry See note for POP, and RCK Debit Entries. Consumer Accounts, see R29.
Advises Not is unauthorized, improper, additional Article Three, Subsection May also be used to return an
Authorized, ineligible, or part of an exceptions. 3.12.3- Incomplete unauthorized debit Entry to a
Improper, Incomplete Transaction. Transaction. non-consumer account if the
Ineligible, or
part of an Article Three, Subsection 3.1.3 debit Entry contains a consumer
Incomplete - RDFI May Rely on Standard SEC Code.
Transaction Entry Class Codes.
Article Three, Subsection
3.4.1.2 Rule Exception for
CCD and CTX Entries to
Consumer Accounts.
Article Three, Section 3.13
- RDFI Right to Transmit
Extended Return Entries.
Article Eight, Section 8.46 -
Incomplete Transaction.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
2 0 1 3 O P E R AT I N G R U L E S
uApproved April 2, 2012, Effective March 15, 2013
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R11 Check Used when returning a Check RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8 This Return Reason Code
Truncation truncation Entry. Non-Consumer - RDFI’s Right to Transmit should be used only if no
Entry Return Return Entries. other code is applicable. The
RDFI must use the Addenda
Information field in the Return
addenda record to specify the
2 0 1 3 O P E R AT I N G R U L E S
reason for return (i.e. “exceeds
dollar amount,” “stale date,”
etc.).
R12 Account Sold to A financial institution received RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8
Another DFI an Entry to an account that Non-Consumer - RDFI’s Right to Transmit
was sold to another financial Return Entries.
institution.
R13 Invalid ACH Entry contains a Receiving ACH Operator Reject/ Consumer or Next file delivery time No Appendix Two, Part 2.5 For ACH Operator use only.
Routing DFI Identification or Gateway Return Non-Consumer following processing (Automatic Entry Detail
Number Identification that is not a Rejection Criteria).
valid ACH routing number.
R14 Representative The representative payee is RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8 The representative payee is a
Payee either deceased or unable to Non-Consumer - RDFI’s Right to Transmit person or institution authorized
Deceased continue in that capacity. The Return Entries. to accept Entries on behalf of
or Unable to beneficiary is not deceased. one or more other persons, such
Continue in as legally incapacitated adults or
That Capacity minor children.
R15 Beneficiary or (1) The beneficiary is RDFI Return Consumer * 2 Banking Days No Article Three, Section 3.8 (1) The beneficiary is the person
Account Holder deceased, or - RDFI’s Right to Transmit entitled to the benefits and
(Other Than a (2) The account holder is Return Entries. may or may not be the account
Representative deceased. holder; or
Payee) (2) The account holder is the
Deceased owner of the account and is not
a representative payee.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR129
APPENDIX FOUR – Return Entries
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
OR130
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R16 Account Frozen Access to the account is RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8
restricted due to specific Non-Consumer - RDFI’s Right to Transmit
action taken by the RDFI or Return Entries.
by legal action.
n 1) Access to the account is RDFI or Return Consumer or * 2 Banking Days No Article Three, Section 3.8
Account
restricted due to specific Gateway Non-Consumer - RDFI’s Right to Transmit
Frozen/Entry
action taken by the RDFI Return Entries.
Returned
Per OFAC or by legal action; or (2)
APPENDIX FOUR – Return Entries
2 0 1 3 O P E R AT I N G R U L E S
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R19 Amount Field Amount field is non-numeric. ACH Operator Reject/ Consumer or Next file delivery time No See Appendix Two, Part For ACH Operator use only.
Error Amount field is not zero in a Return Non-Consumer following processing 2.5 (Automatic Entry Detail
Prenotification, DNE, ENR, Rejection Criteria) for a full
Notification of Change, explanation of this Return
refused Notification of Reason Code.
Change, or zero dollar CCD,
2 0 1 3 O P E R AT I N G R U L E S
CTX, or IAT Entry.
Amount field is zero in
an Entry other than a
Prenotification, DNE, ENR,
Notification of Change,
Return, dishonored Return,
contested dishonored Return,
or zero dollar CCD, CTX, or
IAT Entry.
Amount field is greater than
$25,000 for ARC, BOC, POP
Entries.
R20 Non- ACH Entry to a non- RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8 A non-Transaction Account. as
Transaction Transaction Account. Non-Consumer - RDFI’s Right to Transmit defined in Regulation D, would
Account Return Entries. include an account against
which transactions are prohibited
or limited.
R21 Invalid The identification number RDFI Return Non-Consumer * 2 Banking Days No Article Three, Section 3.8 This Return Reason Code
Company used in the Company - RDFI’s Right to Transmit is generally used on CIE
Identification Identification Field is not Return Entries. transactions.
valid.
R22 Invalid The Receiver has indicated RDFI Return Consumer or * 2 Banking Days No Article Three, Section 3.8 In CIE and MTE Entries, the
Individual ID to the RDFI that the number Non-Consumer - RDFI’s Right to Transmit Individual ID Number is used
Number with which the Originator was Return Entries. by the Receiver to identify the
identified is not correct. account.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR131
APPENDIX FOUR – Return Entries
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
OR132
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R23 Credit Entry Any credit Entry that is RDFI Return Consumer or RDFI must transmit No Article Three, Subsection Examples:
Refused by refused by the Receiver may Non-Consumer the Return Entry to 3.8.3.2 - Timing Requirements (1) a minimum amount required
Receiver be returned by the RDFI. the ACH Operator by for Credit Entries Refused by by the Receiver has not been
the ACH Operator’s Receiver. remitted;
deposit deadline for
(2) the exact amount required
the Return Entry to
has not been remitted;
be made available
to the ODFI no later (3) the account is subject to
than the opening litigation and the Receiver will
of business on the not accept the transaction;
(4) acceptance of the transaction
APPENDIX FOUR – Return Entries
2 0 1 3 O P E R AT I N G R U L E S
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R27 Trace Number Original Entry Trace Number ACH Operator Reject/ Consumer or Next file delivery time No Appendix Two, Part 2.5 For ACH Operator use only.
Error is not present in the Addenda Return Non-Consumer following processing (Automatic Entry Detail
Record on a Return or Rejection Criteria).
Notification of Change
Entry; or
Trace Number of an Addenda
2 0 1 3 O P E R AT I N G R U L E S
Record is not the same
as the Trace Number of
the preceding Entry Detail
Record.
R28 Routing The Check digit for a routing ACH Operator Reject/ Consumer or Next file delivery time No Appendix Two, Part 2.5 For ACH Operator use only.
Number Check number is not valid. Return Non-Consumer following processing (Automatic Entry Detail
Digit Error Rejection Criteria).
R29 Corporate The RDFI has been RDFI Return Non-Consumer * 2 Banking Days No Article Three, Section 3.8 Beyond the return time frame the
Customer notified by the Receiver - RDFI’s Right to Transmit ODFI may agree to accept a late
Advises Not (non-consumer) that a Return Entries. Return Entry; if so use R31.
Authorized specific Entry has not been Article Three, Subsection
authorized by the Receiver. 3.12.1 - Unauthorized Debit
Entry
R30 RDFI Not The RDFI does not ACH Operator Reject/ Consumer or Next file delivery time No Appendix Two, Part 2.5 For ACH Operator use only.
Participant participate in a Check Return Non-Consumer following processing (Automatic Entry Detail
in Check truncation program. Rejection Criteria).
Truncation Aricle Four, Subsection 4.2.6
Program - Return and Rejection of TRC
Entries or TRX Entries.
R31 Permissible The RDFI may return a CCD RDFI Return Non-Consumer Not defined, No Article Three, Subsection CCD and CTX Entries only.
Return Entry or CTX Entry that the ODFI determined by the 3.8.3.5 - Late Return Entries
(CCD and CTX agrees to accept. ODFI and RDFI. for CCD or CTX Entries with
only) ODFI Agreement.
R32 RDFI Non- The RDFI is not able to settle ACH Operator Reject/ Consumer or Next file delivery time No Appendix Two, Part 2.5 For ACH Operator use only.
Settlement the Entry. Return Non-Consumer following processing (Automatic Entry Detail
Rejection Criteria).
R33 Return of XCK This Return Reason Code RDFI Extended Consumer or ** 60 Calendar Days No Article Three, Subsection
Entry may only be used to return Return Non-Consumer 3.8.3.4 - Timing Requirements
XCK Entries and is at the for Return of XCK Entries.
RDFI’s sole discretion.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR133
APPENDIX FOUR – Return Entries
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
OR134
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R34 Limited The RDFI’s participation has ACH Operator Reject/ Consumer or Next file delivery time No Appendix Two, Part 2.5 For ACH Operator use only.
Participation been limited by a federal or Return Non-Consumer following processing (Automatic Entry Detail
DFI state supervisor. Rejection Criteria).
R35 Return of Debit Entries (with the ACH Operator Reject/ Consumer or Next file delivery time No Appendix Two, Part 2.5 For ACH Operator use only.
Improper Debit exception of Reversing Return Non-Consumer following processing (Automatic Entry Detail
Entry Entries) are not permitted Rejection Criteria)
for CIE Entries or to loan
accounts.
R36 Return of ACH credit Entries (with ACH Operator Reject/ Consumer or Next file delivery time No Appendix Two, Part 2.5 For ACH Operator use only.
APPENDIX FOUR – Return Entries
Improper Credit the exception of Reversing Return Non-Consumer following processing (Automatic Entry Detail
Entry Entries) are not permitted for Rejection Criteria).
use with ARC, BOC, POP,
RCK, TEL, WEB, and XCK.
R37 Source The source document to RDFI Extended Consumer or ** 60 Calendar Days Yes Article Three, Subsection For use with ARC, BOC, and
Document which an ARC, BOC, or Return Non-Consumer 3.12.2 - Improper ARC, BOC, POP Entries only.
Presented for POP Entry relates has been POP, and RCK Debit Entries.
Payment presented for payment. Article Three, Section 3.13
- RDFI Right to Transmit
Extended Return Entries
R38 Stop Payment The RDFI determines a RDFI Extended Consumer or ** 60 Calendar Days No Article Three, Subsection For use with ARC and BOC
on Source stop payment order has Return Non-Consumer 3.11.2.2 - RDFI Obligation to Entries only.
Document been placed on the source Recredit for ARC, BOC, and
document to which the ARC RCK Entries Regarding Stop
or BOC Entry relates. Payments Orders.
Article Three, Section 3.13
- RDFI Right to Transmit
Extended Return Entries.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
2 0 1 3 O P E R AT I N G R U L E S
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R39 Improper The RDFI determines that: RDFI Return Consumer or * 2 Banking Days No ArticleThree, Subsection For use with ARC, BOC, and
Source (1) the source document Non-Consumer 3.12.2 - Improper ARC, BOC, POP Entries only and when the
Document/ used for an ARC, BOC, or POP, and RCK Debit Entries. RDFI (rather than the Receiver)
Source POP Entry to its Receiver’s Article Eight, Section 8.32 - determines the Entry is improper.
Document account is improper, or Eligible Source Document.
Presented for
(2) an ARC, BOC, or POP
Payment
2 0 1 3 O P E R AT I N G R U L E S
Entry and the source
document to which the Entry
relates have both been
presented for payment and
posted to the Receiver’s
account.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR135
APPENDIX FOUR – Return Entries
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
OR136
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
RETURN REASON CODES TO BE USED BY FEDERAL GOVERNMENT AGENCIES RETURNING ENR ENTRIES
R40 Return of This Return Reason Code Federal Return - ENR N/A N/A No The Green Book www.fms. For Federal Government Agency
ENR Entry may only be used to return Government Only treas.gov/greenbook use only.
by Federal ENR Entries and is at Agency
Government the Federal Government
Agency Agency’s sole discretion.
R41 Invalid Either the Transaction Code Federal Return - ENR N/A N/A No The Green Book www.fms. For Federal Government Agency
Transaction included in Field 3 of the Government Only treas.gov/greenbook use only.
APPENDIX FOUR – Return Entries
Code Addenda Record does not Agency Appendix Three - ACH Record Example: Transaction Code
conform to the ACH Record Format Specifications, Part “28,” Prenotification of Demand
Format Specifications 3.2 - Glossary of ACH Record Deposit Debit Authorization, for
contained in Appendix Format Data Elements - an ENR sent to SSA pertaining
Three (ACH Record Format Payment Related Information to a direct deposit enrollment.
Specifications) or it is not
appropriate with regard to an
Automated Enrollment Entry.
R42 Routing The Routing Number and the Federal Return - ENR N/A N/A No The Green Book www.fms. For Federal Government Agency
Number/Check Check Digit included in Field Government Only treas.gov/greenbook use only.
Digit Error 3 of the Addenda Record is Agency
either not a valid number or
it does not conform to the
Modulus 10 formula.
R43 Invalid DFI The Receiver’s account Federal Return - ENR N/A N/A No The Green Book www.fms. For Federal Government Agency
Account number included in Field Government Only treas.gov/greenbook use only.
Number 3 of the Addenda Record Agency
must include at least one
alphameric character.
R44 Invalid The Individual ID Number/ Federal Return - ENR N/A N/A No The Green Book www.fms. For Federal Government Agency
Individual Identification Number Government Only treas.gov/greenbook use only.
ID Number/ provided in Field 3 of the Agency
Identification Addenda Record does not
Number match a corresponding
ID number in the Federal
Government Agency’s
records.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
2 0 1 3 O P E R AT I N G R U L E S
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R45 Invalid The name of the consumer Federal Return - ENR N/A N/A No The Green Book www.fms. For Federal Government Agency
Individual or company provided in Field Government Only treas.gov/greenbook. use only.
Name/Company 3 of the Addenda Record Agency
Name either does not match a
corresponding name in
the Federal Government
2 0 1 3 O P E R AT I N G R U L E S
Agency’s records or fails
to include at least one
alphameric character.
R46 Invalid The Representative Payee Federal Return - ENR N/A N/A No The Green Book www.fms. Examples: The Representative
Representative Indicator Code included Government Only treas.gov/greenbook Payee Indicator Code is “zero,”
Payee Indicator in Field 3 of the Addenda Agency and Social Security’s records
Record has been omitted indicate that payments should
or it is not consistent with be sent to a representative
the Federal Government payee on behalf of an
Agency’s records. entitled beneficiary; or The
Representative Payee Indicator
Code is “one,” and Social
Security’s records indicate that
there is no representative payee
and the beneficiary may receive
payments directly.
For Federal Government Agency
use only.
R47 Duplicate The Entry is a duplicate of an Federal Return - ENR N/A N/A No The Green Book www.fms. For Federal Government Agency
Enrollment Automated Enrollment Entry Government Only treas.gov/greenbook use only.
previously initiated by a DFI. Agency
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR137
APPENDIX FOUR – Return Entries
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
OR138
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R50 State Law The RDFI is located in a RDFI Return Consumer * 2 Banking Days No Uniform Commercial Code For use with RCK Entries only.
Affecting RCK state that has not adopted Article 4
Acceptance Revised Article 4 of the http://www.law.cornell.edu/
Uniform Commercial Code ucc/4/
(1990 Official Text) and has
not revised its customer
agreements to allow for
Electronic presentment.
APPENDIX FOUR – Return Entries
OR
The RDFI is located within
a state that requires all
canceled Checks to a specific
type of account to be returned
to the Receiver within the
periodic statement.
R51 Item Related An RCK Entry considered to RDFI Extended Consumer ** 60 Calendar Days Yes Article Three, Subsection For use with RCK Entries only.
to RCK Entry be ineligible or improper. Return 3.12.2 - Improper ARC, BOC,
is Ineligible or POP, and RCK Debit Entries.
RCK Entry is Article Two, Subsection
Improper. 2.5.13.3 - RCK Eligible Items.
Article Two, Subsection
2.5.13.4 - RCK Ineligible Items.
R52 Stop Payment A stop payment order has RDFI Extended Consumer ** 60 Calendar Days No Article Three, Subsection For use with RCK Entries only.
on Item Related been placed on the item to Return 3.11.2.2 - RDFI Obligation to
to RCK Entry which the RCK Entry relates. Recredit for ARC, BOC, and
RCK Entries Regarding Stop
Payment Orders.
R53 Item and RCK In addition to an RCK Entry, RDFI Extended Consumer ** 60 Calendar Days Yes Article Three, Subsection For use with RCK Entries only.
Entry Presented the item to which the RCK Return 3.12.2 - Improper ARC, BOC,
for Payment Entry relates has also been POP, and RCK Debit Entries.
presented for payment.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
2 0 1 3 O P E R AT I N G R U L E S
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R61 Misrouted The financial institution ODFI Dishonored Consumer or The ODFI must No Article Two, Subsection May be used for all Entries
Return preparing the Return Entry Return Non-Consumer transmit a 2.12.5.1 - Dishonor of Return except IAT.
(the RDFI of the original May be used dishonored Return by ODFI.
Entry) has placed the Entry to its ACH
2 0 1 3 O P E R AT I N G R U L E S
for all Entries
incorrect Routing Number except IAT. Operator within five
in the Receiving DFI Banking Days after
Identification field. the Settlement Date
of the Return Entry.
R67 Duplicate The ODFI has received more ODFI Dishonored Consumer or The ODFI must No Article Two, Subsection May be used for all Entries
Return than one Return for the same Return Non-Consumer transmit a 2.12.5.1 - Dishonor of Return except IAT.
Entry. May be used dishonored Return by ODFI.
for all Entries Entry to its ACH
except IAT. Operator within five
Banking Days after
the Settlement Date
of the Return Entry.
R68 Untimely Return The Return Entry has ODFI Dishonored Consumer or The ODFI must No Article Two, Subsection May be used for all Entries
not been sent within the Return Non-Consumer transmit a 2.12.5.1 - Dishonor of Return except IAT.
timeframe established by May be used dishonored Return by ODFI.
these Rules. for all Entries Entry to its ACH
except IAT. Operator within five
Banking Days after
the Settlement Date
of the Return Entry.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR139
APPENDIX FOUR – Return Entries
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
OR140
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R69 Field Error(s) One or more of the field ODFI Dishonored Consumer or The ODFI must No Article Two, Subsection The ODFI must insert the
requirements are incorrect. Return Non-Consumer transmit a 2.12.5.1 - Dishonor of Return appropriate code(s) from below,
May be used dishonored Return by ODFI. separated by an asterisk (*),
for all Entries Entry to its ACH within the Addenda Information
except IAT. Operator within five Field of the Addenda Record
Banking Days after Format for dishonored Returns
the Settlement Date to indicate the field(s) in which
of the Return Entry. the errors occur.
01—Return Contains Incorrect
DFI Account Number
APPENDIX FOUR – Return Entries
2 0 1 3 O P E R AT I N G R U L E S
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R71 Misrouted The financial institution RDFI Contested Consumer or The contested No Article Three, Subsection May be used for all Entries
Dishonored preparing the dishonored Dishonored Non-Consumer dishonored Return 3.8.5.2 - RDFI May Contest except IAT.
Return Return Entry (the ODFI Return Entry must be Dishonored Returns.
of the original Entry) has transmitted to the
2 0 1 3 O P E R AT I N G R U L E S
May be used
placed the incorrect Routing for all Entries ACH Operator within
Number in the Receiving DFI except IAT. two Banking Days
Identification field. after the Settlement
Date of the
dishonored Return
Entry.
R72 Untimely The dishonored Return Entry RDFI Contested Consumer or The contested No Article Two, Subsection May be used for all Entries
Dishonored has not been sent within the Dishonored Non-Consumer dishonored Return 2.12.5.1 - Dishonor of Return except IAT.
Return designated timeframe. Return Entry must be by ODFI.
May be used transmitted to the Article Three, Subsection
for all Entries ACH Operator within 3.8.5.2 - RDFI May Contest
except IAT. two Banking Days Dishonored Returns.
after the Settlement
Date of the
dishonored Return
Entry.
R73 Timely Original The RDFI is certifying that RDFI Contested Consumer or The contested No Article Three, Subsection May be used for all Entries
Return the original Return Entry was Dishonored Non-Consumer dishonored Return 3.8.5.2 - RDFI May Contest except IAT.
sent within the timeframe Return Entry must be Dishonored Returns.
designated in these Rules. May be used transmitted to the
for all Entries ACH Operator within
except IAT. two Banking Days
after the Settlement
Date of the
dishonored Return
Entry.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR141
APPENDIX FOUR – Return Entries
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
OR142
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R74 Corrected The RDFI is correcting a RDFI Corrected Consumer or The corrected No Article Three, Subsection Data must be obtained from the
Return previous Return Entry that Return Non-Consumer Return Entry must 3.8.5.1 - RDFI May Correct following fields in the original
was dishonored using Return May be used be transmitted to Dishonored Returns. Company Batch Header Record,
Reason Code R69 (Field for all Entries the ACH Operator Entry Detail Record or Addenda
Errors) because it contained except IAT. within two Banking Record:
incomplete or incorrect Days after the • DFI Account Number
information. Settlement Date • Trace Number
of the dishonored • Amount
Return Entry. • Individual Identification Number/
Identification Number
APPENDIX FOUR – Return Entries
• Transaction Code
• Company Identification
• Effective Entry Date
May be used for all Entries
except IAT.
R75 Return Not a The Return Entry was not RDFI Contested Consumer or The contested No Article Three, Subsection This code may be used by the
Duplicate a duplicate of an Entry Dishonored Non-Consumer dishonored Return 3.8.5.2 - RDFI May Contest RDFI to contest a dishonored
previously returned by the Return Entry must be Dishonored Returns. Return Entry from an ODFI that
RDFI. May be used transmitted to the used Return Reason Code R67
for all Entries ACH Operator within (Duplicate Return).
except IAT. two Banking Days May be used for all Entries
after the Settlement except IAT.
Date of the
dishonored Return
Entry.
R76 No Errors The original Return Entry RDFI Contested Consumer or The contested No Article Three, Subsection This code may be used by the
Found did not contain the errors Dishonored Non-Consumer dishonored Return 3.8.5.2 - RDFI May Contest RDFI to contest a dishonored
indicated by the ODFI in the Return Entry must be Dishonored Returns. Return Entry from an ODFI that
dishonored Return Entry. May be used transmitted to the used Return Reason Code R69
for all Entries ACH Operator within (Field Errors).
except IAT. two Banking Days May be used for all Entries
after the Settlement except IAT.
Date of the
dishonored Return
Entry.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
2 0 1 3 O P E R AT I N G R U L E S
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R80 IAT Entry The IAT Entry is being Gateway Return Consumer or * 2 Banking Days No Article Three, Section 3.8 For Gateway use with Outbound
Coding Error returned due to one or more Non-Consumer - RDFI’s Right to Transmit IAT Entries only
of the following conditions: Return Entries.
• invalid DFI/Bank Branch
2 0 1 3 O P E R AT I N G R U L E S
Article Five, Section 5.3 -
Country Code Gateway Assumes Obligations
• invalid DFI/Bank of Other Participants.
Identification Number
Qualifier
• invalid Foreign Exchange
Indicator
• invalid ISO Originating
Currency Code
• invalid ISO Destination
Currency Code
• invalid ISO Destination
Country Code
• invalid Transaction Type
Code.
R81 Non-Participant The IAT Entry is being Gateway Return Consumer or * 2 Banking Days No Article Five, Subsection For Gateway use with Outbound
in IAT Program returned because the Non-Consumer 5.1.1 - Gateway Must Enter IAT Entries only
Gateway does not have Agreement with ODFI or
an agreement with either Gateway’s customer.
the ODFI or the Gateway’s
customer to transmit IAT
Entries.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR143
APPENDIX FOUR – Return Entries
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
OR144
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
R82 Invalid Foreign The reference used to identify Gateway Return Consumer or * 2 Banking Days No For Gateway use with Outbound
Receiving DFI the Foreign Receiving DFI Non-Consumer IAT Entries only
Identification of an Outbound IAT Entry is
invalid.
R83 Foreign The IAT Entry is being Gateway Return Consumer or * 2 Banking Days No For Gateway use with Outbound
Receiving DFI returned due to settlement Non-Consumer IAT entries only.
Unable to Settle problems in the foreign
payment system.
R84 Entry Not For Outbound IAT Entries, the Gateway Return Consumer or * 2 Banking Days No For Gateway use with Outbound
Processed by
APPENDIX FOUR – Return Entries
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
2 0 1 3 O P E R AT I N G R U L E S
PART 4.2 Table of Return Reason Codes (continued)
WRITTEN
INITIATED RETURN ACCOUNT TIME CROSS
CODE TITLE DESCRIPTION STATEMENT NOTES
BY TYPE TYPE FRAME REFERENCE
REQUIRED
n
R85 Incorrectly The RDFI/Gateway has Gateway Return Consumer or * 2 Banking Days No For Gateway use with Entries
Coded identified the Entry as an Non-Consumer bearing an SEC Code other
Outbound Outbound international than IAT.
International payment and is returning
Payment the Entry because it bears
an SEC Code that lacks
2 0 1 3 O P E R AT I N G R U L E S
information required
by the Gateway for OFAC
compliance.
* E ach Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the second
Banking Day following the Settlement Date of the original Entry.
** Each Return Entry must be received by the RDFI’s ACH Operator by its deposit deadline for the Return Entry to be made available to the ODFI no later than the opening of business on the Banking
Day following the sixtieth calendar day following the Settlement Date of the original Entry.
OR145
APPENDIX FOUR – Return Entries
APPENDIX FOUR – Return Entries
OR146 2 0 1 3 O P E R AT I N G R U L E S
SUBPART 4.3.1 Company/Batch Header Record Format for Returns
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE CLASS CODE NAME DATA IDENTIFICATION CODE DESCRIPTION DATE DATE (JULIAN) STATUS CODE IDENTIFICATION NUMBER
Field
Inclusion Inserted by
Requirement M M M O M M M O R ACH Operator M M M
Contents ‘5’ Numeric Alphameric Alphameric Alphameric Alphameric Alphameric1 Alphameric YYMMDD Numeric Alphameric2 TTTTAAAA3 Numeric4
Length 1 3 16 20 10 3 10 6 6 3 1 8 7
Position 01-01 02-04 05-20 21-40 41-50 51-53 54-63 64-69 70-75 76-78 79-79 80-87 88-94
NOTE: For Return Entries, each field of the Company/Batch Header remains unchanged from the original entry, unless otherwise noted.
1 May contain the identification of the ACH Operator converting the entry.
2 Changed to reflect the Originator Status Code of the institution initiating the Return Entry (i.e., the RDFI of the original entry).
3 Changed to reflect the Routing Number of the institution initiating the Return Entry (i.e., the RDFI of the original entry).
4 Changed to the batch number assigned by the institution preparing the Automated Return Entry.
OR147
APPENDIX FOUR – Return Entries
SUBPART 4.3.2 Company/Batch Header Record Formats for International ACH Transaction (IAT) Returns
OR148
IAT RETURNS — COMPANY/BATCH HEADER RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
GO
FOREIGN ISO STANDARD ISO ISO IDENTIFICATION/
DATA RECORD SERVICE FOREIGN EXCHANGE FOREIGN DESTINATION ENTRY COMPANY ORIGINATING DESTINATION EFFECTIVE SETTLEMENT ORIGINATOR ORIGINATING
ELEMENT TYPE CLASS IAT EXCHANGE REFERENCE EXCHANGE COUNTRY ORIGINATOR CLASS ENTRY CURRENCY CURRENCY ENTRY DATE STATUS DFI BATCH
NAME CODE CODE INDICATOR INDICATOR INDICATOR REFERENCE CODE IDENTIFICATION CODE DESCRIPTION CODE CODE DATE (JULIAN) CODE IDENTIFICATION NUMBER
Field
Inserted by
Inclusion M M O M R R M M M M M M R M M M
ACH Operator
Requirement
1 2 3 4
Contents ‘5’ Numeric Alphameric Alphameric Numeric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric TTTTAAAA Numeric
Length 1 3 16 2 1 15 2 10 3 10 3 3 6 3 1 8 7
APPENDIX FOUR – Return Entries
Position 01-01 02-04 05-20 21-22 23-23 24-38 39-40 41-50 51-53 54-63 64-66 67-69 70-75 76-78 79-79 80-87 88-94
NOTE: For IAT Return Entries, each field of the Company/Batch Header Record remains unchanged from the original entry, unless otherwise noted.
1 For the return of an outbound International ACH Transaction originated by a U.S. ODFI, this field will contain the foreign exchange rate that is applicable at the time of the return entry if a foreign
exchange rate is provided within this field on the forward entry.
2 Changed to reflect the Originator Status Code of the institution initiating the Return Entry (i.e., the RDFI of the original entry).
3 Changed to reflect the Routing Number of the institution initiating the Return Entry (i.e., the RDFI of the original entry).
4 Changed to the batch number assigned by the institution preparing the Automated Return Entry.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 4.3.3 Corporate Entry Detail Record Format for Returns
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
RECEIVING
DATA RECORD NUMBER OF COMPANY ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK DFI ACCOUNT TOTAL IDENTIFICATION ADDENDA NAME/ID DISCRETIONARY RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS NUMBER RESERVED DATA INDICATOR NUMBER
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M O M R N/A R M M
Contents ‘6’ Numeric1 TTTTAAAA2 Numeric3 Alphameric $$$$$$$$¢¢ Alphameric Numeric Alphameric Blank Alphameric ‘1’ Numeric4
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
NOTE: For Return Entries, each field of the Corporate Entry Detail Record remains unchanged from the original entry, unless otherwise noted.
1 Changed to the appropriate Return Entry Transaction Code. (See Transaction Codes under currently assigned “Code Values” in Appendix Three.)
2 Changed to the Routing Number of the institution receiving the Return Entry (i.e., the ODFI of the original entry).
3 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
4 Changed to the Trace Number assigned by the institution preparing the Automated Return Entry.
OR149
APPENDIX FOUR – Return Entries
SUBPART 4.3.4 Entry Detail Record Format for Returns
OR150
RETURNS — ENTRY DETAIL RECORD
(excludes IAT entries)
FIELD 1 2 3 4 5 6 7 8 9 10 11
INDIVIDUAL
INDIVIDUAL NAME/ DISCRETIONARY DATA/
DATA RECORD DFI IDENTIFICATION NUMBER/ RECEIVING PAYMENT TYPE CODE/ ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT IDENTIFICATION NUMBER/ COMPANY CARD TRANSACTION RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT CHECK SERIAL NUMBER NAME TYPE CODE INDICATOR NUMBER
Field
Inclusion
APPENDIX FOUR – Return Entries
M M M M R M O R R/M M M
Requirement
Contents ‘6’ Numeric1 TTTTAAAA2 Numeric3 Alphameric $$$$$$$$¢¢4 Alphameric5 Alphameric5 Alphameric6 ‘1’ Numeric7
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
NOTE: For Return Entries, each field of the Entry Detail Record remains unchanged from the original entry, unless otherwise noted.
1 Changed to the appropriate Return Entry Transaction Code. (See Transaction Codes under currently assigned “Code Values” in Appendix Three.)
2 Changed to the Routing Number of the institution receiving the Return Entry (i.e., the ODFI of the original entry).
3 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
4 For the return of an outbound International ACH Transactions entry originated by a U.S. ODFI, this amount will be different from the amount reflected in the original forward entry if the exchange rate is
different at the time of the return.
5 For CIE and MTE entries, positions 40-54 are used for a 15-character Individual Name, and positions 55-76 are used for a 22-character Individual Identification Number.
6 For SHR and POS return entries, this field (positions 77-78) is mandatory and contains the Card Transaction Type Code (positions 77-78) of the original entry.
7 Changed to the Trace Number assigned by the institution preparing the Automated Return Entry.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 4.3.5 Addenda Record Format for Returns
(Note: This format is not for use with IAT Returns.)
FIELD 1 2 3 4 5 6 7 8
DATA
ELEMENT RECORD TYPE ADDENDA TYPE RETURN REASON ORIGINAL ENTRY ORIGINAL RECEIVING ADDENDA
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE CODE CODE TRACE NUMBER DATE OF DEATH DFI IDENTIFICATION INFORMATION TRACE NUMBER
Field
Inclusion
Requirement M M M M O R O M
Length 1 2 3 15 6 8 44 15
OR151
APPENDIX FOUR – Return Entries
SUBPART 4.3.6 Entry Detail Record for IAT Return Entries
OR152
IAT RETURNS — ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
FOREIGN
RECEIVER’S GATEWAY
GO NUMBER ACCOUNT OPERATOR SECONDARY
DATA RECORD IDENTIFICATION/ OF NUMBER/ OFAC OFAC ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ADDENDA DFI ACCOUNT SCREENING SCREENING RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT RECORDS RESERVED AMOUNT NUMBER RESERVED INDICATOR INDICATOR INDICATOR NUMBER
Field
Inclusion M M M M M N/A M M N/A O O M M
APPENDIX FOUR – Return Entries
Requirement
Contents ‘6’ Numeric1 TTTTAAAA2 Numeric3 Numeric Blank $$$$$$$$¢¢4 Alphameric Blank Alphameric Alphameric Numeric Numeric5
Length 1 2 8 1 4 13 10 35 2 1 1 1 15
Position 01-01 02-03 04-11 12-12 13-16 17-29 30-39 40-74 75-76 77-77 78-78 79-79 80-94
NOTE: For IAT Return Entries, each field of the Entry Detail Record remains unchanged from the original entry, unless otherwise noted.
1 Changed to the appropriate Return Entry Transaction Code. (See Transaction Codes under currently assigned “Code Values” in Appendix Three.)
2 Changed to the Routing Number of the institution receiving the Return Entry (i.e., the ODFI of the original entry).
3 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
4 For the return of an outbound International ACH Transaction originated by a U.S. ODFI, this amount will be different from the amount reflected in the original forward entry
if the exchange rate is different at the time of the return.
5 Changed to the Trace Number assigned by the institution preparing the Automated Return Entry.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 4.3.6 Entry Detail Addenda Records for IAT Return Entries (continued)
FIELD 1 2 3 4 5 6 7 8
ENTRY
DATA RECEIVING COMPANY DETAIL
ELEMENT RECORD TYPE ADDENDA TYPE TRANSACTION TYPE FOREIGN PAYMENT FOREIGN TRACE NAME/ SEQUENCE
NAME CODE CODE CODE AMOUNT NUMBER INDIVIDUAL NAME RESERVED NUMBER
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion M M R R O M N/A M
Requirement
Length 1 2 3 18 22 35 6 7
NOTE: For IAT Return Entries, each field of the 1st Addenda Record remains unchanged from the original 1st Addenda Record, unless otherwise noted.
1 Changed to reflect the Entry Detail Sequence Number associated with the trace number assigned by the institution preparing the Automated Return Entry.
FIELD 1 2 3 4 5 6
Field
Inclusion M M M M N/A M
Requirement
Length 1 2 35 35 14 7
NOTE: For IAT Return Entries, each field of the 2nd Addenda Record remains unchanged from the original 2nd Addenda Record, unless otherwise noted.
1 Changed to reflect the Entry Detail Sequence Number associated with the trace number assigned by the institution preparing the Automated Return Entry.
OR153
APPENDIX FOUR – Return Entries
SUBPART 4.3.6 Entry Detail Addenda Records for IAT Return Entries continued)
OR154
THIRD ADDENDA RECORD FOR IAT RETURN ENTRIES
FIELD 1 2 3 4 5 6
Field
Inclusion M M M M N/A M
Requirement
Length 1 2 35 35 14 7
NOTE: For IAT Return Entries, each field of the 3rd Addenda Record remains unchanged from the original 3rd Addenda Record, unless otherwise noted.
1 Changed to reflect the Entry Detail Sequence Number associated with the trace number assigned by the institution preparing the Automated Return Entry.
FIELD 1 2 3 4 5 6 7 8
ORIGINATING DFI
DATA IDENTIFICATION ORIGINATING ORIGINATING ENTRY DETAIL
ELEMENT RECORD TYPE ADDENDA TYPE ORIGINATING NUMBER DFI DFI BRANCH SEQUENCE
NAME CODE CODE DFI NAME QUALIFIER IDENTIFICATION COUNTRY CODE RESERVED NUMBER
Field
Inclusion M M M M M M N/A M
Requirement
Length 1 2 35 2 34 3 10 7
NOTE: For IAT Return Entries, each field of the 4th Addenda Record remains unchanged from the original 4th Addenda Record, unless otherwise noted.
1 Changed to reflect the Entry Detail Sequence Number associated with the trace number assigned by the institution preparing the Automated Return Entry.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 4.3.6 Entry Detail Addenda Records for IAT Return Entries (continued)
FIELD 1 2 3 4 5 6 7 8
RECEIVING ENTRY
DATA RECEIVING DFI IDENTIFICATION RECEIVING DFI DETAIL
ELEMENT RECORD TYPE ADDENDA TYPE DFI NUMBER RECEIVING DFI BRANCH SEQUENCE
NAME CODE CODE NAME QUALIFIER IDENTIFICATION COUNTRY CODE RESERVED NUMBER
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion M M M M M M N/A M
Requirement
Length 1 2 35 2 34 3 10 7
NOTE: For IAT Return Entries, each field of the 5th Addenda Record remains unchanged from the original 5th Addenda Record, unless otherwise noted.
1 Changed to reflect the Entry Detail Sequence Number associated with the trace number assigned by the institution preparing the Automated Return Entry.
FIELD 1 2 3 4 5 6
Field
Inclusion M M O M N/A M
Requirement
Length 1 2 15 35 34 7
NOTE: For IAT Return Entries, each field of the 6th Addenda Record remains unchanged from the original 6th Addenda Record, unless otherwise noted.
1 Changed to reflect the Entry Detail Sequence Number associated with the trace number assigned by the institution preparing the Automated Return Entry.
OR155
APPENDIX FOUR – Return Entries
SUBPART 4.3.6 Entry Detail Addenda Records for IAT Return Entries (continued)
OR156
SEVENTH ADDENDA RECORD FOR IAT RETURN ENTRIES
FIELD 1 2 3 4 5 6
Field
Inclusion M M M M N/A M
Requirement
Length 1 2 35 35 14 7
NOTE: For IAT Return Entries, each field of the 7th Addenda Record remains unchanged from the original 7th Addenda Record, unless otherwise noted.
1 Changed to reflect the Entry Detail Sequence Number associated with the trace number assigned by the institution preparing the Automated Return Entry.
FIELD 1 2 3 4 5 6 7 8 9
Field
Inclusion M M M M O R R O M
Requirement
Contents ‘7’ ‘99’ Alphameric Numeric1 YYMMDD2 TTTTAAAA3 $$$$$$$$¢¢4 Alphameric Numeric
Length 1 2 3 15 6 8 10 34 15
Position 01-01 02-03 04-06 07-21 22-27 28-35 36-45 46-79 80-94
2 0 1 3 O P E R AT I N G R U L E S
APPENDIX FOUR – Return Entries
PART 4.4 Dishonored Return Entries • Addenda Type Code “99” must be used to
indicate that the Addenda Record contains
The following specifications apply to dishonored
return information.
Return Entries:
• The following fields of the Addenda Record
• Each dishonored Return Entry that is
must be filled when originating a dishonored
initiated by an ODFI must be in the format
Return Entry:
and sequence defined within this Appendix
Four.
– Positions 39 - 53 Return Trace Number
• Terms used in the format have the meanings
– Positions 54 - 56 Return Settlement Date
defined in Appendix Three (ACH Record
Format Specifications).
– Positions 57 - 58 Return Reason Code
• The Transaction Code used in the Entry
The initiation of a dishonored Return Entry with
Detail Record must be:
Return Reason Code R68 constitutes a certification
by the ODFI that the Return was untimely.
– 21 or 26 for Demand Accounts,
2 0 1 3 O P E R AT I N G R U L E S OR157
SUBPART 4.4.1 Company/Batch Header Record Format for Dishonored Return
(excludes IAT Entries)
OR158
DISHONORED RETURNS — COMPANY/BATCH HEADER RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
DATA RECORD SERVICE COMPANY STANDARD COMPANY COMPANY EFFECTIVE SETTLEMENT ORIGINATOR
ELEMENT TYPE CLASS COMPANY DISCRETIONARY COMPANY ENTRY CLASS ENTRY DESCRIPTIVE ENTRY DATE STATUS ORIGINATING DFI BATCH
NAME CODE CODE NAME DATA IDENTIFICATION CODE DESCRIPTION DATE DATE (JULIAN) CODE IDENTIFICATION NUMBER
Contents ‘5’ Numeric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric1 TTTTAAAA2 Numeric3
APPENDIX FOUR – Return Entries
Length 1 3 16 20 10 3 10 6 6 3 1 8 7
Position 01-01 02-04 05-20 21-40 41-50 51-53 54-63 64-69 70-75 76-78 79-79 80-87 88-94
NOTE: For Dishonored Return Entries, each field of the Company/Batch Header Record remains unchanged from the Return Entry, unless otherwise noted.
1 Changed to reflect the Originator Status Code of the institution initiating the Dishonored Return Entry (i.e., the RDFI of the Return Entry).
2 Changed to reflect the Routing Number of the institution initiating the Dishonored Return Entry (i.e., the RDFI of the Return Entry).
3 Changed to a Batch Number assigned by the institution preparing the Dishonored Return Entry.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 4.4.2 Corporate Entry Detail Record Format for Dishonored Returns
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
RECEIVING
DATA RECORD DFI NUMBER OF COMPANY ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT TOTAL IDENTIFICATION ADDENDA NAME/ID DISCRETIONARY RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS NUMBER RESERVED DATA INDICATOR NUMBER
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M O M R N/A R M M
Contents ‘6’ Numeric TTTTAAAA1 Numeric2 Alphameric $$$$$$$$¢¢ Alphameric Numeric Alphameric Blank Alphameric ‘1’ Numeric3
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
NOTE: For Dishonored Return Entries, each field of the Corporate Entry Detail Record remains unchanged from the Return entry, unless otherwise noted.
1 Changed to the Routing Number of the institution receiving the Dishonored Return Entry (i.e., the ODFI of the Return Entry).
2 Changed to the Check Digit calculated according to NACHA Standards and based on the Routing Number contained in positions 04-11.
3 Changed to the Trace Number assigned by the institution preparing the Dishonored Return Entry (i.e., the RDFI of the Return Entry).
OR159
APPENDIX FOUR – Return Entries
SUBPART 4.4.3 Entry Detail Record Format for Dishonored Returns
(excludes IAT Entries)
OR160
DISHONORED RETURNS — ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11
DISCRETIONARY
INDIVIDUAL DATA/PAYMENT
INDIVIDUAL NAME/ TYPE CODE/
DATA RECORD DFI IDENTIFICATION NUMBER/ RECEIVING CARD ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT IDENTIFICATION NUMBER/ COMPANY TRANSACTION RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT CHECK SERIAL NUMBER NAME TYPE CODE INDICATOR NUMBER
Field
Inclusion M M M M R M O R R/M M M
APPENDIX FOUR – Return Entries
Requirement
Contents ‘6’ Numeric TTTTAAAA1 Numeric2 Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric ‘1’ Numeric3
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
NOTE: For Dishonored Return Entries, each field of the Entry Detail Record remains unchanged from the Return Entry, unless otherwise noted.
1 Changed to the Routing Number of the institution receiving the Dishonored Return Entry (i.e., the ODFI of the Return Entry).
2 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
3 Changed to the Trace Number assigned by the institution preparing the Dishonored Return Entry (i.e., the RDFI of the Return Entry).
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 4.4.4 Addenda Record Format for Dishonored Returns
(excludes IAT Entries)
FIELD 1 2 3 4 5 6 7 8 9 10 11 12
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE TYPE CODE REASON CODE TRACE NUMBER RESERVED IDENTIFICATION RESERVED NUMBER DATE CODE INFORMATION NUMBER
Field
Inclusion
Requirement M M M M N/A R N/A M M M O/M M
Contents ‘7’ ‘99’ Alphameric Numeric1 Blank TTTTAAAA2 Blank Numeric Numeric Alphameric Alphameric3 Numeric4
Length 1 2 3 15 6 8 3 15 3 2 21 15
Position 01-01 02-03 04-06 07-21 22-27 28-35 36-38 39-53 54-56 57-58 59-79 80-94
1 Copy data from positions 7-21 of the Addenda Record of the return entry.
2 Copy data from positions 28-35 of the Addenda Record of the return entry.
3 For Automated Dishonored Returns bearing Return Reason Code R69 (Field Errors) this field (positions 59-79) must contain the code(s) to indicate the field(s) in which erroneous information is located.
4 For Automated Dishonored Returns, changed to reflect the new Trace Number found in positions 80-94 of the Entry Detail Record or Corporate Entry Detail Record.
OR161
APPENDIX FOUR – Return Entries
APPENDIX FOUR – Return Entries
PART 4.5 Contested Dishonored ACH • The following fields of the Addenda Record
Return Entries must be filled when originating a contested
Dishonored Return Entry:
SUBPART 4.5.1 Contested Dishonored
Return Entries – Positions 22 – 27 D
ate Original Entry
• Each contested dishonored Return Entry Returned
initiated by an RDFI must be in the format
and sequence set forth in this Appendix Four. – Positions 36 – 38 O
riginal Settlement
Date ( Julian Date)
• Terms used in the format have the meanings
set forth in Appendix Three (ACH Record – Positions 39 – 53 Return Trace Number
Format Specifications).
– Positions 54 – 56 Return Settlement Date
• The initiation of a contested dishonored
Return Entry constitutes a certification by – Positions 57 – 58 Return Reason Code
the RDFI that the Entry was returned in
accordance with these Rules. – Positions 59 – 73 D
ishonored Return
Trace Number
• The Transaction Code used in the Entry
Detail Record must be: – Positions 74 – 76 D
ishonored Return
Settlement Date
– 21 or 26 for Demand Accounts,
– Positions 77 – 78 D
ishonored Return
– 31 or 36 for Savings Accounts, Reason Code
OR162 2 0 1 3 O P E R AT I N G R U L E S
SUBPART 4.5.3 Company/Batch Header Record Format for Contested Dishonored Return
(excludes IAT Entries)
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
STANDARD
DATA RECORD SERVICE COMPANY ENTRY COMPANY COMPANY EFFECTIVE SETTLEMENT
ELEMENT TYPE CLASS COMPANY DISCRETIONARY COMPANY CLASS ENTRY DESCRIPTIVE ENTRY DATE ORIGINATOR ORIGINATING DFI BATCH
NAME CODE CODE NAME DATA IDENTIFICATION CODE DESCRIPTION DATE DATE (JULIAN) STATUS CODE IDENTIFICATION NUMBER
2 0 1 3 O P E R AT I N G R U L E S
Field Inclusion Inserted by
Requirement M M M O M M M O R ACH Operator M M M
Contents ‘5’ Numeric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric1 TTTTAAAA2 Numeric3
Length 1 3 16 20 10 3 10 6 6 3 1 8 7
Position 01-01 02-04 05-20 21-40 41-50 51-53 54-63 64-69 70-75 76-78 79-79 80-87 88-94
NOTE: For Contested Dishonored Return Entries, each field of the Company/Batch Header Record remains unchanged from the Dishonored Return Entry unless, otherwise noted.
1 Changed to reflect the Originator Status Code of the institution initiating the Contested Dishonored Return Entry (i.e., the RDFI of the Dishonored Return Entry).
2 Changed to reflect the Routing Number of the institution initiating the Contested Dishonored Return Entry (i.e., the RDFI of the Dishonored Return Entry).
3 Changed to a Batch Number assigned by the institution preparing the Contested Dishonored Return Entry.
OR163
APPENDIX FOUR – Return Entries
SUBPART 4.5.4 Corporate Entry Detail Record Format for Contested Dishonored Return
OR164
CONTESTED DISHONORED RETURNS — CORPORATE ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
RECEIVING
DATA RECORD DFI NUMBER OF COMPANY ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT TOTAL IDENTIFICATION ADDENDA NAME/ID DISCRETIONARY RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS NUMBER RESERVED DATA INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M O M R N/A R M M
APPENDIX FOUR – Return Entries
Contents ‘6’ Numeric TTTTAAAA1 Numeric2 Alphameric $$$$$$$$¢¢ Alphameric Numeric Alphameric Blank Alphameric ‘1’ Numeric3
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
NOTE: For Contested Dishonored Return Entries, each field of the Corporate Entry Detail Record remains unchanged from the Dishonored Return entry, unless otherwise noted.
1 Changed to the Routing Number of the institution receiving the Contested Dishonored Return Entry (i.e., the ODFI of the Dishonored Return Entry).
2 Changed to the Check Digit calculated according to NACHA Standards and based on the Routing Number contained in positions 04-11.
3 Changed to the Trace Number assigned by the institution preparing the Contested Dishonored Return Entry (i.e., the RDFI of the Dishonored Return Entry).
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 4.5.5 Entry Detail Record Format for Contested Dishonored Return
(excludes IAT Entries)
FIELD 1 2 3 4 5 6 7 8 9 10 11
DISCRETIONARY
DATA/PAYMENT
INDIVIDUAL INDIVIDUAL NAME/ TYPE CODE/
2 0 1 3 O P E R AT I N G R U L E S
DATA RECORD DFI IDENTIFICATION NUMBER/ RECEIVING CARD ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT IDENTIFICATION NUMBER/ COMPANY TRANSACTION RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT CHECK SERIAL NUMBER NAME TYPE CODE INDICATOR NUMBER
Field
Inclusion M M M M R M O R R R/M M
Requirement
Contents ‘6’ Numeric TTTTAAAA1 Numeric2 Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric ‘1’ Numeric3
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
NOTE: F or Contested Dishonored Return Entries, each field of the Entry Detail Record remains unchanged from the Dishonored Return Entry, unless
otherwise noted.
1 Changed to the Routing Number of the institution receiving the Contested Dishonored Return Entry (i.e., the ODFI of the Dishonored Return Entry).
2 Changed to the Check Digit calculated according to NACHA Standards and based on the Routing Number contained in positions 04-11.
3 Changed to the Trace Number assigned by the institution preparing the Contested Dishonored Return Entry (i.e., the RDFI of the Dishonored Return Entry).
OR165
APPENDIX FOUR – Return Entries
SUBPART 4.5.6 Addenda Record for Contested Dishonored Return
(excludes IAT Entries)
OR166
CONTESTED DISHONORED RETURNS — ADDENDA RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CONTESTED
DISHONORED ORIGINAL DATE ORIGINAL DISHONORED DISHONORED DISHONORED
DATA RECORD ADDENDA RETURN ENTRY ORIGINAL ORIGINAL SETTLEMENT RETURN RETURN RETURN RETURN RETURN RETURN
ELEMENT TYPE TYPE REASON TRACE ENTRY RECEIVING DFI DATE TRACE SETTLEMENT REASON TRACE SETTLEMENT REASON TRACE
NAME CODE CODE CODE NUMBER RETURNED IDENTIFICATION (JULIAN) NUMBER DATE CODE NUMBER DATE CODE RESERVED NUMBER
Field
Inclusion
Requirement M M M M O R M M M M M M M N/A M
APPENDIX FOUR – Return Entries
Contents ‘7’ ‘99’ Alphameric Numeric1 YYMMDD2 TTTTAAAA3 Numeric2 Numeric Numeric Alphameric Numeric Numeric Alphameric Blank Numeric4
Length 1 2 3 15 6 8 3 15 3 2 15 3 2 1 15
Position 01-01 02-03 04-06 07-21 22-27 28-35 36-38 39-53 54-56 57-58 59-73 74-76 77-78 79-79 80-94
1 Copy data from positions 7-21 of the Addenda Record of the Dishonored Return Entry.
2 Mandatory only if Contested Dishonored Return Reason Code is R73.
3 Copy data from positions 28-35 of the Addenda Record of the Dishonored Return Entry.
4 For Automated Contested Dishonored Returns changed to reflect the new Trace Number found in positions 80-94 of the Entry Detail Record or Corporate Entry Detail Record.
2 0 1 3 O P E R AT I N G R U L E S
APPENDIX FIVE – Notification of Change
2 0 1 3 O P E R AT I N G R U L E S OR167
PART 5.3 Table of Change Codes
INITIATED CORRECTED ENTRY TIME
OR168
CODE DESCRIPTION NOTES EXAMPLES
BY DATA TYPE FRAME
C01 Incorrect DFI Account RDFI Correct DFI Account NOC 2 Banking Days from Time frame not applicable for merger or This code would also be used when an
Number Number appears in (COR) original Entry Settlement acquisition. Account Number is incorrectly formatted.
first 17 positions of the Date IAT: For Outbound IAT entries, the correct
Corrected Data Field. Foreign Receiver’s Account Number will
appear in the first (left justification) 35
positions of the Corrected Data Field.
C02 Incorrect Routing RDFI Correct Routing Number NOC 2 Banking Days from Time frame not applicable for merger or Due to merger or consolidation, a once
Number (including Check Digit) (COR) original Entry Settlement acquisition. valid Routing Number must be changed.
appears in first nine Date IAT: For Outbound IAT entries, this field refers
positions of the Corrected to the Gateway Operator’s routing number.
Data Field.
APPENDIX FIVE – Notification of Change
C03 Incorrect Routing RDFI Correct Routing Number NOC 2 Banking Days from Time frame not applicable for merger or Due to merger or consolidation, a once
Number and Incorrect (including Check Digit) (COR) original Entry Settlement acquisition. valid Routing Number must be changed,
DFI Account Number appears in first nine Date IAT: This change code should not be used and in most instances this change will
positions of the Corrected for Outbound IAT entries due to field length cause a change to the account numbering
Data Field--correct DFI limitations. structure.
Account Number appears
in the 13th through 29th
position of same field with
a space in the 10th, 11th,
and 12th positions.
C04 Incorrect Individual RDFI Correct Individual Name/ NOC 2 Banking Days from Time frame not applicable for merger or
Name/Receiving Receiving Company (COR) original Entry Settlement acquisition.
Company Name
n
Name appears in first 22 Date IAT: For IAT Entries, the Correct
positions of the Corrected Individual Name/Receiving Company
Data Field. Name appears in the first 35 positions of
the Corrected Data Field.
C05 Incorrect Transaction RDFI Correct Transaction NOC 2 Banking Days from Time frame not applicable for merger or The account number contained in the Entry
Code Code appears in first two (COR) original Entry Settlement acquisition. is a checking account number but the Entry
positions of the Corrected Date contains a Transaction Code for a savings
Data Field. account, or the account number contained
in the Entry is a savings account number
but the Entry contains a Transaction Code
for a checking account.
2 0 1 3 O P E R AT I N G R U L E S
PART 5.3 Table of Change Codes (continued)
INITIATED CORRECTED ENTRY TIME
CODE DESCRIPTION NOTES EXAMPLES
BY DATA TYPE FRAME
C06 Incorrect DFI Account RDFI Correct DFI Account NOC 2 Banking Days from Time frame not applicable for merger or The account number contained in the
Number and Incorrect Number appears in the (COR) original Entry Settlement acquisition. Entry is incorrect and the Transaction
Transaction Code first 17 positions of the Date IAT: This change code should not be used Code does not match the type of account,
Corrected Data Field -- for Outbound IAT entries due to field length i.e. the account number structure is a
correct Transaction Code limitations. checking account number but is not a valid
appears in the 21st and account number and the Transaction Code
22nd positions of the contained in the Entry is for a savings
same field with spaces in account.
2 0 1 3 O P E R AT I N G R U L E S
the 18th, 19th, and 20th
positions.
C07 Incorrect Routing RDFI Correct Routing Number NOC 2 Banking Days from Time frame not applicable for merger or An Entry posting to a savings account
Number, Incorrect DFI (including Check Digit) (COR) original Entry Settlement acquisition. should actually be going to a demand
Account Number, and appears in the first nine Date IAT: This change code should not be used account or vice versa, and the routing
Incorrect Transaction positions of the Corrected for Outbound IAT entries due to field length number and account number are also
Code Data Field -- correct DFI limitations. incorrect.
Account Number appears
in the 10th through 26th
positions of the same field
-- and correct Transaction
Code appears in the 27th
and 28th positions of the
same field.
C08 Incorrect Receiving DFI RDFI The correct Receiving DFI NOC 2 Banking Days from Time frame not applicable for merger or
Identification (IAT only) Identification appears in (COR) original Entry Settlement acquisition.
the first 34 positions of the Date
Corrected Data Field.
C09 Incorrect Individual RDFI Correct number appears NOC 2 Banking Days from Time frame not applicable for merger or Individual’s Identification Number within the
Identification Number in first 22 positions of the (COR) original Entry Settlement acquisition. Company is incorrect, either on initial input
n
Incorrect Individual Corrected Data Field. Date IAT: For IAT Entries, the correct Receiver or through merger or consolidation.
Identification Number/ Identification Number appears in the first
Incorrect Receiver 15 positions of the Corrected Data Field.
Identification Number
OR169
APPENDIX FIVE – Notification of Change
PART 5.3 Table of Change Codes (continued)
INITIATED CORRECTED ENTRY TIME
OR170
CODE DESCRIPTION NOTES EXAMPLES
BY DATA TYPE FRAME
C13 Addenda Format Error RDFI Information in the Entry NOC 2 Banking Days from Time frame not applicable for merger or A CCD Entry is received with an “05”
Detail Record was correct (COR) original Entry Settlement acquisition. Addenda Type Code, but the addenda
and the Entry was able to Date information does not contain payment
be processed and posted related ANSI ASC X12 data segments or
by the RDFI. However, NACHA endorsed banking conventions.
information found in the
Addenda Record was
unclear or was formatted
incorrectly.
n
C14 Incorrect SEC Code Gateway The RDFI/Gateway NOC 2 Banking Days This Change Code may only be used by a A CCD or PPD Entry is received by the
for Outbound has identified the (COR) from original Entry Gateway to request a change to the IAT RDFI and is posted to the Receiver’s
International Payment Entry as an Outbound Settlement Date format. It may not be used by RDFIs to account, but the Receiver has also
international payment request other changes involving the use of placed a standing instruction with
and is requesting Standard Entry Class Codes. the RDFI to forward all funds from
that future Entries the entry to the Receiver’s account in
APPENDIX FIVE – Notification of Change
2 0 1 3 O P E R AT I N G R U L E S
PART 5.3 Table of Change Codes (continued)
INITIATED CORRECTED ENTRY TIME
CODE DESCRIPTION NOTES EXAMPLES
BY DATA TYPE FRAME
Change codes C61-C69 are only to be used when refusing a Notification of Change. The refused Notification of Change process can only be used with Reason Codes C61 - C69. If a reason other than those listed (C61 - C69)
exists, the Entry should be handled outside of the refused Notification of Change process. (This limitation applies only to the refused Notification of Change process.)
C61 Misrouted Notification ODFI Refused 15 days from receipt of For refused Notification of Change Entries,
of Change NOC NOC or corrected NOC each field of the Company/Batch Header
2 0 1 3 O P E R AT I N G R U L E S
(COR) Record and the Entry Detail Record remain
unchanged from the NOC Entry, unless
otherwise noted in Appendix Five, part 5.4.
C62 Incorrect Trace Number ODFI Refused 15 days from receipt of For refused Notification of Change Entries,
NOC NOC or corrected NOC each field of the Company/Batch Header
(COR) Record and the Entry Detail Record remain
unchanged from the NOC Entry, unless
otherwise noted in Appendix Five, part 5.4.
C63 Incorrect Company ODFI Refused 15 days from receipt of For refused Notification of Change Entries,
Identification Number NOC NOC or corrected NOC each field of the Company/Batch Header
(COR) Record and the Entry Detail Record remain
unchanged from the NOC Entry, unless
otherwise noted in Appendix Five, part 5.4.
C64 Incorrect Individual ODFI Refused 15 days from receipt of For refused Notification of Change Entries,
Identification Number/ NOC NOC or corrected NOC each field of the Company/Batch Header
Identification Number (COR) Record and the Entry Detail Record remain
unchanged from the NOC Entry, unless
otherwise noted in Appendix Five, part 5.4.
C65 Incorrectly Formatted ODFI Refused 15 days from receipt of For refused Notification of Change Entries,
Corrected Data NOC NOC or corrected NOC each field of the Company/Batch Header
(COR) Record and the Entry Detail Record remain
unchanged from the NOC Entry, unless
otherwise noted in Appendix Five, part 5.4.
C66 Incorrect Discretionary ODFI Refused 15 days from receipt of For refused Notification of Change Entries,
Data NOC NOC or corrected NOC each field of the Company/Batch Header
(COR) Record and the Entry Detail Record remain
unchanged from the NOC Entry, unless
otherwise noted in Appendix Five, part 5.4.
OR171
APPENDIX FIVE – Notification of Change
PART 5.3 Table of Change Codes (continued)
INITIATED CORRECTED ENTRY TIME
OR172
CODE DESCRIPTION NOTES EXAMPLES
BY DATA TYPE FRAME
C67 Routing Number Not ODFI Refused 15 days from receipt of For refused Notification of Change Entries,
From Original Entry NOC NOC or corrected NOC each field of the Company/Batch Header
Detail Record (COR) Record and the Entry Detail Record remain
unchanged from the NOC Entry, unless
otherwise noted in Appendix Five, part 5.4.
C68 DFI Account Number ODFI Refused 15 days from receipt of For refused Notification of Change Entries,
Not From Original Entry NOC NOC or corrected NOC each field of the Company/Batch Header
Detail Record (COR) Record and the Entry Detail Record remain
unchanged from the NOC Entry, unless
otherwise noted in Appendix Five, part 5.4.
C69 Incorrect Transaction ODFI Refused 15 days from receipt of For refused Notification of Change Entries,
Code NOC NOC or corrected NOC each field of the Company/Batch Header
(COR) Record and the Entry Detail Record remain
unchanged from the NOC Entry, unless
APPENDIX FIVE – Notification of Change
2 0 1 3 O P E R AT I N G R U L E S
APPENDIX FIVE – Notification of Change
2 0 1 3 O P E R AT I N G R U L E S OR173
SUBPART 5.4.1 Company/Batch Header Record Format for Notification of Change
OR174
NOTIFICATION OF CHANGE — COMPANY/BATCH HEADER RECORD
(excludes IAT Entries)
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
STANDARD
DATA RECORD SERVICE COMPANY ENTRY COMPANY COMPANY ORIGINATING
ELEMENT TYPE CLASS COMPANY DISCRETIONARY COMPANY CLASS ENTRY DESCRIPTIVE EFFECTIVE SETTLEMENT ORIGINATOR DFI BATCH
NAME CODE CODE NAME DATA IDENTIFICATION CODE DESCRIPTION DATE ENTRY DATE DATE (JULIAN) STATUS CODE IDENTIFICATION NUMBER
Field
Inclusion Inserted by
Requirement M M M O M M M O R ACH Operator M M M
Contents ‘5’ Numeric Alphameric Alphameric Alphameric Alphameric1 Alphameric2 Alphameric YYMMDD Numeric Alphameric3 TTTTAAAA4 Numeric5
Length 1 3 16 20 10 3 10 6 6 3 1 8 7
APPENDIX FIVE – Notification of Change
Position 01-01 02-04 05-20 21-40 41-50 51-53 54-63 64-69 70-75 76-78 79-79 80-87 88-94
NOTE: For Notification of Change Entries, each field of the Company/Batch Header Record remains unchanged from the original entry, unless otherwise noted.
1 Contains ‘COR’ for all Notification of Change Entries.
2 May contain the identification of the ACH Operator converting the entry.
3 Changed to reflect the Originator Status Code of the institution initiating the Notification of Change Entry (i.e., the RDFI of the original entry).
4 Changed to reflect the Routing Number of the institution initiating the Notification of Change Entry.
5 Changed to the batch number assigned by the institution preparing the Automated Notification of Change Entry.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 5.4.2 Company/Batch Header Record Formats for International ACH Transaction (IAT) Notification of Change
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
GO
FOREIGN ISO STANDARD ISO ISO IDENTIFICATION/
DATA RECORD SERVICE FOREIGN EXCHANGE FOREIGN DESTINATION ENTRY COMPANY ORIGINATING DESTINATION EFFECTIVE SETTLEMENT ORIGINATOR ORIGINATING
ELEMENT TYPE CLASS IAT EXCHANGE REFERENCE EXCHANGE COUNTRY ORIGINATOR CLASS ENTRY CURRENCY CURRENCY ENTRY DATE STATUS DFI BATCH
NAME CODE CODE INDICATOR INDICATOR INDICATOR REFERENCE CODE IDENTIFICATION CODE DESCRIPTION CODE CODE DATE (JULIAN) CODE IDENTIFICATION NUMBER
2 0 1 3 O P E R AT I N G R U L E S
Field
Inserted by
Inclusion M M M M R R M M M M M M R M M M
ACH Operator
Requirement
1 2 3 4 5
Contents ‘5’ Numeric Alphameric Alphameric Numeric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric TTTTAAAA Numeric
Length 1 3 16 2 1 15 2 10 3 10 3 3 6 3 1 8 7
Position 01-01 02-04 05-20 21-22 23-23 24-38 39-40 41-50 51-53 54-63 64-66 67-69 70-75 76-78 79-79 80-87 88-94
NOTE: For IAT Notification of Change Entries, each field of the Company/Batch Header Record remains unchanged from the original entry, unless otherwise noted.
1 This field must contain ‘IATCOR’ for all Notification of Change Entries related to IAT entries.
2 Contains ‘COR’ for all Notification of Change Entries
3 Changed to reflect the Originator Status Code of the institution initiating the Notification of Change Entry (i.e., the RDFI of the original entry).
4 Changed to reflect the Routing Number of the institution initiating the Notification of Change Entry (i.e., the RDFI of the original entry).
5 Changed to the batch number assigned by the institution preparing the Automated Notification of Change Entry.
OR175
APPENDIX FIVE – Notification of Change
SUBPART 5.4.3 Corporate Entry Detail Record Format for Notification of Change
OR176
NOTIFICATION OF CHANGE — CORPORATE ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
RECEIVING
DATA RECORD NUMBER OF COMPANY ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK DFI ACCOUNT TOTAL IDENTIFICATION ADDENDA NAME/ID DISCRETIONARY RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS NUMBER RESERVED DATA INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M O R R N/A O M M
Contents ‘6’ Numeric1 TTTTAAAA2 Numeric3 Alphameric 00000000004 Alphameric Numeric Alphameric Blank Alphameric ‘1’ Numeric5
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
APPENDIX FIVE – Notification of Change
NOTE: For Notification of Change Entries, each field of the Corporate Entry Detail Record remains unchanged from the original entry, unless otherwise noted.
1 Changed to the appropriate Transaction Code. (See Transaction Codes under currently assigned “Code Values” in Appendix Three.)
2 Changed to the Routing Number of the institution receiving the Notification of Change Entry (i.e., the ODFI of the original entry).
3 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
4 This field must be zero filled.
5 Changed to the Trace Number assigned by the institution preparing the Automated Notification of Change Entry.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 5.4.4 Entry Detail Record Format for Notification of Change
(excludes IAT Entries)
FIELD 1 2 3 4 5 6 7 8 9 10 11
INDIVIDUAL
INDIVIDUAL NAME/
DATA RECORD DFI IDENTIFICATION RECEIVING ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT NUMBER/ COMPANY DISCRETIONARY RECORD TRACE
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE CODE DENTIFICATION DIGIT NUMBER AMOUNT IDENTIFICATION NUMBER NAME DATA INDICATOR NUMBER
Field
Inclusion M M M M R M O R O M M
Requirement
Contents ‘6’ Numeric1 TTTTAAAA 2 Numeric3 Alphameric 00000000004 Alphameric5 Alphameric5 Alphameric ‘1’ Numeric6
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
NOTE: For Notification of Change Entries, each field of the Entry Detail Record remains unchanged from the original entry, unless otherwise noted.
1 Changed to the appropriate Notification of Change Entry Transaction Code. (See Transaction Codes under currently assigned “Code Values” in Appendix Three.)
2 Changed to the Routing Number of the institution receiving the Notification of Change Entry (i.e., the ODFI of the original entry).
3 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
4 This field must be zero filled.
5 For CIE and MTE entries, positions 40-54 are used for a 15 character Individual Name, and positions 55-76 are used for a 22 character Individual Identification Number.
6 Changed to the Trace Number assigned by the institution preparing the Automated Notification of Change Entry.
OR177
APPENDIX FIVE – Notification of Change
SUBPART 5.4.5 Addenda Record Format for Notification of Change
OR178
NOTIFICATION OF CHANGE — ADDENDA RECORD
FIELD 1 2 3 4 5 6 7 8 9
DATA ORIGINAL
ELEMENT RECORD ADDENDA CHANGE ORIGINAL ENTRY RECEIVING DFI CORRECTED TRACE
NAME TYPE CODE TYPE CODE CODE TRACE NUMBER RESERVED IDENTIFICATION DATA RESERVED NUMBER
Field
Inclusion
Requirement M M M M N/A R M N/A M
Contents ‘7’ ‘98’ Alphameric Numeric1 Blank TTTTAAAA2 Alphameric Blank Numeric
Length 1 2 3 15 6 8 29 15 15
Position 01-01 02-03 04-06 07-21 22-27 28-35 36-64 65-79 80-94
APPENDIX FIVE – Notification of Change
1 Copy data from positions 80-94 of the original Entry Detail Record or Corporate Entry Detail Record.
2 Copy data from positions 04-11 of the original Entry Detail Record (the RDFI’s Routing Number).
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 5.4.6 Sequence of Records for Notification of Change for IAT Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion M M M M M N/A M M N/A O O M M
Requirement
Contents ‘6’ Numeric1 TTTTAAAA2 Numeric3 Numeric Blank 00000000004 Alphameric Blank Alphameric Alphameric Numeric Numeric5
Length 1 2 8 1 4 13 10 35 2 1 1 1 15
Position 01-01 02-03 04-11 12-12 13-16 17-29 30-39 40-74 75-76 77-77 78-78 79-79 80-94
NOTE: For IAT Notification of Change Entries, each field of the Entry Detail Record remains unchanged from the original entry, unless otherwise noted.
1 Changed to the appropriate Notification of Change Entry Transaction Code. (See Transaction Codes under currently assigned “Code Values” in Appendix Three.)
2 Changed to the Routing Number of the institution receiving the Notification of Change Entry (i.e., the ODFI of the original entry).
3 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
4 This field must be zero filled.
5 Changed to the Trace Number assigned by the institution preparing the Automated Notification of Change Entry.
OR179
APPENDIX FIVE – Notification of Change
SUBPART 5.4.7 Addenda Record Format for IAT NOCs
OR180
IAT ADDENDA RECORD FOR NOC ENTRIES
FIELD 1 2 3 4 5 6 7 8 9
DATA ORIGINAL
ELEMENT RECORD TYPE ADDENDA TYPE CHANGE ORIGINAL ENTRY RECEIVING CORRECTED TRACE
NAME CODE CODE CODE TRACE NUMBER RESERVED DFI IDENTIFICATION DATA RESERVED NUMBER
Field
Inclusion M M M M N/A R M N/A M
Requirement
Contents ‘7’ ‘98’ Alphameric Numeric1 Blank TTTTAAAA2 Alphameric Blank Numeric
Length 1 2 3 15 6 8 35 9 15
Position 01-01 02-03 04-06 07-21 22-27 28-35 36-70 71-79 80-94
APPENDIX FIVE – Notification of Change
1 Copy data from positions 80-94 of the IAT Entry Detail Record.
2 Copy data from positions 04-11 of the original Entry Detail Record (the RDFI’s Routing Number)
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 5.4.8 Company/Batch Header Record Format for Notification of Change
(excludes IAT Entries)
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
STANDARD
DATA RECORD SERVICE COMPANY ENTRY COMPANY COMPANY EFFECTIVE SETTLEMENT ORIGINATING
ELEMENT TYPE CLASS COMPANY DISCRETIONARY COMPANY CLASS ENTRY DESCRIPTIVE ENTRY DATE ORIGINATOR DFI BATCH
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE CODE NAME DATA IDENTIFICATION CODE DESCRIPTION DATE DATE (JULIAN) STATUS CODE IDENTIFICATION NUMBER
Field
Inclusion Inserted by
Requirement M M M O M M M O R ACH Operator M M M
Contents ‘5’ Numeric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric1 TTTTAAAA2 Numeric3
Length 1 3 16 20 10 3 10 6 6 3 1 8 7
Position 01-01 02-04 05-20 21-40 41-50 51-53 54-63 64-69 70-75 76-78 79-79 80-87 88-94
NOTE: For Refused NOC Entries, each field of the Company/Batch Header Record remains unchanged from the NOC entry, unless otherwise noted.
1 Changed to reflect the Originator Status Code of the institution initiating the Refused NOC Entry (i.e., the RDFI of the NOC Entry).
2 Changed to reflect the Routing Number of the institution initiating the Refused NOC Entry (i.e., the RDFI of the NOC Entry).
3 Changed to the Batch Number assigned by the institution preparing the Refused NOC Entry.
OR181
APPENDIX FIVE – Notification of Change
SUBPART 5.4.9 Corporate Entry Detail Record Format for Refused Notification of Change
OR182
REFUSED NOTIFICATION OF CHANGE — CORPORATE ENTRY DETAIL RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
RECEIVING
DATA RECORD DFI NUMBER OF COMPANY ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT TOTAL IDENTIFICATION ADDENDA NAME/ID DISCRETIONARY RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS NUMBER RESERVED DATA INDICATOR NUMBER
Field Inclusion
Requirement M M M M R M O R R N/A R M M
Contents ‘6’ Numeric TTTTAAAA1 Numeric2 Alphameric $$$$$$$$¢¢ Alphameric Numeric Alphameric Blank Alphameric ‘1’ Numeric3
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
APPENDIX FIVE – Notification of Change
NOTE: For Refused NOC Entries, each field of the Corporate Entry Detail Record remains unchanged from the NOC entry, unless otherwise noted.
1 Changed to the Routing Number of the institution receiving the Refused NOC Entry (i.e., the ODFI of the NOC Entry).
2 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
3 Changed to the Trace Number assigned by the institution preparing the Refused NOC Entry (i.e., the RDFI of the NOC entry).
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 5.4.10 Entry Detail Record Format for Refused Notification of Change
(excludes IAT Entries)
FIELD 1 2 3 4 5 6 7 8 9 10 11
INDIVIDUAL INDIVIDUAL
IDENTIFICATION NAME/
DATA RECORD DFI NUMBER/ RECEIVING ADDENDA
2 0 1 3 O P E R AT I N G R U L E S
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT IDENTIFICATION COMPANY DISCRETIONARY RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER NAME DATA INDICATOR NUMBER
Field
Inclusion M M M M R M O R R M M
Requirement
Contents ‘6’ Numeric TTTTAAAA1 Numeric2 Alphameric $$$$$$$$¢¢ Alphameric Alphameric Alphameric ‘1’ Numeric3
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
NOTE: For Refused NOC Entries, each field of the Entry Detail Record remains unchanged from the original entry, unless otherwise noted.
1 Changed to the Routing Number of the institution receiving the Refused NOC Entry (i.e., the ODFI of the NOC Entry).
2 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
3 Changed to the Trace Number assigned by the institution preparing the Refused NOC Entry (i.e., the RDFI of the NOC Entry).
OR183
APPENDIX FIVE – Notification of Change
SUBPART 5.4.11 Addenda Record Format for Refused Notification of Change
(excludes IAT Entries)
OR184
REFUSED NOTIFICATION OF CHANGE — ADDENDA RECORD
FIELD 1 2 3 4 5 6 7 8 9 10 11
Field
Inclusion
Requirement M M M M N/A R M M M N/A M
Contents ‘7’ ‘98’ Alphameric Numeric1 Blank TTTTAAAA Alphameric Alphameric2 Numeric Blank Numeric
Length 1 2 3 15 6 8 29 3 7 5 15
Position 01-01 02-03 04-06 07-21 22-27 28-35 36-64 65-67 68-74 75-79 80-94
APPENDIX FIVE – Notification of Change
NOTE: This record format should only be used in the refusal of a Notification of Change Entry.
1 Copy data from positions 07-21 of the Addenda Record of the original Notification of Change.
2 Copy data from positions 04-06 of the Addenda Record of the original Notification of Change.
2 0 1 3 O P E R AT I N G R U L E S
APPENDIX SIX – Acknowledgment Entries
2 0 1 3 O P E R AT I N G R U L E S OR185
SUBPART 6.4.1 Company/Batch Header Record Format for Acknowledgment Entries (ACK and ATX)
OR186
ACKNOWLEDGMENT ENTRIES — COMPANY/BATCH HEADER RECORD FORMAT (ACK and ATX)
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
STANDARD
DATA RECORD SERVICE COMPANY ENTRY COMPANY COMPANY SETTLEMENT
ELEMENT TYPE CLASS COMPANY DISCRETIONARY COMPANY CLASS ENTRY DESCRIPTIVE EFFECTIVE DATE ORIGINATOR ORIGINATING DFI BATCH
NAME CODE CODE NAME DATA IDENTIFICATION CODE DESCRIPTION DATE ENTRY DATE (JULIAN) STATUS CODE IDENTIFICATION NUMBER
Contents ‘5’ Numeric1 Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric2 TTTTAAAA3 Numeric4
Length 1 3 16 20 10 3 10 6 6 3 1 8 7
Position 01-01 02-04 05-20 21-40 41-50 51-53 54-63 64-69 70-75 76-78 79-79 80-87 88-94
APPENDIX SIX – Acknowledgment Entries
NOTE: For Acknowledgment Entries, each field of the Company/Batch Header Record remains unchanged from the original entry, unless otherwise noted.
1 Contains ‘200’ for Acknowledgment Entries.
2 Changed to reflect the Originator Status Code of the institution initiating the Acknowledgment Entry (i.e., the RDFI of the original entry).
3 Changed to reflect the Routing Number of the Institution initiating the Acknowledgment Entry (i.e., the RDFI of the original entry).
4 Changed to the batch number assigned by the institution preparing the Acknowledgment Entry.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 6.4.2 Entry Detail Record Format for ACK Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion
Requirement M M M M R M M R O M M
Contents ‘6’ Numeric1 TTTTAAAA2 Numeric3 Alphameric $$$$$$$$¢¢ Numeric4 Alphameric Alphameric Numeric Numeric5
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
FIELD 1 2 3 4 5
DATA
ELEMENT RECORD TYPE ADDENDA TYPE PAYMENT RELATED ADDENDA ENTRY DETAIL
NAME CODE CODE INFORMATION SEQUENCE NUMBER SEQUENCE NUMBER
Field
Inclusion
Requirement M M O M M
Length 1 2 80 4 7
NOTE: For ACK Entries, each field of the Entry Detail Record remains unchanged from the original entry, unless otherwise noted.
1 Changed to the appropriate ACK Entry Transaction Code. (See Transaction Codes under currently assigned “Code Values” in Appendix Three.)
2 Changed to the Routing Number of the Institution receiving the ACK Entry (i.e., the ODFI of the original entry).
3 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
4 Copy data from positions 80-94 of the original Entry Detail Record.
5 Changed to the Trace Number assigned by the institution preparing the ACK entry.
OR187
APPENDIX SIX – Acknowledgment Entries
SUBPART 6.4.3 Corporate Entry Detail Record Format for ATX Entries
OR188
ATX ENTRIES — CORPORATE ENTRY DETAIL RECORD FORMAT
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
ORIGINAL RECEIVING
DATA RECORD DFI ENTRY NUMBER OF COMPANY ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT TOTAL TRACE ADDENDA NAME/ID DISCRETIONARY RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS NUMBER RESERVED DATA INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M M M R N/A O M M
Contents ‘6’ Numeric1 TTTTAAAA2 Numeric3 Alphameric $$$$$$$$¢¢ Numeric4 Numeric Alphameric Blank Alphameric Numeric Numeric5
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
APPENDIX SIX – Acknowledgment Entries
FIELD 1 2 3 4 5
DATA RECORD TYPE ADDENDA TYPE PAYMENT RELATED INFORMATION ADDENDA ENTRY DETAIL
ELEMENT CODE CODE SEQUENCE NUMBER SEQUENCE NUMBER
NAME
Field M M O M M
Inclusion
Requirement
Length 1 2 80 4 7
NOTE: For ATX Entries, each field of the Corporate Entry Detail Record remains unchanged from the original entry, unless otherwise noted.
1 Changed to the appropriate ATX Entry Transaction Code. (See Transaction Codes under currently assigned “Code Values” in Appendix Three.)
2 Changed to the Routing Number of the institution receiving the ATX Entry (i.e., the ODFI of the original entry).
3 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
4 Copy data from positions 80-94 of the original Corporate Entry Detail Record.
5 Changed to the Trace Number assigned by the institution preparing the ATX entry.
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 6.4.4 Company/Batch Header Record Format for Refused Acknowledgment Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
DATA RECORD SERVICE COMPANY STANDARD COMPANY COMPANY EFFECTIVE SETTLEMENT ORIGINATOR
ELEMENT TYPE CLASS COMPANY DISCRETIONARY COMPANY ENTRY CLASS ENTRY DESCRIPTIVE ENTRY DATE STATUS ORIGINATING DFI BATCH
NAME CODE CODE NAME DATA IDENTIFICATION CODE DESCRIPTION DATE DATE (JULIAN) CODE IDENTIFICATION NUMBER
2 0 1 3 O P E R AT I N G R U L E S
Field
Inclusion Inserted by
Requirement M M M O M M M O R ACH Operator M M M
Contents ‘5’ Numeric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric1 TTTTAAAA2 Numeric3
Length 1 3 16 20 10 3 10 6 6 3 1 8 7
Position 01-01 02-04 05-20 21-40 41-50 51-53 54-63 64-69 70-75 76-78 79-79 80-87 88-94
NOTE: For Refused Acknowledgment Entries, each field of the Company/Batch Header Record remains unchanged from the Acknowledgment entry, unless otherwise noted.
1 Changed to reflect the Originator Status Code of the institution initiating the Refused Acknowledgment Entry (i.e., the RDFI of the Acknowledgment Entry).
2 Changed to reflect the Routing Number of the institution initiating the Refused Acknowledgment Entry (i.e., the RDFI of the Acknowledgment Entry).
3 Changed to the Batch Number assigned by the institution preparing the Refused Acknowledgment Entry.
OR189
APPENDIX SIX – Acknowledgment Entries
SUBPART 6.4.5 Entry Detail Record Format for Refused ACK Entries
OR190
REFUSED ACK ENTRIES — ENTRY DETAIL RECORD FORMAT
FIELD 1 2 3 4 5 6 7 8 9 10 11
ORIGINAL
DATA RECORD ENTRY RECEIVING REFUSED ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK DFI ACCOUNT TRACE COMPANY ACKNOWLEDGMENT RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER NAME CODE INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M M R M M M
Contents ‘6’ Numeric TTTTAAAA1 Numeric2 Alphameric $$$$$$$$¢¢ Numeric3 Alphameric Alphameric Numeric Numeric4
Length 1 2 8 1 17 10 15 22 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-76 77-78 79-79 80-94
APPENDIX SIX – Acknowledgment Entries
NOTE: For Refused ACK Entries, each field of the Entry Detail Record remains unchanged from the ACK entry, unless otherwise noted.
1 Changed to the Routing Number of the institution receiving the Refused ACK Entry (i.e., the ODFI of the ACK Entry).
2 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
3 Copy data from positions 40-54 of the ACK entry.
4 Changed to the Trace Number assigned by the institution preparing the Refused ACK Entry (i.e., the RDFI of the ACK Entry).
2 0 1 3 O P E R AT I N G R U L E S
SUBPART 6.4.6 Corporate Entry Detail Record Format for Refused ATX Entries
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
ORIGINAL RECEIVING
DATA RECORD DFI ENTRY NUMBER OF COMPANY REFUSED ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ACCOUNT TOTAL TRACE ADDENDA NAME/ ACKNOWLEDGMENT RECORD TRACE
2 0 1 3 O P E R AT I N G R U L E S
NAME CODE CODE IDENTIFICATION DIGIT NUMBER AMOUNT NUMBER RECORDS ID NUMBER RESERVED CODE INDICATOR NUMBER
Field
Inclusion
Requirement M M M M R M M M R N/A M M M
Contents ‘6’ Numeric TTTTAAAA1 Numeric2 Alphameric $$$$$$$$¢¢ Numeric3 Numeric Alphameric Blank Alphameric Numeric Numeric4
Length 1 2 8 1 17 10 15 4 16 2 2 1 15
Position 01-01 02-03 04-11 12-12 13-29 30-39 40-54 55-58 59-74 75-76 77-78 79-79 80-94
NOTE: For Refused ATX Entries, each field of the Corporate Entry Detail Record remains unchanged from the ATX entry, unless otherwise noted.
1 Changed to the Routing Number of the institution receiving the Refused ATX Entry (i.e., the ODFI of the ATX Entry).
2 Changed to the Check Digit calculated according to NACHA standards and based on the Routing Number contained in positions 04-11.
3 Copy data from positions 40-54 of ATX entry.
4 Changed to the Trace Number assigned by the institution preparing the Refused ATX Entry (i.e., the RDFI of the ATX entry).
OR191
APPENDIX SIX – Acknowledgment Entries
APPENDIX SEVEN – Compensation Rules
OR192 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX SEVEN – Compensation Rules
Compensation =
PART 7.8 Return or Reversal of
(Dollar Amount of Entry) Erroneous Entry
(Federal Funds Rate)
+ $200
(No. of Days Forward Valued)
360 SUBPART 7.8.1 Credit Entries
(1) If an ODFI has Transmitted an erroneous
credit Entry and the RDFI returns the Entry
PART 7.7 Forward Valuation
according to Article Two, Subsection 2.12.2
Credit Entries – (1) An ODFI which Transmitted (ODFI Request for Return), or if the Entry is
a credit Entry may request the RDFI to adjust the reversed according to Article Two, Section
payment to a future value date. The RDFI is not 2.9 (Reversing Entries), the RDFI must pay
obligated to make such an adjustment. (2) If the the ODFI compensation according to the
RDFI makes the requested adjustment, the RDFI following formula, upon receipt of a claim
shall, upon receiving a claim for compensation for compensation within 90 days of the
within 90 days from the date on which such Settlement Date of the Return or Reversal.
adjustment was made, pay the ODFI compensation
according to the following formula:
2 0 1 3 O P E R AT I N G R U L E S OR193
APPENDIX SEVEN – Compensation Rules
Compensation = Compensation =
OR194 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX EIGHT – Rule Compliance Audit Requirements
2 0 1 3 O P E R AT I N G R U L E S OR195
APPENDIX EIGHT – Rule Compliance Audit Requirements
a.
Verify that a Record of each Entry is PART 8.3 Audit Requirements for RDFIs
retained for six years from the date the
In addition to the audit procedures outlined in
Entry was Transmitted, except as otherwise
Parts 8.1 (General Audit Requirements) and 8.2
expressly provided in these Rules. Verify
(Audit Requirements for All Participating DFIs)
that a printout or reproduction of the
of this Appendix Eight, all RDFIs and their Third-
information relating to the Entry can be
Party Service Providers must conduct an audit of
provided, if requested by the Participating
the following relating to the receipt of ACH entries:
DFI’s customer or any other Participating
DFI or ACH Operator that originated, a. Verify that the account number contained
Transmitted, or received the Entry. (Article in a Prenotification Entry is for a valid
One, subsections 1.4.1 and 1.4.2) account. If the Prenotification does not
contain a valid account number, or is
b.
When a Record required by these Rules
otherwise erroneous or unprocessable,
is created or retained in an Electronic
verify that the RDFI Transmits either (a)
form, verify that the Electronic form (a)
a Return Entry, or (b) a Notification of
accurately reflects the information in
Change. (Article Three, section 3.5)
the Record, and (b) is capable of being
accurately reproduced for later reference, b. Verify that, if the RDFI chooses to initiate
whether by Transmission, printing, or Notifications of Change, such COR Entries
otherwise. (Article One, subsection 1.4.3) are Transmitted within two banking days of
the Settlement Date of the entry to which
c. Verify that the Participating DFI conducted
the Notification of Change relates, with the
an audit of its compliance with the rules
exception of Notifications of Change due to
in accordance with Appendix Eight (Rule
merger, acquisition, or other similar events.
Compliance Audit Requirements) for the
(Article Three, subsection 3.9.1)
previous year. (Article One, subsection
1.2.2) c. Verify that, subject to the RDFI’s right of
return, all types of Entries that comply with
d. Verify that required encryption or a secure
these Rules and are received with respect
session is used for banking information
to an account maintained with the RDFI
transmitted via an Unsecured Electronic
are accepted. Verify that the RDFI handles
Network. (Article One, subsection 1.6)
XCK entries and entries to non-transaction
accounts appropriately. (Article Three,
e. Verify that the Participating DFI has reported
subsections 3.1.1 and 3.8.2)
and paid to the National Association (a)
all annual fees, and (b) a per-Entry fee for
d. Verify that, subject to the RDFI’s right of
each Entry that is Transmitted or received
return, the amount of each credit Entry
by the Participating DFI, including those
received from its ACH Operator is made
Entries that are not processed through
available to the Receiver for withdrawal no
an ACH Operator but are exchanged with
later than the Settlement Date of the Entry.
another non-affiliated Participating DFI.
In the case of a credit PPD Entry that is
(Article One, subsection 1.10)
made available to the RDFI by its ACH
Operator by 5:00 p.m. (RDFI’s local time)
f.
Verify that the Participating DFI has
on the Banking Day prior to the Settlement
conducted an assessment of the risks of its
Date, verify that the amount is made
ACH activities and has implemented a risk
available to the Receiver for withdrawal at
management program on the basis of such
the opening of business on the Settlement
an assessment. (Article One, subsection
Date. Verify that debit entries are not
1.2.4)
OR196 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX EIGHT – Rule Compliance Audit Requirements
posted prior to the Settlement Date, even if h. Verify that the RDFI returns any credit Entry
the Effective Date of the Entry is different that is refused by a Receiver by Transmitting
from the Settlement Date of the Entry. a Return Entry to its ACH Operator by the
(Article Three, subsections 3.3.1.1, 3.3.1.2, ACH Operator’s deposit deadline for the
and 3.3.2) Return Entry to be made available to the
ODFI no later than the opening of business
e.
For Consumer Accounts, verify that the on the second Banking Day following the
RDFI provides or makes available to each RDFI’s receipt of notification from the
of its Receivers required information Receiver that it has refused the Entry.
concerning each credit and debit Entry Also verify that the RDFI returns all credit
to a Consumer Account of such Receiver. Entries that are not credited or otherwise
(Article Three, subsection 3.1.5.1) made available to its Receivers’ accounts
by Transmitting a Return Entry to its ACH
For non-Consumer Accounts, verify that the Operator by the ACH Operator’s deposit
RDFI provides or makes available to the deadline for the Return Entry to be made
Receiver the contents of the Check Serial available to the ODFI no later than the
Number Field of an ARC, BOC, or POP opening of business on the second Banking
Entry. (Article Three, subsection 3.1.5.2) Day following the Settlement Date of the
original Entry. (Article Three, subsections
f. For all entries except RCK: 3.8.3.2 and 3.8.4)
Verify that the RDFI Transmits Return i. Verify that the RDFI honors stop payment
Entries to its ACH Operator by the ACH orders provided by Receivers, either
Operator’s deposit deadline for the Return verbally or in writing, to the RDFI at least
Entries to be made available to the ODFI three Banking Days before the scheduled
no later than the opening of business on date of any debit Entry to a Consumer
the second Banking Day following the Account other than a Single Entry. Verify
Settlement Date of the original Entry, that the RDFI honors stop payment orders
except as otherwise provided in these provided by Receivers to the RDFI at such
rules. (Article Three, section 3.8) time and in such manner as to allow the
RDFI a reasonable opportunity to act
Verify that late returns of unauthorized
upon the order prior to acting on any
CCD or CTX Entries are Transmitted with
debit Entry to a non-Consumer Account,
the agreement of the ODFI and that such
or an ARC, BOC, POP, or RCK Entry, or a
entries utilize the appropriate Return
Single Entry IAT, PPD, TEL, or WEB Entry.
Reason Code. (Article Three, subsection
to a Consumer Account. (Article Three,
3.8.3.5; Appendix Four)
subsections 3.7.1.1, 3.7.1.2 and 3.7.2)
Verify that dishonored Return Entries
Verify that the RDFI uses Return Reason
received by the RDFI are handled
Codes R38 (Stop Payment on Source
appropriately, and that contested
Document) and R52 (Stop Payment on Item
dishonored Return Entries and corrected
Related to RCK Entry) properly. Verify that,
Return Entries are initiated in a timely
for each ARC, BOC, or RCK Entry for which
manner. (Article Three subsection 3.8.5;
a stop payment order was in force with
Appendix Four)
respect to (a) the Check that was used as
an Eligible Source Document for the ARC or
g. Verify that Return Entries relating to RCK
BOC Entry, or (b) the item to which the RCK
Entries are Transmitted to the RDFI’s ACH
Entry relates, the Extended Return Entry is
Operator by midnight of the RDFI’s second
Transmitted to the RDFI’s ACH Operator
Banking Day following the Banking Day of
by its deposit deadline for the Extended
the receipt of the RCK Entry. (Article Three,
Return Entry to be made available to the
subsection 3.8.3.3)
ODFI no later than the opening of business
2 0 1 3 O P E R AT I N G R U L E S OR197
APPENDIX EIGHT – Rule Compliance Audit Requirements
on the Banking Day following the sixtieth an audit of the following relating to the origination
calendar day following the Settlement of ACH entries:
Date of the original Entry. (NOTE: No
Written Statement of Unauthorized Debit a.
Verify that the ODFI has entered into
is required for entries returned for these Origination Agreements with all Originators
reasons.) (Article Three, subsections or Third-Party Senders that bind the
3.11.2.2 and 3.13.1; Appendix Four) Originator or Third-Party Sender to these
Rules; that authorize the ODFI to originate
j.
Verify that Written Statements of entries on behalf of the Originator or Third-
Unauthorized Debit are obtained from Party Sender; that, within such agreements,
consumers for all returns bearing Return the Originator or Third-Party Sender
Reason Codes R05, R07, R10, R37, R51, and acknowledges that Entries may not be
R53, and that each Extended Return Entry initiated that violate the laws of the United
is Transmitted to the RDFI’s ACH Operator States; that includes any restrictions on
by its deposit deadline for the Extended types of Entries that may be originated; that
Return Entry to be made available to the includes that the Third-Party has entered
ODFI no later than the opening of business into an agreement with each Originator/
on the Banking Day following the sixtieth and that such agreements include the right
calendar day following the Settlement Date of the ODFI to terminate or suspend the
of the original Entry. Verify that copies agreement for breach of the Rules, and the
of Written Statements of Unauthorized right of the ODFI to audit the Originator’s,
Debits are provided to the ODFI within the the Third-Party Sender’s and the Third-
required time frame, when such copies are Party Sender’s Originators’ compliance
requested in writing by the ODFI. (Article with the Origination Agreement and the
Three subsection 3.11.1, 3.12.4, 3.12.6; and Rules. With respect to IAT Entries, verify
3.13.1; Appendix Four) that agreements contain all necessary
provisions. (Article Two, subsections
k.
Verify that the RDFI has provided the 2.2.1.1, 2.2.1.2 and 2.5.8.3)
Receiver with proper notice to ensure
compliance with UCC Article 4A with b.
Verify that, if applicable, the ODFI has
respect to ACH credit transactions. (Article entered into agreements with all Sending
Three, subsection 3.1.6) Points that Transmit Entries on the ODFI’s
behalf to an ACH Operator. (Article Two,
l.
Verify that, when requested to do so by subsection 2.2.1.3)
the non-Consumer Receiver, the RDFI
provides all information contained within c.
Verify that the ODFI has assessed the
the payment-related information field of risks of the Originator’s or Third-Party
an Addenda Record(s) Transmitted with a Sender’s ACH activity, and has established,
CCD, CTX, CIE, or IAT Entry. The RDFI must implemented and periodically reviewed an
provide this information by the opening of exposure limit for each Originator or Third-
business on the RDFI’s second Banking Party Sender. Verify that the ODFI has
Day following the Settlement Date of the established and implemented procedures
Entry. (Article Three, subsection 3.1.5.3) to monitor the Originator’s or Third-Party
Sender’s origination and return activity
PART 8.4 Audit Requirements for ODFIs across multiple Settlement Dates; enforce
In addition to the audit procedures outlined in restrictions on the types of Entries that may
Parts 8.1 (General Audit Requirements) and 8.2 be originated; and enforce the exposure
(Audit Requirements for All Participating DFIs) of limit. (Article Two, subsection 2.2.2)
this Appendix Eight, ODFIs, Third-Party Service
d. Verify that the ODFI accepts Return Entries
Providers, and Third-Party Senders must conduct
and Extended Return Entries that comply
with these Rules and that are Transmitted by
the RDFI within the time limits established
OR198 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX EIGHT – Rule Compliance Audit Requirements
by these Rules. Verify that dishonored with an Originator directly, also verify
Return Entries are Transmitted within five that the Third-Party Sender has utilized
banking days after the Settlement Date a commercially reasonable method to
of the Return Entry and that contested establish the identity of each Originator
dishonored Return Entries are accepted, that uses an Unsecured Electronic Network
as required by these rules. Verify that to enter into an Origination Agreement
the ODFI is using return reason codes with the Third-Party Sender. (Article Two,
in an appropriate manner. (Article Two, subsections 2.4.1.8 and 2.15.2)
subsections 2.12.1, 2.12.5.1, and 2.12.5.2;
Appendix Four) j. Verify that Reversing Entries and Reversing
Files are initiated in accordance with the
e.
Verify that information relating to NOCs requirements of these Rules. (Article Two,
and Corrected NOCs is provided to each sections 2.8 and 2.9)
Originator or Third-Party Sender within two
Banking Days of the Settlement Date of the k.
For BOC Entries, verify that the ODFI
NOC or Corrected NOC in accordance with has (1) established and implemented
Appendix Five (Notification of Change). commercially reasonable procedures to
Verify that refused NOCs are Transmitted verify the identity of each Originator or
within fifteen (15) days of receipt of an Third-Party Sender of such entries; and (2)
NOC or corrected NOC. (Article Two, established and implemented procedures
subsections 2.11.1 and 2.11.2) to document specific information with
respect to each Originator, as required by
f. With the exception of XCK entries, verify these rules, and that, upon request, such
that the ODFI provides to the RDFI, upon information is provided to the RDFI within
receipt of the RDFI’s written request, the the required time frame. (Article Two,
original, a copy, or other accurate Record subsection 2.5.2.5)
of the Receiver’s authorization with
respect to a Consumer Account within ten l. Verify that the ODFI has reported Return
banking days without charge. (Article Two, Rate information on each Originator
subsections 2.3.2.5 and 2.5.18.6) or Third-Party Sender, as requested by
the National Association. (Article Two,
g. Verify that, when agreed to by the ODFI, late subsection 2.17.2)
Return Entries are accepted in accordance
with these rules. (Article Two, subsection m.
Verify that the ODFI has (1) registered
2.12.6) its Direct Access status with the National
Association; (2) obtained the approval of
h.
Verify that the ODFI has provided the its board of directors, committee of the
Originator with proper notice to ensure board of directors, or its designee for
compliance with UCC Article 4A with each Direct Access Debit Participant; (3)
respect to ACH transactions. (Article Two, provided required statistical reporting for
subsection 2.3.3.2) each Direct Access Debit Participant; and
(4) notified the National Association of
i.
Verify that the ODFI has utilized a any change to the information previously
commercially reasonable method to provided with respect to any Direct Access
establish the identity of each Originator Debit Participant. (Article Two, subsection
or Third-Party Sender that uses an 2.17.1)
Unsecured Electronic Network to enter
into an Origination Agreement with the n. Verify that the ODFI has kept Originators
ODFI. When an ODFI has a relationship and Third-Party Senders informed of their
with a Third-Party Sender rather than responsibilities under these rules. (Article
Two, section 2.1)
2 0 1 3 O P E R AT I N G R U L E S OR199
APPENDIX NINE – Arbitration Procedures
OR200 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX NINE – Arbitration Procedures
Arbitration is mandatory for both parties once a the names not deleted on the list returned, or, if
claim for arbitration is filed in accordance with neither list is returned within the time limit, from
these rules; (2) A hearing will not be held; (3) among the names on the lists as mailed to each
Three arbitrators will decide the case; and (4) party.
The stipend for each arbitrator will be 1% of the
arbitrator’s decision. SUBPART 9.4.2 Arbitration Procedures B and C
For claims subject to Arbitration Procedures B and
SUBPART 9.3.3 Complaints with Damages of C, arbitrators will be selected by the following
$50,000 or More (Arbitration Procedure C) method: (1) The National Association will mail
All complaints in which the amount of damages each party the same list of ten arbitrators from
claimed is $50,000 or more will be processed among those nominated as provided herein who
under Arbitration Procedure C in these rules. are not affiliated with either party to the dispute;
Under Arbitration Procedure C: (1) Arbitration (2) Each party will have ten days from the date the
is not mandatory. Before the complaint is filed, list is mailed to review the list, delete three names,
both parties must agree to submit the dispute to and mail or deliver the remaining names to the
arbitration. If both parties agree, one of them must National Association; (3) The National Association
submit to the National Association a complaint that will then compare the two lists and select three
complies with these rules; (2) A hearing will be arbitrators not deleted from either list to decide
held unless the parties otherwise agree and notify the case; and (4) If either list is not returned
the National Association at the time the complaint within the time limit specified above, the National
is filed. If the parties otherwise agree, the Association will then select the arbitrators to
procedures in Subpart 9.5.2 (Arbitration Procedure decide the case from among the names not deleted
B) rather than Subpart 9.5.3 (Arbitration Procedure on the list returned, or, if neither list is returned
C) of this Appendix Nine will be followed; (3) At within that time limit, from among the names on
its discretion, a party may be represented at the the list as mailed to each party.
hearing by legal counsel; (4) Three arbitrators
will decide the case; and (5) The stipend for each PART 9.5 Presentation of the Case and
arbitrator will be 1.5% of the arbitrator’s decision. the Decision
2 0 1 3 O P E R AT I N G R U L E S OR201
APPENDIX NINE – Arbitration Procedures
evidence and other procedural and substantive SUBPART 9.5.3 Arbitration Procedure C
matters not inconsistent with these rules as he Cases subject to Arbitration Procedure C will be
may deem appropriate; (5) The decision of the presented and the decisions reached according
arbitrator will be based upon the applicable to the following requirements: (1) If a hearing is
rules; (6) Neither party will initiate contact with to be held, the arbitrators will set a hearing date
the arbitrator concerning the subject matter of which will not be less than 90 days after each
the dispute unless the other party is present; (7) party has received notification of the selection of
The arbitrator will be entitled to recover a part the arbitrators; (2) The National Association will
or all of the arbitrator’s stipend from either party provide both parties with at least 30 days prior
as determined by the arbitrator; and (8) The notice of the hearing; (3) Following the hearing,
arbitrator will pay his expenses and each party the arbitrators will have 30 days to render their
will pay its own expenses, including attorneys’ decision. The amount of the award of damages
fees, in connection with the arbitration. may not exceed the amount of damages claimed in
the complaint; (4) The arbitrators may adopt such
SUBPART 9.5.2 Arbitration Procedure B rules and procedures with respect to evidence
Cases subject to Arbitration Procedure B will be and other procedural and substantive matters not
presented and the decisions reached according inconsistent with these rules as they may deem
to the following requirements: (1) After a party appropriate; (5) The decision of the arbitrators will
has received notification of the selection of the be based upon the applicable rules; (6) Neither
arbitrators, it will have 14 days to submit to the party will initiate contact with any arbitrator
National Association in writing for consideration in concerning the subject matter of the dispute
such proceeding any matter it deems appropriate, unless the other party is present; (7) Each party
and the National Association will submit copies will pay its own expenses, including attorneys’
of such materials to the arbitrators and the other fees, in connection with the arbitration; and (8)
party; (2) In the event the respondent, in the The arbitrators will be entitled to recover a part or
judgment of the arbitrators, fails to cooperate in all of their travel and other expenses in connection
the proceeding within 14 days of a request for with the arbitration and the arbitrators’ stipend
information by the arbitrators, the facts as stated from either party, as determined by the arbitrators.
in the complaint will be assumed to be true for
purposes of the arbitration; (3) Once the arbitrators PART 9.6 Payment and Appeal
have received all information they deem relevant
or necessary, the arbitrators will have 30 days to SUBPART 9.6.1 Arbitration Procedures A and B
render their decision. The amount of the award of Payments of awards and appeals of decisions will
damages may not exceed the amount of damages be subject to the following requirements: (1)
claimed in the complaint; (4) The arbitrators may The party against which such amount has been
adopt such rules and procedures with respect to assessed will have 14 days after receiving notice
evidence and other procedural and substantive of the decision in which to pay the damage award
matters not inconsistent with these rules as they or other amount assessed against it as provided
may deem appropriate; (5) The decision of the in these rules; (2) The decision of the arbitrator(s)
arbitrators will be based upon the applicable will be final and binding on the parties to the
rules; (6) Neither party will initiate contact with dispute, and judgment thereon may be entered
the arbitrators concerning the subject matter of in any court having jurisdiction. Except to the
the dispute unless the other party is present; (7) extent such a prohibition is unlawful under the
The arbitrators will be entitled to recover a part laws of the state in which the party against which
or all of the arbitrators’ stipend from either party damages have been awarded by the arbitrator(s) is
as determined by the arbitrators; and (8) The domiciled, such decision will not be appealable to
arbitrators will pay their expenses and each party the courts.
will pay its own expenses, including attorneys’
fees, in connection with the arbitration. SUBPART 9.6.2 Arbitration Procedure C
Payments of awards and appeals of decisions will
be subject to the following requirements: (1) In
OR202 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX TEN – Rules Enforcement
the absence of an appeal to the courts, the party and their customers by limiting the number of
against which such amount has been assessed will unauthorized Entries.
have 14 days after receiving notice of the decision
in which to pay the damage award or other amount PART 10.2 ODFI Reporting
assessed against it as provided in these rules; (2) Requirements
The arbitrators’ decision will be binding on the
parties to the dispute, and judgment thereon may SUBPART 10.2.1 National Association Request
be entered by any court having jurisdiction. Except for Information
to the extent the parties have entered into an If, in its sole discretion, the National Association
enforceable agreement to the contrary, either party believes that the rate that debit Entries are returned
may appeal the arbitrators’ decision to the courts. as unauthorized exceeds one percent for one or
In the absence of such an appeal, the arbitrators’ more Originators or Third-Party Senders using the
decision will be final. ODFI to originate Entries, the National Association
may send, via traceable delivery method, a written
request to the ODFI’s Chief Operating Officer for
information described in Article Two, Subsection
APPENDIX TEN 2.17.2 (ODFI Return Rate Reporting). A copy of
Rules Enforcement this request will also be sent to the ODFI’s ACH
Manager.
2 0 1 3 O P E R AT I N G R U L E S OR203
APPENDIX TEN – Rules Enforcement
u (National System of Fines) of this Appendix Ten for of Subpart 10.4.2 (Submission Requirements for
a Class 2 Rules Violation, as defined within Subpart Rules Enforcement Proceedings Initiated by a
10.4.7.4 (Class 2 Rules Violation), if the ODFI Participating DFI or an ACH Operator.) The Report
(1) fails to provide the National Association with of Possible ACH Rules Violation Form and filing
complete and accurate information, as required instructions are located in the NACHA Operating
by Article Two, Section 2.17.2 (ODFI Return Rate Guidelines.
Reporting), within ten Banking Days of receipt
of NACHA’s written request for information; (2) A rules enforcement proceeding may also be
substantiates the claim that the Originator’s or initiated and conducted by the National Association
Third-Party Sender’s return rate for unauthorized in response to (1) a violation of unauthorized
Entries exceeded one percent, and the ODFI fails to Entries according to Part 10.2 (ODFI Reporting
reduce that return rate to a rate below the return Requirements) of this Appendix Ten, or (2) the
threshold for unauthorized Entries within 30 days failure of a Participating DFI to comply with a
after receipt of the National Association’s written direct obligation to the National Association,
request, according to Article Two, Section 2.17.2 as defined by these rules. A rules enforcement
(ODFI Return Rate Reporting); or (3) substantiates proceeding initiated by the National Association
that the Originator’s or Third-Party Sender’s return must comply with the requirements of Subpart
rate for unauthorized Entries exceeded one percent 10.4.3 (Submission Requirements for Rules
and the ODFI successfully reduced the return rate Enforcement Proceedings Initiated by the National
to below the return threshold within the 30 day Association).
time period, but the ODFI failed to maintain the
return rate below one percent for 180 additional SUBPART 10.4.2 Submission Requirements for
days. Rules Enforcement Proceedings Initiated by a
Participating DFI or an ACH Operator
PART 10.3 ODFI Registration Each rules enforcement proceeding initiated by
Requirements a Participating DFI or an ACH Operator that is a
party to a transaction must include a completed
If, in its sole discretion, the National Association
Report of Possible ACH Rules Violation that
believes that an ODFI has failed to register its
includes the following information and conforms
Direct Access Debit Participant status, or to provide
to the following requirements:
data reporting regarding a Direct Access Debit
Participant, the National Association may initiate
SUBPART 10.4.2.1 Identification of Parties
a rules enforcement proceeding. Such proceeding
will be according to Part 10.4 (National System of The names, addresses, and telephone numbers of
Fines) of this Appendix Ten for a Class 2 Rules the complainant and the other Participating DFI
Violation, as defined within Subpart 10.4.7.4 (Class involved in the dispute (the “respondent”) and
2 Rules Violation). routing number of the respondent.
OR204 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX TEN – Rules Enforcement
an ACH rule has been violated, and of any written the information provided by the ODFI
communications by the complainant and the substantiates that the Originator’s or Third-
respondent relating to the violation(s) asserted. Party Sender’s return rate for unauthorized
Entries exceeded the return rate, and the
SUBPART 10.4.2.4 Authorization for Submitting ODFI successfully reduced the return rate to
a Rules Violation Report below the return threshold within the 60 day
The Report of Possible ACH Rules Violation must time period, but the ODFI failed to maintain
be signed by an authorized representative of the the return rate below the return threshold for
complainant. 180 additional days; (4) or the Participating
DFI failed to comply with a direct obligation
SUBPART 10.4.2.5 Deadline for Submitting a Rules to the National Association, as defined by
Violation Report these rules;
A Report of Possible ACH Rules Violation must
a
u statement outlining the reason(s) for
be submitted to the National Association within
90 days of the occurrence of the rule violation(s) the initiation of a rules enforcement
asserted. proceeding: (1) the ODFI failed, within the
required timeframe, to provide the National
SUBPART 10.4.2.6 Complaints Involving Multiple
Association with complete and accurate
Participating DFIs information as required by Article Two,
Section 2.17.2 (ODFI Return Rate Reporting);
If the complainant is asserting rules violations
(2) the information provided by the ODFI
against more than one Participating DFI, a separate
substantiates the claim that the Originator
Report of Possible ACH Rules Violation must be
or Third-Party Sender exceeded the return
filed with respect to each such Participating DFI.
rate for unauthorized Entries and the ODFI
has failed to reduce the Originator’s or
SUBPART 10.4.3 Submission Requirements for
Third-Party Sender’s return rate for Entries
Rules Enforcement Proceedings Initiated by the
National Association returned as unauthorized to a rate below the
return threshold for unauthorized Entries
Each rules enforcement proceeding initiated by the
within 30 days after receipt of the National
National Association must contain the following
Association’s written request, according
information and conform to the following
to Article Two, 2.17.2 (ODFI Return Rate
requirements:
Reporting); (3) the information provided by
the ODFI substantiates that the Originator’s
• a statement outlining the reason(s) for
or Third-Party Sender’s return rate for
the initiation of a rules enforcement
unauthorized Entries exceeded the return
proceeding: (1) the ODFI failed, within the
rate, and the ODFI successfully reduced the
required timeframe, to provide the National
return rate to below the return threshold
Association with complete and accurate
within the 30 day time period, but the ODFI
information as required by Article Two,
failed to maintain the return rate below the
Section 2.17.2 (ODFI Return Rate Reporting);
return threshold for 180 additional days; or
(2) the information provided by the ODFI
(4) the Participating DFI failed to comply
substantiates the claim that the Originator or
with a direct obligation to the National
Third-Party Sender exceeded the return rate
Association, as defined by these rules;
for unauthorized Entries and the ODFI has
failed to reduce the Originator’s or Third-
• for a rules enforcement proceeding initiated
Party Sender’s return rate for Entries returned
in response to a violation of unauthorized
as unauthorized to a rate below the return
Entries according to Part 10.2 (ODFI
threshold for unauthorized Entries within 60
Reporting Requirements) of this Appendix
days after receipt of the National Association’s
Ten, a copy of the National Association’s
written request, according to Article Two,
written request for information according to
2.17.2 (ODFI Return Rate Reporting); (3)
Subpart 10.2.1 (National Association Request
for Information) of this Appendix Ten.
uApproved April 2, 2012, Effective March 15, 2013
2 0 1 3 O P E R AT I N G R U L E S OR205
APPENDIX TEN – Rules Enforcement
A rules enforcement proceeding initiated by the and explaining that fines may be imposed against
National Association must be submitted within the Participating DFI in the event that the rule
90 days of the occurrence of the rule violation(s) violation is not corrected.
asserted.
The Participating DFI will be asked to correct
SUBPART 10.4.4 Assessment of Rules the problem that caused the rule violation and
Enforcement Submission to respond within ten Banking Days after the
Each submission of a rules enforcement proceeding date on which it received the Notice of Possible
will be evaluated by the National Association to ACH Rules Violation. The Notice of Possible
ensure that the documentation necessary to identify ACH Rules Violation Response Form must be
the incident has been included and to determine sent, via traceable delivery method, to the
whether a violation of these rules appears to have National Association and must include either (1)
occurred. If the National Association makes a an acknowledgment of the Participating DFI’s
preliminary determination that a violation of these recognition of and intent to correct the problem
rules has occurred, the National Association will causing the rule violation, along with a statement
identify whether the violation is (1) the first such specifying the date by which the Participating DFI
violation, (2) a Class 1 Rules Violation involving a will resolve the problem (resolution date), or (2) a
recurrence of a previous violation, or (3) a Class statement, along with supporting documentation,
2 Rules Violation, and it will issue either a Notice that the Participating DFI does not believe that a
of Possible ACH Rules Violation or a Notice of rules infraction has occurred.
Possible Fine in accordance with this Subpart
10.4.4. If the National Association determines that If the National Association receives the
it is unclear whether a rules violation has occurred, Participating DFI’s completed response form
or if the National Association believes the violation and any necessary documentation within the ten
involves a Class 2 Rules Violation, it may forward Banking Day time frame, no additional action will
the issue to the ACH Rules Enforcement Panel for be taken by the National Association unless (1) the
additional review. National Association believes the time frame and
resolution date asserted by a Participating DFI as
In circumstances involving (1) a submission to the necessary to resolve the problem causing the rules
rules enforcement process from a Participating DFI violation are excessive and require review by the
or an ACH Operator that is a party to a transaction, ACH Rules Enforcement Panel, or (2) the National
identifying either a Class 1 Rules Violation or a Association receives an additional submission of a
Class 2 Rules Violation; or (2) a rules enforcement rule violation report.
proceeding initiated by the National Association
because of a Class 2 Rules Violation, the issue SUBPART 10.4.4.2 Notice of Possible Fine
will be forwarded directly to the ACH Rules If the National Association determines that the
Enforcement Panel for evaluation and possible violation is a Class 1, Class 2, or Class 3 Rules
assessment of a fine or penalty in accordance with Violation, as defined by Subpart 10.4.7 (Fines
Subpart 10.4.7 (Fines and Penalties). and Penalties), a Notice of Possible Fine will be
sent to the Participating DFI and the National
SUBPART 10.4.4.1 Notice of Possible ACH Association will forward the issue to the ACH Rules
Rules Violation Enforcement Panel to consider the imposition of a
If the National Association determines that the fine against the Participating DFI in accordance
violation is the first such infraction of these rules, with Subpart 10.4.7 of this Appendix Ten.
a Notice of Possible ACH Rules Violation will
be sent to the ACH Manager at the respondent In the Notice of Possible Fine, the Participating
Participating DFI, within ten Banking Days via DFI will be asked to correct the rule violation that
traceable delivery method, indicating that an is the basis for the Notice of Possible Fine and
infraction of the rules appears to have occurred to respond to the National Association within ten
OR206 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX TEN – Rules Enforcement
Banking Days after the date on which it received SUBPART 10.4.5 Notifications
a Notice of Possible Fine. The Notice of Possible
Fine Response Form must be sent, via traceable SUBPART 10.4.5.1 Notification on Initiation of Rules
delivery method, to the National Association and Enforcement Proceeding
must include either (1) an acknowledgment of An informational copy of each rules enforcement
the Participating DFI’s recognition of and intent proceeding initiated under this Appendix Ten will
to correct the problem causing the rule violation be forwarded to the Regional Payments Association
that is the basis for the Notice of Possible Fine, of both the complainant and the respondent. In the
along with a statement specifying the Resolution event that either party is an access participant (i.e.,
Date, or (2) a statement, along with supporting not a member of a Regional Payments Association),
documentation, that the Participating DFI does not an informational copy will be forwarded to the local
believe that a rules violation occurred. Federal Reserve Bank. In situations involving the
initiation of a rules enforcement proceeding by the
Where the ODFI fails to provide a complete National Association according to Subpart 10.4.1
and accurate response in accordance with the (Initiation of a Rules Enforcement Proceeding), an
requirements of Section 2.17.2 (ODFI Return informational copy of each such rules enforcement
Rate Reporting), the ODFI’s acknowledgment proceeding initiated will be forwarded to the ACH
to the Notice of Possible Fine must include the Operators.
reporting information required by Section 2.17.2.
In situations involving the ODFI’s affirmation of a SUBPART 10.4.5.2 Notification on Resolution
return rate for unauthorized Entries in excess of of Issue
the return threshold, the ODFI’s acknowledgment The National Association will notify the complainant
to the Notice of Possible Fine must include upon the resolution of the rules enforcement
updated information on, and the timetable for, the proceeding that either (1) the violation has been
implementation of the ODFI’s plan to reduce its resolved or will be resolved within a certain time
return rate. period, or (2) the respondent has refuted the claim
of a rules violation.
Where the ODFI fails to register or provide data
reporting in accordance with the requirements SUBPART 10.4.6 ACH Rules Enforcement Panel
of Article Two, Section 2.17.1 (Direct Access
Registration), the ODFI’s acknowledgement to the SUBPART 10.4.6.1 Selection of Enforcement Panel
Notice of Possible Fine must include the registration The National Association will maintain a list of
information required by Section 2.17.1. members of the ACH Rules Enforcement Panel
that have been nominated in accordance with the
If the National Association receives the procedures established by the National Association.
Participating DFI’s completed response form
and related information within the ten Banking SUBPART 10.4.6.2 Responsibilities of
Day time frame, and the National Association Enforcement Panel
determines that the response refutes the claim The ACH Rules Enforcement Panel, in accordance
in the Notice of Possible Fine, the National with these rules, is the final authority regarding
Association will take no additional action at that each of these issues:
time. In all other circumstances described within
this Subpart 10.4.4.2, the National Association will • the imposition of any fines or penalties
forward the issue to the ACH Rules Enforcement recommended by the National Association;
Panel for its consideration and possible imposition
of a fine in accordance with Subpart 10.4.7 (Fines • instances in which the National Association
and Penalties) of this Appendix Ten. believes the time frames and Resolution Dates
asserted by the respondent Participating DFI
as necessary to resolve the problem causing
a rules violation are excessive;
2 0 1 3 O P E R AT I N G R U L E S OR207
APPENDIX TEN – Rules Enforcement
• rules violations that the National Association period following the Resolution Date of the
believes constitute Class 1, Class 2, or Class 3 initial rules violation; or
Rules Violations; and
• the same infraction is committed by the same
• situations in which the National Association Participating DFI within the one-year period
determines that it is unclear whether a rules following the Resolution Date of the initial
violation has occurred. rules violation.
SUBPART 10.4.7 Fines and Penalties Fines for recurrences may be assessed by the ACH
Rules Enforcement Panel as follows:
SUBPART 10.4.7.1 Imposition of Fines/Penalties
In the event that a Participating DFI is cited with • The first recurrence of a rules violation that
a Class 1, Class 2, or Class 3 Rules Violation, the will cause a fine to be levied by the National
National Association will impose a fine, subject to Association will result in an assessment of up
approval by the ACH Rules Enforcement Panel, to $1,000 against the Participating DFI.
on the Participating DFI in accordance with this
Subpart 10.4.7. • The second recurrence of a rules violation
that causes a fine to be levied by the National
The National Association will collect a fine by Association will result in an assessment of up
transmitting an ACH debit to the account of the to $2,500 against the Participating DFI.
affected respondent Participating DFI. Each
Participating DFI agrees to the payment of any • The third recurrence of a rules violation that
fines in accordance with this process. The National causes a fine to be levied by the National
Association will provide notice to the respondent Association will result in an assessment of up
Participating DFI of the date and amount of the to $5,000 against the Participating DFI.
debit at least seven Banking Days in advance of
the Settlement Date of the debit. SUBPART 10.4.7.4 Class 2 Rules Violation
A Class 2 Rules Violation is one in which:
SUBPART 10.4.7.2 Determination of Fines
The fine(s) levied against a respondent (1)
the Participating DFI has not responded
Participating DFI for an infraction(s) of these rules to either the Notice of Possible ACH Rules
will be determined based on an evaluation by the Violation or the Notice of Possible Fine;
National Association of whether the rules violation
is a Class 1, Class 2, or Class 3 Rules Violation. (2)
the Participating DFI responds to either
notice that it does not intend to correct the
SUBPART 10.4.7.3 Class 1 Rules Violation rules violation;
A Class 1 Rules Violation involves a recurrence
(3)
the Participating DFI (i) fails to respond
of a previous rules violation. A rules violation
completely and accurately, within the proper
is considered to be a recurrence of a previously
time frame, to the National Association’s
reported infraction of these rules if:
request for information in accordance with
the requirements of Article Two, Section
• the same infraction is committed by the same
2.17.2 (ODFI Return Rate Reporting); (ii)
Originator that transmits through the ODFI
substantiates the claim that the Originator
within the one-year period following the
or Third-Party Sender exceeded the return
Resolution Date of the initial rules violation;
rate for unauthorized Entries and the ODFI
has failed to reduce the Originator’s or
• the same infraction is committed by the same
Third-Party Sender’s return rate for Entries
Third-Party Service Provider transmitting
returned as unauthorized to a rate below
through or on behalf of an ODFI or receiving
the return threshold for unauthorized
on behalf of an RDFI within the one-year
OR208 2 0 1 3 O P E R AT I N G R U L E S
APPENDIX TEN – Rules Enforcement
2 0 1 3 O P E R AT I N G R U L E S OR209
APPENDIX TEN – Rules Enforcement
OR210 2 0 1 3 O P E R AT I N G R U L E S
INDEX
Index
2 0 1 3 O P E R AT I N G R U L E S OR211
INDEX
Audit requirements B
all DFIs, OR195
general rule, OR1, OR195 Back office conversion entries
ODFIs, OR198–OR199 defined, OR53
RDFIs, OR196–OR198 improper debits, OR43
rules compliance audit requirements, OR195 notification, OR10
Third-Party Service Providers, OR195, OR198 obligations of Originators, OR10–OR11
Authorization, OR5–OR6 origination of, OR10, OR10–OR11
authorization code, OR104–OR105 right to recredit, OR42
Automated accounting advice sequence of records, OR80
ACH Operator obligations, OR48 specific provisions for, OR10–OR11
defined, OR53 standard entry class codes, OR121
file record format, OR77–OR78 Back valuation
standard entry class code, OR120 defined, OR193
Automated Clearing House Banking Day
defined, OR53 defined, OR53
Automated Clearing House Operators Batch count, OR104
adherence to NACHA Operating Rules, OR46 Batch level reject option, OR69
agreement, OR46 Batch number, OR104
agreements with DFIs, OR46 Beginning segment for payment order/
data elements, OR102 remittance advice
defined, OR53 defined, OR116
Federal Reserve Policy Statement on Privately Beneficiary, change of, OR194–OR195
Operated Multilateral Settlement Systems, Beneficiary deceased code, OR129
OR46 Block count, OR104
file reversals, OR47–OR48 Blocking factor, OR104
general responsibilities, OR46 BOC. See Back office conversion entries
general rules, OR1 BPR/BPS data segment
indemnity of association, OR51 defined, OR116
inter-ACH Operator exchange, OR46 Business day
limitation of liability, OR51 defined, OR53
not agent of participating DFI, OR47
performance standards, OR46 C
processing functions, OR46
record of entries requirement, OR2 Card expiration date, OR104
record retention, OR47 Card transaction type code, OR104
return entries, OR47 CCD entries. See Corporate credit or debit entries
return or rejection by, OR46 Change codes, OR104
risk control measures, OR46 table of, OR168–OR172
Automated enrollment entries Change of beneficiary, OR194
about, OR13 Check
defined, OR53 defined, OR53
return by Federal Government Agency codes, Check digit, OR104
OR136 Check serial number, OR105
sequence of records, OR85 defined, OR53
standard entry class code, OR121 Check truncation entries. See Truncated check
Automatic batch rejection, OR69–OR70 entries
Automatic entry detail rejection, OR70–OR72 Check truncation program
Automatic file rejection, OR68–OR69 defined, OR53
Auxiliary on-us field Code values, OR73
defined, OR53 Company/batch control record
Availability, OR35 entry hash, OR109–OR110
format specifications, OR73
OR212 2 0 1 3 O P E R AT I N G R U L E S
INDEX
2 0 1 3 O P E R AT I N G R U L E S OR213
INDEX
DFI account number, OR107, OR111 Entry detail records. See also Corporate entry
DFIs. See Depository Financial Institutions detail record
Direct access acknowledgement entries, OR187
defined, OR54 contested dishonored returns, OR165
registration, OR31–OR32 dishonored returns, OR160
Direct access debit participant exchange specifications, OR62
defined, OR54 format specifications, OR73
Direct Financial Institution notification of change, OR177
defined, OR54 refused acknowledgment entries, OR190
Discretionary data, OR107 refused notification change, OR183
Dishonored returns returns, OR150
codes used by ODFIs, OR139–OR140 Entry detail sequence number, OR109
contested, OR41 Entry hash, OR109–OR110
corrected, OR40 Erroneous entries, OR193–OR194
ODFIs, OR28 defined, OR55
reason code, OR108 Erroneous file
record format, OR158–OR161 defined, OR56
settlement date, OR108 Excused delay, OR3
specifications, OR157 Existing relationship
trace number, OR108 defined, OR56
Disputes. See Arbitration Exposure limits, OR5
DNE entries. See Death notification entries Extended return entries, OR45–OR46
Document reference number, OR108 defined, OR56
Duplicate enrollment code, OR137
Duplicate entry code, OR132
Duplicate return code, OR139
F
Federal funds rate
E defined, OR192
Federal Reserve Bank, OR51–OR52
Effective entry date, OR108 FGO. See Foreign Gateway
Effect of illegality Field error codes, OR102, OR140
rules compliance, OR1 Field inclusion requirements, OR102
Electronic File
defined, OR54 defined, OR56
Electronic Record File acknowledgment
defined, OR54 ACH Operators, OR68
records permitted, OR3 File control record
Electronic signature entries format, OR73
defined, OR55 entry hash, OR109
Electronic transmission requirements, OR62 format specifications, OR74
Eligible item, OR17, OR22 specifications, OR65
Eligible source document File creation date, OR109
defined, OR55 File creation time, OR109
Encoding, OR19 File header records
Endorsement exchange specifications, OR63
restrictive, OR18 format specifications, OR74
ENR entries. See Automated enrollment entries File identification, OR109
Entries File ID modifier, OR109
defined, OR55 File level reject option, OR69
general rules, OR1 File record edit criteria code, OR130
reversing, OR25–OR26 File specification, OR62–OR67
timeliness of, OR8, OR46 Financial agency
transmission of, OR8 defined, OR56
Entry/addenda count, OR108 Financial Crimes Enforcement Network,
U.S. Department of Treasury, OR1
OR214 2 0 1 3 O P E R AT I N G R U L E S
INDEX
2 0 1 3 O P E R AT I N G R U L E S OR215
INDEX
OR216 2 0 1 3 O P E R AT I N G R U L E S
INDEX
2 0 1 3 O P E R AT I N G R U L E S OR217
INDEX
OR218 2 0 1 3 O P E R AT I N G R U L E S
INDEX
S Telephone-initiated entries
authorization for, OR20–OR21
Secondary OFAC screening indicator, OR120 defined, OR60
Security requirements. See Data security general rule, OR19
requirements obligations of originators, OR20
Sending points sequence of records, OR97
defined, OR60 standard entry class code, OR122
liabilities of ODFIs, OR5 Terminal city, OR122
Sequence number within batch, OR120 Terminal identification code, OR122
Sequence of records, OR62–OR63 Terminal location, OR123
Service class code, OR120 Terminal state, OR123
Settlement, OR51–OR52 Third-Party Senders
Settlement date, OR120–OR121 agreements with ODFIs, OR4–OR5
defined, OR60 defined, OR60
Shared network entries international ACH transactions, OR13
defined, OR60 obligations of, OR30–OR31
general rule, OR19 risk management of, OR5
PIN requirements, OR19 verification of identity, OR8
sequence of records, OR96 Third-Party Service Providers
standard entry class code, OR122 defined, OR60
SHR. See Shared network entries Timely original return code, OR141
Single entry Total amount, OR123
defined, OR60 Total debit or credit entry dollar amount, OR123
Six banking days’ delay, OR24 Trace number, OR123–OR124
Source documents Trace number sequence, OR65
accounts receivable entries, OR9 Transaction account
back office conversion entries, OR11 defined, OR60
defined, OR55 Transaction codes, OR123–OR124
improper source document code, OR135 Transaction date, OR124
may not be presented for payment, OR10, Transaction description, OR124
OR11 Transaction serial number, OR125
point-of-purchase entries, OR15 Transaction time, OR125
presented for payment code, OR134 Transaction type code, OR125
stop payment code, OR134 Transmit
Standard Entry Class Codes, OR120–OR122 defined, OR60
defined, OR60 TRC entries. See Truncated check entries
RDFI may rely on, OR33 Truncated check entries
State law affecting acceptance code, OR138 defined, OR53
Statements, periodic, OR12 eligible participants, OR21
Stop payment codes, OR128, OR134, OR138 return and rejection, OR47
Stop payments, OR38–OR39 return code, OR129
rules application, OR21
T sequence of records, OR98
standard entry class code, OR122
Technical specifications Truncated entries exchange
ACH file exchange, OR62–OR67 defined, OR53
ACH record format, OR73–OR125 rules application, OR21
acknowledgment entries, OR185–OR191 sequence of records, OR99
arbitration procedures, OR200–OR202 standard entry class code, OR122
compensation rules, OR192–OR194 Truncation
data acceptance, OR68–OR72 defined, OR61
national system of fines, OR204–OR209 TRX. See Truncated entries exchange
notification of change, OR167–OR184
return entries, OR126–OR166
rule compliance audit requirements,
OR195–OR199
rules enforcement, OR203–OR209
2 0 1 3 O P E R AT I N G R U L E S OR219
INDEX
U W
UEN. See Unsecured electronic networks Waiver of right to recredit, OR43
Unable to locate account code, OR127 Warranties
Uncollected funds code, OR128 destroyed check entries, OR23
Unexcused delays, OR3 liability for breach of, OR9
Uniform Commercial Code of Gateway, OR49
defined, OR61 of ODFIs, OR7–OR8
Unposted credit entries, OR40 of RDFIs, OR35
Unsecured electronic networks sending points, OR8
defined, OR61 Third-Party Senders, OR30
transmission of ACH information, OR3 Wireless network
warranties, OR8 defined, OR61
Untimely return code, OR139 Written statement of unauthorized debit
defined, OR61
V
Variable debits, OR6
OR220 2 0 1 3 O P E R AT I N G R U L E S
NACHA Operating Guidelines –
Corporate Edition
The NACHA Operating Rules (Rules) provides users with the legal framework for the ACH
Network, while the NACHA Operating Guidelines – Corporate Edition provides guidance on
implementing the rules. In the case of any inconsistency or conflict between the Rules and the
NACHA Operating Guidelines – Corporate Edition, the NACHA Operating Rules govern.
The NACHA Operating Guidelines - Corporate Edition includes excerpts from the NACHA
Operating Guidelines that are important to corporations. Refer to the Guidelines for originator
roles and responsibilities within the ACH Network and an overview of various Standard Entry
Class Codes. In addition, the NACHA Operating Guidelines – Corporate Edition offers details on
the legal framework of the Rules, Third-Party Service Providers, OFAC Compliance, and a brief
history of the development of the ACH Network.
Users of the corporate edition of the NACHA Operating Rules & Guidelines should be aware that
certain chapters and/or section of the NACHA Operating Guidelines have been omitted from this
document. Additional topics not addressed by this corporate edition and other important, more
detailed information relating to the processing of ACH entries by both Originators and other
ACH participants may be found within the complete NACHA Operating Guidelines contained
within the 2013 NACHA Operating Rules & Guidelines.
SECTION I – General Information
CHAPTER 1 OVERVIEW OF THE SYSTEM
ACH PARTICIPANTS
SECTION I Listed below, and in Figure 1-1, are the participants
that are involved in a typical ACH transaction:
General 1.
the originating company or individual
Information
(Originator),
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG1
SECTION I – General Information
CHAPTER 1 OVERVIEW OF THE SYSTEM
OG2 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
CHAPTER 1 OVERVIEW OF THE SYSTEM
account. For example, when a corporate buyer The example in Figure 1-2 illustrates the ACH
originates a payment for goods through the ODFI, credit process.
the ODFI initiates the credit transaction to transfer
the money into the corporate seller’s account at the Information and Funds Flow
RDFI. In this instance, the seller is the Receiver. Example:
ACH credit transactions involve both consumer As illustrated in Figure 1-2, a payroll deposit (PPD)
and corporate payments with distinct rules and credit flows from an account at a company’s financial
regulations for each. The most typical consumer institution to an account at an employee’s financial
ACH application is Direct Deposit of payroll. institution. Figure 1-2 also illustrates the flow of
a corporate trade exchange (CTX) credit from an
Some of the more common credits processed account at a company’s financial institution to an
through the ACH Network are listed below: account at a vendor’s financial institution. Credit
entries must be posted to a Receiver’s account no
• annuities later than Settlement Date. Consumer (PPD) credit
• customer-initiated transactions entries that are made available to the RDFI by its
(e.g., telephone bill payments) ACH Operator by 5:00 p.m. (RDFI’s local time) on
• corporate-to-corporate payments the banking day prior to Settlement Date must
be made available by opening of business on the
• dividends Settlement Date.
• interest payments
• payrolls – private and government ACH Debits
• pensions – private and government In an ACH debit transaction, funds flow in
the opposite direction. Funds are collected
• Social Security payments from a Receiver’s account and transferred to an
• tax payments Originator’s account, even though the Originator
• government vendor payments initiated the entry. For example, the Originator of
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG3
SECTION I – General Information
CHAPTER 1 OVERVIEW OF THE SYSTEM
• government savings bonds purchases A typical transaction as it flows through the ACH
• holiday or vacation club payments Network might follow the path described below:
• insurance payments
• The Originating Depository Financial Institution
• mortgage and installment loan payments (ODFI) and the originating company determine,
• point of sale purchases by agreement, how the information must be
delivered to the ODFI. In some cases, the
• utility payments
Originator formats the data in accordance with
OG4 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
CHAPTER 1 OVERVIEW OF THE SYSTEM
the requirements of the NACHA Operating The following are the three main participants (ODFI,
Rules and transmits it the ODFI. In other ACH Operator, RDFI) and their responsibilities
instances, the ODFI may take unformatted data concerning settlement and posting.
as a service to their client companies and does
the formatting itself. The ODFI establishes ODFI
processing schedules and cutoff times with its Settlement with the ODFI for entries originated
Originators so that entries may be processed usually occurs using the same procedures used for
and transmitted in sufficient time for settlement settlement of entries received. If the scheduled
to occur on the dates desired by its Originators. Settlement Date of a credit entry is not a banking
day for the ODFI, but the applicable Federal
• The company delivers the file to its ODFI. The Reserve office is open on that date, settlement will
timing of delivery must conform to appropriate occur on the scheduled Settlement Date.
schedules in order for the payment to settle on
the intended date. Specific procedures and timing of settlement
between the ODFI and the Originator are solely at
• The ODFI generally removes “on-us” entries the discretion of the ODFI and the Originator and,
and transmits the remaining entries to the ACH therefore, governed by agreement between them.
Operator by the ACH Operator’s processing
deadline. An “on-us” transaction is one in ACH Operator
which the Receiver and the Originator both
An ACH Operator calculates settlement totals owed
have accounts at the same financial institution.
to and by Participating DFIs based on the effective
Therefore, the transaction need not be transmitted
entry dates and processing dates contained within
through the ACH Network but instead may
batches of transactions. An ACH Operators provides
simply be retained by the financial institution
information to participants on the dollar amounts
and posted to the appropriate account.
that will be settled for each institution on each
Settlement Date. ACH entries processed by the
• The ACH Operator sorts the entries by RDFI
Federal Reserve ACH Operator are settled against
routing number and transmits the payment
the Participating DFI’s settlement account held at
information to the appropriate RDFI(s) for
the Federal Reserve. Settlement for transactions
posting.
processed by private sector ACH Operators is
determined by an arrangement with the Federal
On Settlement Date, all the ODFI, RDFI and ACH
Reserve.
Operator effect the appropriate settlement of
funds.
RDFI
Settlement While settlement between the Originator and
the ODFI is governed by agreement, settlement
Settlement is the actual transfer of the value of
between the RDFI and the Receiver is determined
funds between financial institutions to complete
by the NACHA Operating Rules, Federal Reserve
the payment instruction of an ACH entry.
availability schedules, and agreement.
The Federal Reserve provides settlement services
When an ACH file is processed by the receiving
for ACH entries processed by the Federal Reserve
ACH Operator, the ACH Operator will read the
and for private sector ACH Operators that process
effective entry date in the Company/Batch Header
ACH entries. The Federal Reserve ACH Operator
Record and settle according to that date. If the file
calculates the net credit and debit positions of
has been delivered to the ACH Operator so that the
financial institutions and applies those credits
ACH Operator is able to settle on the effective entry
or debits to the reserve accounts of the financial
date, it will insert the corresponding Julian Date in
institutions (or their correspondent banks) that are
the Settlement Date field. If the ACH Operator
maintained on the books of the Federal Reserve.
cannot settle on the effective entry date due to a
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG5
SECTION I – General Information
CHAPTER 1 OVERVIEW OF THE SYSTEM
stale date, weekend, or holiday, the ACH Operator • ACH credits will be delivered to an RDFI
will insert the Julian Date of the next business no earlier than two banking days prior to
day into the Settlement Date field reflecting that the Settlement Date. It is recommended that
settlement will occur on that date. credits be posted on the Settlement Date; credit
entries may, however, be posted prior to the
• Settlement information is produced by the ACH Settlement Date if the RDFI cannot warehouse
Operator as ACH entries are processed. This the entries. NACHA Operating Rules require that
information is accumulated based on the type credit entries must be available for withdrawal
of entry (debit or credit) by Settlement Date. by the customer no later than the Settlement
These settlement totals are reported to the RDFI Date of the entry. Further, according to NACHA
or its settlement member correspondent. Operating Rules, each PPD credit entry that is
made available to an RDFI by its ACH Operator
• The ACH Operator may provide ACH settlement by 5:00 p.m. (RDFI’s local time) on the banking
information in a machine-readable format to day prior to the Settlement Date must be made
facilitate the automation of settlement accounting available to the Receiver for withdrawal at the
for correspondent RDFIs. opening of business on the Settlement Date. For
this purpose, opening of business is defined as
• RDFIs should balance settlement totals daily the later of 9:00 a.m. (RDFI’s local time) or the
against totals posted to the RDFI’s customer time the RDFI’s teller facilities (including ATMs)
accounts and against any rejects that may occur are available for customer account withdrawals.
on a daily basis. Rejects and other differences
must be resolved immediately. CONSUMER VS. CORPORATE
PAYMENTS
• ACH settlement procedures are the same for
consumer and corporate transactions. In view ACH transactions are typically categorized
of the large-dollar entries that flow through the as either consumer payments or corporate
ACH Network for corporate customers, RDFIs payments, depending on the relationship of the
should have internal procedures in place to parties involved in the transaction and the type
monitor large-dollar settlement totals. of Receiver account. (Note: The term “corporate
payments” refers generally to any transaction to a
non-consumer account and includes corporations,
Posting
small businesses and non-profit organizations
The RDFI is responsible for posting entries and
alike.) In addition, payments are distinguished
for providing funds availability, both of which are
as Federal Government payments (including
determined by the Settlement Date in the Company
automated disbursements originating from the
Batch Header Record.
United States Government, such as Social Security
benefits, military and civilian payrolls, retirement
• ACH debits will be delivered to an RDFI no earlier
benefits, tax refunds, and disbursements for
than one banking day prior to the Settlement
state and federal revenue sharing programs) or
Date. NACHA Operating Rules state that debits
commercial payments (initiated by both individual
cannot be posted prior to the Settlement Date.
consumers and corporations).
If an RDFI is closed for business on the
Consumer payments currently made via the ACH
scheduled Settlement Date of a debit entry, but
Network include credit applications such as
the Receiving ACH Operator is open, the RDFI
payroll, retirement, dividend, interest, and annuity
will be debited on the scheduled Settlement
payments, in addition to educational benefit
Date unless it has advised the ACH Operator
reimbursements, payments and advances, and many
to delay settlement to the next business day of
others. Consumer ACH debit applications include,
the RDFI. If the ACH Operator agrees to delay
among others, the collection of insurance premiums,
settlement, the RDFI must pay for any costs of
mortgage and rent payments, utility payments,
float resulting from the deferral of settlement.
installment payments, a variety of membership
dues, and other recurring obligations.
OG6 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
CHAPTER 1 OVERVIEW OF THE SYSTEM
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG7
SECTION I – General Information
CHAPTER 1 OVERVIEW OF THE SYSTEM
OG8 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
CHAPTER 2 LEGAL FRAMEWORK
CTX formats. These acknowledgments indicate to cannot be made, and (3) check images that are
the Originator that the payment was received and unprocessable.
that the RDFI will attempt to post the payment to
the Receiver’s account. Acknowledgment entries
initiated in response to a CCD credit entry utilize
the ACK format. Acknowledgments initiated CHAPTER 2
in response to a CTX credit entry utilize the
ATX format. Legal Framework
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG9
SECTION I – General Information
CHAPTER 2 LEGAL FRAMEWORK
Other laws that have a direct bearing on ACH Additional information on Reg D is available
operations are the Uniform Commercial Code on the Federal Reserve’s website at http://www.
Article 4 (which governs check transactions) and federalreserve.gov/bankinforeg/reglisting.
Article 4A(which governs funds transfers), and htm.
the Electronic Funds Transfer Act as implemented
by Regulation E. Certain other activities related REGULATION E
to ACH payments are affected by The Right to
Regulation E implements the Electronic Fund
Financial Privacy Act, Regulation D regarding
Transfer Act (EFTA). The regulation establishes
reserve requirements, Regulation CC regarding
basic rights and responsibilities of consumers
funds availability, and other regulatory agency
and financial institutions that use electronic funds
directives. Relationships between the consumer as
transfer services. Regulation E (Reg E) applies to
Receiver and the RDFI are generally governed by
consumer transactions only and provides a series
Regulation E and the account agreement.
of protections to consumer users of electronic
funds transfers.
REGULATION D
The Federal Reserve Board’s Regulation D imposes Topics covered in Reg E include similarly
reserve requirements on certain deposits held by authenticated written authorizations; authorization
depository institutions, including all FDIC-insured requirements for merchants and other payees
banks, insured credit unions, savings banks, and that initiate electronic check transactions; pre-
mutual savings banks. Depository institutions authorized electronic funds transfers; notice
must maintain reserves in the form of cash in their obligations for Originators; initial and periodic
vaults or, if vault cash is insufficient, as a balance disclosures; error resolution; and other issues.
in an account at a Federal Reserve Bank or with a The Official Staff Interpretations of Reg E provide
pass-through correspondent. Reserve requirements guidance on the regulation’s coverage of electronic
are currently between three and ten percent of a check conversion transactions, computer-initiated
depository institution’s net “transaction accounts.” bill payments, as well as authorization of recurring
debits from a consumer’s account, among other
A “transaction account” is an account from which matters.
the depositor may make transfers or withdrawals by
check, debit card, or other electronic instruction. If Reg E applies to any electronic fund transfer that
an account does not permit the depositor to make authorizes a financial institution to debit or credit
more than six such transfers or withdrawals per a consumer’s account, with certain exceptions.
month, the institution may classify the account as Electronic fund transfer means any transfer of funds
a “savings deposit” and not a transaction account. that is initiated through an electronic terminal,
Savings deposits are not subject to the reserve telephone, computer, or magnetic tape for the
requirement. purpose of ordering, instructing, or authorizing a
financial institution to debit or credit a consumer’s
If the financial institution permits more than the account.
authorized number of transfers or withdrawals per
month from an account, that account is a transaction The term “electronic fund transfer” includes, but is
account even if the institution calls it a savings not limited to:
deposit or “savings account,” and is thus subject
to transaction account reserve requirements. If a – POS transfers
depository institution gives a customer access to – ATM transfers
savings accounts via the ACH Network or another
– Direct deposits or withdrawals of funds
electronic payments mechanism, the account
generally must be classified as a transaction – Telephone transfers
account, unless the specified kinds of withdrawals – Debit card transactions
and transfers are limited in number each month
to not more than six per month (including Reg E coverage also extends to situations in which
ACH debit). a check, draft, or similar paper instrument is used
OG10 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
CHAPTER 2 LEGAL FRAMEWORK
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG11
SECTION I – General Information
C H A P T E R 3 O FA C R E Q U I R E M E N T S A N D O B L I G AT I O N S
More information on UCC 4A can be found domestic or international. This Chapter is divided
in the NACHA publication, Revised Uniform into two sections: Domestic ACH OFAC Obligations
Commercial Code Article 4A and the Automated and International ACH OFAC Obligations.
Clearing House Network.
DOMESTIC ACH OBLIGATIONS
In September 1997, the NACHA Operating Rules
were amended to require that Originator/ODFI
CHAPTER 3 agreements include an acknowledgment by the
OFAC Requirements and Originator that ACH transactions it originates
comply with the laws of the United States (“NACHA
Obligations Rule”). The effect of this rule change is to focus
financial institution liability for inadvertent
processing of a domestic ACH transaction in
The U.S. Treasury Department’s Office of Foreign violation of OFAC-enforced sanctions policies on
Assets Control (OFAC) administers economic the financial institution holding the account of the
sanctions and embargo programs that require blocked party.
assets and transactions involving interests of target
countries, target country nationals, and other
IMPACT TO ACH NETWORK
specifically identified companies and individuals
be frozen. For purposes of OFAC compliance, these
PARTICIPANTS FOR DOMESTIC
entities are referred to as “Specially Designated
ACH TRANSACTIONS
Nationals and Blocked Persons.” OFAC maintains Originators
and regularly updates a master list (SDN List) Domestic Originators should be aware that they
identifying known “blocked parties.” are subject to applicable U.S. law, including OFAC-
enforced sanctions, when initiating ACH entries.
All of the sanctions programs enforced by OFAC Foreign Originators initiating transactions with a
involve declarations of national emergency by financial institution that is under U.S. jurisdiction
the President of the United States. As with all similarly must be aware that the institution is
payment mechanisms, the ACH Network is subject subject to OFAC-enforced sanctions. Originators in
to the requirement to comply with OFAC-enforced either category should not be acting on behalf of,
sanctions policies. or transmitting funds to or from, any blocked party
subject to OFAC-enforced sanctions. Agreements
Who is subject to OFAC? All U.S. citizens and between ODFIs and Originators should include a
permanent resident aliens, companies located in statement that the Originator acknowledges that
the U.S., overseas branches of U.S. companies, it may not initiate ACH entries that violate the
and, in some cases, overseas subsidiaries of U.S. laws of the United States. Originators should
companies fall under OFAC jurisdiction. In terms be aware that they will be held to an obligation
of the ACH Network, this means that all U.S. ACH to originate only lawful ACH transactions under
participants, including Originators, Originating such agreements with their ODFIs. Originators of
Depository Financial Institutions (ODFIs), ACH transactions should also be aware that their
Receiving Depository Financial Institutions ODFI may from time to time need to temporarily
(RDFIs), Receivers and third-parties need to suspend processing of a transaction (particularly an
be aware that they can be held accountable for International ACH Transaction) for greater scrutiny
sanctions violations by the U.S. Government and or verification against the SDN List, and that this
must understand their compliance obligations. action may affect settlement and/or availability.
OG12 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
C H A P T E R 3 O FA C R E Q U I R E M E N T S A N D O B L I G AT I O N S
both they and their Originators are subject to the Entries Violating OFAC Sanctions
NACHA Operating Rules and applicable U.S. law Each ODFI should be aware that if it inadvertently
when transmitting these entries. ODFIs should transmits an unlawful ACH credit entry to a
make this obligation clear in their agreements Receiver that is subject to OFAC sanctions, the RDFI
with Originators. ODFIs processing International holding the blocked party’s account is obligated
ACH Transactions may also find it beneficial to to post the credit entry to the Receiver’s account,
include in their agreements a reference to possible freeze the proceeds, and report the transaction
delays in processing, settlement and/or availability to OFAC.
of these transactions when the ODFI determines
that enhanced scrutiny or verification may be In the event that the ODFI inadvertently processes
necessary. an unlawful ACH debit entry to a blocked
account, the RDFI holding the blocked account
The NACHA Operating Rules reflects the “Know (or an intermediary receiving point such as a
Your Customer” principle that the ODFI will verify correspondent or third-party processor able to
the Originator is not a blocked party and that a identify the transaction), in compliance with OFAC
good faith effort will be undertaken to determine, policies, should return the entry in accordance
through the normal course of business, that the with the NACHA Operating Rules using Return
Originator is not engaged in transmitting funds to, Reason Code R16 (Account Frozen). In this way,
from, or on behalf of a party subject to a blocking the proceeds do not leave the blocked account and
action. If the ODFI encounters a transaction in the ODFI is informed of the reason.
the normal course of business initiated by an
Originator that would violate OFAC-enforced If the ODFI is instructed to originate an ACH debit
sanctions, federal law requires the ODFI to comply entry that it has reason to believe would be an
with OFAC policies. Under U.S. law, the ODFI is unlawful transaction, NACHA has been advised
responsible for freezing or rejecting the proceeds that OFAC would prefer that the transaction be
of illicit ACH transactions involving interests of transmitted so that, if not returned or rejected by
blocked parties for whom the ODFI holds an the RDFI, the proceeds from the transaction can
account. As a depository financial institution, the be captured by the ODFI, frozen and reported
ODFI should have a process in place to determine to OFAC. See section on “Handling IAT Debit
whether any of its account holders is identified as Processing” for more information.
a blocked party in a current SDN List (see section
on “Account Screening” below). Identification of Blocked Parties
As blocked parties and related transactions may
Origination of Entries be difficult to identify in the normal course of
With respect to domestic ACH transactions, by business, ODFIs may wish to become familiar
addressing the issues above, the ODFI may rely with how to locate and interpret lists of specially-
on the RDFI for compliance with OFAC policies designated nationals and blocked persons subject
when it is the RDFI that holds the account or is to U.S. sanctions to facilitate OFAC compliance
otherwise acting on behalf of a blocked person. and avoid liability for monetary penalties.
Consultation with counsel, audit/compliance staff,
As noted above, the ODFI should address the and/or wire transfer operations personnel — in
Originator’s obligation to comply with U.S. laws addition to visiting and becoming familiar with
in its origination agreement. The ODFI should the OFAC website at http://www.treas.gov/ofac —
also recognize that when unbundling “on us” is recommended. There are also several vendors
transactions (i.e., the ODFI is also the RDFI for of online or database SDN identification services
a transaction) from files received for processing that can assist financial institution reviews at the
from an Originator, it will need to review these account level, including the new account set-up
transactions with greater scrutiny since it is phase or reviewing existing accounts when new
servicing both sending and receiving sides. blocked parties are added to the SDN List.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG13
SECTION I – General Information
C H A P T E R 3 O FA C R E Q U I R E M E N T S A N D O B L I G AT I O N S
RDFIs Receivers
RDFIs should be aware that they are subject to Domestic Receivers (and those otherwise under
the requirements of the NACHA Operating Rules U.S. jurisdiction) are subject to U.S. law, including
and applicable U.S. law when processing ACH OFAC sanctions, and should be aware that their
entries. This includes the need to comply with financial institutions are subject to both U.S. law
OFAC enforcement policies in the event that the and the NACHA Operating Rules when handling
RDFI receives an ACH transaction being made to, ACH transactions on their behalf. This may involve
from, or on behalf of any party subject to OFAC delays in posting, settlement and the availability
sanctions. As a depository financial institution, the of proceeds — particularly for ACH transactions
RDFI should have a process in place to determine initiated by parties outside U.S. jurisdiction — if an
whether any of their account holders is identified RDFI finds it necessary to scrutinize a transaction
as a blocked party in a current SDN List (see in more detail. In the case where there appears to
section on “Account Screening” below). be a violation of U.S. sanctions policies, proceeds
from an ACH credit may be frozen and therefore
Receipt of Entries unavailable to the Receiver pursuant to a blocking
With respect to domestic ACH transactions, the action. For unlawful ACH debits, Receivers may
RDFI is responsible for rejecting or freezing the have the proceeds debited from their account and
proceeds of a transaction involving interests of a frozen by either the RDFI or the ODFI pursuant to
blocked party for whom the RDFI holds an account a blocking action.
or on whose behalf the RDFI is acting.
Third-Parties
Entries Violating OFAC Sanctions Third-parties (including processors and
In the event that an ODFI inadvertently transmits correspondent/respondent banks) should recognize
an unlawful ACH credit entry to a Receiver that is that OFAC sanctions enforcement applies to their
subject to OFAC sanctions, the RDFI holding the role as it would the party they are acting on behalf
blocked party’s account should post the credit entry of. For example, a third-party acting on behalf
to the account, ensure the account is frozen, and of a number of downstream corporate Originators
report the transaction to OFAC. In the event that should recognize that its ODFI will hold it
an ODFI inadvertently transmits an unlawful ACH accountable for ensuring that ACH transactions it
debit entry, the RDFI holding the account should introduces into the domestic ACH Network comply
ensure the account is frozen, report the transaction with U.S. law. This means that the ODFI has to rely
to OFAC, and return the entry in accordance with on the third party to police downstream parties for
the NACHA Operating Rules using Return Reason which it is acting.
Code R16 (Account Frozen) with advice that the
entry was destined to an account frozen due to Similarly, a domestic respondent bank/RDFI
OFAC blocking action. receiving ACH transactions through a correspondent
bank should not automatically assume that its
Identification of Blocked Parties correspondent will have intercepted and frozen
any unlawful transactions it has processed on the
As blocked parties and related transactions may be
respondent’s behalf. While there may be some
difficult to identify in the normal course of business,
attention focused on the correspondent in the event
RDFIs may wish to become familiar with how to
of an unlawful transaction being passed through,
locate and interpret lists of specially-designated
the correspondent serving the RDFI is generally
nationals and blocked persons subject to U.S.
not in a position to verify the identity of the RDFI’s
sanctions to ensure compliance and avoid liability
accountholder (or the ODFI’s Originator) on a
for sizeable monetary penalties. Consultation
particular ACH transaction.
with counsel, audit/compliance staff, and/or wire
transfer operations personnel is recommended.
OG14 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
C H A P T E R 3 O FA C R E Q U I R E M E N T S A N D O B L I G AT I O N S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG15
SECTION I – General Information
C H A P T E R 3 O FA C R E Q U I R E M E N T S A N D O B L I G AT I O N S
procedure that allow for the proper handling Financial Institution as a Gateway
of all transactions and customers. Some of the A financial institution acting as a Gateway may
items that should be covered in the ACH OFAC process Inbound and Outbound IAT credit and
policy are: debit transactions. The FI acting as a Gateway must
review the IAT transactions for OFAC compliance.
• Who is responsible for OFAC compliance; Although populating the Gateway Operator OFAC
Screening Indicator with the results of the scan
• How the organization maintains an up-to-date is optional, it is a good business practice. OFAC
listing of prohibited countries, organizations, has stated that the responsibility for investigating
and individuals (detail how the organization suspect IAT transactions may be passed to the
obtains the information from OFAC and when); RDFI, but within the NACHA Operating Rules,
the Gateway has taken on the warranties and
• How specific transactions are handled (i.e. responsibilities of the ODFI. As such, the Gateway
debits, credits); warrants that all transactions originated are in
compliance with U.S. law. To that end a financial
• What information is checked against the “SDN” institution acting as a Gateway should investigate
list; and clear any suspect IAT transactions before they
are originated into the ACH Network. If an IAT
• OFAC reporting procedures;
debit transaction is found to be in violation of an
OFAC sanctions policy, OFAC has stated that all
• Record retention; and
processing should cease; that the Gateway/ODFI
is to notify OFAC within 10 days. The Gateway
• OFAC compliance audit.
should notify the Foreign Gateway that the item
has been rejected or frozen because it was in
IMPACT TO ACH NETWORK violation of U.S. law, and the Gateway should send
PARTICIPANTS FOR INTERNATIONAL a copy of the unlawful transaction to the RDFI.
ACH TRANSACTIONS (IAT)
Gateways Originators
The Gateway is defined as either a financial Corporate Originators should be aware that they
institution or an ACH Operator that acts as the entry are subject to applicable U.S. law, including OFAC-
point to or exit point from the United States for enforced sanctions, when initiating ACH entries.
IAT entries. The capabilities and responsibilities Originators should not be acting on behalf of, or
vary between financial institution and transmitting funds to or from, any blocked party
ACH Operator. subject to OFAC-enforced sanctions. Agreements
between ODFIs and Originators should include a
ACH Operator Acting as a Gateway statement that the Originator acknowledges that
An ACH Operator acting as a Gateway may they may not initiate ACH entries that violate the
process Outbound IAT debit and credit entries but laws of the United States. Originators should
may only process Inbound IAT credit entries and be aware that they will be held to an obligation
reversing debits. No Inbound IAT debit entries to originate only lawful ACH transactions under
may be processed by an ACH Operator acting as such agreements with their ODFIs. Originators of
a Gateway. ACH transactions should also be aware that their
ODFI may, from time to time, need to temporarily
An ACH Operator acting as a Gateway must review suspend processing of an IAT transaction for
all IAT entries for OFAC compliance and populate greater scrutiny or verification against the SDN
the Gateway Operator OFAC Screening Indicator List, and that this action may affect settlement and/
(Field 10 of the IAT Entry Detail Record) with the or availability.
results of the review before passing the entry to
the RDFI. The ACH Operator is not required to
investigate any suspect transaction.
OG16 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
C H A P T E R 3 O FA C R E Q U I R E M E N T S A N D O B L I G AT I O N S
The ODFI is responsible for reviewing all IAT When a financial institution credits a
transactions for OFAC compliance prior to the beneficiary’s account with the proceeds
items being released to the ACH Operator. All of a transaction that is in violation of
parties to the transactions should be reviewed OFAC regulations, it has committed a
including the name and physical address of the violation by processing the transaction
Originator and Receiver, the receiving bank name, forward. The consequences of the
identification and branch country code, and any violation can be mitigated if the
remittance information in the Payment Related institution is able to prevent the
Information contained in the optional Remittance beneficiary’s access to the funds until
Information addenda record. If suspect transactions the OFAC screening is completed, or is
are identified during the review, the items should otherwise able to recover the funds prior
be investigated and cleared before the transactions to their being used by the beneficiary.”
are released to the ACH Operator. If the ODFI
encounters a transaction initiated by an Originator A copy of OFAC’s letter can be found on the
that would violate OFAC-encountered sanctions, IAT Resource page on the NACHA website at
Federal law requires the ODFI to comply with www.nacha.org
OFAC policies. Under U.S. law, the ODFI is
responsible for freezing or rejecting (depending on Handling Unlawful Transactions
the specifics of the particular sanctions program) Credit Entries:
the proceeds of illicit ACH transactions involving
interests of blocked parties. If the RDFI receives an inbound unlawful IAT
credit entry to a Receiver that is subject to
RDFIs OFAC sanctions, the RDFI holding the blocked
RDFIs should be aware that they are subject to the party’s account should post the credit entry to
requirements of the NACHA Operating Rules and the account, ensure the account is frozen, and
applicable U.S. law when processing ACH entries. report the transaction to OFAC.
This includes the need to comply with OFAC
enforcement policies in the event that the RDFI
If the Originator of the IAT entry is subject
receives an ACH transaction being made to, from, to OFAC sanctions the transaction should not
or on behalf of any party subject to OFAC sanctions. be posted to the Receiver’s account, the funds
The RDFI is responsible for rejecting or freezing should be suspended and the transaction
the proceeds of a transaction involving interests of reported to OFAC.
blocked parties.
Debit Entries:
Timing of OFAC Screening of IAT Transactions
If the RDFI receives an unlawful IAT debit entry,
NACHA has received reports that some RDFIs do the RDFI should investigate the transaction
not screen IAT entries for OFAC compliance prior and, if it is found to be in violation of an OFAC
to posting them to the Receiver’s account. In some sanction, should contact OFAC for guidance.
cases, this is due to system or software constraints OFAC will handle these transactions on a case-
at the RDFI. NACHA contacted OFAC requesting by-case basis.
comment on this practice and received a letter
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG17
SECTION I – General Information
C H A P T E R 3 O FA C R E Q U I R E M E N T S A N D O B L I G AT I O N S
OG18 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
C H A P T E R 3 O FA C R E Q U I R E M E N T S A N D O B L I G AT I O N S
Gateway (ODFI) Responsibilities for Inbound Under these processing guidelines, there should
IAT Debit Transactions be no instances in which a Gateway transmits an
A financial institution acting as a Gateway (ODFI) inbound IAT debit in which there is a “1” in the
for Inbound IAT debits should: OFAC Screening Indicator. All suspect transactions
would either be cleared or processing would
• Review all Inbound IAT debits for OFAC cease.
compliance, including all parties to the
transaction and all remittance data; Gateway Procedures for Rebalancing a
Batch and File
• Segregate any suspect transactions into an OFAC ACH operations software should rebalance the
review module or queue; batch and file to include revisions to the following
fields: Total Debit Entry Dollar Amount in Batch/
• Populate the Gateway Operator OFAC Screening File, Total Credit Entry Dollar Amount in Batch/
Indicator (Field 10, IAT Entry Detail Record) for File, Entry/Addenda Count and Entry Hash at
clean transactions with “0.” (NOTE: This field both the Batch Control and File Control level and,
is Optional under the NACHA Operating Rules, possibly, the Batch Count and/or Block Count in
but its use is strongly encouraged); the File Control Record.
• Rebalance the original batch and file, if necessary, RDFI Responsibilities for Inbound IAT
and send to the ACH Operator (see section Debit Transactions
below on Gateway Procedures for Rebalancing An RDFI should recognize that it may receive
a Batch and File); IAT debits and be prepared in advance to handle
the IAT debits. The RDFI for Inbound IAT debits
• Investigate suspect transactions:
should:
– For a suspect transaction cleared by the
• Review all incoming IAT debits for OFAC
investigation:
compliance. (NOTE: Use of the Gateway
Operator Screening Indicator field by the
1.
Populate the Gateway Operator OFAC
Gateway is optional. An RDFI should not assume
Screening Indicator (Field 10, IAT Entry
a transaction is clean because of the presence of
Detail Record) for clean transactions with
a “0” in the Gateway Operator OFAC Screening
“0.” (NOTE: This field is Optional under
Indicator (Field 10, IAT Entry Detail Record), or
the NACHA Operating Rules, but its use is
because of the absence of any indicator in this
strongly encouraged);
field. The RDFI should rely on the results of its
own investigation.);
2. Batch cleared transactions and send to the
ACH Operator for normal processing and
• Post clean transactions normally, and within
settlement.
the timeframes required under the NACHA
Operating Rules;
– For transactions confirmed as an OFAC hit:
• Investigate any suspect IAT debits:
1. Cease processing of the entry;
– For a suspect transaction cleared by an
2. Notify the Foreign Gateway that the debit
investigation, post normally;
entry has been rejected and is in violation
of U.S. law;
– For a suspect transaction confirmed as an OFAC
hit — contact OFAC directly. The Gateway
3. Notify OFAC within 10 days;
may have missed this transaction or the OFAC
list may have been revised. OFAC will handle
4. Notify the RDFI that the transaction destined
these situations on a case-by-case basis.
for one of its customers has been rejected,
and provide a copy of the transaction.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG19
SECTION I – General Information
C H A P T E R 3 O FA C R E Q U I R E M E N T S A N D O B L I G AT I O N S
Under these processing guidelines, there should Secondary OFAC Screening Indicator. These fields
be no instances in which an RDFI receives an are optional and may or may not be populated.
inbound IAT debit in which there is a “1” in the The Gateway Operator OFAC Screening Indicator
OFAC Screening Indicator. This does not relieve indicates the results of a Gateway screen for OFAC
the RDFI of its obligation to screen the IAT debits compliance. A value of “0” indicates that the
that it receives and report SDN hits to OFAC. Gateway has not found a potential blocked party,
as identified by OFAC on the SDN list. A value of
If an RDFI receives notification from a Gateway “1” indicates the potential presence of a blocked
than an inbound IAT debit destined for one of its party. [Field formatting – This field must be space
accounts has been rejected due to the presence filled if no screening has been conducted.]
of a blocked party (as described in the Gateway
Responsibilities section), the RDFI should take Inbound IAT Transactions Coming
appropriate due diligence measures. into the U.S.
If the IAT transactions enter the U.S. ACH through
DEBIT BLOCKS AND FILTERS the Federal Reserve FedACH International Service,
A number of financial institutions currently offer Field Ten will be populated by the Federal Reserve
a debit block service to their corporate customers. as the Gateway. If the IAT transaction enters the
For an IAT debit that is not in violation of an OFAC U.S. ACH through any other Gateway, the decision
sanctions program, an IAT debit processed against to populate these fields is optional. If Field Ten
an account with a debit block may be returned as has been populated, its information should not be
unauthorized as with any other debit transaction. changed, even if a suspect transaction has been
For an IAT debit that is in violation of an OFAC reviewed and cleared. If a secondary party to the
sanctions program, contact OFAC directly before transaction does another OFAC review of the file,
the debit is returned. OFAC has indicated that the results of the additional review should be
it wants to address this issue on a case-by-case placed in Field Eleven.
basis.
The Secondary OFAC Screening Indicator indicates
NOTE: Any entry that is identified as a potential the results of a Third-Party Service Provider screen
hit against the SDN list must be handled as for OFAC compliance. A value of “0” indicates that
an exception item, requiring investigation the Third Party Service Provider has not found a
and closer examination by the RDFI. Such potential blocked party, as identified by OFAC on
transactions may not be automatically returned by the SDN list. A value of “1” indicates the potential
the RDFI. presence of a blocked party. [Field formatting:
This field must be space filled if no screening has
IAT OFAC SCREENING INDICATOR been conducted].
OG20 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
CHAPTER 4 GENERAL RULES
systems as changes are made to the list and/or on Generally, regulators stress the importance of 1)
a periodic basis to ensure that the current version assessing the nature of risks associated with ACH
is being applied to review their account base and activity; 2) performing appropriate know-your-
to verify new customers. There are also several customer due diligence; 3) establishing controls for
vendors that have OFAC account-level screening Originators, third-parties, and direct-access to ACH
solutions from which a wide range of services are Operator relationships; and 4) having adequate
available. Regardless of whether an internal or a management, information and reporting systems
third-party option is used, the objectives are the to monitor and mitigate risk.
same:
The following list includes examples of recent
• Running existing or new accountholder risk-management requirements and guidance by
information against the SDN List to identify regulators:
those accounts or applicants that involve the
interests of a blocked party (resulting in a “hit”); • OCC Bulletin 2006-39, Automated Clearing
and House Activities, September 1, 2006 (see http://
www.occ.treas.gov/ftp/bulletin/2006-39.pdf);
• Reviewing information about a “hit” to establish
whether the identification is valid, if necessary • FFIEC’s BSA/AML Examination Manual, 2007
contacting OFAC for verification (caution: more edition (see http://www.ffiec.gov/bsa_aml_
“false” hits than “true” hits are likely, given infobase/documents/BSA_AML_Man_2007.pdf,
close approximations in the names or aliases pages 199 through 205);
of individuals or companies on the SDN List
with the names of legitimate individuals or • OCC Bulletin 2008-12, Payment Processors,
companies); and, freezing and reporting to April 24, 2008 (see http://www.occ.treas.gov/
OFAC those accounts that are “true” hits. ftp/bulletin/2008-12.html);
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG21
SECTION I – General Information
CHAPTER 4 GENERAL RULES
Electronic Signatures and Records accurately reflect the information contained within
Electronic records include agreements, the document and that both the electronic record
authorizations, Written Statements of Unauthorized and a record of the authentication can be accurately
Debit, or other records created, generated, reproduced for future reference.
transmitted, communicated, received, or stored by
electronic means. Electronic records may have a ACH participants should be aware that other ACH
signature requirement. participants may also utilize electronic methods to
obtain and retain records of ACH documents. In
Electronic signatures are electronic sounds, such cases, the participants can expect to receive
symbols, or processes attached to or logically electronic versions, rather than hard copies, of
associated with an agreement, authorization, documents that they request from other ACH
Written Statement of Unauthorized Debit, or other participants.
record executed or adopted by a person with
the intent to sign the record. The writing and EXCUSED DELAY
signature requirements contained in the NACHA The NACHA Operating Rules provisions regarding
Operating Rules can be satisfied by compliance excused delay help clarify circumstances in which
with the Electronic Signatures and Global a processing delay by a Participating DFI or an
National Commerce Act (E-Sign Act), including ACH Operator would be excused. The Rules
the provisions that reference state versions of the permit a Participating DFI or ACH Operator to
Uniform Electronic Transactions Act. delay performance of its obligations under the
Rules beyond required time limits if:
To satisfy the requirements of the NACHA Operating
Rules (and Regulation E for preauthorized debits), 1.
the delay was caused by the interruption of
electronic signatures must “similarly authenticate” communication or computer facilities; and
the electronic records. The authentication method
chosen must evidence both the signer’s identity and 2. the delay was beyond the reasonable control of
his assent to the terms of the record. For purposes the Participating DFI or ACH Operator seeking
of the NACHA Operating Rules, ACH records may the excused delay.
also be similarly authenticated using the same
authentication methods currently prescribed Delay by an ACH Operator beyond the time
for consumer debit authorizations — that is, the limits prescribed or permitted by the Rules also is
record may be similarly authenticated via the excused to the extent the delay was caused by the
Internet through the use of a digital signature, interruption or the suspension of payment by, or
PIN, password, shared secret, etc., or a hard copy unavailability of funds from, a Participating DFI or
record may be authenticated via the telephone by another ACH Operator.
recording the consumer’s speaking or key-entering
a code identifying the signer. Whether a delay is beyond the reasonable control
of the party asserting an excused delay must
Any other written notice or disclosure required be determined based on the available facts and
by the NACHA Operating Rules but not requiring circumstances surrounding the delay, including
a signature may also be provided in electronic whether the Participating DFI or ACH Operator
form, including e-mail. (Please note that state and exercised the level of diligence required under
Federal laws may require consumer consent before such circumstances. A delay caused, in whole or
using electronic notices/disclosures.) in part, by the default, misconduct or negligence of
a Participating DFI or ACH Operator, including the
Record Retention failure to maintain or implement an appropriate
ACH participants are permitted to retain copies of disaster recovery and business continuity plan, is
ACH records in electronic form. Those participants not excused under the Rules for that Participating
using electronic methods to retain ACH records DFI or ACH Operator.
should implement practices and procedures to
ensure that electronic records of ACH documents
OG22 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION I – General Information
CHAPTER 4 GENERAL RULES
A delay that is excused will continue to be excused of the NACHA Operating Rules governing excused
until either the cause of the delay has been delay is consistent with general guidance from the
eliminated or should have been eliminated (if the Federal Financial Institutions Examination Council
affected Participating DFI or ACH Operator had (FFIEC) regarding contingency backups, which
exercised the level of diligence required under the states that “All computer installations must make
circumstances), whichever is earlier. formal arrangements for alternative processing
capability . . .”
A Participating DFI or ACH Operator asserting an
excuse from any delay under the Rules should, as Financial institutions and ACH Operators should
promptly as possible after discovery, notify other have back-up systems in place to protect against
ACH participants of the delay and its reliance on delays caused by computer failure. However, the
the Rules to excuse such delay. The notice may be failure of a DFI’s or ACH Operator’s systems due
given directly to affected ACH participants, through to circumstances beyond their control may still
membership organizations such as Regional constitute an excused delay.
Payment Associations, through an ACH Operator if
the ACH Operator agrees to distribute such notice, ACH DATA SECURITY REQUIREMENTS
or through other methods reasonably designed to
For all ACH transactions that involve the exchange
notify the affected ACH participants.
or transmission of banking information (which
includes, but is not limited to, an entry, entry data,
If an ACH participant affected by a delay wishes
a routing number, an account number, and a PIN
to challenge whether a Participating DFI or ACH
or other identification symbol) via an Unsecured
Operator has properly claimed an excused delay,
Electronic Network, the NACHA Operating Rules
the participant may do so using the National System
require that such banking information be either:
of Fines, as with any other alleged rules violation.
The party asserting the excused delay bears the
1.
encrypted using a commercially reasonable
burden of proving that the delay is properly
security technology that, at a minimum, is
excused. NACHA may consider all available facts
equivalent to 128-bit RC4 encryption technology,
and circumstances in making a determination,
or
including:
2. transmitted via a secure session that utilizes
1. the cause of the delay;
a commercially reasonable security technology
that provides a level of security that, at
2.
the applicable provisions of the disaster
a minimum, is equivalent to 128-bit RC4
recovery and business continuity plan that
encryption technology.
were intended to prevent and/or mitigate the
delay, including whether the event causing the
For purposes of the NACHA Operating Rules and
delay was reasonably foreseeable and whether
the ACH Network, an Unsecure Electronic Network
the disaster recovery and business continuity
is a network, public or private, that:
plans were properly implemented; and
1. is not located entirely within a single, contiguous,
3.
the actions being taken to remedy the
physical facility; and
situation.
2. either (a) transmits data via circuits that are not
Operational outages due to the general failure
dedicated to communication between two end-
or interruption of communication or computer
points for the duration of the communication,
facilities or other equipment do not constitute an
or (b) transmits data via wireless technology
excused delay for a Participating DFI, its Third-
(excluding a communication that begins and
Party Service Provider, or an ACH Operator. DFIs
ends with a wireline connection, but that is
and ACH Operators must expect that computer
routed by a telecommunications provider for
problems will occur and make contingency plans to
a portion of the connection over a wireless
handle such situations. In this regard, the section
system).
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG23
SECTION I – General Information
CHAPTER 4 GENERAL RULES
FIGURE 4-1
For clarity, the Internet is an Unsecure Electronic of any banking information exchanged over such
Network, even though secure transmissions may an Unsecured Electronic Network between:
be made over that otherwise unsecure network.
1. an Originator and a Receiver;
A secure Internet session is one that is typically
indicated by the secure access symbol on the 2. an Originator and an ODFI;
bottom menu bar of the browser (e.g., a padlock).
For security purposes, a secure Internet session will 3. an ODFI and an ACH Operator;
generally expire after a certain period of inactivity,
at which time the user will be required to reenter 4. an ACH Operator and an RDFI; and
the login credentials initially used to enter the
secure Internet session. Currently, 128-bit RC4 5.
an Originator, ODFI, RDFI, or ACH Operator
encryption technology is the standard for financial and a Third-Party Service Provider.
transactions and is considered commercially
reasonable. If technological advancements Transmissions of banking information over an
drive the commercially reasonable standard to Unsecured Electronic Network by means of voice
change, Originators should comply with the new or keypad inputs from a wireline or wireless
standard. telephone to a live operator or voice response unit
are not subject to this data security requirement.
Figure 4-1 above depicts the concept of a secure An application in which the Originator obtains
Internet session. information from the Receiver by another means
(such as the telephone) and then key enters the
These encryption requirements must be employed information via the Internet is, for example, subject
prior to the key-entry and through the transmission
OG24 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 5 R E L AT I O N S H I P W I T H O D F I
Originating
modem pool is not subject to this requirement.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG25
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 5 R E L AT I O N S H I P W I T H O D F I
1
The NACHA Operating Rules do not require an ODFI/Originator
agreement for Customer Initiated Entries (CIE). For more information
on CIE, refer to Chapter 40 of these Guidelines.
OG26 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 6 R E L AT I O N S H I P W I T H R E C E I V E R A N D A U T H O R I Z AT I O N R E Q U I R E M E N T S
4. include any restrictions on the types of entries Relationship With ODFI in this section. Detailed
that may be originated; information on OFAC compliance can be found in
Section I of these Guidelines.)
5. include the right of the ODFI to terminate or
suspend the agreement upon no more than Originators should interface with their ODFIs via
ten Banking Days’ notice for the Originator’s a secured telecommunications link for all ACH-
breach of the Rules; and related activity. This includes the origination and/
or receipt of all current ACH entries and related
6. provide for the right of the ODFI to audit the reports and any future related applications.
Originator’s compliance with the origination
agreement and the Rules.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG27
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 6 R E L AT I O N S H I P W I T H R E C E I V E R A N D A U T H O R I Z AT I O N R E Q U I R E M E N T S
For instance, although written authorization is MICR line is not appropriate for ACH activity. In
permissible for BOC Entries, notice would still be addition, some financial institutions may provide
required to comply with Regulation E. their customers with another source document
that indicates the routing and account number
When the Rules specify requirements for entries to be used for ACH entries.
to be authorized in a particular way, the Rules also
specify the minimum requirements that Originators In an effort to help ensure the proper routing and
must follow for each entry initiated in that particular processing of ACH Entries, Originators should
manner. The Rules explicitly require the use of the consider implementing practices and procedures
appropriate Standard Entry Class Code for such that will enable them to verify the accuracy
entries. For instance, an Originator that wishes to of routing numbers prior to the transmission
convert a check received at the point of purchase of entries into the ACH Network. Originators
to an ACH debit during back office processing may must be aware that, in certain circumstances,
only use the BOC Standard Entry Class Code and such as with TEL entries and WEB entries, the
must comply with the Rules related to such entries. NACHA Operating Rules specifically require an
No other Standard Entry Class Code may be used Originator to establish commercially reasonable
for such purposes. procedures to verify that routing numbers are
valid.
CONSUMER RECEIVERS
• The authorization should indicate whether it
In general, the Originator must obtain the
relates to entries directed to a demand deposit
Receiver’s authorization to initiate entries through
account, a savings account, a loan account or a
the ACH Network to the Receiver’s account. The
general ledger account. (Note: NOW accounts
authorization must (1) be readily identifiable as
and sharedraft accounts are transaction
an ACH authorization; (2) have clear and readily
accounts within the broad category of demand
understandable terms; and (3) provide that the
accounts.)
Receiver may revoke the authorization only by
notifying the Originator in the manner specified in
• The Originator must obtain authorization for
the authorization.
both consumer credit and debit entries. However,
when both the Originator and Receiver are
Originators of entries to consumer accounts must
natural persons, Receiver authorization is not
meet the following authorization requirements:
required for credit entries. This is an exception
to the credit authorization requirement.
• Account numbers and routing numbers must be
accurately stated.
Authorization for Credit Entries
Originators may use the on-us field of the MICR Consumers may provide authorizations for credit
line of a check to obtain the account number entries in writing, or they may be provided orally
for ACH entries. Originators must ensure that or by other non-written means. As noted above,
the correct Receiver’s account number is if both the Originator and Receiver are natural
contained in each ACH entry. Originators are persons, no Receiver authorization is required.
strongly encouraged to establish practices and
procedures to ensure the validity and accuracy Authorization for Debit Entries
of each Receiver’s account number for all entries All debits to consumer accounts must be authorized
transmitted into the ACH Network. by the consumer via a writing that is signed or
similarly authenticated by the consumer, with
Originators should also look on the face of a the exception of ARC, BOC, and RCK entries.
check for the routing information. Some financial The authorization requirements for ARC, BOC,
institutions may print the routing number and RCK, and TEL entries to consumer accounts are
account number used for ACH purposes on the discussed separately below.
face of the document, if the information on the
OG28 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 6 R E L AT I O N S H I P W I T H R E C E I V E R A N D A U T H O R I Z AT I O N R E Q U I R E M E N T S
Originators of debit entries to consumer accounts and the consumer, but the consumer has
must comply with the following criteria to ensure initiated the telephone call to the Originator. For
proper authorization of consumer debits under the a Single Entry TEL, the Originator must either
NACHA Operating Rules: make an audio recording of the consumer’s
oral authorization or provide the Receiver with
Copy of Authorization – With the exception of
• written notice confirming the oral authorization
ARC, BOC, and RCK entries, the Originator must prior to the Settlement Date of the entry. For a
obtain the consumer’s written authorization. recurring TEL entry, the Originator must make
This authorization may be sent to the consumer an audio recording of the consumer’s oral
by mail, fax, or Internet/on-line network, or it authorization and provide the Receiver with a
may be provided to the consumer in person. In written copy of the authorization prior to the
circumstances where the consumer signs the Settlement Date of the first entry. The Originator
written authorization or, alternatively, uses the must provide the ODFI with the original, copy,
telephone to similarly authenticate the written or other accurate record of the Receiver’s
authorization by speaking or key entering a code authorization in such time and manner as to
identifying himself, the consumer has a paper enable the ODFI to deliver the authorization to
authorization in his possession, which he should the RDFI within ten banking days of the RDFI’s
retain as his copy of the authorization. The request.
consumer can also request an additional hard
copy of the authorization from the Originator. For ARC, BOC, and RCK entries, authorization
For the Internet/on-line network alternative, consists of notice from the Originator to the
the consumer reads the authorization that consumer and the receipt of the consumer’s
is displayed on the computer screen or other source document (for ARC and BOC entries) or
visual display. The consumer should print the item (for RCK entries) by the Originator.
authorization from his computer screen and
retain this copy. The Originator must be able P
lease refer to the chapters on ARC,
to provide the consumer with a hard copy of a BOC, and RCK entries for specific notice
debit authorization if requested to do so. requirements.
F
or ARC entries for an in-person bill payment
For a Return Fee Entry – that is, a debit entry to a
at a manned location and for BOC entries, the consumer’s account for the purpose of collecting
Originator must provide a copy of the notice or a Return Fee – the Originator must obtain the
substantially similar language to the Receiver at Receiver’s authorization prior to initiating the
the time of the transaction. Return Fee Entry. This can be accomplished in
either of two ways:
For POP entries, the Originator must obtain the
Receiver’s written authorization, as discussed (1) Authorization by Notice – Originators
above, and must also provide the Receiver with may obtain authorization for a Return Fee
notice at the point of purchase or manned bill Entry by providing the Receiver/check
payment location. writer with notice that conforms to the
requirements of Regulation E at the time
Please refer to Chapters 37, 38, and 44 on that the underlying ACH debit is authorized
ARC, BOC and POP entries, respectively, for or the underlying check is accepted. Please
specific notice requirements. refer to the chapter on Return Fee Entries
for specific notice requirements.
F
or TEL entries, the consumer’s authorization
may be obtained orally via the telephone for (2) Authorization other than by Notice –
debits where there is (1) an existing relationship Originators may also obtain authorization
between the Originator and the consumer, or (2) for a Return Fee Entry in any other form
no existing relationship between the Originator permitted by the Rules, dependent upon
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG29
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 6 R E L AT I O N S H I P W I T H R E C E I V E R A N D A U T H O R I Z AT I O N R E Q U I R E M E N T S
the Standard Entry Class Code used for the minimum information must be included as
debit Entry to a Consumer Account (e.g., part of the authorization:
written authorization for PPD or WEB,
oral authorization for TEL). - t he amount of the recurring transactions or a
reference to the method of determining the
Please refer to Chapter 54 for more detailed amounts of recurring transactions;
information on authorization and specific
notice requirements for Return Fee Entries. - t he timing (including the start date), number
and/or frequency of the electronic fund
• Minimum Information Requirements – For transfer, or other similar reference, to the
all entries, the authorization must be readily consumer’s account;
identifiable as an ACH debit authorization and its
terms must be clear and readily understandable. - the Receiver’s name or identity;
With the exception of POP, the writing must
specify that the Receiver may revoke the - the account to be debited;
authorization only by notifying the Originator
in the manner specified on the authorization - a telephone number for Receiver inquiries
form. that is answered during normal business
hours;
– For Single Entry TEL entries, the following
minimum information must be included as - t he manner in which the Receiver can revoke
part of the authorization: the authorization; and
- the date on or after which the ACH debit to - the date of the Receiver’s oral authorization.
the Receiver’s account will occur;
• Authentication of Authorization – With the
- t he amount of the transaction, or a reference exception of ARC, BOC, RCK, and Return Fee
to the method of determining the amount of Entries entries, the authorization must be signed
the transaction; or similarly authenticated by the consumer.
- t he manner in which the Receiver can revoke To satisfy the requirements of Regulation E and
the authorization; the NACHA Operating Rules, the authentication
method chosen must evidence both the consumer’s
- the date of the Receiver’s oral authorization; identity and his assent to the authorization.
and
Examples of methods used to similarly authenticate
- a statement by the Originator that the an authorization include, but are not limited to, the
authorization obtained from the Receiver use of digital signatures, codes, shared secrets, PINs,
is for a Single-Entry ACH debit, a one-time etc. Authentication of an authorization is strongest
electronic funds transfer, or other similar when the authorization and the authentication of
reference. that authorization occur simultaneously or nearly
simultaneously. Although an initial website session
– For recurring TEL entries, the following log-in may constitute adequate authentication for
OG30 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 6 R E L AT I O N S H I P W I T H R E C E I V E R A N D A U T H O R I Z AT I O N R E Q U I R E M E N T S
a click-through authorization as part of the same at least ten calendar days before the scheduled
session, Originators and ODFIs should consider transfer date. Additionally, if the Originator
the strength of the association of an initial log- informs the consumer of the right to receive notice
in with a later authorization. The Originator and of all varying transfers, the consumer may elect to
ODFI bear the burden of demonstrating that the receive notice only when a transfer does not fall
authentication process is sufficiently linked to the within a specified range of amounts. Alternatively,
authorization. the consumer may elect to receive notice only when
a transfer differs from the most recent transfer by
Appendix H of these Guidelines outlines more than an agreed upon amount.
acceptable alternatives for authenticating the
consumer’s authorization. If the Originator changes the date on or after which
a recurring debit entry to a consumer account
Retention of Authorization is scheduled to be debited, the Originator must
The Originator must retain an original or copy of send the Receiver written notification of the new
a written authorization, and readily and accurately date. The Originator must send the notice at least
reproducible records evidencing any other form of seven (7) calendar days before the first entry to be
authorization. The record of authorization must affected by the change is scheduled to be debited
be retained by the Originator for a period of two to the Receiver’s account.
years following the termination or revocation of the
authorization. The authorization may be retained Copy of Authorization
as an electronic record that (1) accurately reflects The Originator, upon request of the ODFI, must
the information in the record, and (2) is capable present the original, copy or other accurate record
of being accurately reproduced for later reference, of the customer’s authorization to an ODFI for its
whether by transmission, printing, or otherwise. use or use by the RDFI. The RDFI should not ask
for the customer authorization as a normal course
Multiple, Non-Recurring Debits of business but only if an exception is expected or
Multiple but non-recurring debits are debits in has occurred.
which the amount and time frame for the initiation
of the debits may vary. Examples of this type of Data Passing
debit include occasional catalog purchases from The Restore Online Shoppers’ Confidence Act
the same merchant or occasional purchases of prohibits a merchant from initiating an Internet
securities with a broker. Originators do not need to transaction unless the merchant has obtained
obtain a written authorization for each individual certain authorization information, including
debit entry. However, they must have obtained a account number and consumer’s name and
written authorization up front that establishes a address, directly from the consumer. This law also
relationship between the Originator and consumer prohibits a merchant from disclosing a customer’s
Receiver for this particular type of activity and to account number and other billing information to
which all such entries would apply. another merchant for use in an Internet-based sale.
Notice of Change in Amount/Change in Effective March 15, 2013, the NACHA Operating
Debiting Date for Recurring Debits to Consumer Rules will be modified to protect customers from
Accounts such potentially confusing practices. NACHA will
When the amount of a recurring debit to a adopt a rule that is similar to those currently in
consumer account varies, specific requirements effect in major card brand rules. This rule will
apply. If a preauthorized debit transfer varies from be broader in scope than the requirements of The
the immediately preceding transfer relating to the Restore Online Shoppers’ Confidence Act in that it
same authorization or from a fixed preauthorized is not limited to Internet transactions.
amount, the Originator must send the Receiver
written notification of the amount and the date The Rules will be revised to 1) prohibit an ODFI
on or after which of the transfer will be debited from disclosing a consumer Receiver’s account
number or routing number to any third party for
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG31
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 6 R E L AT I O N S H I P W I T H R E C E I V E R A N D A U T H O R I Z AT I O N R E Q U I R E M E N T S
use in initiating a debit Entry that is not part of the underlying check is accepted. Any notice
the original authorization; and 2) require the ODFI meeting the form, process, and content permissible
to ensure that the Originator and any Third-Party under Regulation E satisfies this authorization
Service Provider do not disclose such information requirement, even though the account to be
for use in initiating a debit Entry that is not part of debited is a non-Consumer account.
the original authorization.
Please see chapter 54 on Return Fees for specific
CORPORATE RECEIVERS authorization and notice requirements.
Agreements/Authorizations for
Remittance Information/Non-Monetary
Corporate Transactions
Entries
As with consumer entries, the business Receiver
The nature of the agreement between the Originator
must authorize all ACH credits and debits to its
and Receiver will include additional terms if the
account. An Originator must enter an agreement
application includes the processing of payment-
with each business Receiver of entries (other than
related data along with the payment.
ARC, BOC and POP Entries to non-consumer
accounts) under which the Receiver has agreed to Non-Monetary Entries are entries that carry no
be bound by the NACHA Operating Rules. The settlement value but do include payment-related
nature of the agreement for corporate transactions remittance data. Examples of Non-Monetary
can vary depending upon the complexity of the Entries include CTX and CCD entries that carry
application and the relationship between the remittance information indicating a credit position
Originator and the Receiver. The Originator of the Originator to the Receiver or relating to a
that is collecting or disbursing funds to its own period of time during which no funds are owed by
subsidiaries, for example, may require an entirely the Originator to the Receiver. Originators must
different agreement for the funds transfer than it ensure that corporate trading partner agreements
would if it were entering into a trading partner include provisions for remittance data to be sent
agreement with another corporation. via the ACH Network for either live dollar or Non-
Monetary Entries.
With respect to ARC and BOC entries, authorization
consists of notice from the Originator to the
Corporate Debits
business Receiver and the receipt of the business’
Eligible Source Document. For POP entries, Originators of corporate debits to Receivers other
authorization is comprised of both the Receiver’s than their own subsidiaries need to be aware of
written authorization and notice regarding the the sensitivity of this application. Many corporate
check conversion policy provided to the Receiver Receivers are reluctant to allow debit activity to
by the Originator at the point of purchase or their accounts; therefore, it is imperative that
manned bill payment location. the agreement that supports this type of activity
is complete and accurate. Originators may be
Specific information on authorization and required to provide some proof that debit activity
notice requirements for ARC, BOC, and POP was, in fact, authorized if a transaction is questioned
entries can be found in Chapters 37, 38 and by the Receiver.
44, respectively, of these Guidelines.
ORIGINATING ACH ENTRIES
As with other entries, a Return Fee Entry to a Originators that use the various ACH applications
non-Consumer account must be authorized by must be sure to comply with the requirements
the Receiver. For a Return Fee related to an ARC, associated with the particular application. Each
BOC or POP Entry, the Originator may obtain entry type has specific conditions that must be met
the Receiver’s authorization by providing the in order for the entry to be considered properly
Receiver/check writer with notice that conforms authorized.
to the requirements of Regulation E at the time
that the underlying ACH debit is authorized or
OG32 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 6 R E L AT I O N S H I P W I T H R E C E I V E R A N D A U T H O R I Z AT I O N R E Q U I R E M E N T S
Originating ARC Entries • Retain a copy of the front of the Eligible Source
When originating an ARC Entry, an Originator Document for 2 years, and provide it to the
must: ODFI upon request;
• Prior to accepting each check, provide the • Securely store the Eligible Source Document
Receiver with a conspicuous notice that has until destroyed; and
clear and readily understandable terms;
• Maintain a telephone number for customer
• Provide a copy of the notice, or language that is inquiries.
substantially similar, to the Receiver at the time
of the transaction when the source document Originating CCD Entries
for the ARC Entry is provided by the Receiver When originating a CCD Entry to a non-consumer
in-person for payment of a bill at a manned account, an Originator must:
location;
• Obtain the corporate Receiver’s authorization to
• Obtain an eligible source document (i.e., a originate entries to the Receiver’s account and
check) via the U.S. mail, dropbox, delivery
service or in person for payment of a bill at a • Obtain the corporate Receiver’s agreement to be
manned location; bound by the NACHA Operating Rules.
• Provide the Receiver with a conspicuous notice • Void the Eligible Source Document and return it
that has clear and readily understandable to the Receiver;
terms;
• Obtain a written, signed authorization; and
• Provide a copy of the notice or substantially
similar language to the Receiver at the time of • Provide a copy of the notice at the time of the
the transaction; transaction.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG33
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 6 R E L AT I O N S H I P W I T H R E C E I V E R A N D A U T H O R I Z AT I O N R E Q U I R E M E N T S
OG34 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 7 I N I T I AT I O N O F F O R WA R D E N T R I E S
• Verify the Receiver’s identity. The Rules also define specific content requirements
for the Company Name Field for transactions in
• Verify that the routing number is valid. which the party initiating the payment is not the
ultimate payee or payor of a transaction -- that is,
• Conduct annually an audit of data security where a third party is involved in the origination
practices for Receivers’ financial information. of the payment. Specifically, for any ACH debit
transaction in which the party transmitting the
entry into the ACH Network is not the payee of
the transaction (which is defined as the party to
CHAPTER 17 which payment is ultimately being directed), the
Company Name Field must contain the name by
Initiation of Forward Entries which the payee is known and readily recognized
by the Receiver. For any ACH credit transaction in
which the party initiating the entry into the ACH
PROCESSING REQUIREMENTS Network is not the payor of the transaction (which
Account Types and Transaction Codes is defined as the party from which payment is
ultimately being directed), the Company Name
The NACHA Operating Rules permit Originators to
Field must contain the name by which the payor
transmit ACH credit and debit entries to demand
is known and readily recognized by the Receiver.
accounts (i.e., checking, NOW, and sharedraft
This requirement is consistent with Regulation
accounts) and savings accounts at an RDFI. The
E, which requires an RDFI to provide the name
Rules also permit Originators to transmit both
of any third party to or from whom funds were
credit and debit entries to financial institutions’
transferred on the consumer’s periodic statement.
general ledger accounts and to transmit credit
entries only (with the exception of reversals to
The following scenarios provide examples of how
correct erroneous credit entries) to loan accounts.
the Company Name Field is to be used in a variety
Transaction Codes are used to define the type of
of payment models.
entry and the type of account to which the entry
is transmitted.
Example #1
Please refer to Appendix Three of the NACHA SmartPay, Inc., provides a variety of payment
Operating Rules for a complete list of processing services on behalf of several insurance
Transaction Codes. companies, offering lockbox services, check
conversion, ACH debit origination, and general
Company Name Identification accounts receivables and policy management
services through a centralized location. Policy
To ensure clear identification of the source of
holders deal with SmartPay directly regarding
an ACH transaction, the Rules contain specific
billing issues or questions regarding the payment
requirements with respect to how an Originator
of insurance premiums. Although SmartPay, Inc.
must identify itself within an ACH record. The Rules
handles all of the payment processing functions,
specifically require the Originator to populate the
including collecting money from policy holders, it
Company Name Field with the name by which it is
is considered to be a third party acting on behalf
known to and readily recognized by the Receiver
of each insurance company rather than the party
of the entry. This name could, for example, be the
to which funds are ultimately being directed by the
Originator’s “doing business as” name or “trading
insured. In this model, the Company Name Field
as” name. The inclusion of a readily recognizable
for any debits originated to the policy holders’
Originator name ensures that the Receiver is
accounts by SmartPay must contain the name
able to identify a transaction appearing on his
of the insurer issuing the policy and providing
periodic statement. The clear identification of the
coverage rather than SmartPay, which consolidates
Originator of an ACH transaction also improves
payments on behalf of those parties.
overall network quality by reducing the number of
unrecognized entries requiring investigation and
return by the RDFI.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG35
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 7 I N I T I AT I O N O F F O R WA R D E N T R I E S
OG36 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 7 I N I T I AT I O N O F F O R WA R D E N T R I E S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG37
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 7 I N I T I AT I O N O F F O R WA R D E N T R I E S
OG38 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 7 I N I T I AT I O N O F F O R WA R D E N T R I E S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG39
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 8 O R I G I N AT O R S A N D R E T U R N A N D D I S H O N O R E D R E T U R N E N T R I E S
OG40 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 8 O R I G I N AT O R S A N D R E T U R N A N D D I S H O N O R E D R E T U R N E N T R I E S
the return deadline for the return of debit entries In certain business arrangements, a Third-Party
for which the consumer Receiver had previously Sender initiates a debit entry to a consumer’s
revoked his authorization, which are transmitted account to fund a corresponding payment (e.g.,
using Return Reason Code R07 – Authorization an ACH credit) to a payee. For example, Third-
Revoked). Party Senders may be involved in origination of
utility payments, bill payments, tuition payments,
At times, Originators may erroneously transmit ACH etc. In situations where a Third-Party Sender
Entries that are formatted using an incorrect SEC debits a consumer Receiver but does not complete
Code. This is in violation of the NACHA Operating the intended transaction by paying the Receiver’s
Rules. The Rules allow the RDFI to rely on the obligation to the payee, the underlying transaction
ODFI’s warranty that the SEC Code included in the is incomplete (an “Incomplete Transaction”).
entry is proper and obligates the RDFI to use the Incomplete Transactions create service issues for
return rules and time frames associated with that RDFIs, particularly when a Third-Party Sender fails
particular SEC Code. to perform its obligations across a large number of
customers.
However, for an unauthorized debit to a consumer
account that bears a corporate SEC Code (i.e., This rule amendment will permit a consumer
CCD or CTX), the RDFI may be unable to meet Receiver to request, and require the RDFI
the time frame for return because the return to provide, re-credit for a debit Entry to the
time frame for corporate entries may have lapsed Receiver’s account when it is part of an Incomplete
before the consumer can receive his statement Transaction. The rule will also specifically provide
and notify his RDFI about the unauthorized debit for the return of such a debit by the RDFI, putting
to his account. In order to enable the RDFI to the obligation for the debit back with the ODFI
treat all unauthorized debits to consumer accounts where it rightfully belongs. The request for re-
in a consistent manner, regardless of SEC Code, credit and the RDFI’s return of a debit related to
the NACHA Operating Rules define a specific an Incomplete Transaction will be subject to the
Return Reason Code R05 (Unauthorized Debit to same requirements and time frames currently
Consumer Account Using Corporate SEC Code) that defined within the Rules for the recredit and
the RDFI may use to return unauthorized entries return of an unauthorized debit to the Receiver’s
to a consumer account that bear a corporate SEC account. Specifically, the rule will require an RDFI
Code. Returns bearing Return Reason Code R05 to recredit a consumer Receiver for a debit that is
must be transmitted by the RDFI in such time and part of an Incomplete Transaction if the consumer
manner that the return is made available to the has provided a Written Statement of Unauthorized
ODFI no later than the opening of business on the Debit. The RDFI will be required to transmit a
banking day following the sixtieth calendar day return in such time and manner as to be made
following the Settlement Date of the original entry. available to the ODFI no later than the opening of
Prior to transmitting returns bearing this return business on the Banking Day following the sixtieth
code, the RDFI must obtain a Written Statement of calendar day following the Settlement Date of the
Unauthorized Debit from the consumer. debit Entry. The description of Return Reason Code
R10 (Customer Advises Not Authorized, Improper,
Incomplete Transactions and the Return of or Ineligible) will be expanded for this purpose.
Funding Debit Entries
Effective March 15, 2013, the Rules will be amended As a result of this change, Originators may benefit
to allow the return of a debit Entry to a consumer from a better resolution of the interruption of
account within 60 days of the Settlement Date their customers’ payments. When Originators’
for an “Incomplete Transaction.” An Incomplete customers are re-credited by their RDFIs, these
Transaction is defined as a transaction for customers will be in a position to make alternative
which a Third Party Sender debits a consumer’s payment arrangements with Originators.
account to collect funds, but does not complete
the corresponding payment to the party to which
payment is owed.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG41
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 8 O R I G I N AT O R S A N D R E T U R N A N D D I S H O N O R E D R E T U R N E N T R I E S
OG42 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 8 O R I G I N AT O R S A N D R E T U R N A N D D I S H O N O R E D R E T U R N E N T R I E S
Originators should be aware that returns bearing • Establish a deadline for accepting debit returns
Return Reason Code R14 - Representative Payee after which debit returns will be dishonored. A
Deceased or Unable to Continue in that Capacity return can be dishonored as untimely only if the
are transmitted when the representative payee return was not initiated within the appropriate
assigned to receive benefit payments on behalf of time frames, and only if the ODFI or Originator
the entitled individual has died. A representative has suffered a loss.
payee is a person or institution authorized to
accept entries on behalf of one or more other REINITIATION OF RETURN ENTRIES
persons, such as legally incapacitated adults or An Originator may reinitiate an entry that was
minor children. Returns bearing Return Reason returned if:
Code R14 indicate that the representative payee,
and not the beneficiary of the payments, has died. • the entry was returned for insufficient or
The beneficiary is not deceased and is still entitled uncollected funds (the entry cannot be reinitiated
to the benefit payments. This Return Reason more than two times following the return of the
Code should not be used unless a representative original entry);
payee exists.
• the entry was returned for stopped payment and
Returns bearing Return Reason Code R15 - reinitiation has been authorized by the Receiver;
Beneficiary or Account Holder [Other Than a or
Representative Payee] Deceased will indicate
either (1) in the case of benefit payments where no • the Originator has taken corrective action to
representative payee has been assigned, the actual remedy the reason for the return.
beneficiary is deceased, or (2) in the case where the
payment is not a benefit payment (i.e., insurance Reinitiation must take place within one hundred
premium debit), the owner of the account has died eighty days after the Settlement Date of the original
and the payment is being returned by the RDFI. Entry.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG43
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 9 O R I G I N AT O R S A N D P R E N O T I F I C AT I O N S A N D N O T I F I C AT I O N S O F C H A N G E
Note: Special requirements apply to the reinitiation provided for within the NACHA Operating Rules
of RCK entries. See Chapter 46 for more and as outlined below.
information.
A prenotification entry may be originated at
DISHONORED RETURNS any time. If an Originator chooses to transmit
prenotification entries, however, it may not initiate
The Originator may have its ODFI dishonor a
live dollar entries until at least six banking days
return for specific reasons, which fall into two
following the Settlement Date of the prenotification
categories as follows:
entry. The prenote must carry an appropriate
Effective Entry Date to be processed through the
• The return entry is untimely.
ACH system (it is not the date of the first live
entry). Any prenotification entry with an Effective
• The return entry contains incorrect information.
Entry Date that falls outside of the processing
window will be rejected by the ACH Operator just
The Originator should be aware, however, that
as it would if it were a live entry.
the RDFI may contest a dishonor that has been
issued for an untimely return, or it may initiate a
The format of a prenotification entry is the same
corrected return. If an Originator fails to utilize
as a live dollar entry, except in the Entry Detail
the Dishonored Return process, such failure does
Record, in which the dollar amount is zero and the
not preclude its right to seek recovery against
transaction code indicates a prenotification entry.
an RDFI outside of the ACH return process for a
Prenotification entries may be intermingled within
late return.
a batch of credit and/or debit live dollar entries.
The Transaction Codes for prenotification entries
are:
OG44 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 1 9 O R I G I N AT O R S A N D P R E N O T I F I C AT I O N S A N D N O T I F I C AT I O N S O F C H A N G E
• If a prenotification is returned by the ACH corrections within six banking days of receipt of
Operator, then the Originator should be aware the NOC information or prior to initiating another
that the RDFI has never received the prenote. entry to the Receiver’s account, whichever is later.
The Originator should research the reason for Originators should not wait six banking days
the return and make any necessary corrections if the change can be made earlier – they should
before transmitting another entry. make the change prior to initiating the next entry,
if possible. Originators should be thoroughly
• If a prenotification is returned by the RDFI, then familiar with the NOC Change Codes and their
the Originator should research the problem meanings. Originators should work with their
according to the Return Reason Code contained ODFIs to agree upon the method by which NOC
on the return entry and make any necessary information will be provided by the ODFI (e.g., via
corrections prior to transmitting a subsequent electronic media, paper format, etc.) and should
entry. ensure that they have a thorough understanding of
how to interpret NOC provided by their financial
• If a prenotification results in a Notification institutions.
of Change, then the Originator should make
the required change within six banking days NOC Change Codes generally fall into two
of receipt of the NOC information or prior to categories:
initiating another entry, whichever is later, or
issue a Refused Notification of Change. •
Codes that indicate an error in the account
information – entries carrying these codes
NOTIFICATIONS OF CHANGE indicate that the RDFI did receive the entry
but the account information or information
A Notification of Change (NOC) is a Non-Monetary
regarding the Receiver was incorrect. Changes
Entry transmitted by an RDFI to the Originator
must be made so that the RDFI can handle the
through the ODFI. It is created when the RDFI
entry appropriately.
receives a prenotification or a live dollar entry that
contains incorrect information. A Notification of
• Codes that indicate an error in the routing of
Change:
the entry – entries carrying these codes indicate
that the routing information must be changed.
• identifies the entry that has been received at the
Failure to change the routing information could
RDFI;
cause subsequent entries to that particular
account to be delayed or returned. An Originator
• pinpoints the specific information on that entry
should not assume, however, that a change to
that is incorrect; and
a routing number affects all ACH transactions
going to that routing number. For example, if
• provides the correct information in a precise
a financial institution buys some branches of
format so the Originator can make the change.
a failed institution, it might initiate NOCs only
Notifications of Change have a unique Standard for those specific accounts they have now taken
Entry Class Code, COR, and a unique Addenda over. The original routing number may be valid
Type Code, “98”. for other accounts.
A complete list of change codes for Notifications Originators should monitor Notifications of
of Change appears in Appendix Five of the Change that are received to determine whether
NACHA Operating Rules. their enrollment procedures need to be modified.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG45
SECTION II – Originating Depository Financial Institutions
C H A P T E R 2 0 O R I G I N AT O R S A N D R E V E R S A L S A N D R E C L A M AT I O N S
Identification field of the original entry may not reversing file can include an entire file or a number
match the routing number in the Originating DFI of batches that constitute a segment of a file. A
Identification field of the NOC. However, the reversing file should only reverse those batches
RDFI’s routing number from the original entry that were duplicate or erroneous.
can be located in the Original Receiving DFI
Identification field in the addenda record of the Duplicate Files
NOC. A duplicate file is a file that was erroneously
introduced into the ACH Network twice. Duplicate
An Originator should be familiar with the Refused files are exact in that all data within the two files are
Notification of Change process for its ODFI to notify exactly the same, including effective entry dates,
the RDFI that it cannot process the Notification of trace numbers, dollar amounts, etc. Therefore, the
Change. Procedures must be established between Receiver was erroneously paid (credits) or charged
the Originator and the ODFI for the origination (debits) twice.
of Refused NOCs, which must be in automated
format. Erroneous Files
An erroneous file is one in which the information
within a substantial number of the entries was
incorrect. For example, the Receivers’ account
CHAPTER 20
numbers could all be invalid, causing the entries
Originators and Reversals to be posted or rejected incorrectly, or the dollar
and Reclamations amount could have been incorrectly calculated,
causing the Receiver to be credited or debited
incorrectly.
Once an entry or file of entries has been transmitted
into the ACH Network, it cannot be recalled, but Procedures
an erroneous or duplicate file may be reversed. If It is the responsibility of the party that originated
a single entry has been duplicated or originated the duplicate or erroneous file to reverse that file.
erroneously, the ODFI may either request the Each reversing file must be in the format required
RDFI to return the entry or transmit a reversing by ACH specifications. When a file is reversed due
entry. Reversal capability allows fast, efficient, and to duplication or error, the Originator or ODFI
accurate recovery from an error. Originators can must:
initiate a reversal, depending upon the reason for
the reversal. • Initiate the reversing file so that it can be
transmitted or made available to the RDFI(s)
An Originator may initiate a reclamation entry for within 5 banking days after the Settlement Date
pension, annuity or other benefit payments by for the entries within the duplicate or erroneous
PPD, as provided for in sections 2.10 (Reclamation file.
Entries and Written Demands for Payment) and
3.6.2 (Liability of RDFI for Reclamation Entries • Place the word “REVERSAL” in the Company
and Written Demands for Payment) of the NACHA Entry Description Field of each Company/Batch
Operating Rules, if; Header Record.
• the Receiver is deceased; and • Transmit the file to the Originating ACH Operator
within 24 hours of the discovery of the error.
• neither the Receiver’s estate nor any other
account holder is entitled to the payment. • Initiate a correcting file with the reversing file, if
the file is reversing an erroneous file.
FILE REVERSALS
File reversals may be originated to correct a
duplicated file or an erroneous file in which
substantially all of the entries were incorrect. A
OG46 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION II – Originating Depository Financial Institutions
C H A P T E R 2 0 O R I G I N AT O R S A N D R E V E R S A L S A N D R E C L A M AT I O N S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG47
SECTION II – Originating Depository Financial Institutions
C H A P T E R 2 1 R E L AT I O N S H I P W I T H O R I G I N AT O R S A N D O D F I s
The reclamation entry is a debit entry that must ODFI and the Originator; there is no contractual
be originated in an amount equal to or less than agreement between the Originator and the ODFI.
the pension, annuity, or other benefit payment to
which the Receiver was not entitled. ORIGINATORS
The NACHA Operating Rules require that the
The reclamation entry or written demand for
agreements between the Third-Party Sender and
payment must contain:
its Originators include at least the same provisions
required by an origination agreement between
• the name of the Receiver;
the Originator and the ODFI. The agreements
• the deceased Receiver’s account number; should also identify processing requirements for
• the exact amount of the entry being reclaimed; the specific applications, and establish liability
and and accountability for certain procedures related
to the applications. In some instances, provisions
• the approximate date the entry being reclaimed
of the agreement may be superseded by applicable
was initiated.
federal or state law (e.g., Uniform Commercial
Reclamation entries must also contain the word Code Article 4A or the Electronic Fund Transfer
RECLAIM in the Company Entry Description Field Act).
of the Company/Batch Header Record.
Please see Appendix C of these Guidelines for a
The Originator or ODFI must originate a reclamation list of issues that the Third-Party Sender and
entry or written demand for payment within five its Originator may specifically define in their
banking days after the Originator receives notice origination agreement.
of the Receiver’s death. If a reclamation entry is
returned by the RDFI, the Originator may make ODFIs
a written demand for payment within 15 banking The unique position of Third-Party Senders within
days after it receives a returned reclamation entry. the ACH transaction flow can result in increased
risk to Network participants due to the lack of
a direct contractual relationship between the
PA R T T H R E E Originator and the ODFI. The NACHA Operating
Rules require Third-Party Senders and their ODFIs
RIGHTS AND RESPONSIBILITIES to enter into originations agreements to help
OF THIRD-PARTY SENDERS protect the ODFI against credit risk by providing
them with the ability to seek recovery of payment
directly from the Originator.
OG48 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
CHAPTER 36 ACKNOWLEDGMENT ENTRIES
•
Warranties of/Indemnifications by Third-
Standard Entry
Party Senders – Each Third-Party Sender
that authorizes an ODFI to transmit entries Class Codes
to a Receiver’s account warrants to the ODFI
that the Originator has agreed to assume the
responsibilities of an Originator, as required by
the NACHA Operating Rules. In any case in which
the Originator fails to perform its obligations as CHAPTER 36
an Originator under the Rules, the Third-Party
Acknowledgment Entries
Sender indemnifies the ODFI against any loss.
(ACK & ATX)
• Performance of ODFI Obligations – If a Third-
Party Sender performs any obligations of an
ODFI under the Rules, the Third-Party Sender Two Standard Entry Class Codes are available for
must also perform the requirements of an ODFI use by ACH participants that allow Originators to
under the Rules, and must warrant that it is request an acknowledgment from the RDFI that a
legally able to do so. These responsibilities corporate credit entry has been received and that
include conducting an annual audit of the Third- the RDFI will attempt to post the payment to the
Party Sender’s compliance with the NACHA Receiver’s account.
Operating Rules. The Rules do not relieve the
ODFI of any of its obligations when they are The ACK and ATX Standard Entry Class Codes
performed by a Third Party Sender. provide the platform for state and Federal
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG49
SECTION V – Standard Entry Class Codes
C H A P T E R 3 7 A C C O U N T S R E C E I VA B L E E N T R I E S
government agencies and other corporate users noted that, in order for the Originator to receive
to utilize the ACH Network for acknowledgment the requested acknowledgment, both the ODFI and
purposes. the RDFI of the entry must support the appropriate
acknowledgment formats. Originators may wish to
An acknowledgment entry is a non-dollar consider whether they need to develop a process
transaction transmitted by the RDFI in response to identify and react to situations in which a
to a request for an acknowledgment contained requested acknowledgment entry is not received.
within the forward CCD or CTX credit entry. The
ACK format is used by the RDFI to acknowledge An RDFI which supports the ACH acknowledgment
the receipt of entries originated using the CCD process will transmit an ACK or ATX entry so that
format. The ATX format is used by the RDFI to it is made available to the ODFI no later than
acknowledge the receipt of entries originated the opening of business on the second banking
using the CTX format. day following the Settlement Date of the CCD or
CTX entry to which the acknowledgment relates.
Use of the ACH acknowledgment process is An ACK or ATX entry transmitted by the RDFI in
optional for all participants, enabling corporations response to a request for an acknowledgment may
and financial institutions to utilize and/or provide be accompanied by one optional Addenda Record.
ACH acknowledgment services based upon their The Addenda Record contains an 80-character
individual organizations’ business needs. Payment-Related Information field, within which
an ANSI ASC X12 REF (Reference) data segment
RESPONSIBILITIES OF ORIGINATORS may be entered which includes information about
the acknowledgment as agreed to by the trading
Since the ACH acknowledgment process is an optional
partners.
service for all ACH participants, Originators and
Receivers wishing to exchange acknowledgments
Refused Acknowledgment Entries
via the ACH Network will need to address the use
of acknowledgment entries in their trading partner In the event that an Originator receives an ACK
agreements. Originators should also be aware or ATX entry that is transmitted to it in error by
that the ODFI and RDFI involved in the payment the RDFI or that contains incorrect information,
process may, but are not required to, receive and the Originator may request its ODFI to transmit
process acknowledgment entries on behalf of a refused acknowledgment entry to the RDFI in
their corporate customers. As a result, Originators accordance with the requirements of the NACHA
choosing to utilize the acknowledgment process Operating Rules. A refused acknowledgment
should address the use of the acknowledgment entry (refused ACK or refused ATX) should be
process in their Originator-ODFI agreements. transmitted by the ODFI within fifteen days of the
Settlement Date of the misrouted or erroneous
Request for Acknowledgment acknowledgment entry.
OG50 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 3 7 A C C O U N T S R E C E I VA B L E E N T R I E S
OBLIGATIONS OF ORIGINATORS
INITIATING AN ARC ENTRY —
AN OVERVIEW Agreements With ODFIs
• The Originator provides the Receiver (the An Originator using the ACH Network to convert
check writer) with notice prior to receipt of the eligible checks received (1) through the U.S. mail
eligible source document, stating that a check (or via an equivalent delivery service), (2) at a
may be converted and collected electronically. dropbox location, or (3) in-person for the payment
For the in-person payment of a bill at a manned of a bill at a manned location, and collect them
bill payment location, the Originator must also using Accounts Receivable Entries should consider
provide the Receiver with a copy of the notice, modifications to its agreement with its ODFI to
or language that is substantially similar, at the address specific issues related to the origination
time of the transaction. of ARC entries. In addition to being bound to
the requirements of the NACHA Operating Rules
• Receiver (customer) either mails or delivers to through its ODFI/Originator agreement, an
an unmanned dropbox a check for a payment Originator and its ODFI should also address any
to the Originator, or presents a check to the processing obligations, timing, liabilities, etc.,
Originator in-person for the payment of a bill at that are unique to the ARC application. These
a manned location. modifications could, for example, address the
extent to which the Originator and ODFI share
• The Originator (usually a biller, such as a utility liability for the following warranties as they apply
company, financial institution, credit card issuer, to the origination of ARC entries:
internet or telecommunications company)
uses a check reading device to capture MICR • The amount of the entry, the routing number, the
information from the check (i.e., routing number, account number, and the check serial number
account number and serial number), which are in accordance with the source document;
is used by the Originator to generate a debit
entry to the Receiver’s account. The Originator • The Originator must retain a reproducible and
may not key enter MICR information from the legible copy of the front of the Receiver’s source
check, nor may the originator key enter MICR document for two years from the Settlement
information after the check reader has captured Date of the ARC entry. Upon receipt of an
the data, except as specifically noted later in this RDFI’s written request, the ODFI must provide
chapter. such copy to the RDFI within ten banking
days. Originators must be prepared to provide
• The amount of the entry is also entered from the such copies to their ODFIs for this purpose.
check. Originators may also choose, at their discretion,
to retain a copy of the back of the Receiver’s
source document.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG51
SECTION V – Standard Entry Class Codes
C H A P T E R 3 7 A C C O U N T S R E C E I VA B L E E N T R I E S
• The source document used for an ARC entry “When you provide a check as payment,
must not be presented for payment unless the you authorize us to use information
ARC entry is returned by the RDFI. That is, to from your check to make a one-time
avoid “double dipping,” the check may not be electronic fund transfer from your
collected through the paper collection system account. In certain circumstances, such
unless the ACH debit is returned by the RDFI. as for technical or processing reasons,
In addition to the RDFI and ACH Operator, this we may process your payment as a
warranty runs to any other party that may be check transaction.”
liable on the source document.
An Originator may also choose to use wording
• The Originator must employ commercially other than the Regulation E safe harbor language
reasonable methods to securely store (1) all provided above, provided that it is substantially
source documents until destruction, and (2) all similar to the Regulation E safe harbor language.
banking information relating to ARC entries.
For purposes of Regulation E, electronic check
Authorization/Notification Requirements transactions are one-time transfers, which require
Originators are required to provide notice to notice to be provided and an authorization obtained
the Receiver, prior to the receipt of each source from the Receiver for each entry. As a result, the
document that will be used as the basis for the ARC notice discussed above must be provided to
origination of an ARC entry, that receipt of the the Receiver prior to the initiation of each ARC
Receiver’s check is deemed to be the Receiver’s entry. The Originator must also provide a copy of
authorization for an ACH debit entry to the the notice, or language that is substantially similar,
Receiver’s account, in accordance with the terms to the Receiver at the time of the transaction when
of the source document. The check is used solely the source document for the Entry is provided by
as a source document for capturing the Receiver’s the Receiver in-person for payment of a bill at a
routing number, account number, check serial manned location.
number, and dollar amount for the entry. The
provision of the notice by the Originator to the Originators must ensure that the required notice
Receiver and the receipt of the source document is clear and readily understandable, and must
together constitute authorization of the ARC provide it in a prominent and conspicuous manner.
entry. A notice in small print and buried in the middle
of unrelated information, for example, is not
The rules governing ARC incorporate Regulation considered to be in a prominent and conspicuous
E safe harbor language into the required notice, location. It is common practice for Originators to
requiring that the notice include the following, or provide the required notice by placing it on the
substantially similar, language: face of the bill (which billers may present to their
customers in paper or electronic form) or on the
“When you provide a check as back of the bill’s first page. Originators should
payment, you authorize us either to use consider using headings preceding the notice to
information from your check to make a draw attention to the information presented to
one-time electronic fund transfer from Receivers, or the use of indicators on the front of
your account or to process the payment the statement to direct them to complete language
as a check transaction.” on the reverse side. If the required notice is not
included on the bill, an Originator intending to
The following alternative safe harbor language is convert eligible checks to ARC Entries must ensure
also provided by Regulation E and may be used to that such notice is provided to the Receiver prior
comply with these notice requirements: to accepting the check as payment. An Originator
could, for example, accomplish this by posting
signage with the required language in a prominent
OG52 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 3 7 A C C O U N T S R E C E I VA B L E E N T R I E S
and conspicuous location at the manned bill Opting Out of Check Conversion
payment location and providing the check writer At their discretion, Originators of ARC entries may
with a take away copy of the notice. choose to allow Receivers to opt out of ARC check
conversion, although the NACHA Operating Rules
Notice on Coupon Books do not require them to do so. Originators that
In certain, limited circumstances, however, such as provide their customers with an opt-out option
where lenders provide coupon books to Receivers may establish their own reasonable policies and
(typically for mortgages, automobile loans, practices for enabling a Receiver to opt out of
personal loans, and other recurring loan payments), check conversion for a specific checking account.
Originators do not have the same opportunities
to provide notice as they do with in-person Requirements for MICR Capture
transactions or with mailed billing statements or During initial processing of ARC entries, Originators
invoices because the coupon books are provided must use a reading device to capture the Receiver’s
to the Receiver in advance and include coupons routing number, account number, and check serial
for several payments. Because a coupon book is number from the MICR line of the Receiver’s
designed so that a consumer must detach a coupon eligible source document. Although this data may
from the book and provide the coupon with each not be key entered during initial processing, key
payment, a separate notice with respect to check entry is permitted for subsequent correction of
conversion need not be printed on each payment errors related to MICR misreads, misencoding, or
coupon, provided that the notice is placed in a processing rejects.
conspicuous location on the coupon book (e.g.,
on the first page or inside the front cover) that the Although the Rules require an RDFI to accept an
consumer can retain. ACH transaction that bears information that was
accurately obtained from the on-us field of the
Notice When Multiple Payments or Multiple MICR line of a check, differences in banks’ MICR
Checks are Provided for One Bill lines may present Originators with challenges
In other circumstances, where multiple payments properly parsing the MICR line for accurate
may be remitted in response to one bill or invoice, formatting of an ARC entry. Originators may wish
such as when multiple checks are submitted within to consider the development of databases and the
a particular billing period related to one account, or use of other available MICR resources to facilitate
multiple checks are received from the Receiver or processing of ARC transactions.
another party with respect to a particular account,
it may be difficult for Originators to provide notice Collection of Return Fees
prior to the receipt of each individual check. ARC entries must be originated so that the amount
Under these circumstances, the provision of the of the entry, the routing number, the account
required notice to the Receiver listed on the billing number, and the check serial number accurately
account is sufficient for the conversion of all checks reflect the source document. No fees of any
provided in payment for the billing cycle or the type may be added to the amount of the source
invoice for which notice was provided, regardless document when it is transmitted as an ARC entry.
of whether the checks are received from the
Receiver or another party for that account. This An Originator desiring to use the ACH Network to
notice applies to all checks submitted as payment collect a Return Fee from a Receiver must originate
until the provision of notice on or with the next a separate Return Fee Entry using the appropriate
invoice or statement. Standard Entry Class Code and must follow all
rules governing the origination of Return Fee
Entries. For specific information on Return Fee
Entries, please refer to Chapter 54 in the Special
Topics section of these Guidelines.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG53
SECTION V – Standard Entry Class Codes
C H A P T E R 3 7 A C C O U N T S R E C E I VA B L E E N T R I E S
Originators need to be aware that the requirements position of the Check Serial Number field, and
of the NACHA Operating Rules regarding the any unused spaces within the field must be
origination of Return Fee Entries are in addition to left blank.
any requirements defined by applicable state law
governing Return Fees. Originators are responsible Therefore, for check number 1234:
for determining what the applicable state laws are,
if any, for each of their check-accepting locations CORRECT 1234
that intend to, or may, use the ACH Network for
the collection of Return Fees. INCORRECT 0001234
000000000001234
Formatting Requirements CK# 001234
• Dollar Amount – ARC entries must be originated CK1234
for amounts of $25,000 or less.
1234 6532986002
• Company Name – Originators must ensure that CK1234 48832817
the name of the Originator (that is, the payee
of the source document) or the payee name Originators should be aware that the NACHA
indicated on the bill or invoice appears within Operating Rules require RDFIs to print the check
the Company Name Field of the Company/Batch serial number on both consumer and business
Header Record of the ARC entry. The contents Receivers’ bank statements.
of this field are provided to the Receiver for
descriptive purposes by the RDFI, and must be • Individual Name/Receiving Company Name
formatted in such a manner that the Receiver – The inclusion of the Receiver’s name within
can easily recognize the Originator of the the Individual Name/Receiving Company
payment (e.g., a trading as or doing business Name Field of the ARC Entry Detail Record is
as name, etc.). Originators should be aware optional, at the discretion of the Originator. If
that the Receiver looks for a familiar name to the Originator chooses to utilize this field, it
identify the transaction; if the Receiver does must include either (1) the Receiver’s name, or
not recognize the Company Name as presented (2) a reference number, identification number,
on his statement, the Receiver may instruct his or code that the merchant uses to identify a
RDFI to return the transaction as unauthorized. particular transaction or customer. (NOTE:
When a reference number, identification number,
• Check Serial Number – The check serial number or code is used to identify the transaction or
of the eligible source document to which the customer, it should be uniquely related to the
ARC entry relates must be placed within the Receiver or transaction. A generic description is
Check Serial Number Field of the ARC Entry not an acceptable means to identify the Receiver
Detail Record. or the transaction.)
OG54 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 3 7 A C C O U N T S R E C E I VA B L E E N T R I E S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG55
SECTION V – Standard Entry Class Codes
C H A P T E R 3 7 A C C O U N T S R E C E I VA B L E E N T R I E S
other electronic media or hardware containing 1. An RDFI that determines that an ARC entry was
banking information. based on an improper source document, or that
the entry and the source document were both
Return of Accounts Receivable Entries presented for payment, may return the entry
ARC entries are governed by the same Return using Return Reason Code, R39 (Improper
Reasons and Return Reason Codes as other ACH Source Document/Source Document Presented
debit entries (a complete listing of Return Reason for Payment). Entries returned using this return
Codes can be found within Appendix Four of the reason code must be received by the RDFI’s ACH
NACHA Operating Rules). In addition, some special Operator’s deposit deadline for the return entry
circumstances can apply, as described below. to be made available to the ODFI no later than
opening of business on the second banking day
Return by ACH Operator following the Settlement Date of the original
entry. No written statement of unauthorized
ARC entries are limited to dollar amounts of
debit is required for this code.
$25,000 or less. Any ARC entry originated in an
amount greater than $25,000 will be returned by
2.
When the Receiver, rather than the RDFI, as
the ACH Operator.
discussed above, determines that the source
document to which an ARC entry relates was
Return by RDFI improper or that the entry and the source
Timing of Returns document were both presented for payment,
Most ARC entries need to be returned by the RDFI the RDFI may return the entry so that it is made
so that the return entry is made available to the available to the ODFI by the opening of business
ODFI no later than the opening of business on the on the banking day following the sixtieth
second banking day following the Settlement Date calendar day following the Settlement Date of
of the ARC entry. the original entry using Return Reason Code
R10 or R37, respectively. A written statement
In the following circumstances, an RDFI may also of unauthorized debit is required when using
return an ARC entry so that it is made available to either of these return reason codes.
the ODFI by opening of business on the banking
day following the sixtieth calendar day following Stop Payments
the Settlement Date of the original entry for the As with other Single-Entry ACH transactions, a
following reasons: 1) no notice was provided to the Receiver desiring to place a stop payment order on
Receiver that the check was going to be converted an ARC entry may do so, provided that he notifies
to an ACH debit, 2) improper source document, 3) his RDFI in such a time and manner that allows the
the source document was presented for payment RDFI a reasonable opportunity to act on the stop
as a check through the check collection system, or payment order prior to acting on the debit entry.
4) the ARC transaction was initiated in an amount ARC entries returned by the RDFI as payment
other than that indicated on the source document. stopped will bear the Return Reason Code R08 and
In these circumstances, the RDFI requires the will be made available to the ODFI by opening of
Receiver to sign or similarly authenticate a written business on the second banking day following the
statement of unauthorized debit prior to being re- settlement date of the ARC entry.
credited for the transaction.
Originators should note that the RDFI may also
Returns for Improper Source Documents or return an ARC entry if the Receiver places a stop
When Both ARC Entry and Source Document payment on the source document (i.e., in the
Have Been Presented check stop payment system) instead of the ACH
With respect to ARC entries based on improper stop payment system. In this situation, the RDFI
source documents or where both the ARC entry must transmit the return using Return Reason
and the source document have been presented Code R38 (Stop Payment on Source Document)
for payment, an RDFI may return such entries in so that it is made available to the ODFI by the
either of two ways: opening of business on the banking day following
OG56 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
CHAPTER 38 BACK OFFICE CONVERSION ENTRIES
the sixtieth calendar day following the Settlement a take-away copy of the notice language at the
Date of the original entry. This time frame allows time of the transaction.
a “safety net” for RDFIs that have not linked their
check and ACH systems to check for stop payment • The customer presents a check for payment.
orders for this application. A written statement of The Originator retains the check for subsequent
unauthorized debit is not required for this return processing in the back office.
reason.
• In the back office, the Originator determines
whether the check is eligible for conversion.
If so, the Originator uses a reading device to
capture MICR information from the check (i.e.,
CHAPTER 38
routing number, account number, and serial
Back Office Conversion Entries number), and generates a debit entry to the
(BOC) Receiver’s account.
SOURCE DOCUMENTS
The Back Office Conversion (BOC) Entry application The Originator may use an eligible check as a
enables Originators to convert, during back office source document for the initiation of a BOC entry
processing, checks presented by the Receiver for if it has been provided to the Originator at either
payments made at either the point of purchase or the point of purchase or a manned bill payment
a manned bill payment location. BOC entries are location. For a detailed list of eligibility criteria
Single-Entry debits and may only be used for non- for check conversion entries, refer to the Source
recurring, in-person payments where there is no Document Eligibility Charts within Appendix E of
standing authorization for the origination of ACH these Guidelines, or to the definition of Eligible
debits to the Receiver’s account. Source Document within Article Eight of the Rules.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG57
SECTION V – Standard Entry Class Codes
CHAPTER 38 BACK OFFICE CONVERSION ENTRIES
• The ODFI has, prior to originating BOC entries, the BOC entry is returned by the RDFI. That is,
established procedures to maintain the following to avoid “double dipping,” the check may not be
information with respect to each Originator of collected through the paper collection system
such entries: unless the ACH debit is returned by the RDFI.
In addition to the RDFI and ACH Operator, this
– company name; warranty runs to any other party that may be
– address; liable on the source document.
– telephone number;
• The Originator must employ commercially
– contact person; reasonable methods to securely store (1) all
– taxpayer identification number; and source documents until destruction, and (2) all
– a description of the nature of the business of banking information relating to BOC entries.
each Originator.
Authorization/Notification Requirements
• The ODFI has established practices and Originators are required to provide notice to
procedures to provide the RDFI with information the Receiver, prior to the receipt of each eligible
identifying the Originator of BOC entries within source document that is used as the basis for the
two banking days of receipt of the RDFI’s origination of a BOC entry, that receipt of the
written request for such information, provided Receiver’s check is deemed to be the Receiver’s
the RDFI’s written request is received within authorization for an ACH debit entry to the
two years of the Settlement Date of the original Receiver’s account, in accordance with the terms
entry. of the eligible source document. The check is
used solely as the eligible source document for
• The Originator has employed commercially capturing the Receiver’s routing number, account
reasonable procedures to verify the identity of number, check serial number, and dollar amount
each Receiver of BOC entries. for the entry. The provision of the notice by the
Originator to the Receiver and the receipt of the
• Each Originator of BOC entries maintains a eligible source document together constitute
working telephone number that is answered authorization of the BOC entry.
during the Originator’s normal business hours for
Receiver inquiries regarding BOC transactions. The rules governing BOC incorporate Regulation
This telephone number must also be displayed E safe harbor language into the required notice,
on the required notice for BOC entries. requiring that the notice include the following, or
substantially similar, language:
• The amount of the entry, the routing number, the
account number, and the check serial number “When you provide a check as
are in accordance with the source document; payment, you authorize us either to use
information from your check to make a
• The Originator has retained a reproducible and one-time electronic fund transfer from
legible copy of the front of the Receiver’s source your account or to process the payment
document for two years from the Settlement as a check transaction. For inquiries,
Date of the BOC entry. please call <retailer phone number>.”
(Upon receipt of an RDFI’s written request,
the ODFI must provide such copy to the RDFI
within ten banking days. Originators must be
prepared to provide copies to their ODFIs for
this purpose.)
OG58 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
CHAPTER 38 BACK OFFICE CONVERSION ENTRIES
The requirement to include a retailer’s telephone In cases where an electronic device is used, the
number above is not required as part of the notice can be displayed on the screen for the
Regulation E safe harbor language but is a Receiver to read prior to providing the eligible
requirement of the NACHA Operating Rules with source document for conversion. Alternatively,
respect to the notice obligation. the notice can be provided on an invoice or
billing statement that the Receiver can read prior
Regulation E also provides alternative safe harbor to providing the eligible source document for
notice language, below, that Originators may conversion. Originators should understand that
choose to use for electronic check conversion. the term “provide” is intended to mean that the
Originators using this alternative language also Originator has utilized a medium (e.g., written
need to include the retailer’s telephone number as document, tablet, computer screen, or other
required by the Rules. method) that allows the Receiver to read the notice
prior to the Originator’s receipt of the eligible
“When you provide a check as payment, source document.
you authorize us to use information
from your check to make a one-time The Originator must also provide the Receiver
electronic fund transfer from your with a take-away copy of the notice language (or
account. In certain circumstances, such language that is substantially similar) at the time
as for technical or processing reasons, of the transaction.
we may process your payment as a
check transaction.” This notice as authorization is the minimum
standard for compliance with the authorization
Originators are not required to use the safe harbor requirements for BOC entries. An Originator may
language discussed above. The actual wording of also choose, at its discretion, to obtain a signed,
the notice may be determined at the discretion written authorization for a BOC entry, but it is
of the Originator, provided that it is substantially still required to comply with all requirements for
similar to the safe harbor language and includes notice to be in compliance with Regulation E.
the retailer’s telephone number.
Opting Out of Check Conversion
For purposes of Regulation E, electronic check At their discretion, Originators may allow Receivers
transactions are one-time transfers, which require to opt out of BOC check conversion, although the
notice to be provided and an authorization NACHA Operating Rules do not require them to
obtained from the Receiver for each entry. As a do so. Originators that offer an opt-out option to
result, an Originator must provide the Receiver their customers should establish procedures under
with the required notice discussed above prior which a Receiver may notify the Originator, at the
to the initiation of each BOC entry. One way point of purchase or manned bill payment location,
an Originator may meet this requirement is by that a particular check does not authorize an ACH
posting the notice (which must be clear and readily debit entry to the Receiver’s account.
understandable) in a prominent and conspicuous
location at the point of purchase/manned bill Requirements for MICR Capture
payment location. A notice in small print and
During initial processing of BOC entries, Originators
buried in the middle of unrelated information, for
must use a MICR reading device to capture the
example, is not considered to be in a prominent
Receiver’s routing number, account number,
and conspicuous location. Originators should
and check serial number from the MICR line of
consider using headings preceding the notice to
the Receiver’s check (eligible source document).
draw attention to the information presented to the
Although this data may not be key entered during
Receiver. Notices provided on signage should not
initial processing, key entry is permitted, for
be obscured by other information or signs that
subsequent correction of errors related to MICR
may also be located at the point of purchase or
misreads, misencoding, or processing rejects.
manned bill payment location.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG59
SECTION V – Standard Entry Class Codes
CHAPTER 38 BACK OFFICE CONVERSION ENTRIES
OG60 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
CHAPTER 38 BACK OFFICE CONVERSION ENTRIES
document is destroyed by the Originator, it must • maintain a careful inventory of the company’s
be securely stored using commercially reasonable electronic devices and of the storage location of
methods. any other sensitive information.
The Rules also require Originators to use When destroying BOC source documents or
commercially reasonable methods to securely other banking information, Originators should
store all banking information related to the BOC establish reasonable measures for destroying such
transaction. Banking information includes, but information that may include:
is not limited to, an entry, entry data, a routing
number, an account number, PINs and other • burning, pulverizing, or shredding papers that
identification symbols, etc. contain such information so that the information
cannot be read or reconstructed;
Although the NACHA Operating Rules do not
otherwise address data security with respect to the • the use of an outside disposal company that has
secure storage of banking and related information, been certified by a recognized industry group;
such requirements may be governed by state or
Federal laws and regulations. Originators should • the destruction and/or erasure of data when
be familiar with any such laws when determining disposing of computers, disks, CDs, magnetic
the commercial reasonableness of their storage tapes, hard drives, laptops, smartphones,
methods. cell phones, or any other electronic media or
hardware containing banking information.
When choosing a commercially reasonable
method for secure data storage, Originators should FORMATTING REQUIREMENTS
consider the following guidance provided by the
• Dollar Amount – BOC entries must be originated
Federal Trade Commission for complying with
for amounts of $25,000 or less.
the Safeguards Rule, which implements security
measures within the Gramm-Leach-Bliley Act. • Company Name – Originators must ensure that
the name of the Originator (that is, the payee
• know where sensitive information is stored and
of the source document) or the payee name
that it is stored securely;
indicated on the bill or invoice appears within
the Company Name Field of the Company/
• ensure that only authorized personnel have
Batch Header Record of the BOC entry. The
access to sensitive data;
contents of this field are provided to the
Receiver for descriptive purposes by the RDFI,
• ensure that storage areas are protected against
and must be formatted in such a manner that
destruction or damage from physical hazards
enables the Receiver to easily recognize the
such as fire or floods;
Originator (e.g., a trading as or doing business
as name, etc.). Originators should be aware
• store records in a room or cabinet that is locked
that the Receiver looks for a familiar name to
when unattended;
identify the transaction; if the Receiver does
not recognize the Company Name as presented
• when information is stored on a server or other
on his statement, the Receiver may instruct his
computer, ensure that the computer is accessible
RDFI to return the transaction as unauthorized.
only with a strong password and that it is kept
in a physically-secure area;
• Check Serial Number – The check serial number
of the source document to which the BOC entry
• avoid storing sensitive information on an
relates must be placed within the Check Serial
electronic device with an Internet connection;
Number Field of the BOC Entry Detail Record.
• maintain secure backup records and keep
The Rules permit Originators to place only the
archived data secure by storing it off-line and in
check serial number within the Check Serial
a physically-secure area;
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG61
SECTION V – Standard Entry Class Codes
CHAPTER 38 BACK OFFICE CONVERSION ENTRIES
Number Field of the BOC Entry Detail Record. by the Originator (or its ODFI on the Originator’s
That is, the word “check,” abbreviations such behalf) within 180 days of the settlement date of
as “ck” or “chk,” or other merchant codes must the original entry.
not be included within the field. Because the
Check Serial Number Field is defined as an For BOC entries returned for any other reason, the
alphanumeric one, the Rules require information Originator must first remedy the reason for the
within this field to be left justified and space return before reinitiating the entry within the 180-
filled. The serial number of the check must day time period discussed above.
begin in the leftmost position of the Check Serial
Number field, and any unused spaces within the RETURN OF BOC ENTRIES
field must be left blank.
BOC entries are governed by the same Return
Reasons and Return Reason Codes as other ACH
Therefore, for check 1234:
debit entries (a complete listing of Return Reason
Codes can be found within Appendix Four of the
CORRECT 1234
NACHA Operating Rules). In addition, some special
INCORRECT 0001234 circumstances can apply, as described below.
000000000001234
Return by ACH Operator
CK# 001234 BOC entries are limited to dollar amounts of
CK1234 $25,000 or less. Any BOC entry originated in an
1234 6532986002 amount greater than $25,000 will be returned by
CK1234 48832817 the ACH Operator.
OG62 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 3 9 C O R P O R AT E C R E D I T O R D E B I T A N D C O R P O R AT E T R A D E E X C H A N G E E N T R I E S
Returns for Improper Source Documents or Originators should note that the RDFI may also
When Both BOC Entry and Source Document return a BOC entry if the Receiver places a stop
Have Been Presented payment on the source document (i.e., in the
With respect to BOC entries based on improper check stop payment system) instead of the ACH
source documents or where both the BOC entry stop payment system. In this situation, the RDFI
and the source document have been presented must transmit the return using Return Reason
for payment, an RDFI may return such entries in Code R38 (Stop Payment on Source Document)
either of two ways: so that it is made available to the ODFI by the
opening of business on the banking day following
1. An RDFI that determines that a BOC entry was the sixtieth calendar day following the Settlement
based on an improper source document, or that Date of the original entry. This time frame allows
the entry and the source document were both a “safety net” for RDFIs that have not linked their
presented for payment, may return the entry check and ACH systems to check for stop payment
using Return Reason Code, R39 (Improper orders for this application. A written statement of
Source Document/Source Document Presented unauthorized debit is not required for this return
for Payment). Entries returned using this return reason.
reason code must be received by the RDFI’s ACH
Operator’s deposit deadline for the return entry
to be made available to the ODFI no later than
opening of business on the second banking day CHAPTER 39
following the Settlement Date of the original
entry. No written statement of unauthorized Corporate Credit or Debit and
debit is required for this code. Corporate Trade Exchange
2.
When the Receiver, rather than the RDFI, as
Entries (CCD & CTX)
discussed above, determines that the source
document to which a BOC entry relates was
Corporate Credit or Debit (CCD) and Corporate
improper or that the entry and the source
Trade Exchange (CTX) Entries are debit or credit
document were both presented for payment,
entries used to facilitate business-to-business
the RDFI may return the entry so that it is made
(B2B) ACH payments. Although these ACH options
available to the ODFI by the opening of business
move money between business accounts in the
on the banking day following the sixtieth
same way, they are distinguished by the ability of
calendar day following the Settlement Date of
the Originator and Receiver to exchange various
the original entry using Return Reason Code
amounts of remittance information.
R10 or R37, respectively. A written statement of
unauthorized debit is required when using this • Corporate Credit or Debit (CCD) – The CCD
return reason code. application can be either a buyer-initiated or
seller-initiated transaction used to move funds
Stop Payments between the buyer’s and seller’s financial
As with other Single-Entry ACH transactions, a institution accounts. It is also used by companies
Receiver desiring to place a stop payment order on to move funds from outlying depository locations
a BOC entry may do so, provided that he notifies to a central bank account. This format may be
his RDFI in such a time and manner that allows the used as a stand-alone payment instruction for
RDFI a reasonable opportunity to act on the stop funds transfer, with no remittance detail included.
payment order prior to acting on the debit entry. Companies use the CCD format when there is
BOC entries returned by the RDFI as payment no need to exchange remittance information,
stopped will bear the Return Reason Code R08 and such as paying a single invoice.
will be made available to the ODFI by opening of
business on the second banking day following the
Companies that need to transmit remittance
settlement date of the BOC entry. data with the CCD entry may add an addenda
record to carry the payment related information.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG63
SECTION V – Standard Entry Class Codes
C H A P T E R 3 9 C O R P O R AT E C R E D I T O R D E B I T A N D C O R P O R AT E T R A D E E X C H A N G E E N T R I E S
The addenda record carries 80 characters of that the biller uses to post the payment.
payment related information, which must be When remittance data needs to accompany
formatted using ANSI ASC X12 data segments a payment, the type of remittance data, along
or a NACHA-endorsed banking convention. The with the appropriate format (in accordance
addenda record may also be used to reference a with the Rules), is specified by the seller and
separate transmission of remittance information communicated to the buyer in advance of the
that flows outside of the ACH Network. The transaction.
CCD plus addenda (also known as a CCD+
entry) is typically used to pay a single invoice • Lower Payment and Remittance Processing Costs:
that is identified in the addenda record. It may The initiation of payments and processing of data
also be used for multiple invoices, providing a electronically removes many of the personnel
reassociation reference number for the source expenses required to handle paper remittances
of the remittance data. (i.e., salaries and overtime staffing during peak
periods), as well as the costs associated with
• Corporate Trade Exchange (CTX) – The paper storage and handling, such as opening
CTX application is also a buyer-initiated or envelopes, manually crediting the account, and
seller-initiated transaction used to move funds depositing payments.
between the buyer’s and seller’s financial
institution accounts. The CTX format supports • Improved Data Accuracy: The ability to carry
the transfer of extensive addenda records - up data and dollars together eliminates misrouted
to a maximum of 9,999 records each carrying remittances (there is an audit trail for all ACH
80 characters of payment related data - along transactions) and delays from bill stubs received
with the transfer of the payment. Remittance without a check, or checks received without a
information within CTX addenda records must bill stub. In addition, many ACH processors
be formatted as either a syntactically correct have integrated sophisticated methods to
ANSI ASC X12 transaction set or as a payment verify account numbers, further reducing the
related UN/EDIFACT transaction. The CTX possibility of errors.
format is typically used to pay multiple invoices
that are listed in the addenda records, although • Accelerated Cash Flow: The receipt of ACH
it may be used for a single invoice. payments makes cash flow and forecasting more
predictable, eliminates receiving checks by mail
LEGAL FRAMEWORK and reduces clearing float. For customers that
initiate credit payments, funds are immediately
In addition to the applicable NACHA Operating
available to the biller.
Rules, wholesale credit transactions transmitted
as CCD or CTX entries are governed by Article • Flexibility: The ACH Network allows both credit
4A of the Uniform Commercial Code. As they and debit payment options, and can be used in
are not consumer entries, they are not subject to any bill payment receivables channel. An ACH
Regulation E. solution is also widely available, and scalable,
allowing for adoption by both smaller and larger
BUSINESS-TO-BUSINESS PAYMENTS businesses and customers.
The ACH offers a number of special features
for business payments. By using ACH CASH CONCENTRATION AND
electronic payments for accounts payable and DISBURSEMENT
accounts receivable functions, businesses can
Cash concentration and disbursement are cash
realize significant cost-savings and processing
management techniques used by companies with
efficiencies.
remote locations to effectively manage funds.
Cash concentration consolidates all available funds
• Data and Dollars Together: The ACH Network
in a single account. Disbursement is controlled so
can carry both payment and remittance data.
The remittance data provides information
OG64 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 3 9 C O R P O R AT E C R E D I T O R D E B I T A N D C O R P O R AT E T R A D E E X C H A N G E E N T R I E S
that cash can be fully invested during the day and ACH payment, it is possible that the seller will not
funding requirements for checks can be met. Cash be able to post the payment correctly, meaning
concentration and disbursement help improve the the buyer’s account will not be properly credited.
flow of cash, reduce excess balances and increase The seller may, therefore, only allow the buyer to
interest earned. The ACH Network provides originate a credit ACH payment once the buyer
companies with a quick and cost-efficient means agrees to the remittance requirements. As above,
for cash concentration. the terms of the agreement would be dictated by
the trading partner agreement.
OBLIGATIONS OF ORIGINATORS
Sellers and buyers should discuss special payment
Agreement with ODFI requirements prior to conducting business. The
An Originator using CCD/CTX entries should range of payment terms and conditions should be
consider modifying its agreement with its ODFI to covered in their trading partner agreement.
address specific issues related to the origination
of these entries. In addition to being bound The agreement will also specify the manner in
to the requirements of the NACHA Operating which dispute resolution will be handled.
Rules through its ODFI/Originator agreement,
the agreement should address any formatting RETURN OF CCD/CTX ENTRIES
requirements, processing obligations, warehousing,
timing, etc. that are unique to CCD/CTX entries. CCD and CTX entries are governed by the same
return reasons and Return Reason Codes as other
ACH debit entries. Most CCD/CTX entries need to
Agreement with Receiver
be returned by the RDFI so that the return entry
With business-to-business payments, ACH is made available to the ODFI no later than the
transactions originated by a buyer are credit opening of business on the second banking day
transactions because the buyer (the party that owes following the Settlement Date of the CCD/CTX
funds) “pushes” funds to the seller’s (party that is entry.
owed the payment) account. ACH transactions
originated by a seller are debit transactions because If an RDFI receives written notification from a
the seller “pulls” funds from the buyer’s account. Receiver after the time for return has expired that
a CCD or CTX debit entry to the Receiver’s account
As with all ACH transactions, the Originator of was not authorized by the Receiver, the RDFI may
a CCD or CTX entry must receive the Receiver’s transmit a permissible return entry to the ODFI,
authorization to debit or credit the Receiver’s provided that the ODFI has agreed, either verbally
account. The NACHA Operating Rules do not or in writing, to accept the late return entry. Such
require the CCD/CTX authorization to be in a a return must be transmitted using Return Reason
specific form. However, the rules require the Code R31 (Permissible Return Entry).
Originator and Receiver to have an agreement
that binds the Receiver to the Rules. This trading At times, Originators may erroneously transmit ACH
partner agreement should contain the authorization entries that are formatted using an incorrect SEC
requirements and procedures as determined by the Code. This is in violation of the NACHA Operating
parties; the companies negotiate the terms. Rules. The Rules allow the RDFI to rely on the
ODFI’s warranty that the SEC Code included in the
In some instances a seller may have specialized entry is proper and obligates the RDFI to use the
data remittance requirements for an electronic return rules and time frames associated with that
credit payment (e.g., specific data elements and particular SEC Code.
formats) and/or may require that remittance be
sent through a specific channel (e.g., the ACH, or a However, for an unauthorized debit to a consumer
private remittance network — sometimes referred account that bears a corporate SEC Code (i.e., CCD
to as a value-added network). If the buyer is unable or CTX), the RDFI may be unable to meet the time
to meet the exact specifications for making a credit frame for return because the return time frame
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG65
SECTION V – Standard Entry Class Codes
C H A P T E R 3 9 C O R P O R AT E C R E D I T O R D E B I T A N D C O R P O R AT E T R A D E E X C H A N G E E N T R I E S
for corporate entries may have lapsed before the CORPORATE ACH PAYMENT
consumer can receive his statement and notify his TRANSACTION FLOW
RDFI about the unauthorized debit to his account.
In order to enable the RDFI to treat all unauthorized Buyer-Initiated Payments:
debits to consumer accounts in a consistent manner, Credit Model – Data and Dollars Together
regardless of SEC Code, the NACHA Operating The process flow for a buyer-initiated payment
Rules define a specific Return Reason Code R05 when remittance data is included with the payment
(Unauthorized Debit to Consumer Account Using (data and dollars together) is shown in Figure 39-1.
Corporate SEC Code) that the RDFI may use to
return unauthorized entries to a consumer account Payment Initiation
that bear a corporate SEC Code. Returns bearing 1.
The buyer and the seller may enter into a
Return Reason Code R05 must be transmitted by trading partner agreement that establishes
the RDFI in such time and manner that the return authorization for ACH payment. The seller
is made available to the ODFI no later than the must provide the buyer with the bank routing
opening of business on the banking day following number of its financial institution and depository
the sixtieth calendar day following the Settlement account number or electronic lockbox account
Date of the original entry. number. This information is used to route
the ACH payment to the seller. Typically, the
A complete listing of Return Reason Codes can seller notifies the buyer about the desired data
be found within Appendix Four of the NACHA requirements and ACH format in the trading
Operating Rules. partner agreement.
FIGURE 39-1
OG66 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 3 9 C O R P O R AT E C R E D I T O R D E B I T A N D C O R P O R AT E T R A D E E X C H A N G E E N T R I E S
4.
The ACH Operator sorts and batches ACH Buyer-Initiated Payments:
transactions for the appropriate RDFIs and Credit Model – Data and Dollars Separate
transmits the ACH transaction in a batch to the
While standardized remittance data can accompany
RDFI by the Settlement Date.
a CCD or CTX payment, buyers sometimes convey
it using other networks or methods. This is
Settlement known as the data “re-association model” (or data
5.
The ODFI debits the buyer’s/Originator’s and dollars separate), where the Receiver (seller)
account. The ACH Operator debits the ODFI receives payment through the ACH, but must re-
and credits the RDFI. The RDFI credits the associate the payment with the correct remittance
seller’s/Receiver’s account on the Settlement information coming from another source, such
Date for the amount of the payment.
FIGURE 39-2
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG67
SECTION V – Standard Entry Class Codes
C H A P T E R 3 9 C O R P O R AT E C R E D I T O R D E B I T A N D C O R P O R AT E T R A D E E X C H A N G E E N T R I E S
as a value added network (VAN). This method Seller-Initiated Payments: Debit Model
requires the Receiver to have an identifier that Seller-initiated corporate ACH transactions are
can associate the payment with the remittance for debit transactions. When the seller initiates an
proper reconciliation in the accounts receivable ACH debit, the seller is the Originator of the ACH
system. See Figure 39-2. transaction and the buyer is the Receiver. The
seller debits the buyer’s account for the amount of
Payment initiation and settlement occur similar to payment due on an agreed upon date. Figure 39-3
the data and dollars together credit model above. illustrates this model.
The difference between these buyer initiated
payment models is how remittance data flows to Payment Initiation
the seller (2a). In the re-association model, where
1.
Similar to buyer-initiated ACH transactions,
data and dollars are separate, the buyer sends
the use of ACH debit as the payment method
remittance data (per the seller’s specifications) to
is typically preauthorized in a trading partner
a VAN, which then routes the data to the seller.
agreement established between the buyer and
The seller then has to re-associate, or reconcile,
seller. At a minimum, the buyer must provide
the payment credit with the remittance data.
the seller with the ABA number (i.e.; the bank
FIGURE 39-3
OG68 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 3 9 C O R P O R AT E C R E D I T O R D E B I T A N D C O R P O R AT E T R A D E E X C H A N G E E N T R I E S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG69
SECTION V – Standard Entry Class Codes
C H A P T E R 3 9 C O R P O R AT E C R E D I T O R D E B I T A N D C O R P O R AT E T R A D E E X C H A N G E E N T R I E S
ANSI ASC X12 data elements or data segments or to obtain a copy of the X12 Standards,
only, while the CTX addenda records can carry a please contact the Data Interchange Standards
full payment related ANSI ASC X12 transaction set Association (DISA) www.disa.org.
(i.e., one that contains a BRP or BPS data segment)
or payment related UN/EDIFACT syntax. Preparing the CCD Addenda Record
A CCD entry may relay remittance information
The ANSI ASC X12 transaction sets that contain using the “05” addenda record. Only one addenda
valid BPR/BPS data segments are: record may accompany each CCD entry. The
addenda record includes 80 characters of payment
• 103 Abandoned Property Filings – the 103 related information.
Transaction Set
Users of this payment format may insert any
• 521 Income or Asset Offset – the 521 NACHA-endorsed banking convention (i.e.,
Transaction Set child support, tax payment, or electronic dealer
drafting), or up to 80 characters of any combination
• 813 Electronic Filing of Tax Return Data – the of payment related ANSI ASC X12 data segments
813 Transaction Set and data elements — that is any combination of
data segments and data elements from the specific
• 820 Payment Order/Remittance Advice – the
transaction sets identified above. Data segments
820 Transaction Set
from other standards are not permitted in the
addenda record.
• 823 Lockbox – the 823 Transaction Set
An asterisk (“*”) must be used as the separator
• 835 Health Care Claim Payment/Advice – the
(or “delimiter”) between data elements, and the
835 Transaction Set
backslash (“\”) (referred to as the “terminator”)
must be used to indicate the end of a data
The NACHA Operating Rules do not specify which
segment.
version of the ASC X12 standards should be used.
However, the examples, definitions, and ASC X12
Preparing the CTX Addenda Record(s)
standards discussed in this chapter are derived
from the version release 5010 of the ASC X12 A CTX entry relays remittance information using the
Standards manual. For more information on basic ASC X12 Interchange Control Structure, Application
X12 rules, see Appendix J of these Guidelines. Control Structure, ANSI ASC X12 transaction sets
containing a BPR or BPS data segment (see list
Entries using the CCD format may also use NACHA- above), or payment related UN/EDIFACT syntax.
endorsed banking conventions to convey payment The addition of one or more addenda records to
related information within the addenda record. the entry detail record allows a corporation to
transmit payment related information; however, the
To receive information on NACHA endorsed presence of an addenda record is not mandatory
banking conventions, please visit www.nacha. with CTX entries.
org.
• For CTX entries there is a limit of 9,999 addenda
Although this chapter refers to the ANSI ASC X12 per ACH payment.
Interchange Control Structure (ANSI ASC X12.5),
the ANSI ASC X12 Application Control Structure • Only the ASC X12 Interchange Control Structure
(ANSI ASC X12.6), UN/EDIFACT payment related (ANSI ASC X12.5), Application Control Structure
syntax, and the transaction sets shown above, it (ANSI ASC X12.6), ANSI ASC X12 transaction
does not discuss these standards in detail. sets containing a BPR or BPS data segment
(see above), or payment related UN/EDIFACT
To receive additional information about ASC information are permitted in the CTX addenda
X12 or UN/EDIFACT payment related syntax, record.
OG70 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 3 9 C O R P O R AT E C R E D I T O R D E B I T A N D C O R P O R AT E T R A D E E X C H A N G E E N T R I E S
• For CTX entries that use multiple addenda monetary entry, an amount of zero is placed in the
records, the addenda are, in effect, chained amount field of the entry indicating that the value
together with each succeeding addenda record of the transaction is zero; however, remittance
carrying the next 80 characters of the message. information is carried in the addenda to support
the zero dollar payment. Zero dollar payments
• An addenda sequence number is provided in the with remittance can be treated similarly to dollar
addenda record. The sequence number is “0001” payments in that they can be coded as debits or
for the first addenda record. Each succeeding credits to savings or demand accounts. Typically,
addenda must contain a number greater than zero dollar payments are embedded in an ongoing
the previous addenda. application where the transactions usually have
value; however, for a particular time period, such
• Standards developed by the ASC X12 are as in the tax or health care industries, no funds
developed for computer processing and are not are owed.
easily readable by human operators, since codes
are often used to relay information. A zero dollar entry can also be transmitted through
the ACH as a pre-advice, where remittance detail
• The format of the ASC X12 message within the is transmitted from the Originator to the Receiver
addenda records is referred to as “enveloping” prior to the actual payment. This process allows
since it is comparable to placing a message any problems with the remittance detail to be
within an envelope and attaching it to a payment worked out prior to the flow of funds. A zero
as it flows through the system. dollar transaction can be transmitted with both
CCD and CTX entries.
Preparing CTX addenda records requires the
preparation of a file of ASC X12 formatted Compression of the Data
information. Once the record formats are constructed, the X12
message is then divided into 80-character segments
Refer to Appendix J within these Guidelines for and inserted within the addenda records. The
a discussion on Basic ASC X12 rules, and to Payment Related area of the addenda should be
the Data Interchange Standards Association fully utilized by “compressing” the ASC X12 data.
(DISA) at www.disa.org for complete Compression is a procedure in which one segment
information on X12 requirements. immediately follows the preceding segment. If a
data segment is longer than eighty characters, the
The Originator may either prepare the CTX
payment related field of the first addenda record is
entries itself or pass the X12 information to its
completely filled and the data is “wrapped” to the
financial institution to prepare the ACH file,
payment related field in the next addenda record.
depending on the agreement that the Originator
(Fourteen characters of the addenda record
has with its ODFI. Any editing or formatting of
contain the tracking and control information
transaction information done by the ODFI can be
needed for ACH processing.) A maximum of 9,999
considered a value-added service performed by
addenda records may be generated for any one
that organization.
CTX message, allowing a message totaling nearly
800,000 bytes.
CTX entries may be produced by scanning the
information in the ASC X12 message. From the
Delimiters, Terminators, and Version Release
information contained in the data segments, the
NACHA record formats can be constructed. For CTX payments, the ASC X12 structure allows
the originator flexibility in selecting delimiters,
Addenda Information and Zero Dollar Entries terminators, and the Version Release Control
Number. The value of these elements will be
Corporate payments may carry a dollar value or no
defined in the ISA segment (see Appendix J on
dollar value. In the case of a dollar value entry,
Basic ASC X12 Rules in these Guidelines) and will
a dollar amount greater than zero is transmitted
be chosen by agreement between the Originator
with the remittance detail. In the case of a non-
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG71
SECTION V – Standard Entry Class Codes
C H A P T E R 4 0 C U S T O M E R - I N I T I AT E D E N T R I E S
and Receiver. Corporate users should note that UNDERSTANDING CIE BUSINESS
delimiters and terminators must be contained in the MODELS
NACHA data character set (EBCDIC characters with
Once consumers authorize payments from an
a value greater than hexadecimal “3F” and ASCII
online banking application, payments to billers
characters with a value greater than hexadecimal
can be made using several different models. For
“1F”). Communication control characters, those
example, payments made at online banking sites
characters with an EBCDIC value of “3F” or less
can be transmitted to billers through the ACH
or an ASCII value of “1F” or less, interfere with the
Network, through other payment networks, or
processing systems of ACH Operators and RDFIs
even by check. The specific payment method
and cannot be used.
chosen can depend on the
By combining payments with Electronic Data
• use of a third-party to provide a financial
Interchange payment information, corporations
institution’s online banking service;
enjoy many benefits. The combination of payment
and payment information allows the corporation
• risk profile of the payer and/or the risk tolerance
to apply this information in an automated manner
defined by the payee;
upon receipt rather than manually reconciling
the data and dollars. In general, Electronic Data • electronic receivables services provided to the
Interchange provides a basis for complete end-to- biller; and
end automation of order entry information.
• ability for the consumer financial institution/
third party service provider to send the payment
electronically to the biller.
CHAPTER 40
The discussion below describes common process
Customer-Initiated Entries (CIE) flows for bill payments transmitted through the
ACH Network from online banking applications.
A Customer-Initiated Entry (or CIE entry) is a
credit entry initiated on behalf of, and upon the Financial Institution as Bill Payment Provider
instruction of, a consumer to transfer funds to a In this model, a financial institution operates its
Receiver. CIE entries are usually transmitted to a own bill payment system and is able to originate
company for payment of funds that the consumer ACH payments. See Figure 40-1. The financial
owes to that company and are initiated by the institution’s consumer customer authorizes
consumer through some type of online banking a payment through the FI’s online banking
product or bill payment service provider. With application, and the consumer’s financial institution
CIEs, funds owed by the consumer are “pushed” to transmits a credit to the biller’s (i.e., the Receiver’s)
the biller in the form of an ACH credit, as opposed financial institution using the CIE format. (Note:
to the biller’s use of a debit application (e.g., The consumer’s financial institution will often
PPD, WEB) to “pull” the funds from a customer’s rely on a third party to obtain payment routing
account. instructions for billers.) Once the CIE credit is
received, the RDFI credits the biller’s account, and
This chapter provides an overview of the passes the payment remittance information (i.e.,
fundamentals of the CIE application and its use in the customer’s account number with the biller and
the bill payment environment. Topics include basic the payment amount) to the biller. The biller then
explanations of various CIE bill payment models, credits the consumer’s account.
risks related to CIE usage, and best practices
for minimizing exception processing in the bill 1.
Originator (consumer) approves the payment
payment arena. amount to the biller in an online banking
application.
OG72 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 0 C U S T O M E R - I N I T I AT E D E N T R I E S
FIGURE 40-1
2. ODFI (consumer’s bank) originates the CIE to but the bill payment service is actually operated by
the biller’s financial institution. a TPSP. Once the consumer approves a payment
from the online banking application (or portal),
3. RDFI (biller’s bank) receives CIE, and credits the TPSP’s own financial institution (rather than
biller’s (Receiver’s) account with RDFI. the consumer’s financial institution) will first
debit the consumer’s account at his financial
4. Biller (Receiver) receives remittance data and institution (using a WEB or PPD transaction) and
credits consumer’s account with biller. then transmit a CIE credit to the biller’s financial
institution (similar to the financial institution bill
Third Party Service Provider payment provider model described above). With
as Bill Payment Provider this model, two separate ACH transactions are
In this model, shown in Figure 40-2, a financial required to complete the consumer’s payment
institution uses the services of a Third-Party instruction.
Service Provider (TPSP) to support bill payment
for its online banking platform. This model also As an alternative to transmitting a CIE credit to
applies to third-party bill payment providers that the biller on the consumer’s behalf, the TPSP
offer bill payment services that are not associated may effect payment to the biller through other
with an online banking service. In these cases, the methods, depending on the services provided
bill payment service is usually provided through a to the consumer’s financial institution and the
portal or non-bank website. biller’s preferences for payment delivery. In lieu
of transmitting the payment to the biller through
In this scenario, the consumer’s financial institution the ACH, the TPSP may choose to use another
is a passive party to the transaction. This means payment network, or it may even send a check
that the consumer may log-in and access his if the TPSP’s financial institution does not have
financial institution’s online bill payment service, electronic routing information for a particular
biller.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG73
SECTION V – Standard Entry Class Codes
C H A P T E R 4 0 C U S T O M E R - I N I T I AT E D E N T R I E S
FIGURE 40-2
1.
Originator (consumer) approves the payment 3.
ODFI (TPSP’s FI) originates a credit to the
amount to a biller using an online banking biller for multiple consumer payments using
application or portal service. (Note: The an individual CIE for each payment, or the
consumer’s financial institution has contracted payments may be bundled into a CTX transaction
with a TPSP to operate the FI’s online banking with the remittance details in accompanying
service. The TPSP has a separate relationship addenda records (data and dollars together).
with another (the TPSP’s own) financial
institution to originate and receive ACH OR the ODFI (third party processor FI) may
a.
transactions.) originate a CCD or CCD+ credit to the biller,
and send the remittance data separately to the
2. ODFI (TPSP’s FI) debits the consumer’s account biller outside the ACH Network (remittance
at the consumer’s FI by transmitting a PPD or re-association model).2
WEB debit.
2
While this chapter discusses the use of CIE for Third-Party Service
Providers using the ACH to transmit payments to billers on consumers’
behalf, the TPSP also has the option of transmitting a CCD or
CTX transaction to the biller. In this model, a TPSP with multiple
consumer customers paying the same biller may “bundle” the
payments to a single biller within a single CCD or CTX transaction.
Remittance data may accompany the CTX (data and dollars together),
or the remittance data could be sent directly to the biller outside the
ACH (remittance re-association model), which is the likely scenario if
the TPSP uses CCD. More information on this payment option can be
found within the CCD/CTX chapter in these Guidelines.
OG74 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 0 C U S T O M E R - I N I T I AT E D E N T R I E S
4.
RDFI (biller’s bank) receives payment RECEIPT AND POSTING OF CIE
transactions, credits biller’s account at the ENTRIES — RDFIS AND BILLERS
RDFI, and provides the remittance detail to the
In the bill payment environment, payment posting
biller.
involves a two-step process:
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG75
SECTION V – Standard Entry Class Codes
C H A P T E R 4 0 C U S T O M E R - I N I T I AT E D E N T R I E S
OG76 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 0 C U S T O M E R - I N I T I AT E D E N T R I E S
– changes can be made on or shortly after the rather than the Originator (the consumer paying
effective date of the change; the bill). The identification of the Bill Payment
Service Provider in these fields provides the biller
– it eliminates the need for each consumer with the means to identify the Bill Payment Service
to update the account number through the Provider originating the transaction in the event
online banking/consolidator system which is that the biller needs to contact the Bill Payment
time consuming and subject to errors; and Service Provider concerning a customer inquiry or
error investigation.
– it dramatically reduces exception items.
Company Discretionary Data
For a biller to provide a bulk-change notification, In a CIE entry, the Company Discretionary Data
each processor will require secure biller-specific field within the Company/Batch Header Record
requirements that will be defined by the processor. identifies the name of the biller (i.e., the Receiver)
to which the entries are being transmitted.
Correcting Biller Account Numbers Through
the NOC Process Note: This is different from the typical use of
Notifications of Change (NOC) should be created this field for other SEC Codes, where Originators
by Receivers of CIE transactions (i.e., the payee and ODFIs may, at their option, include codes of
or biller) and transmitted via their RDFIs to notify significance to them for specialized handling of the
consumers and their financial institutions/bill entries within the batch. For non-CIE applications,
payment service providers when there is a change the Receiver is typically identified within the Entry
in the customer’s account number at the payee/ Detail Record.
biller. An NOC is originated when: (1) the payee
or biller changes a customer’s account number CIE Entry Detail Record
due to internal system requirements, or (2) the
payee or biller can post the payment but the Individual Name
original customer account number received from For CIE entries, the Individual Name field within
Originator was not correct. Change Code C09 the Entry Detail Record is used to provide the
– Incorrect Individual Identification Number – is Receiver with additional information to identify
used for this purpose. When an NOC is received by the payment — typically the name of the payor on
the ODFI/Originator, the Originator must update whose behalf the CIE entry was transmitted.
the customer’s payee or biller account number
within six banking days or prior to transmitting Note: This is different from other SEC Codes, where
the next CIE entry, whichever is later. the Individual Name is otherwise the name of the
Receiver of the payment.
FORMATTING AND TECHNICAL
REQUIREMENTS Individual Identification Number
ACH participants should be aware that CIE entries In a CIE entry, the Individual Identification Number
include some non-standard uses of certain fields field within the Entry Detail Record contains
when compared to other SEC Codes. the accounting number by which the payor (the
consumer) is known to the payee (Receiver/biller).
CIE Company/Batch Header Record This number is used by the Receiver to update
accounts receivable records, and should be the
Company Name and Company Identification number shown on an invoice, statement, billhead,
Fields or other communication as the reference. Numbers
For CIE entries, the contents of the Company may be policy numbers, customer numbers, invoice
Name and Company Identification fields in the numbers, meter numbers, etc.
Company/Batch Header Record identify the Bill
Payment Service Provider transmitting the entry
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG77
SECTION V – Standard Entry Class Codes
C H A P T E R 4 0 C U S T O M E R - I N I T I AT E D E N T R I E S
CIE Addenda Record You can use a valid ANSI ASC X12 data segment
CIE entries may be accompanied by one “05” but the total number of characters, including
Addenda Record. delimiters and terminators can only be a maximum
of 80 characters. The X12 data segments may
Payment Related Information Field allow for more than 80 characters but the ACH
Payment Related Information field is a maximum
Any payment-related ANSI ASC X12 data segment
of 80 characters.
may be included within the Payment-Related
Information field of the CIE addenda record. This
enables billers and Bill Payment Service Providers
to transmit specific information related to the
payment that assists them when processing CIE
entries, such as consumer name or address.
For Example:
N1*BY*John Smith*ZZ*123456789\
N4**VA*201714\
OG78 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 0 C U S T O M E R - I N I T I AT E D E N T R I E S
Biller provides information • Provide and maintain processing instructions on the processor’s EBPP Biller Directory: account number set up
for third party processor parameters (e.g., account mask, check digit routine,), remittance information (e.g., remittance addresses), and
biller directories to other relevant information (e.g., alternative biller names)
facilitate payment • Provide exception error reports to processors and payment consolidators so EBPP Biller Directory and other
origination process from database updates can be made on a timely basis.
online banking/payment
• Work with processors and payment consolidators to exchange information on a periodic basis (e.g., monthly)
consolidator systems
using “scrub files”. Generally, the processor/payment consolidator will extract all of the consumer names and
account numbers associated with a unique biller on its EBPP Biller Directory (containing no dollar amounts).
The biller will match the consumer data on the processor/payment consolidator system with its internal system,
and provide the processor/payment consolidator with corrections showing the incorrect (“old”) and correct (“new”)
account numbers. The processor/payment consolidator will use this information to update its systems, and
preferably, reflect the new, updated account number on the consumer’s payee set up on the online banking/
consolidator site.
• Establish procedures for monitoring and reporting exception items. Send corrections to processor/payment
consolidator on a daily, monthly or at least a quarterly basis.
• Provide additional data to processor/payment consolidator such as consumer account name when a biller issues
the same account number to different customers within its system.
Biller provides consumers • Use the same account number for online bill payments as the one shown on the remittance coupon.
with clear online • Ensure the account number to be used for online bill payments is clearly defined and highlight the account
bill payment set-up number on the paper bill.
instructions.
• Provide instructions and examples on your website that demonstrate where the account number is on the
paper bill, and what identifier(s) need to be provided when making an online bill payment via online banking/
consolidator providers.
Processors manage/monitor • Enforce “front end” consumer data entry rules, and apply account edits early in the consumer data entry process.
payee setup and payment • When the consumer is setting up the account number for a biller, provide consumer with an error message if the
origination account number does not match the biller’s instructions on the EBPP Biller Directory (e.g., check digit routine,
prohibit consumers entering “NA” or “free checking”, etc. as remittance information).
• When consumer enters incorrect account number, provide consumer with online self-help and instructions.
• Implement strong biller account number edits (e.g., length, data type, beginning prefix numbers such as
BINs – Bank Identification Numbers, and check digit routines) when possible.
• Monitor the number and frequency of exception items and make adjustments to account number edits as needed.
• Work with billers to improve setup process by ensuring account masks have been defined. Fine-tune the masks/
edits, and remove them where they cause default to paper.
• Work with billers to be able to verify posting and account information.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG79
SECTION V – Standard Entry Class Codes
C H A P T E R 4 0 C U S T O M E R - I N I T I AT E D E N T R I E S
OG80 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
3
NACHA did not implement all aspects of the BSA “Travel Rule” with
the IAT SEC code. Only specific data elements were adopted. The IAT
does not include the dollar threshold established by the BSA “Travel
Rule”.
4
31 C.F.R. Part 103.33(g)
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG81
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
institution that serves as the U.S. ODFI. Outbound its correspondent bank (Bank C) in the U.S., along
IAT entries, while originated through the U.S. with funding instructions for the payments. Bank
ACH system, will reach the receiving financial C acts as the U.S. Gateway Operator (entry point
institution in the other country through a variety to the U.S.). Bank C receives the SWIFT message
of methods (e.g., SWIFT, proprietary networks, or and funding, creates the ACH files (IAT format),
possibly the domestic ACH system of the receiving and transmits the ACH file to the ACH Operator.
country). The IAT format is only used for The ACH Operator processes the file and transmits
international batch payment transactions where the transactions to the RDFIs for posting to the
some part of the payment process involves the U.S. Receivers’ accounts. Bank B would also be
ACH Network. identified as a Foreign Correspondent Bank in the
IAT Addenda Record for Foreign Correspondent
Figure 43-1 provides an illustration of an Bank Information. This addenda record is created
international payment inbound to the U.S. In by the U.S. Gateway Operator or its designate.
this example, Bank A in Germany originates a
SWIFT message on behalf of the Originating REGULATORY ENVIRONMENT
Company to its correspondent bank (Bank B) in
the U.K. The message requests that payments Federal Regulatory Agency Requests
be made in the U.S. via the ACH Network to the & Guidance
ultimate beneficiaries (Receivers), and funding OFAC has stated that financial institutions need
instructions for all transactions are included with to safeguard the U.S. financial system from
the message. Bank B sends the SWIFT message to terrorist and other sanctions abuses involving
international ACH payments. In the domestic
OG82 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
payment environment, ODFIs and RDFIs can rely OVERVIEW OF IAT RULE
on each other to ensure compliance with OFAC REQUIREMENTS
obligations with regard to their own customers.
For international payments, however, DFIs cannot
Identification of International Payments
rely on international counterparts for compliance With the implementation of the IAT SEC code,
with U.S. law. The examination procedures for ACH transactions originating from or transmitted
financial institutions’ risk-based OFAC compliance to an office of a financial agency located outside
are included in the Federal Financial Institutions the territorial jurisdiction of the U.S. are required
Examination Council’s (FFIEC) Bank Secrecy Act/ to be explicitly identified by the ODFI or Gateway
Anti-Money Laundering Examination Manual. Operator entering such payments into the U.S.
ACH Network. The following definition of
Identification of International ACH International ACH Transaction was established for
Transactions and Formats to Comply such transactions, to which the SEC code, IAT, and
with U.S. Law formatting requirements apply.
Under the IAT rules, international ACH payments
International ACH Transaction or IAT entry means
are identified by focusing on where the financial
a debit or credit entry that is part of a payment
agency that handles the payment transaction is
transaction involving a financial agency’s office
located, regardless of where any other party to
that is not located in the territorial jurisdiction of
the transaction (e.g., the Originator or Receiver)
the United States. For purposes of this definition, a
is located. Specifically, where any ACH entry
financial agency means an entity that is authorized
is part of a payment transaction that involves a
by applicable law to accept deposits or is in the
financial agency’s office that is not located within
business of issuing money orders or transferring
the territorial jurisdiction of the United States,
funds. An office of a financial agency is involved in
the ACH entry must be identified using the IAT
the payment transaction if it (1) holds an account
(International ACH Transaction) Standard Entry
that is credited or debited as part of the payment
Class Code. As a result, certain transactions that
transaction; or (2) receives payment directly from
are international in nature but were transmitted as
a Person or makes payment directly to a Person
PPDs or CCDs in the past are now required to be
as part of the payment transaction; or (3) serves
transmitted as IATs. The IAT format helps RDFIs
as an intermediary in the settlement of any part
comply with their obligations under U.S. law by:
of the payment transaction. These entries must
be originated using the IAT Standard Entry Class
• carrying the additional data requirements
Code.
included in the BSA’s “Travel Rule” (i.e.,
Originator name/physical address/deposit
The term “payment transaction” in the definition of
account number, Originator’s depository
an International ACH Transaction is not a defined
institution name, payment amount, Receiver
term within the NACHA Operating Rules, but OFAC
name/address/account number, and the
has requested that NACHA provide guidance to the
Receiver’s financial institution), as requested by
ACH participants on the use of the term.
OFAC; and
Within the IAT definition, payment transaction
• containing OFAC Screening Indicators to aid
refers to
financial institutions in effective interdiction of
unlawful transactions.
• an instruction of a sender to a bank to pay,
or to obtain payment of, or to cause another
The identification of these payments as international
bank to pay or to obtain payment of, a fixed or
transactions and the inclusion of data elements
determinate amount of money that is to be paid
from “Travel Rule”, as well as the means to convey
to, or obtained from, a receiver, and
OFAC screening results, enable the RDFIs to
comply with OFAC compliance expectations.
• any and all settlements, accounting entries, or
disbursements that are necessary or appropriate
to carry out the instruction.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG83
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
The IAT definition classifies international United States for ACH payment transactions. Also
payments based on the geographical location known as a “Gateway Operator.”
of the financial agencies (financial institutions
or money transmitting businesses) involved in The IAT application incorporates, within the
the transaction, instead of on the location of the sections of the Rules addressing ODFI and Gateway
other parties to the transaction (e.g., Originator or obligations, specific rules and requirements
Receiver). For example, payment transactions that for each of these parties when exchanging IAT
start as wires or interbank transfers from abroad entries. Specifically, Article Two (Rights and
and are converted to ACH entries by a U.S. financial Responsibilities of ODFIs, Their Originators and
agency would be covered under this definition. Third-Party Senders) includes provisions governing
On the other hand, ACH entries originated from an ODFIs when originating IATs, and Article Five
account at a U.S. DFI based on instructions from (Rights and Responsibilities of Gateways for IAT
the account holder residing abroad would not be Entries) addresses Gateway responsibilities.
covered, unless the instructions were included
with funding in a SWIFT or proprietary message Gateway Obligations
sent from a foreign financial institution to the U.S. Article Five (Rights and Responsibilities of
DFI. Similarly, domestic ACH entries funded over Gateways for IAT Entries) includes the following
the counter at a U.S. DFI would be excluded, while specific obligations for Gateways:
a similar entry funded at a foreign bank would be
included. (See attached “ACH Payment Scenarios: • to obtain authorization from the ODFI or a
Domestic or International?” for more examples customer of the Gateway to originate IAT
of how the IAT definition would apply to various entries;
payment situations.)
• to enter into an agreement with the ODFI
This definition does not apply to transactions that or a customer of the Gateway in which the
may involve data received or processed offshore, ODFI or the Gateway’s customer instructs it to
where the processing entity is not a party to the receive Outbound IAT Entries on the ODFI’s
transaction and such processing is incidental to or customer’s behalf for re-transmission to a
and does not alter the terms of the transaction. foreign country;
In these cases, the offshore party does not have a
direct financial stake in the transaction through an • to notify the intended RDFI when it has blocked
account relationship or settlement obligation (e.g., and/or rejected any Inbound payment transaction
consolidated corporate treasury departments or because the origination of an Inbound IAT Entry
contracted third-party data processors). for such transaction would violate U.S. legal
requirements (effective September 21, 2012);
IAT =
• to transmit a timely ACH return entry for any
Payment + Financial Agency + U.S. ACH Network
Transaction (Outside the Use of the IAT SEC
Outbound IAT entry that is returned to it by the
(Instruction + Territorial code is required IF Foreign Gateway in accordance with the foreign
Settlement) Jurisdiction of the the transactions flow law or foreign payment system rules by which
United States) through the U.S. ACH
Network at some point the Gateway is bound;
Gateway means either an ACH Operator or a • to comply with U.S. laws and regulations.
Participating Depository Financial Institution that
acts as an entry point to or exit point from the
OG84 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
An ACH Operator acting as a Gateway also will be in understanding the parties and terminology
required to ensure that Inbound IAT entries are involved with an International ACH Transaction:
restricted to ACH credits only, with the exception
of reversals. Outbound IAT entries processed Foreign Correspondent Bank means a Participating
through an ACH Operator acting as a Gateway DFI in a foreign country that holds deposits
may be either credits or debits. owned by other financial institutions and provides
payment and other services to those financial
A Participating DFI acting as a Gateway is also institutions.
deemed to have assumed the responsibilities and
warranties of an ODFI (for Inbound IAT Entries) or Foreign Gateway Operator means a Gateway
an RDFI (for Outbound IAT Entries), pursuant to Operator that acts as an entry point to or exit point
Article Two (Rights and Responsibilities of ODFIs, from a foreign country.
Their Originators and Third-Party Senders) or
Article Three (Rights and Responsibilities of RDFIs IAT SEC Code
and Their Receivers), respectively. Participating The IAT application consolidates consumer and
DFIs acting as Gateways may originate both credit non-consumer international payments under the
and debit entries, inbound and outbound. same SEC code (IAT). Unlike the U.S., payment
formats used in other countries typically do not
Gateway vs. ACH Operator distinguish between consumer and business
The Federal Reserve provides a Gateway service transactions.
with its FedGlobal service. With this service, it
processes inbound IAT credit transactions, does The use of one SEC code for all international
an OFAC review of all inbound IAT transactions, payments requires ACH participants to treat
populates the OFAC Screening Indicator field, and international payments to consumer and business
reports the suspect transactions to OFAC. accounts in the same manner. As a result, the
longer timeframe associated with the return of
The Federal Reserve and EPN, as ACH Operators, unauthorized consumer transactions under the
will process all IAT transactions originated by DFIs Rules also applies to unauthorized entries to
as Gateways. They will perform all ACH Operator business accounts. Specifically, for Inbound IAT
edits on the IAT debit and credit transactions and entries, the return of any unauthorized IAT entry
deliver the IAT transactions to the RDFIs. The is required to be transmitted by the RDFI in such
ACH Operators will NOT do an OFAC review of time and manner that the return entry will be made
the IAT transactions. available to the ODFI/Gateway Operator no later
than the opening of the business on the banking
ODFI Obligations day following the sixtieth calendar day following
In addition to all other ODFI warranties and the settlement date of the original entry. (Note: For
obligations defined within Article Two (Rights and Outbound IAT entries, the time frames for return
Responsibilities of ODFIs, Their Originators and of an entry are determined by the payment system
Third-Party Senders), additional obligations for IAT rules of the foreign country and may exceed the
transactions relate to: (1) Originator authorization 60-day return window defined by the U.S. ACH
and agreement; (2) ODFI warranties for Outbound system.)
IAT entries with respect to compliance with U.S. law
and compliance with foreign payment system rules; Formatting Modifications
and (3) exceptions for Inbound and Outbound IAT Data Requirements
entries (refer to the NACHA Operating Rules for a The IAT format includes certain data elements
complete listing of exceptions). from the BSA’s “Travel Rule,” which is currently
required for wire transfers. The data elements
Identification of Participants in an IAT Entry listed below are included in the IAT format and
The following definitions are included in Article all fields correspond to the SWIFT message format
Eight of the Rules to assist ACH participants field lengths to allow for greater interoperability.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG85
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
• Name and physical address of the Originator The Foreign Correspondent Bank addenda record
is used only for inbound IAT transactions to
• Name and physical address of the Receiver identify any intermediary foreign bank involved in
(“Beneficiary”) the transactions between the foreign originating
bank and the U.S. Gateway Operator.
• Account number of Receiver
(Note: A maximum of twelve addenda records
• Identity of the Receiver’s bank may be transmitted with an IAT entry. Seven of
these addenda records are mandatory and contain
• Foreign Correspondent Bank(s) name, Bank ID the travel rule information identified above. Five
number and Bank Branch Country Code additional addenda records (i.e., remittance and
foreign correspondent bank detail) may also
Mandatory Addenda Records accompany each entry.)
Seven mandatory Addenda Records must accompany
each IAT entry in order to convey the information OFAC Screening Indicators
listed above. All information related to a particular The IAT format includes two optional, single-
ACH participant is grouped together within one character fields within the Entry Detail Record to
or more addenda records (e.g., information related convey the results of voluntary OFAC screening
to the Originator will be provided together within on the transaction. For Inbound IAT entries,
one or more addenda records). the first field is available to convey the results
of an OFAC screen by a Gateway Operator, and
Optional Addenda Records for a secondary screening indicator is available to be
Remittance Information used by a third-party service provider to convey
IAT entries accommodate the transmission of such screening results. A value of “0” indicates
optional remittance information. A maximum of that the party conducting the screening has not
two optional addenda records can accompany found a potential blocked party, as identified by
an IAT entry, within which a maximum of 160 OFAC on its list of Specially Designated Nationals
characters (80 characters per addenda record) (“SDN list”). A value of “1” indicates the potential
of remittance information can be included. This presence of a blocked party. The field must be
enables standard 4x35 remittance information in space-filled if no screening has been conducted.
a SWIFT message or Fedwire-formatted record These OFAC screening indicators assist RDFIs
to be included within an IAT entry. There are processing international payments with their
no formatting specifications for the optional compliance obligations by identifying entries that
remittance information except for those banking are highly suspect.
conventions that have been developed to carry
mandatory information for secondary SEC codes The Federal Reserve Bank’s Retail Payments Office,
identified in the Transaction Type Code field. on behalf of the Federal Reserve in its capacity of a
Gateway Operator, screens Inbound IAT entries for
Addenda Records for Foreign Correspondent OFAC compliance, as requested by OFAC. It advises
Bank Identification the RDFI, through the use of an OFAC Screening
A separate addenda record must be added to the Indicator, of potential issues and, subject to OFAC’s
payment for each Foreign Correspondent Bank that approval, utilizes FedLine Web to advise the RDFI
is involved with the transmission or exchange of an of Inbound IAT transactions that contain data
IAT entry. Any Foreign Correspondent Bank that appearing on the OFAC “SDN List.” The Electronic
is involved in an IAT transaction must be identified Payments Network (EPN), the private-sector ACH
within an addenda record, providing parties to the Operator, also makes available an OFAC screening
transaction with additional information needed function to its customer financial institutions as a
to identify and react to unlawful transactions. A value-added service.
maximum of five Foreign Correspondent Bank
addenda records may accompany an IAT entry. The OFAC Screening Indicator should only be used
as a reference and not the final determining factor
for OFAC compliance by the RDFI.
OG86 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
Returns and Notifications of Change on data obtained from the Gateway, changes
for International ACH Transactions related to other information carried within an
international payment are generally not applicable
IAT Returns
to international payments and are not supported
The seven mandatory addenda records that under the IAT application. NOCs related to IAT
accompany a forward IAT entry are required to entries have unique formatting requirements based
be transmitted with any IAT return entry. An IAT on data requirements associated with international
return is also required to include one additional payments, requiring development of a distinct set
addenda record within which specific information of formats (company/batch header record, entry
related to the return (such as return reason code, detail record, and addenda record) for these
original entry trace number, etc.) is included. NOC entries. NOCs related to IAT entries are
Addenda records related to Foreign Correspondent distinguished from domestic NOCs through the use
Banks and those containing remittance information of an “IAT Indicator” code within the Company/
are not copied for return to the Originator. Batch Header Record.
These IAT return formatting requirements differ Unlike the IAT return process, the seven mandatory
from domestic ACH return processing. For the addenda records, the remittance addenda records,
return of domestic transactions, addenda records and the Foreign Correspondent Bank addenda
transmitted with forward entries are not returned records transmitted with the forward IAT entry
by the RDFI, as they contain only remittance are not needed to process the NOC and are not
information and are not necessary to identify included. The transmission of Refused NOCs is
the original transaction or process the associated not supported by the IAT rules.
return. IAT addenda records, however, contain key
data related to the payment itself, and the return of (Note: For an Outbound IAT entry, where the RDFI
such information is needed to adequately identify resides in a foreign country, the rules governing
the original transaction and process the return. NOCs apply only to the extent that the NOC
process is supported by the payment system rules
Dishonored and Contested Dishonored Returns of the foreign receiving country. However, for
Not Permitted for IAT Entries an Inbound IAT entry, where the RDFI is a U.S.
Dishonored and Contested Dishonored Return financial institution, NOC rules apply as they do to
entries are not be permitted for use with IAT entries. other, domestic entries. Where a U.S. RDFI initiates
These domestic exception processes do not have an NOC in relation to an Inbound IAT entry, the
counterparts within foreign payments systems, Gateway is obligated (as of March 16, 2012) to
requiring issues beyond return of the original provide any corrected data contained within that
transaction to be resolved through channels other NOC to the Foreign Gateway within two banking
than the dishonor/contested dishonor process. days of the settlement date of the NOC.)
Information obtained from Gateways under the
prior cross-border process indicated that the Exemption from Rules Obligations –
volume of exception situations requiring additional IAT Processing and the Effect of Illegality
handling of returned entries was extremely low A Participating DFI must process each IAT entry
and that manual handling of such issues had been in accordance with all requirements of the NACHA
adequate in resolving problems related to these Operating Rules. A DFI is excused from its
payments. Based on this information, and on compliance with specific obligations under the
additional complexities involving foreign exchange Rules only when the processing of an IAT entry
conversion, the Rules prohibit IAT return entries would cause the DFI to be in violation of U.S.
from being dishonored or contested. law. The DFI must, therefore, comply with its
obligations under the NACHA Operating Rules, and
IAT Notifications of Change any other legal requirements related to the Entry,
RDFIs can transmit changes related to routing unless it identifies an IAT as a suspect transaction.
numbers and account numbers for IAT entries via For domestic RDFIs that receive inbound IATs,
the Notification of Change (NOC) process. Based these obligations include, but are not limited
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG87
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
to, the timely provision of funds and the timely When a financial institution credits a
transmission of returns. beneficiary’s account with the proceeds
of a transaction that is in violation of
A suspect transaction, for purposes of OFAC OFAC regulations, it has committed a
compliance5, is one that potentially involves or violation by processing the transaction
relates to a “specially designated national” (SDN) forward. The consequences of the
or “blocked party,” and requires more detailed violation can be mitigated if the
examination by the Participating DFI to determine institution is able to prevent the
whether the entry violates OFAC sanctions. For beneficiary’s access to the funds until
these suspect entries only, the Rules, through the OFAC screening is completed, or is
the effect of illegality provision, excuse the otherwise able to recover the funds prior
Participating DFI from its obligations to comply to their being used by the beneficiary.”
with any provision of the Rules, such as crediting
or debiting an account, if such compliance is A copy of OFAC’s letter can be found on the
inconsistent with U.S. law. IAT Resource page on the NACHA website at
www.nacha.org
Following the implementation of the IAT
application, NACHA received reports that some ACH PAYMENT SCENARIOS:
domestic RDFIs were liberally applying the DOMESTIC OR INTERNATIONAL?
provision on the effect of illegality. In these cases,
Several scenarios are provided below to better
RDFIs assumed that, solely because entries were
understand when a specific payment transaction
coded as IATs (and not because the entries were
involving the U.S. ACH Network should be
suspect transactions), they did not have to meet
deemed an International ACH Transaction (IAT)
the requirements of the Rules (including, but not
or a domestic ACH transaction. In all scenarios,
limited to, timely provision of funds or returns).
the location of the financial agencies involved
This is inconsistent with the requirements of the
in the settlement of the transaction is the key
Rules and, as with any other infraction of the
determining factor. The term “financial agency” is
Rules, can subject the DFI to enforcement action
primarily intended to mean a depository financial
through the National System of Fines.
institution, but it also covers money transmitting
businesses to the extent they are involved in the
Timing of OFAC Screening of IAT Transactions
payment transaction.
NACHA has received reports that some RDFIs do
not screen IAT entries for OFAC compliance prior While the scenarios described below represent an
to posting them to the Receiver’s account. In some assessment of situations that are likely, they are
cases, this is due to system or software constraints not all-inclusive as to the types of transactions and
at the RDFI. NACHA contacted OFAC requesting situations that might give rise to a determination of
comment on this practice and received a letter an IAT or a domestic ACH transaction. Domestic
from OFAC (GEN-594137) stating its position. In transactions are listed in scenarios A, B, C/D,
the letter, OFAC states: and part of the transactions for scenario F. IAT
transactions are listed in scenarios C/D - Alternatives
“It is OFAC’s position that a financial 1 & 2, E, G, H and part of the transactions for
institution that performs its OFAC scenario F.
screening after having credited a
beneficiary’s account increases its OFAC Each scenario involves defined parties as recognized
risk substantially. in the NACHA Operating Rules that govern IATs
under the IAT SEC code.
5
his is for information purposes only, and is not intended to provide
T
legal advice. Readers should seek advice from legal advisors with
regard to their obligations under programs administered by the U.S.
Department of the Treasury’s Office of Foreign Assets Control.
OG88 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
A U.S.-domiciled company with 500 U.S.- Domestic transactions, formatted as PPD transactions
resident employees is a subsidiary of an offshore
multinational corporation with its headquarters in
Europe. Revenues are generated through domestic Scenario B – Payroll:
business activities of the U.S.-domiciled company. A U.S.-domiciled company with 500 U.S.-
resident employees is a subsidiary of an offshore
Twice monthly, the U.S.-domiciled company multinational corporation (the parent company).
sends payroll payment instructions for all 500 U.S. The parent company has centralized many of
employees in a single file to its New York bank the global treasury, human resources, and data
where it holds an account. processing functions of its global subsidiaries
(including the U.S. subsidiary) at its headquarters
Upon receipt of the payroll information from in Europe.
the U.S.-domiciled company, the New York bank
executes the following payment transactions: Twice monthly, the U.S. subsidiary sends the parent
company any changes to employee status, salaries,
• Originates an ACH file of 420 credit entries to hours, etc. Also, twice monthly, after updating
pay 420 of its employees on settlement date, with its central HR records, the parent company sends
an offsetting book-entry debit to the company’s payroll payment instructions for all U.S. employees
account at the New York bank totaling the sum in a single file to its New York bank on behalf
value of all 420 credit entries; of the U.S. subsidiary, which holds an account
with the New York bank. Funding for payroll is
• Prints and ships to the company 80 payroll generated through business activities of the U.S.
checks (and 500 payroll stubs), drawn on the subsidiary.
company’s U.S. bank account at its New York
bank, to pay those U.S. employees not on Direct The New York bank receives the U.S. subsidiary’s
Deposit. payroll file from the parent company, and executes
the following:
Result – Domestic or IAT?
All 420 ACH credits and the single, offsetting debit • Originates an ACH file of 420 credit entries to
in this scenario would be domestic transactions pay 420 U.S. employees on settlement date,
and not IATs (the credits would be PPD entries; with an offsetting book-entry debit to the U.S.
the debit typically would be an on-us DDA entry). subsidiary’s account at its New York bank
This is because the New York bank and the RDFIs totaling the sum value of all 420 credit entries;
holding the employees’ accounts are the only
financial agencies involved in the transactions • Prints and ships to the U.S. subsidiary 80 payroll
and they are all in the territorial jurisdiction of checks (and 500 payroll stubs), drawn on the
the U.S. subsidiary’s U.S. account at its New York bank
to pay those U.S. employees not on Direct
Deposit.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG89
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
Result – Domestic or IAT? Upon receipt of the payroll file for the U.S.
All 420 ACH credits and the single, offsetting debit subsidiary from the parent company, the European
in this scenario would be domestic transactions bank instructs the bank in New York via a SWIFT
and not IATs (the credits would be PPD entries; message (or proprietary system) to execute the
the debit typically would be an on-us DDA entry). following payment transactions:
This is because the New York bank and the RDFIs
holding the employees’ accounts are the only banks • Originate an ACH file of 420 credit entries to
involved in the transactions. No financial agencies pay 420 U.S. employees on settlement date,
located outside of the territorial jurisdiction of the with a debit to the U.S. subsidiary’s account at
U.S. are involved in the payment transactions. its New York bank totaling the sum of all 420
credit entries;
OG90 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
• Credit its correspondent account at the New Upon receipt of the payroll file for the U.S.
York bank on behalf of its U.S. subsidiary; subsidiary from the parent company, the European
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG91
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
bank instructs its correspondent bank in New York company). The parent company has centralized
via a SWIFT message (or proprietary system) to many of the global treasury, human resources, and
execute the following: data processing functions of its global subsidiaries
(including the U.S. subsidiary) at its headquarters
• Debit the European bank’s correspondent in Europe.
account at the New York bank in the amount of
the sum of all 500 payroll payments and credit All invoices for the U.S. subsidiary are sent to
an account of the U.S. subsidiary for the payroll the parent company for processing and payment.
file; Twice monthly, the parent company originates
a file to its European bank to pay outstanding
• Originate an ACH file of 420 credit entries to invoices for their U.S. subsidiary. The European
pay 420 U.S. employees on settlement date, with bank instructs a New York bank via a SWIFT
a debit to the account of the U.S. subsidiary message (or proprietary system) to execute
payroll settlement account at the New York bank payment transactions on behalf of the parties. As
totaling the sum value of all 420 credit entries; in Scenario C and its alternatives, the payment
instructions and related funding transactions may
• Print and ship to the U.S. subsidiary 80 payroll vary.
checks (and 500 payroll stubs), drawn on the
New York bank for the U.S. subsidiary, to pay Result – Domestic or IAT?
those U.S. employees not on Direct Deposit. This scenario and its various alternatives in terms
of location of parties, funding and types of payment
Result – Domestic or IAT? instructions are identical to Scenario C with the
All 420 credit transactions would be IATs and not exception that the payments are commercial
domestic. This is because the European bank is a in nature and not consumer. Therefore, the
foreign financial institution that is involved in the determination of whether the commercial ACH
payment transaction in a number of ways. The transactions are domestic or IATs is the same.
European bank, which is the Originator’s bank, is
part of the settlement of the transaction with the
Simplified Scenario D –
New York bank by sending and funding the SWIFT
Vendor Payments
message through correspondent banking.
• Vendor payments would follow the logic associated with Scenarios
A, B, & C listed above.
Simplified Scenario C Alternative 1 and 2 – • See simplified scenarios above.
U.S. Subsidiary of an Offshore
Multinational Corporation
Scenario E – ACH Debits for Payments
• U.S. domiciled company
to Foreign Receivers:
• Direct funding for the payroll file from the parent company through
a foreign financial agency outside the territorial jurisdiction of the An offshore bank provides a service allowing
United States. Persons in the U.S. to send funds easily and
• Payroll information, whether in SWIFT message, ACH file format,
economically to relatives or other Persons in the
or proprietary format tied to the specific funding is sent to the
companies U.S. bank. offshore bank’s country of domicile. The Person
• All employees’ ACH deposits are being sent to banks within using the service (Originator) logs onto a website
the territorial jurisdiction of the United States through the ACH and instructs the offshore bank (Originating Bank)
Network.
to make a payment to anyone in that country. The
International transactions, formatted as IAT transactions Originator keys the following information into
the website: Receivers name, physical address,
banking information, and the Originator’s own
Scenario D – Vendor Payments: routing and transit number and account number
A U.S.-domiciled company is a subsidiary of of its domestic bank and physical address. The
an offshore multinational corporation (parent offshore bank originates a SWIFT payment
OG92 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG93
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
to pay those U.S. and offshore retirees not on Scenario G – ACH Credit Payments to
Direct Deposit. Foreign Receivers:
An offshore bank provides a service allowing
Result – Domestic or IAT? companies in the U.S. to send funds easily and
Four hundred of the 420 ACH credits and the single, economically to companies in its country of
offsetting debit in this scenario would be domestic domicile. The offshore bank holds a correspondent
transactions and not IATs (the credits would be account with a New York bank that can receive
PPD entries; the debit typically would be an on-us ACH credit entries (with remittance data), with the
DDA entry) because there are no foreign financial offshore company as ultimate Receiver. At the end
institutions involved in the transactions. Both the of the daily processing cycle, the New York bank
Originator’s bank in Kansas City and the Receivers’ sends to the offshore bank (1) a wire in the amount
banks are within the territorial jurisdiction of of the aggregate of the credits received/settled that
the U.S. day, and (2) an EDI file with the individual entry
detail and remittance information. This enables
However, the 20 ACH entries to U.S. accounts for the offshore bank to reconcile the settlement wire
further crediting to offshore retirees would be down to the customer level and provide each
IATs and not domestic, as they would all require customer the requisite remittance detail for his or
an offshore bank to credit the Receivers’ accounts. her individual payments.
It is the employer’s obligation to understand the
legal domicile of its retirees and inquire whether Result – Domestic or IAT?
they hold accounts in U.S. banks or with offshore All of the ACH credits received by the New York
financial institutions. The employer would have bank on behalf of the offshore bank would be
to recognize the need to provide the relevant IAT and not domestic since the offshore bank
information to the U.S. bank to facilitate origination holds accounts that would be credited as part of
of properly formatted IAT entries to its offshore the transactions. Therefore, the offshore bank’s
retirees. Because the Receivers’ accounts are held offshore customers should instruct their U.S.
with offshore banks, despite being destined to U.S. trading partners to originate ACH entries using the
bank accounts, the transactions would be IATs. IAT SEC code.
OG94 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
– N
otify the Foreign Gateway Operator that
the debit entry has been rejected and is in
INBOUND IAT DEBIT PROCESSING violation of U.S. law.
PROCEDURES
– Notify OFAC within 10 business days
OFAC has provided NACHA with specific
requirements and expectations regarding the – P
rovide a copy of the payment transaction
handling of inbound IAT debit transactions. Under to the RDFI and advise it that the transaction
these requirements, a Gateway Operator that destined for one of its customers has been
identifies the presence of a blocked party in an rejected.
inbound IAT debit will cease processing the entry,
and take several additional steps to report the Note: Under these processing guidelines, a
violation to OFAC, the Foreign Gateway Operator, Gateway Operator will not send IAT debits to the
and the RDFI. ACH Operator when there is a “1” in the OFAC
Screening Indicator field. All suspect transactions
ODFI/Gateway Operator Responsibilities for either will be cleared or will have their processing
Inbound IAT Debit Transactions ceased.
A financial institution acting as a Gateway Operator RDFI Responsibilities for Inbound IAT
(ODFI) for Inbound IAT debit transactions Debit Transactions
should: RDFIs should recognize that they may receive IAT
debit transactions and be prepared in advance to
1. Review all Inbound IAT debit transactions for handle the IAT debits. The RDFI for Inbound IAT
OFAC compliance, including all parties to the debit transactions should:
transaction and all remittance data;
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG95
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
4.
For a suspect transaction cleared by an • All financial institutions should have a written
investigation, post normally; OFAC compliance policy.
For a suspect transaction confirmed as an OFAC
• If a financial institution contracts with a third-
hit – contact OFAC directly. The Gateway Operator
party provider to do the actual OFAC review of
may have missed this transaction or the OFAC list
the transactions, a financial institution cannot
may have been revised. OFAC will handle these
contract away its liability for OFAC compliance.
situations on a case-by-case basis.
For additional information on OFAC
If the RDFI receives notification from the Gateway
Compliance, see Chapter Three (OFAC
Operator that a transaction has been rejected,
Requirements and Obligations) of these
this information should be included in any AML
Guidelines.
evaluation of the customer by the financial
institution. Information on rejected transactions
is being provided to the RDFI by the Gateway IAT MAPPING
Operator at the request of OFAC. The following example of Scenario F (which
is discussed earlier in this chapter) is provided
NOTE: Under these processing guidelines, an to assist ACH participants in understanding the
RDFI should not receive IAT debits in which there mapping of mandatory data elements into the IAT
is a “1” in the OFAC Screening Indicator field. addenda record structure. Complete formatting
This does not relieve the RDFI of its obligation to requirements and technical specifications for the
screen IAT debits that it receives. IAT transaction can be located within the NACHA
Operating Rules, and a chapter on mapping the full
OFAC REQUIREMENTS FOR FINANCIAL IAT format is included in the IAT Survival Guide.
INSTITUTIONS
Example: Outbound Pension/Credit Transfer
OFAC has been very clear in its expectations of
financial institutions with respect to the IAT
Scenario F – Pension Payments
entries. In a letter from R. Richard Newcomb,
Director, Office of Foreign Asset Control dated Peanut Company makes pension payments to
March 9, 2004, OFAC stated that, for Inbound 400 U.S.-resident retirees and 50 retirees residing
IAT entries, “U.S. RDFIs and beneficiaries will offshore. Twice monthly, Peanut Company sends
continue to have an obligation to ensure that all pension payment instructions for 400 retirees in a
aspects of inbound, cross-border transactions are single file to Bank of Bluemont, where it holds an
in compliance with OFAC regulations and to take account. Upon receipt of the pension information
appropriate steps to investigate, suspend, reject, from Peanut Company, Bank of Bluemont executes
block, and report on transactions as necessary.” the following payment transactions:
For Outbound IAT entries, the “U.S. ODFIs and
• Originates an ACH file of 400 credit entries to
their Originators will continue to be responsible
pay 400 U.S. retirees on settlement date, with an
for ensuring that all parties to the transactions, as
offsetting debit entry to the Peanut Company’s
well as the underlying purpose of the transactions,
account at the Bank of Bluemont for the total of
are not in violation of OFAC regulations, and they
the sum value of all 400 credit entries.
will need to take appropriate steps to investigate,
suspend, reject, block, and report on transactions.”
• For the 50 retirees residing offshore, Peanut
Company uses three payment methodologies:
OG96 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG97
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13
Field
Inclusion
Requirement M R M M M O M M M M O O O
UPPER
CASE A-Z
Contents
NUMERIC
‘1’ Numeric bTTTTAAAAC bTTTTAAAAC YYMMDD HHMM 0-9 ‘094’ ‘10’ ‘1’ Alphameric Alphameric Alphameric
Length 1 2 10 10 6 4 1 3 2 1 23 23 8
Position 01-01 02-03 04-13 14-23 24-29 30-33 34-34 35-37 38-39 40-40 41-63 64-86 87-94
BANK OF
EXAMPLE
‘1’ 01 051000033 34567891 091102 0935 A ‘094’ ‘10’ ‘1’ TCB SERVICES BLUEMONT
File Header Record – Original Entry File Creation Date and File Creation Time
The File Creation Date is ‘091102,’ the date on
Key Fields: which the file is prepared by Bank of Bluemont.
The File Creation Time is 0935, representing the
Immediate Destination time in hours and minutes that the creation or
The Immediate Destination Field identifies the exchange took place.
party to which the file is being delivered. In
Scenario F, this field contains the Routing Number File ID Modifier
of the ACH Operator – TCB Services. The File ID Modifier is ‘A’ because it is the first file
that Trust Bank is delivering to its ACH Operator
Immediate Origin (TCB Services) on November 2nd. Subsequent
The Immediate Origin Field identifies the sender files, if any, would be labeled ‘B,’ ‘C,’ etc. The File
of the file. In this example, this field contains the ID Modifier, coupled with the File Creation Date
Routing Number of the ODFI – Bank of Bluemont. and Time, can be used by the ODFI, along with
other information, to trace the file.
OG98 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
FIELD 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
GO
FOREIGN ISO STANDARD ISO ISO IDENTIFICATION/
DATA RECORD SERVICE FOREIGN EXCHANGE FOREIGN DESTINATION ENTRY COMPANY ORIGINATING DESTINATION EFFECTIVE SETTLEMENT ORIGINATOR ORIGINATING
ELEMENT TYPE CLASS IAT EXCHANGE REFERENCE EXCHANGE COUNTRY ORIGINATOR CLASS ENTRY CURRENCY CURRENCY ENTRY DATE STATUS DFI BATCH
NAME CODE CODE INDICATOR INDICATOR INDICATOR REFERENCE CODE IDENTIFICATION CODE DESCRIPTION CODE CODE DATE (JULIAN) CODE IDENTIFICATION NUMBER
Field
Inserted by
Inclusion M M O M R R M M M M M M R M M M
ACH Operator
Requirement
Contents ‘5’ Numeric Alphameric Alphameric Numeric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric Alphameric YYMMDD Numeric Alphameric TTTTAAAA Numeric
Length 1 3 16 2 1 15 2 10 3 10 3 3 6 3 1 8 7
Position 01-01 02-04 05-20 21-22 23-23 24-38 39-40 41-50 51-53 54-63 64-66 67-69 70-75 76-78 79-79 80-87 88-94
Example ‘5’ 200 FF 3 ES 395468717 IAT PENSION USD USD 091103 1 34567891 0000001
When the ODFI has a contractual relationship with ISO Destination Country Code, ISO Originating
a Third-Party Sender rather than the Originator Currency Code, and ISO Destination Currency
itself, the value of this field may identify either the Code
Originator or the Third-Party Sender. Refer to the International Organization for
Standardization’s website at www.iso.org for ISO
currency and country code values.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG99
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
FOREIGN
RECEIVER’S GATEWAY
GO NUMBER ACCOUNT OPERATOR SECONDARY
DATA RECORD IDENTIFICATION/ OF NUMBER/ OFAC OFAC ADDENDA
ELEMENT TYPE TRANSACTION RECEIVING DFI CHECK ADDENDA DFI ACCOUNT SCREENING SCREENING RECORD TRACE
NAME CODE CODE IDENTIFICATION DIGIT RECORDS RESERVED AMOUNT NUMBER RESERVED INDICATOR INDICATOR INDICATOR NUMBER
Field
Inclusion M M M M M N/A M M N/A O O M M
Requirement
Contents ‘6’ Numeric TTTTAAAA Numeric Numeric Blank $$$$$$$$¢¢ Alphameric Blank Alphameric Alphameric Numeric Numeric
Length 1 2 8 1 4 13 10 35 2 1 1 1 15
Position 01-01 02-03 04-11 12-12 13-16 17-29 30-39 40-74 75-76 77-77 78-78 79-79 80-94
34567891
EXAMPLE
‘6’ 22 12345678 0 0007 0000105000 450200051332 1 0000367
Entry Detail Record – Original Entry Gateway Operator OFAC Screening Indicator
Key Fields: This field indicates the results of a Gateway
Operator screen for OFAC compliance. A value of
Transaction Code ‘0’ indicates that the Gateway Operator has not
found a potential blocked party, as identified by
The transaction code is used to direct the payment
OFAC on its list of Specially Designated Nationals
to a specific type of account (i.e., checking, savings,
(SDN list). A value of ‘1’ indicates the potential
loan, or general, ledger) and indicates whether the
presence of a blocked party. On an Outbound IAT
payment is a debit or credit. In this example, a
Entry, this field will be left blank.
‘22’ indicates a credit to the pensioner’s checking
account.
Trace Number
GO Identification/Receiving DFI Identification The Trace Number is assigned by the ODFI in
ascending sequence and uniquely identifies
For Outbound IAT Entries, this field contains the
each entry within a batch. The first eight digits
Routing Number of the U.S. Gateway Operator.
of the Trace Number are always the Routing
In this example, this field contains the routing
Number of the Gateway Operator/ODFI entering
number of Trust Bank, which is acting as the
the transaction into the Network. In association
Gateway Operator.
with the File Creation Date, File ID Modifier,
and other information, the Trace Number can be
Foreign Receiver’s Account Number/
used to trace an entry through the ACH Network.
DFI Account Number
Throughout the entire processing cycle (from GO/
For Outbound IAT Entries, this field contains ODFI to RDFI), the Trace Number is retained with
the foreign Receiver’s account number. In this the entry record. The Trace Number is critical in
example, this field contains Susan Smith’s account routing return entries and notifications of change
number at BBVA in Spain, ‘450200051332.’ back to the ODFI through the ACH Network.
Amount
This field contains the dollar amount of the entry in
U.S. dollars.
OG100 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
Field
Inclusion M M R R O M N/A M
Requirement
Length 1 2 3 18 22 35 6 7
First IAT Addenda Record – Original Entry Receiving Company Name/Individual Name
This field contains the name of the Receiver. In
Key Fields: this example, this field identifies the pensioner,
Susan Smith.
Transaction Type Code
This field contains a three-character code used to Entry Detail Sequence Number
identify the type of transaction. In this example, This field contains the ascending sequence number
this field contains ‘PEN’ to identify a pension section of the Entry Detail Record’s trace number.
payment. This number is the same as the last seven digits
of the trace number of the related Entry Detail
Foreign Payment Amount Record. In this example, the entry detail sequence
For Outbound IAT Entries originated using a Foreign number is ‘0000367.’
Exchange Indicator of “FV” (fixed-to-variable), this
field is zero-filled. For Outbound IAT Entries using
a Foreign Exchange Indicator of “VF” (variable-to-
fixed) or “FF” (fixed-to-fixed), this field contains
the amount for which the entry is to be received by
the Foreign Receiver in the currency denomination
expressed in the ISO Destination Currency Code
Field of the Company/Batch Header Record. In
this fixed-to-fixed example, this is the amount of
the credit to Susan Smith’s account in US dollars.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG101
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
Field
Inclusion M M M M N/A M
Requirement
Length 1 2 35 35 14 7
Field
Inclusion M M M M N/A M
Requirement
Length 1 2 35 35 14 7
Second and Third IAT Addenda Records – the backslash should immediately follow the last
Original Entry known data element (e.g., ‘ATLANTA\’). When the
missing data element occurs before another data
Key Fields:
element — in this example, if the city were not
available — an asterisk should be used as a place
Originator Name
holder for the missing data element, followed by
This field contains the name of the Originator of
the next data element (e.g., ‘*GA\’.)
the transaction, Peanut Company.
Originator Country and Postal Code
Originator Street Address
This field identifies Peanut Company’s country
This field contains Peanut Company’s physical
and postal code, ‘US*30666\’. Data elements must
street address, ‘8916 Riverbend Road.’
be separated by an asterisk and must end with a
backslash.
Originator City and State or Province
This field contains the city and, if applicable, the Note: Where the country is known but the postal
state or province of the Originator. Asterisks must code is unavailable, the country should appear,
be used to separate the data elements, and the last immediately followed by a backslash (e.g., ‘US\’).
data element must be followed by a backslash. Where the country is not available but the postal
This example identifies ‘ATLANTA*GA\’ for the city code is present, an asterisk should be used as a
and state in which Peanut Company is located. place holder, followed by the postal code and
backslash (e.g., ‘*30666\’).
Note: In some cases, a defined data element may
be unknown or may not be applicable. When
the missing data element occurs last — in this
example, if no state or province were available —
OG102 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
Field
Inclusion M M M M M M N/A M
Requirement
Length 1 2 35 2 34 3 10 7
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG103
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
RECEIVING RECEIVING
DATA RECEIVING DFI IDENTIFICATION DFI ENTRY DETAIL
ELEMENT RECORD TYPE ADDENDA TYPE DFI NUMBER RECEIVING DFI BRANCH SEQUENCE
NAME CODE CODE NAME QUALIFIER IDENTIFICATION COUNTRY CODE RESERVED NUMBER
Field
Inclusion M M M M M M N/A M
Requirement
Length 1 2 35 2 34 3 10 7
OG104 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
Field
Inclusion M M O M N/A M
Requirement
Length 1 2 15 35 34 7
Field
Inclusion M M M M N/A M
Requirement
Length 1 2 35 35 14 7
Sixth and Seventh IAT Addenda Records – Receiver City and State or Province
Original Entry This field contains the city and, if applicable, the
state or province of the Receiver. Asterisks must
Key Fields: be used to separate the data elements, and the last
data element must be followed by a backslash.
Receiver Identification Number This example identifies ‘BARCELONA\’ as the city
This field may be used by the Originator to insert its in which Susan Smith resides. In this example, no
own number for tracing purposes. In this example, province is indicated for the city of Barcelona.
“SM18362-28” is Susan Smith’s identification
number at Peanut Company. Receiver Country and Postal Code
This field identifies Susan Smith’s country code,
Receiver Street Address ‘ES*28001\’.
This field contains the Receiver’s (Susan Smith’s)
physical street address, ‘14 CALLE DE CORTEZ.’
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG105
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
FIELD 1 2 3 4 5 6 7 8 9 10 11
Field
Inclusion
Requirement M M M M M M R O N/A M M
Contents ‘8’ Numeric Numeric Numeric $$$$$$$$$$¢¢ $$$$$$$$$$¢¢ Alphameric Alphameric Blank TTTTAAAA Numeric
Length 1 3 6 10 12 12 10 19 6 8 7
Position 01-01 02-04 05-10 11-20 21-32 33-44 45-54 55-73 74-79 80-87 88-94
Example ‘8’ 200 0000008 0012345678 000000000000 000000105000 395468717 34567891 0000367
Company/Batch Control Record – Total Debit and Credit Entry Dollar Amounts
Original Entry The Total Debit and Credit Entry Dollar Amount
fields contain accumulated Entry Detail debit and
Key Fields: credit totals within a given batch. In this example,
the Total Credit Entry Dollar Amount is $1050.00,
Entry/Addenda Count and the Total Debit Entry Dollar Amount is $0.00
The Entry/Addenda Count Field is a tally of each because no debits were originated within the
Entry Detail and Addenda Record processed within batch.
the batch. In this example, one Entry Detail Record
and seven Addenda Records were used. Company Identification
This field conveys the same information that is
Entry Hash contained within the Originator Identification
This field is prepared by hashing the 8-digit Field of the Company/Batch Header Record.
Routing Number in each entry. The Entry Hash
provides a check against inadvertent alteration of Originating DFI Identification
data contents due to hardware or program failure. The Originating DFI Identification Field carries
the same information that is carried in the GO
Identification/Originating DFI Identification Field
of the Company/Batch Header Record.
OG106 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
FIELD 1 2 3 4 5 6 7 8
Field
Inclusion
Requirement M M M M M M M N/A
Length 1 6 6 8 10 12 12 39
File Control Record – Original Entry Total Debit and Credit Dollar Amount in File
The Total Debit and Credit Entry Dollar Amounts
Key Fields: Fields contain accumulated Entry Detail debit and
credit totals within the file. In this example, the
Batch Count
Total Debit Entry Dollar Amount is $0.00, and the
The value of the Batch Count Field is equal to the Total Credit Entry Dollar Amount is $1050.00.
number of Company/Batch/Header Records in the
file. In this example, the value is ‘1.’
Entry Hash
This field is prepared by hashing the RDFI’s 8-digit
Routing Number in each entry. The Entry Hash
provides a check against inadvertent alteration of
data contents due to hardware or program failure.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG107
SECTION V – Standard Entry Class Codes
C H A P T E R 4 3 I N T E R N AT I O N A L A C H PAY M E N T S
OG108 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
CHAPTER 44 POINT OF PURCHASE ENTRIES
• Check Digit – The check digit for BBVA Miami’s A Point of Purchase Entry (POP) is a Single-Entry
routing number (rather than Trust Bank’s) is ACH debit originated based on an eligible source
identified within this field. document provided to an Originator by a Receiver
at the point-of-purchase or manned bill payment
• Foreign Receiver’s Account Number/DFI location for conversion at that location. This
Account Number – This field contains a application provides Originators with an alternative
domestic account number at BBVA Miami to processing Receivers’ checks as the method of
rather than Susan’s BBVA account number in payment. This chapter addresses issues relating to
Barcelona, Spain. the origination and receipt of POP Entries.
Fifth IAT Addenda Record POP entries are considered to be ACH entries
from start to finish, with the Receiver’s check used
• Receiving DFI Name – This field contains the
by the Originator solely as a source document
name of the Receiving DFI holding the Receiver’s
for the Receiver’s routing and account number
account. In Scenario F-2, this field identifies the
information. Such transactions are not considered
name of the domestic RDFI (BBVA Miami) rather
to be truncated checks and do not fall under
than BBVA in Spain.
the requirements of check law or the Uniform
Commercial Code for the following reasons:
• Receiving DFI Identification Number Qualifier –
This field contains ‘01’ to identify BBVA Miami’s
1. the check is not accepted by the merchant as a
identification number as National Clearing
negotiable instrument; and
Number (US routing number) rather than BBVA
Spain’s IBAN.
2. the check is not negotiated by the merchant or
accepted into the check collection system.
• Receiving DFI Identification – This field contains
the bank identification number of the DFI at
which the Receiver maintains his account. For INITIATING A POP ENTRY —
Outbound IAT Entries, this field contains the AN OVERVIEW
bank identification number of the foreign RDFI. • An Originator provides notice that a check
In this example, this field is populated with received for payment will be converted to an
BBVA Miami’s routing number.’ electronic funds transfer.
• Receiving DFI Branch Country Code – This field • To initiate a POP entry, the Receiver must present
is populated with the value ‘US’ to identify the an eligible source document (check) that has
United States as the country in which the RDFI, not been previously voided or negotiated to the
BBVA Miami, is located. Originator at time of payment, usually at a cash
register or other checkout location.
Note: For Scenario F-3, the contents of all other
records comprising the IAT Entry (Addenda – The check need not be completed or signed
Records 1-4, 6, and 7) remain unchanged from by the Receiver.
those illustrated in Scenario F-1.
• The Originator must use a check reading device
to capture MICR information from the check
(i.e., routing number, account number, and
serial number), which is used by the Originator
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG109
SECTION V – Standard Entry Class Codes
CHAPTER 44 POINT OF PURCHASE ENTRIES
The Rules governing POP entries define specific – The source document may not have been used
eligibility requirements and limits on the types of for a prior POP entry.
source documents that may be converted.
• The Originator must retain the original or a copy
For a detailed list of eligibility criteria for of the Receiver’s authorization for two years
check conversion entries, refer to the Source from the Settlement Date of the POP entry.
Document Eligibility Charts in Appendix E of
these Guidelines, or to the definition of Eligible – Upon receipt of an RDFI’s written request, the
Source Document in Article Eight of the Rules. ODFI must provide such copy to the RDFI
within ten banking days. Originators must
ACH DATA SECURITY REQUIREMENTS be prepared to provide such copies to their
The NACHA Operating Rules impose specific data ODFIs for this purpose.
security requirements for all ACH transactions that
involve the exchange or transmission of banking • The Originator must provide the Receiver a
information (which includes, but is not limited to, receipt containing the following information for
an entry, entry data, a routing number, an account each POP entry to the Receiver’s account.
number, and a PIN or other identification symbol)
1. Originator name
via an Unsecured Electronic Network.
2. Company/third-party service provider phone
ACH participants must abide by these
number for inquiries
requirements which are discussed in detail in
Chapter 4 of these Guidelines.
3. date of transaction
OG110 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
CHAPTER 44 POINT OF PURCHASE ENTRIES
10. merchant identification number At the Originator’s discretion, the receipt and the
authorization required for POP Entries may be
11.
Receiver’s financial institution routing provided to the Receiver on the same document or
number on different documents
12. Receiver’s truncated account number Note: Originators should be aware that some
Receivers may choose to opt out of check conversion
13. Receiver’s truncated identification number activity by declining to sign a written authorization
at the point of purchase. In other cases, Receivers
– The Originator must not place the Receiver’s may have chosen to opt out of check conversion
complete account number or complete activity by having their checks reprinted to include
identification number on the receipt an Auxiliary On-Us Field in the MICR line. In both
of these situations, Originators may not convert
14. Transaction reference number the check to a POP entry and are encouraged to
work with these customers to establish alternative
• The Originator must employ commercially payment methods.
reasonable methods to securely store all banking
information relating to POP entries.
Collection of Return Fees
For more information on agreements, refer to An Originator desiring to use the ACH Network
Chapter 15 within these Guidelines. to collect a Return Fee from a Receiver must
originate a separate Return Fee Entry using the
appropriate Standard Entry Class Code and must
Authorization/Notification Requirements
follow all rules governing the origination of Return
Originators are required to provide notice to the Fee Entries. For specific information on Return Fee
Receiver and to obtain a written authorization Entries, please refer to Chapter 54 in the Special
from the Receiver to satisfy the authorization Topics section of these Guidelines.
requirement for a POP entry. The provision of
the notice by the Originator to the Receiver, Originators need to be aware that the requirements
the receipt of the source document and the of the NACHA Operating Rules regarding the
written authorization from the Receiver together origination of Return Fee Entries are in addition to
constitute authorization for the POP entry. The
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG111
SECTION V – Standard Entry Class Codes
CHAPTER 44 POINT OF PURCHASE ENTRIES
any requirements required by applicable state law leftmost position of the Check Serial Number field,
governing Return Fees. Originators are responsible and any unused spaces within the field must be
for determining what the applicable state laws are, left blank.
if any, for each of their check-accepting locations
that intend to, or may, use the POP application. Thus, for check number 1234:
OG112 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
CHAPTER 44 POINT OF PURCHASE ENTRIES
of the POP Entry Detail Record. This information In these three circumstances, the RDFI requires the
is used to identify the location of the electronic Receiver to sign or similarly authenticate a written
terminal used to originate the POP entry. statement of unauthorized debit prior to being re-
credited for the transaction.
Return of Point of Purchase Entries
POP entries are governed by the same Return Returns for Improper Source Documents or
Reasons and Return Reason Codes as other ACH When Both POP Entry and Source Document
debit entries. Have Been Presented
With respect to POP entries based on improper
A complete listing of Return Reason Codes source documents or where both the POP entry
can be found in Appendix Four of the NACHA and the source document have been presented
Operating Rules. for payment, an RDFI may return such entries in
either of two ways:
In addition, some special circumstances can apply,
as described below. 1. An RDFI (rather than the Receiver) determines
that a POP entry was based on an improper
Return by ACH Operator source document, or that the entry and the
POP entries are limited to dollar amounts of source document were both presented for
$25,000 or less. Any POP entry originated in an payment, may return the entry using Return
amount greater than $25,000 will be returned by Reason Code, R39 (Improper Source Document/
the ACH Operator. Source Document Presented for Payment).
Entries returned using this return reason code
Return by RDFI must be received by the RDFI’s ACH Operator’s
deposit deadline for the return entry to be made
POP entries, like other ACH transactions, may be
available to the ODFI no later than opening of
returned for a variety of reasons.
business on the second banking day following
the Settlement Date of the original entry.
Timing of Returns
Most POP entries need to be returned by the RDFI • No written statement of unauthorized debit is
so that the return entry is made available to the required for this code.
ODFI no later than the opening of business on the
second banking day following the Settlement Date 2. When the Receiver (rather than the RDFI) as
of the POP entry. discussed above, determines that the source
document to which an POP entry relates was
In the following circumstances, an RDFI may also improper or that the entry and the source
return a POP entry so that it is made available to document were both presented for payment,
the ODFI by opening of business on the banking the RDFI may return the entry so that it is
day following the sixtieth calendar day following made available to the ODFI by the opening of
the Settlement Date of the original entry for the business on the banking day following the 60th
following reasons: calendar day following the Settlement Date of
the original entry using Return Reason Code
1. no notice was provided to the Receiver that the R10 or R37, respectively.
check was going to be converted to an ACH
debit; • A written statement of unauthorized debit
is required when using this return reason
2. the source document used for the entry was not code.
an eligible source document; or
Originators should be aware, however, that RDFIs
3. the source document was presented for payment can not return POP entries based on a Receiver’s
as a check through the check collection claim that his authorization had been revoked
system.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG113
SECTION V – Standard Entry Class Codes
C H A P T E R 4 5 P R E A R R A N G E D PAY M E N T A N D D E P O S I T E N T R I E S
(R07) since these are one-time transactions where Reinitiation of POP Entries
the Originator generally processes the transactions POP entries that have been returned for insufficient
immediately after the purchase is complete. or uncollected funds may be reinitiated up to two
times following the return of the original entry,
As appropriate, the Receiver may (1) request his provided such reinitiations are transmitted by the
RDFI to stop the payment of a POP entry (Return Originator (or its ODFI on the Originator’s behalf)
Reason Code R08), (2) request his RDFI to return within 180 days of the settlement date of the
an unauthorized (R10) or ineligible/improper POP original entry.
entry (Return Reason Code R10 or R39), or (3) go
directly to the Originator (merchant) to request a For POP entries returned for any other reason, the
refund of the transaction. Originator must first remedy the reason for the
return before reinitiating the transaction within
Originators should also be aware that, because the 180-day time period discussed above.
the POP entry application does not require the
Originator to capture the Receiver’s name for Verification of Receiver’s Identity
inclusion on the point of purchase entry, the
The NACHA Operating Rules are silent on the
RDFI must rely on the ODFI’s warranty regarding
means by which an Originator establishes the
the validity of the Receiver’s account number for
identity of the checkwriter for a POP entry. Most
posting purposes. The RDFI, therefore, may not
retailers, merchants and other parties who accept
return a point of purchase entry using Return
checks have established policies and procedures
Reason Codes R03 or R17 solely because the
for accepting checks to limit their risk; for example,
Receiver’s name is not included in the entry. The
they use commercially reasonable procedures to
RDFI may, however, use these Return Reason
do so.
Codes if otherwise appropriate.
For a discussion on the concept of commercially
Originators must be prepared to handle returned
reasonable standards, please refer to Chapter
POP Entries and must establish procedures that
4 of these Guidelines.
enable them to identify and contact the Receiver
relating to any unpaid debit entry. Because the
Retailers, merchants and other parties normally
Originator does not retain the Receiver’s voided
continue to use standard policies and procedures
check that was used as a source document, and
when using a check for a source document.
because the Receiver’s name and address are not
Originators should be mindful that they will
included as part of the MICR-capture process,
not have the original check (source document)
Originators needs to develop alternative methods
available should the item be returned, nor will
for retaining information necessary to identify
they have a copy or image of the check unless they
the Receiver for whom a POP debit has been
choose to make such a copy or image. NACHA
returned.
Operating Rules do not require that the Originator
copy or image the check; the decision to do so is
Stop Payments left to the Originator.
As with other Single-Entry ACH transactions, a
Receiver desiring to place a stop payment order on
a POP entry may do so, provided that he notifies
his RDFI in such a time and manner that allows the
CHAPTER 45
RDFI a reasonable opportunity to act on the stop
payment order prior to acting on the debit entry. Prearranged Payment and
POP entries returned by the RDFI as payment
Deposit Entries (PPD)
stopped will bear the Return Reason Code R08 and
will be made available to the ODFI by opening of
business on the second banking day following the A Prearranged Payment and Deposit (PPD) Entry is
settlement date of the POP entry. a credit or debit entry originated by an organization
to a consumer’s account, based on standing or
OG114 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 5 P R E A R R A N G E D PAY M E N T A N D D E P O S I T E N T R I E S
single-entry authorization from that consumer. PPD respect to formatting requirements, processing
entries can be used for both recurring and non- obligations, warehousing, and timing.
recurring payments, and comprise a fundamental
component of the ACH Network. This application For more detailed information on agreements
is used for the majority of consumer payments, between Originators and their ODFIs, refer to
incorporating a large variety of Direct Deposit and Chapter 15 within these Guidelines.
Direct Payment applications within its scope.
AUTHORIZATION REQUIREMENTS
Direct Deposit is a credit application that transfers
As with any ACH transaction, the Originator must
funds into a consumer’s account at his financial
obtain the Receiver’s authorization to initiate PPD
institution (the RDFI). The funds being deposited
entries through the ACH Network to the Receiver’s
can represent a variety of products, such as
account. For PPD debit entries, the authorization
payroll, dividend, interest, pension, and annuity
must
payments.
1. be in writing;
Direct Payment is a debit application, in which
companies use the ACH Network to electronically
2. be readily identifiable as an ACH authorization;
collect bill payments from their customers.
Through the use of a standing authorization, 3. have clear and readily understandable terms;
the consumer grants the company authority to
originate periodic debits to his account as bills 4.
provide that the Receiver may revoke the
become due. Direct Payment is widely used with authorization only by notifying the Originator
recurring billing relationships, such as insurance, in the manner specified in the authorization;
mortgage, utility, and loan payments, as well as a and
variety of membership dues.
5. be either signed or similarly authenticated by
INITIATING A PPD ENTRY — the consumer. (Refer to the discussion below on
AN OVERVIEW the use of the similarly authenticated standard
• An Originator obtains authorization from the with PPD entries.)
Receiver to originate an entry to the Receiver’s
account. For PPD debit entries, the authorization The Originator must provide the Receiver a copy
must be in writing and signed or similarly of the authorization for all debit entries.
authenticated by the Receiver. For PPD credit
entries, the consumer’s authorization may be For credit entries to a consumer account, the
provided orally or by other non-written means. authorization may be obtained in writing, or it may
be obtained orally or by other non-written means.
• The Originator initiates PPD credits or PPD
debits to the consumer’s account, based on the Although an authorization is not required for
terms of the authorization. a reversing entry that complies with the Rules,
Originators are encouraged to obtain direct
authorizations for these entries.
OBLIGATIONS OF ORIGINATORS
Agreements with ODFIs An Originator must retain the original or a
An Originator must enter into a contractual reproducible copy of the Receiver’s authorization
agreement with the ODFI for the origination of for two years from the termination or revocation
ACH payments. In addition to being bound to of the authorization, and must be able to provide
the requirements of the NACHA Operating Rules, the ODFI with an accurate copy within the time
Originators should ensure that this agreement period required by the ODFI.
addresses any issues that may be specific to PPD
entries, as well as any specific obligations with
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG115
SECTION V – Standard Entry Class Codes
C H A P T E R 4 5 P R E A R R A N G E D PAY M E N T A N D D E P O S I T E N T R I E S
PPD Entries and the Similarly in these circumstances should pay particular
Authenticated Standard attention to compliance with the Federal Trade
As an alternative to providing a written signature Commission’s (FTC’s) Telemarketing Sales Rule
to authorize a PPD debit entry, the consumer (16 C.F.R. Part 310) and should take steps to
Receiver may similarly authenticate the written ensure that their authorization language is clear,
authorization that was previously delivered to conspicuous, and readily understood by the
him by the Originator. The similar authentication Receiver, and that their means of authentication
method must evidence both the consumer’s identity unambiguously indicates the Receiver’s assent
and his assent to the authorization. to the transaction.
For example, where there is an existing relationship, The Originator must retain a record of any
the Originator could have previously delivered the authentication code relayed by the consumer. If
written terms of the authorization to the consumer the consumer verbally expresses the authentication
with an explanation of a telephone payment code, the Originator must make and retain an audio
option. The consumer Receiver could authenticate recording of the consumer’s statement of the code.
his agreement to the terms of the authorization by If the consumer relays the authentication code by
key-entering into a VRU or speaking into a recorded key-entering it into a VRU, a record of the keystrokes
line a PIN provided with the authorization that must be retained. As with other ACH transactions,
identifies the consumer. (Either the consumer or proof of authorization is required. Originators must
the Originator could have initiated the telephone retain a copy of both the written authorization and
call in this case.) the consumer’s use of the authentication code.
Both must be accurately reproduced and provided
Alternatively, an Originator having no relationship to the ODFI upon request.
with the Receiver could deliver the terms of the
authorization to the Receiver in a catalog mailed Originators should be aware of the distinction
on an unsolicited basis. Either party (consumer or between PPD entries that are similarly authenticated
Originator) could initiate the telephone call, during using the telephone and Telephone-Initiated
which the consumer Receiver would authenticate Entries, which are discussed in Chapter 47 of these
his agreement to the terms of the authorization Guidelines.
by key-entering into a VRU or speaking into a
recorded line a PIN printed in the catalog. Source Documents for PPD Entries
While the NACHA Operating Rules do not define any
When a consumer uses the telephone to similarly specific requirements for obtaining the consumer’s
authenticate an authorization, Originators should routing and account number to generate a PPD
consider the following as best practices: entry, one common business practice used by
Originators is to use the MICR line from a check
• The PIN code should be a minimum of four to obtain this information. Originators must
digits. ensure that the correct Receiver’s account number
is contained in each ACH entry. Originators are
• If there is not an existing relationship between strongly encouraged to establish practices and
the Originator and the Receiver, the code procedures to ensure the validity and accuracy
should be printed on the written authorization of each Receiver’s account number for all entries
that is in the consumer’s possession when the transmitted into the ACH Network.
telephone conversion occurs. This demonstrates
the consumer’s possession of the authorization Originators may also look on the face of a check
language at the time of the call. for the routing information. Some financial
institutions may print the routing number and
• Outbound calls by an Originator to a consumer account number used for ACH purposes on the face
where there is no prior relationship pose of the item, if the information on the MICR line is
heightened risks for obtaining a properly not appropriate for ACH activity. In addition, some
authenticated,bona fide authorization.Originators financial institutions may provide their customers
OG116 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 5 P R E A R R A N G E D PAY M E N T A N D D E P O S I T E N T R I E S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG117
SECTION V – Standard Entry Class Codes
CHAPTER 46 RE-PRESENTED CHECK ENTRIES
Debit from its Receiver. The Originator may request Reserve Regulation CC. However, RCK entries are
its ODFI obtain a copy of the Receiver’s written not subject to the Electronic Funds Transfer Act
statement regarding the unauthorized debit entry. (EFTA) or Regulation E.
Originators should work with their ODFIs to
establish procedures to request such information The legal framework for Re-presented Check Entries
from the RDFI when appropriate. is premised on the fact that the origin of each RCK
entry is based on a paper check that has been
Reinitiation of PPD Entries dishonored. Transfers of funds that were originated
PPD entries that have been returned for insufficient by a check, draft, or similar paper instrument are
or uncollected funds may be reinitiated up to two specifically excluded from coverage under the
times following the return of the original entry, EFTA (15 U.S.C. 1693a(6)) and Regulation E (12
provided such reinitiations are transmitted by the C.F.R. 205.3(c)(1)). Accordingly, if a Re-presented
Originator (or its ODFI on the Originator’s behalf) Check Entry is treated as a check transaction for
within 180 days of the Settlement Date of the purposes of the EFTA and Regulation E, it follows
original entry. that the UCC and Regulation CC should continue
to be the bodies of law that govern the rights and
For PPD entries returned for any other reason, the responsibilities of the parties involved with that
Originator must first remedy the reason for the payment, even though it has been converted to
return before reinitiating the transaction within electronic form.
the 180-day time period discussed above.
A Re-presented Check Entry is considered to be
a presentment notice for purposes of Revised
Article 4 of the Uniform Commercial Code (1990
Official Text). To that end, receipt of a Re-
CHAPTER 46
presented Check Entry constitutes presentment
Re-Presented Check Entries of the item in accordance with Article 4-110, and
return of the Re-presented Check Entry constitutes
(RCK) notice of dishonor or non-payment of the item in
accordance with Article 4-301. Provisions of the
Re-presented Check Entries (RCK) are Single- NACHA Operating Rules that are applicable to Re-
Entry debits initiated by Originators to re-present presented Check Entries are in accordance with
paper checks electronically after the paper checks Commentary provisions set forth in 12 C.F.R. Part
have been returned for insufficient or uncollected 229.37 of Federal Reserve Regulation CC.
funds.
ELIGIBILITY REQUIREMENTS FOR
The Rules governing RCK entries define specific ELECTRONIC RE‑PRESENTMENT
eligibility requirements and limits on the types An Originator may initiate an RCK entry only in
of checks that may be re-presented via the relation to an item that
ACH Network. In addition to the fundamental
requirement that only a check returned for • is an item within the meaning of Revised Article
insufficient or uncollected funds can be collected 4 of the Uniform Commercial Code (1990 Official
in this manner, Originators are also limited Text);
to converting only certain types of consumer
checks in amounts less than $2,500. More • is a negotiable demand draft drawn on or
detailed information on these and other eligibility payable through or at a participating DFI, other
requirements can be found later in this chapter. than a Federal Reserve Bank or Federal Home
Loan Bank;
LEGAL FRAMEWORK
• contains a pre-printed serial number;
In addition to applicable NACHA Operating Rules,
Re-presented Check Entries are also governed by
• is in an amount less than $2,500;
the Uniform Commercial Code (UCC) and Federal
OG118 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
CHAPTER 46 RE-PRESENTED CHECK ENTRIES
• non-cash items (as defined by Section 229.2(u) • the item is not subject to a defense or claim;
of Federal Reserve Regulation CC);
• the ODFI has no knowledge of any insolvency;
• drafts drawn on the Treasury of the United
States, a Federal Reserve Bank, or a Federal • the re-presented check entry accurately reflects
Home Loan Bank; the item;
• drafts drawn on a state or local government that • the underlying item — that is, the original check
are not payable through or at a Participating (or image or substitute check) — has not been
DFI; and will not be presented unless the RCK entry
has been returned by the RDFI;
• United States Postal Service money orders;
• the information encoded in magnetic ink on the
• items payable in a medium other than United item after issuance of the item is correct;
States currency;
• any restrictive endorsement placed on the item
• items payable to a person other than the is void or ineffective; and
Originator; and
• the ODFI will provide the RDFI with a copy of
• drafts that do not contain the original signature the front and back of the item to which the RCK
of the Receiver, including remotely created entry relates within ten banking days of the
checks, as defined by Regulation CC (e.g., the RDFI’s written request for a copy.
drawer does not sign a check but authorizes
another party to debit his account via a draft).
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG119
SECTION V – Standard Entry Class Codes
CHAPTER 46 RE-PRESENTED CHECK ENTRIES
Originators should be aware that, to protect An Originator desiring to use the ACH Network to
both the check writer and the RDFI, a check collect a Return Fee from a Receiver must originate
writer is permitted to sign a written statement a separate debit entry Return Fee Entry using the
of unauthorized debit and be recredited for the appropriate SEC Code and must follow all rules
amount of an RCK entry if the required notification governing the origination of Return Fee Entries.
by the Originator is not provided. In this situation, For specific information on Return Fee Entries,
an Originator should be aware that an RDFI has please refer to Chapter 54 in the Special Topics
an extended period of time within which to return Section of these Guidelines.
the entry. (Specifically, the RDFI must transmit the
return entry in such a time and manner that the Originators need to be aware that the requirements
return entry is made available to the ODFI no later of the NACHA Operating Rules regarding the
than the opening of business on the banking day origination of Return Fee Entries are in addition
following the sixtieth calendar day following the to any requirements defined by applicable state
Settlement Date of the RCK entry.) law governing the collection of Return Fees.
Originators are responsible for determining what
Restrictive Endorsements the applicable state laws are, if any, for each of
Any restrictive endorsement (e.g., “For Deposit their check-accepting locations that intend to, or
Only”) that is placed on the item by the Originator may, use the ACH Network for the collection of
or its agent is void or ineffective when the item is Return Fees.
presented as a re-presented check entry.
Some Originators may desire to place an
authorization stamp on the check being used
Formatting Requirements
for the payment of goods or services in order to
• Dollar Amount – RCK entries must be originated
collect a returned check fee in the event that the
for amounts less than $2,500.
check is returned for insufficient or uncollected
funds. In order for this practice to be compliant
• Company Name – The original payee on the face
with the NACHA Operating Rules, the following
of the check must appear within the Company
requirements must be met:
Name Field of the Company/Batch Header Record
OG120 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
CHAPTER 46 RE-PRESENTED CHECK ENTRIES
• An authorization placed on the check must be the front and back of the check to the ODFI for
signed (not initialed). This signature must stand its use, or for the use of the RDFI requesting the
alone, i.e., the authorization language for the information. If the check has been finally paid,
ACH debit entry must not be stamped in close the Originator must indicate this on the copy.
proximity to the maker’s signature on the check
such that it could appear that by signing the Return of Re-presented Check Entries
check, the checkwriter has also agreed to the Originators can expect to receive returned RCK
authorization. The signature for the authorization entries for a variety of reasons. Generally speaking,
must clearly relate to the authorization language RDFIs must return RCK entries to their ACH
itself. Operators by midnight of the second banking day
following the banking day of receipt of the RCK
• The authorization on the check must be readily entry. This return time period is applicable to the
identifiable as an ACH debit authorization and its return of most RCK entries, including RCK entries
terms must be clear and readily understandable returned by RDFIs that are located in states that (1)
(i.e., the print cannot be so small or smeared have not adopted Revised Article 4 of the Uniform
that a consumer would be unable to easily read Commercial Code (1990 Official Text) and have
the authorization and understand its terms). not revised its customer agreements to allow for
electronic presentment, or (2) require all canceled
• The authorization on the check must contain checks to a specific type of account to be returned
information that explains how the consumer to the Receiver within the periodic statement.
may revoke the authorization.
Originators should be aware, however, that an
• The Originator must provide the consumer with RDFI may also return an RCK entry so that it is
an electronic or hard copy of the authorization. made available to the ODFI by the opening of
business on the banking day following the sixtieth
• The Originator must retain the original or a calendar day following the Settlement Date of the
copy of the authorization for two years from the original entry in the following circumstances: (1)
termination or revocation of the authorization. the Receiver had placed a stop payment order on
the item to which the RCK entry relates, (2) the
Authorization language, if stamped on the back of
required notice stating the re-presented check
the check, should be in the endorsement space
entry policy was not provided by the Originator,
provided and not lower on the check. Before
(3) the check is ineligible, (4) all signatures on the
stamping the back of a check with anything other
check are not authentic or authorized, or the check
than an endorsement, Originators must ensure that
has been altered, (5) the amount of the entry was
they understand and are in compliance with both
not accurately obtained from the item, or (6) both
the NACHA Operating Rules and all regulations
the RCK entry and the item to which the RCK entry
that govern the collection of checks.
relates have been presented for payment. With the
exception of returns due to stop payment on the
Number of Presentments original item, the Receiver is required to provide
Originators may transmit a re-presented check the RDFI with a written statement of unauthorized
entry no more than twice after the first return of debit specifying the reason for the return.
a paper item, and no more than once after the
second return of a paper item. For additional information on written
statements of unauthorized debit, refer to
Retention of Copy of Item Chapter 26 in these Guidelines. A complete
The Originator must retain a copy of the front and listing of return reason codes, including those
back of the item (check) to which the RCK entry specifically addressing return conditions
relates for seven years from the Settlement Date unique to RCK, as discussed above, can be
of the RCK entry. When requested to do so by found within Appendix Four of the NACHA
the ODFI, the Originator must provide a copy of Operating Rules.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG121
SECTION V – Standard Entry Class Codes
C H A P T E R 4 7 T E L E P H O N E - I N I T I AT E D E N T R I E S
OG122 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 7 T E L E P H O N E - I N I T I AT E D E N T R I E S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG123
SECTION V – Standard Entry Class Codes
C H A P T E R 4 7 T E L E P H O N E - I N I T I AT E D E N T R I E S
OBLIGATIONS OF ORIGINATORS For both Single Entry and recurring TEL entries, the
Originator must clearly state during the telephone
Agreements with ODFIs
conversation that the consumer is authorizing an
Originators that wish to use the ACH Network to ACH debit entry to his account. The Originator
transmit TEL entries should consider modifications must understand that the Receiver must explicitly
to their agreements with their ODFIs to address express consent. Silence is not express consent.
the origination of this type of transaction. At
a minimum, additions to the ODFI/Originator Single Entry TEL Entries
agreement should include, but not be limited to:
Originators of Single Entry TEL entries are
obligated either to audio record the Receiver’s
• the Originator’s responsibilities and obligations
oral authorization or to provide, in advance of
with respect to the provision of specific
the Settlement Date of the entry, written notice to
information to the Receiver during the telephone
the Receiver that confirms the oral authorization.
call;
The authorization must be readily identifiable as
• the Originator’s requirement to audio record an authorization and must have clear and readily
the oral authorization or provide written understandable terms. The following minimum
confirmation of the Receiver’s authorization for information must be included as part of the
Single-Entry TEL entries; authorization:
• the Originator’s requirement to audio record the • the date on or after which the Receiver’s account
oral authorization and provide a written copy will be debited;
of the Receiver’s authorization for recurring TEL
• the amount of, or a reference to the method of
entries, to the extent required by Regulation E;
determining the amount of, the debit entry to
• verification of the identity of the Receiver; and the Receiver’s account;
7
While Receivers are typically identified by name in an authorization,
the Rule includes the broader term “identity” to provide Originators
with the flexibility to use identity credentials such as user name and
password as part of the authorization. The Originator should have
other records that would then link those identity credentials to the
Receiver’s name.
OG124 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 7 T E L E P H O N E - I N I T I AT E D E N T R I E S
When the Originator of a Single Entry TEL entry provides additional guidance as to how ODFIs and
elects to provide the Receiver with written notice Originators can comply with e-Sign. Although
confirming the Receiver’s oral authorization, that NACHA cannot formally interpret Regulation E, the
notice must include, at a minimum, the pieces of guidance below provides additional information
information required to be included during the on how to comply with the Rules for authorization
telephone call, as described above. The Originator of recurring TEL entries. This guidance is not
should disclose to the Receiver the method by intended to be legal advice regarding compliance
which written notice will be provided if this option with Regulation E. ODFIs and Originators using
is used by the Originator. recurring TEL are responsible for determining
their own compliance with Regulation E and the
Recurring TEL Entries e-Sign Act.
Originators of recurring TEL entries are obligated
to both audio record the Receiver’s oral Authorization of Recurring TEL Entries under
authorization and to provide a written copy of Regulation E and e-Sign Act
the authorization to the Receiver, to the extent Under the Rules, an ODFI is responsible for the
required by Regulation E. The Originator should compliance of the telephone authorization process
disclose to the Receiver the method by which the with applicable law and for the validity of any
written copy will be provided. The authorization authorization obtained using such a process. To
must be readily identifiable as an authorization facilitate ACH participants’ understanding of
and must have clear and readily understandable such processes, the following provides high-level
terms. The following minimum information must outlines of two distinct situations that Originators
be included as part of the authorization: and ODFIs might face when considering whether
to permit consumers to authorize recurring ACH
• the amount of the recurring transactions, or debits from their accounts via the telephone. The
a reference to the method of determining the first scenario is based on the Rules as they existed
amount of recurring transactions; prior the effective date of the recurring TEL rule
(September 16, 2011), and results in “telephone-
• the timing (including the start date), number, initiated PPD transactions” in which a written
and/or frequency of the electronic funds authorization is electronically signed. This remains
transfers, or other similar reference, to the a permissible transaction format for institutions
consumer’s account; that follow the process outlined below. The second
scenario is based on the current rule for recurring
• the Receiver’s name or identity; TEL payments with an oral authorization. These
are merely two examples; there are many other
• the account to be debited; variations of the scenarios below that Originators
and ODFIs may wish to consider.
• a telephone number that is available to the
Receiver and answered during normal business Scenario 1 – Telephone-Initiated PPD Entries by
hours for customer inquiries; Electronically Signed Authorization
• the method by which the Receiver can revoke The consumer has received the clear and readily
the authorization; and understandable terms of the preauthorized
transfer in writing (either in a physical writing
• the date of the Receiver’s oral authorization. or in an electronic manner that satisfies the
e-Sign Act or other applicable law) prior to the
Authorizations for recurring TEL Entries need to telephone call. The writing includes spaces for
meet the writing and signature requirements of the consumer to record any variable information
Regulation E for preauthorized transfers, which (e.g., transaction amount, transaction frequency,
can be done by conforming to the e-Sign Act. account number and/or routing number). The
However, neither Regulation E nor its Commentary
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG125
SECTION V – Standard Entry Class Codes
C H A P T E R 4 7 T E L E P H O N E - I N I T I AT E D E N T R I E S
consumer then initiates a telephone call to the Other Considerations for TEL Entry
Originator, during which the consumer authorizes Authorizations
a recurring debit to his or her consumer account, Originators should understand that the term
and “signs” the written authorization either by “provide” is intended to mean that the Originator
inputting a code into the telephone keypad or by has utilized a medium (e.g., U.S. mail, fax, or other
providing the code orally to a customer service mail delivery method) to send the written notice
representative on a recorded line. This scenario to the Receiver. Any written notice or disclosure
could apply to an existing billing relationship, in required by the NACHA Operating Rules, including
which the billing company regularly sends bills in those for TEL entries, may be provided in electronic
writing (either paper or electronic) to an existing form (e.g., e-mail and SMS text message to a
customer. The bill would contain the clear and smartphone or mobile device). However, state and
readily understandable terms of the preauthorized federal laws may require Receiver consent before
transfers, and a code for the customer to input using electronic notices/disclosures.
during the telephone call.
The term “provide” does not imply receipt of such
Scenario 2 – Recurring TEL Entries by Oral notice by the Receiver. Originators that send a
Authorization copy of the written authorization or use a written
notice to confirm the authorization must afford
The consumer has not received the terms of the the Receiver the right to contact the Originator
preauthorized transfer in writing (either in a to correct any erroneous information contained
physical writing or in an electronic manner that within the notice using a provided telephone
satisfies the e-Sign Act or other applicable law) number. Compliance with the NACHA Operating
prior to the telephone call. The consumer initiates Rules does not eliminate the obligation to comply
a telephone call to the Originator, during which with other applicable laws.
the consumer authorizes a recurring debit to his
or her consumer account. The consumer provides An Originator using a voice response unit (VRU) to
his or her authorization, including his or her capture a Receiver’s authorization for a TEL entry
“signature” or “authentication” of the authorization, must understand that key-entry responses by the
via a recorded conversation. The consumer either Receiver to input data and to respond to questions
repeats or expressly confirms the authorization, does not qualify as an oral authorization. A VRU
including the account to be debited, the timing may be used by the Receiver to key enter data and
of the debits (e.g., monthly on the 1st business to respond to questions, provided that the actual
day of the month), and the amount (e.g., $500 per authorization by the Receiver is provided orally.
month), as well as other required elements of the
authorization. The Originator provides a written Retention of Record of Authorization for
copy of the authorization to the consumer (either TEL Entries
in a physical writing or in an electronic manner that For Single Entry TEL entries, the Originator must
satisfies e-Sign Act or other applicable law). This retain either the original, copy, or other accurate
scenario could apply to both: 1) an existing billing record of the Receiver’s oral authorization or a
relationship in which terms of the preauthorized copy of the written notice confirming the Receiver’s
transfer are not contained in writing on a bill; oral authorization for two years from the date of
and 2) a new billing relationship in which a new the authorization. For recurring TEL entries, an
customer wants to authorize recurring payments Originator must retain for two years from the
during the same telephone call that establishes termination or revocation of the authorization (i)
a new service (e.g., a new car insurance policy), the original, copy, or other accurate record of the
provided that the authorization is the result of an oral authorization, and (ii) evidence that a copy of
inbound customer call. the authorization was provided to the Receiver in
compliance with Regulation E. At the request of
the ODFI, the Originator must provide a copy of
the Receiver’s authorization.
OG126 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 8 I N T E R N E T I N I T I AT E D / M O B I L E E N T R I E S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG127
SECTION V – Standard Entry Class Codes
C H A P T E R 4 8 I N T E R N E T I N I T I AT E D / M O B I L E E N T R I E S
When NOT to use the SEC Code WEB: when it is, or is not, appropriate to use the WEB
1. WEB is not appropriate if the authorization is SEC code.
oral.
When a consumer Receiver key enters information
Example: Authorization is given during a into a mobile device or computer as a means to
telephone conversation via a device over a communicate that information over the Internet
Wireless Network. to the Originator’s servers, the transaction should
be coded as a WEB Entry, even if the mobile
2. WEB is not appropriate if the Receiver’s device or computer is owned by the Originator.
instructions for initiation of the debit entry are An example of this scenario is when a consumer
communicated to the Originator over the Internet enters his or her account information on an
via a wired network but the authorization has insurance company’s web page, to authorize a
been given in some other manner. debit to pay for an insurance premium, even if the
consumer does so on an insurance agent’s laptop
Example: A written authorization was obtained or tablet computer. The WEB SEC code should
from the Receiver through the mail to debit be used in this scenario regardless of the physical
his account for a bill payment service but he location where the consumer and the agent meet
goes to the biller’s website to verify the amount (e.g., consumer’s home, agent’s office, local coffee
of the bill each month, this transaction would shop). The fact that the consumer and the agent
constitute a PPD entry rather than a WEB are meeting together does not result in the use of
entry. the POS SEC code, because the agent’s laptop is
being used as a means to communicate information
3. WEB is not appropriate to initiate credit entries over the Internet, not as a POS device.
except for a reversing entry to correct a previous
WEB debit entry. By contrast, a Point of Sale (POS) Entry is a debit
entry to a Consumer Account that is initiated by a
4. WEB is not appropriate to initiate debit or Receiver to pay for a purchase of goods or services
credit entries for business transactions. at an “electronic terminal” at the point of sale
or to receive cash back at such a location. This
5. WEB is not appropriate if the POS code would term is intended to be interpreted as defined in
otherwise apply, because the WEB format Regulation E, and the reference to “point of sale”
does not contain the necessary fields for means the Entry must be initiated by the Receiver
communication of POS transaction information. in-person at the Originator’s electronic terminal.
(Adjustments and other credit Entries related to
Example: A Receiver uses a third party near an original POS debit Entry are also coded as
field communication mobile payment service to “POS,” but may be initiated through back office
initiate a debit to his or her bank account to pay reconciliation processes.)
for goods at the point-of-sale. In accordance
with the Formal Rules Interpretation regarding Examples of electronic terminals for this purpose
the Proper Use of SEC Codes, the merchant are traditional terminals at stationary point-of-
(Originator) should use the POS SEC code sale locations such as grocery store cash registers
so that information regarding the merchant or automated gasoline pumps. The term also
identity and terminal location can be properly includes more innovative technology, such as
communicated to the RDFI. mobile devices owned or leased by a merchant
that are used as mobile check-out terminals, even
Other Considerations on When to Use WEB if the merchant uses the mobile device at a location
Rather Than Other SEC Codes for Scenarios that is not owned or rented by the merchant. For
Involving Mobile Devices example, a mobile tablet device that is used by
Mobile technologies are creating new mechanisms a farmer to accept payments at various farmers’
for initiating ACH entries. The following discussion markets around the state would be a point-of-
and scenarios provide additional guidance on
OG128 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 8 I N T E R N E T I N I T I AT E D / M O B I L E E N T R I E S
sale electronic terminal for this purpose, and ACH 3. transmits data via wireless technology
transactions initiated at such a device should be
coded as POS. • excluding a communication that begins and
ends with a wireline connection, but that is
It is also important to differentiate for this purpose routed by a telecommunications provider for
the proper use of the POS, MTE, POP and BOC a portion of the connection over a wireless
SEC codes. The following scenarios would not system.
result in the use of the WEB SEC code, even if any
part of the transaction utilizes a mobile device: COMMERCIALLY REASONABLE
For all WEB entries, each Originator is obligated
• If a transaction at a point-of-sale electronic
to ensure that certain aspects of a transaction have
terminal is initiated with an “access device” (as
been handled in a commercially reasonable manner.
that term is defined in Regulation E) or with
In addition, each ODFI warrants that the Originator
account and routing and transit information that
has handled those aspects of a transaction in a
is not machine-read from the MICR line, then
commercially reasonable manner. Those aspects of
POS is the correct SEC code to use.
the transaction include commercially reasonable
methods of authentication to verify the identity
• If the electronic terminal is an ATM (automated
of the Receiver, fraudulent transaction detection
cash dispensing machine), then MTE is the
systems, methodology to establish a secure Internet
appropriate SEC code to use.
session, and procedures to verify the validity of
• If the transaction is initiated by capturing the RDFI’s routing number.
information from the MICR line of a check
For a discussion on the concept of commercially
through a reading device at the point-of-purchase
reasonable standards, please refer to Chapter
and returning the check to the consumer, then
4 of these Guidelines.
POP is the correct SEC code to use.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG129
SECTION V – Standard Entry Class Codes
C H A P T E R 4 8 I N T E R N E T I N I T I AT E D / M O B I L E E N T R I E S
2.
multiple entries, based on an authorization information (which includes, but is not limited to,
provided by the Receiver establishing a an entry, entry data, a routing number, an account
relationship with the Originator for a specific number, and a PIN or other identification symbol)
type of activity, that are originated each time via an Unsecured Electronic Network. ACH
upon the specific instructions of the Receiver. participants must abide by these requirements.
Example: An instruction via mobile device to a ACH data security is discussed in detail in
broker to purchase or sell securities. Chapter 4 of these Guidelines.
While all of this is subjective and depends on Example: The NACHA Operating Rules require
each unique transaction, it is important for both an Originator of WEB entries to conduct or have
Originators and ODFIs to be able to recognize conducted on its behalf, annual audits to ensure
these payments in order to monitor them that the financial information it obtains from
separately for risk management purposes. Receivers is protected by security practices and
procedures.
2.
To ensure that a Receiver has the ability to
place a stop payment order on a Single-Entry For more information on agreements, refer to
WEB transaction, the NACHA Operating Rules Chapter 5 in these Guidelines.
allow a Receiver to provide a stop payment
order to his financial institution as long as it Authorization Requirements
is given in such a time and manner that allows Originators of WEB entries must obtain the
the RDFI a reasonable opportunity to act on the Receiver’s authorization prior to initiating a
stop payment order prior to acting on the debit debit entry under this application. Although the
entry. For a recurring payment, the Receiver has NACHA Operating Rules do not prescribe specific
the right to place a stop payment only as long authorization language for the WEB application, the
as the request for the stop payment is made at authorization must conform to the requirements of
least three banking days prior to the scheduled the NACHA Operating Rules, which require that:
Settlement Date of the entry. The RDFI may, at
its discretion, honor such a stop payment order 1. the authorization must be in a writing that is
received within this three banking day period. signed or similarly authenticated by the Receiver
via the Internet or a Wireless Network, or
ACH DATA SECURITY REQUIREMENTS
2.
the authorization is obtained in any manner
The NACHA Operating Rules impose specific data
permissible for other Standard Entry Class
security requirements for all ACH transactions that
Codes, but the Receiver’s instructions for the
involve the exchange or transmission of banking
OG130 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 8 I N T E R N E T I N I T I AT E D / M O B I L E E N T R I E S
initiation of the debit entry is communicated the strength of the association of an initial log-
via a Wireless Network (other than by an oral in with a later authorization. The burden of
communication), and demonstrating that the authentication process is
sufficiently linked to the authorization will be on
3. the authorization must be readily identifiable as the Originator and ODFI.
an ACH debit authorization;
For a discussion on the concept of similarly
4. the authorization must express its terms in a authenticated, please refer to Chapter 16
clear and readily understandable manner; and within these Guidelines.
5.
the authorization must provide the Receiver One of the practical considerations for an Originator
with a method to revoke his authorization is how to present an authorization to a Receiver
by notifying the Originator in the manner over the Internet that both meets the requirements
prescribed. of the NACHA Operating Rules and is easily
understood. As long as the required information is
To meet the first requirement that the authorization included in the authorization language, Originators
be in writing, in the context of WEB entries, the have the flexibility to draft the language in any
Receiver must be able to read the authorization way that is user-friendly for their customers.
language displayed on a computer screen or other
visual display. The Originator should prompt the The following pieces of information should be
Receiver to print the authorization and retain a included in the authorization:
hard copy or electronic copy. The Originator must
be able to provide the Receiver with a hard copy 1.
Express authorization language (“I authorize
of the authorization if requested to do so. Only the Company A” to debit my account)
Receiver may authorize the WEB transaction, and
not a Third-Party Service Provider on behalf of the 2. Amount of transaction:
Receiver.
• for a Single-Entry payment
The NACHA Operating Rules allow the use of a
digital signature or code to similarly authenticate • for a recurring entry that is for the same
a written authorization. Examples of methods amount each interval, or
used to similarly authenticate an authorization
include, but are not limited to, the use of digital • for a range of payments
signatures, codes, shared secrets, PINs, biometrics,
etc. To satisfy the requirements of the NACHA 3. The effective date of the transaction
Operating Rules, which parallel Regulation E, the
authentication method chosen must identify the 4. The Receiver’s account number
Receiver and demonstrate the Receiver’s assent to
the authorization. 5.
The Receiver’s financial institution’s routing
number
Originators should understand the distinction
between authenticating a Receiver for general use 6. Revocation language
on a website (or marketing purposes, etc.) and
authentication in the context of an authorization. Originators must retain records of a Receiver’s
Authentication of an authorization is strongest authorization for two years after the termination
when the authorization and the authentication of or revocation of the authorization. In the physical
that authorization occur simultaneously or nearly world this record would be an original or copy
simultaneously. Although an initial website session of the signed authorization. In the electronic
log-in may constitute adequate authentication for world where the authorization will be similarly
a click-through authorization as part of the same authenticated, the Originator must keep a copy of
session, Originators and ODFIs should consider the authorization and a record of the authentication.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG131
SECTION V – Standard Entry Class Codes
C H A P T E R 4 8 I N T E R N E T I N I T I AT E D / M O B I L E E N T R I E S
The Originator must also be able to provide these with existing customers, new customers or
records to the ODFI upon its request. The ODFI both. Originators with an established business
may request these records either for its own use relationship with the Receiver — whether
or to forward to the RDFI (the Receiver’s financial established online, in person, over the telephone,
institution). or some other method — can usually authenticate
those customers using shared secrets such as a
In the event that an Originator must demonstrate PIN, password or previous transaction history.
proof of a Receiver’s authorization to a WEB entry,
it should provide documentation that provides The Originator has the responsibility to choose an
transaction details including Receiver information appropriate solution for authentication that will
and sales documentation to show what goods and/ minimize the potential for fraudulent transactions.
or services were exchanged. Common examples in use today include asking
for several forms of identifying information and
Example: Originators can provide a screen checking that information against databases; asking
shot of the authorization language and then challenge questions based upon credit bureau or
the date/timestamp of the Receiver login and other information; or sending the Receiver a specific
the authorization process that evidenced both piece of information, either online or offline, and
the consumers’ identity and his assent to the then asking the Receiver to verify that information
authorization. as a second step in the authentication process.
OG132 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION V – Standard Entry Class Codes
C H A P T E R 4 8 I N T E R N E T I N I T I AT E D / M O B I L E E N T R I E S
• something the Receiver knows (password), • the type of goods or services being sold.
• something the Receiver has (a personal A fraudulent transaction detection system must be
computer), used no matter how small the transaction amount
or type. To not deploy any method or procedure
• something the Receiver is (voice or fingerprint), to detect transaction fraud is not considered
and commercially reasonable.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG133
SECTION V – Standard Entry Class Codes
C H A P T E R 4 8 I N T E R N E T I N I T I AT E D / M O B I L E E N T R I E S
This audit requirement can be met in several ways. • Relevant employees must be educated on
It can be a component of a comprehensive internal information security and company practices
or external audit, or it can be an independent and their individual responsibilities.
audit that uses a commercially reasonable
generally accepted security compliance program. • Access controls should be in place to ensure
An Originator that is already conducting an audit adequate administrative, technical, and
of these practices and procedures for another physical controls:
area of its business is not required to have two
separate audits. However, the audit should address – Limit employee access to secure areas and
adequate levels of data security for the Originator’s to documents/files that contain Receiver
ACH operations. financial information.
The following sections detail the minimum – Ensure that terminated employees have no
components that need to be audited in order to be access to secure information and areas.
in compliance with the audit requirement. (Note:
In any case where these key components are not – Permit visitors only when absolutely
specifically required under the NACHA Operating necessary to these areas and information
Rules, all are recommended by NACHA as sound and ensure they are accompanied by an
business practices.) employee at all times.
1. Physical security to protect against theft, – Authenticate all access to any database
tampering or damage containing sensitive ACH information such
as financial information (e.g., passwords or
• Critical network, server, and passphrase, multifactor authentication such
telecommunications equipment should be as token devices, smart cards, biometrics,
placed in physically secure locations that or public keys).
permit access only to authorized personnel.
– Implement key-management procedures to
• Firewalls must be fully deployed with secured require split knowledge for dual control of
processes for administering those firewalls. keys (e.g., requiring two or three people
(or processes or procedures) to cooperate
• Firewalls must protect websites from in gaining authorized access to a system
inappropriate and unauthorized access. resource (data, files, devices) – a separation
of duties).
• Disaster recovery plans must be developed
and reviewed periodically. – Establish policies and procedures to monitor
and audit all user activity for personnel with
Personnel and access controls to protect against
2. access to Receiver information in order to
unauthorized access and use detect exceptions.
• A formal set of security policies and Network security to ensure secure capture,
3.
procedures must be developed that clearly transmission, storage, distribution, and
outline the corporate rules governing access destruction.
to sensitive financial data.
• Install and maintain a firewall configuration
• Hiring procedures should be developed to protect all Receiver financial information,
that will, at a minimum, verify application including but not limited to the company
information and check references on new network and databases, and portable
employees that will have access to Receiver electronic devices (e.g., employee laptops,
financial information. smartphones, etc.)
OG134 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
Special Topics
procedures periodically.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG135
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
the ODFI and the Originator with respect to the funds are ultimately owed. In some situations, the
initiation of ACH transactions. The organization Originator may enter into a contractual agreement
acting as a Third-Party Service Provider could be with a Third-Party Service Provider, such as a
a data processing service bureau, correspondent payroll processor or other type of service provider,
bank, payable through bank, or simply a financial to process the company’s payments. In these
institution acting on behalf of another financial cases, the Third-Party Service Provider, rather than
institution. the ultimate Originator of the payments, may have
the contractual relationship with the ODFI and the
Use of a Third-Party Service Provider can greatly account against which the funds are settled. While
enhance the origination and receiving capabilities this business model is commonplace in today’s
of the ODFI and RDFI. It is important that payments environment, it is important that ACH
both the ODFI and the RDFI are aware of their participants recognize that the Third-Party Service
responsibilities in ACH processing and ensure that Provider is not the Originator of the transactions.
those responsibilities are being met even if a third
party is performing the processing function. Using Third-Party Service Provider
a Third-Party Service Provider as a processing A Third-Party Service Provider is an entity other
agent does not relieve the financial institution of than an Originator, ODFI, or RDFI that performs
its obligations under the NACHA Operating Rules, any functions on behalf of the Originator, the
nor does it change the timing when actions must ODFI, or the RDFI with respect to the processing
be taken, e.g., use of a Third Party does not modify of ACH entries, including, but not limited to, the
the returns deadline. creation of ACH files.
OG136 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
its account or the account of another Third-Party to pay its employees, the Receivers. ABC Payroll
Sender a credit entry, debit entry, or non-monetary is a Third-Party Service Provider performing the
entry to the Receiver’s account at the RDFI. An function of creating the payroll file on behalf of
organization acting as Third-Party Sender is also a the Originator and transmitting it to the ODFI.
Third-Party Service Provider. ABC Payroll is also a Third-Party Sender because it
is acting as an intermediary between the employer
Third-Party Senders are a subset of Third-Party (the Originator) and MegaBank (the ODFI) and no
Service Providers. A Third-Party Sender is always contractual agreement exists between the ODFI
a Third-Party Service Provider that acts on behalf and the Originator.
of an Originator, but a Third-Party Service Provider
does not always act as a Third-Party Sender. A Example # 2
Third-Party Service Provider is considered to be a An employer contracts with ABC Payroll to handle
Third-Party Sender when it acts as an intermediary its payroll processing. ABC Payroll formats the
between the ODFI and the Originator and there is ACH file on behalf of the employer and forwards
no contractual agreement between the Originator it on to MegaBank, with which the employer has
and the ODFI. In this instance, the Third-Party a contractual agreement to originate ACH activity
Sender acts like the ODFI to the Originator. In any on its behalf. In this case, the employer holds
circumstance in which an Originator utilizes the an account with MegaBank that is credited or
services of a Third-Party Service Provider but has debited by MegaBank for settlement of the ACH
also executed a contractual agreement directly with transactions processed by ABC Payroll on the
the ODFI, the Third-Party Service Provider would employer’s behalf.
not be considered a Third-Party Sender and would
not be subject to the rule provisions governing The employer in this example is the Originator of
Third-Party Senders. The NACHA Operating Rules the payroll file because it is legally obligated to pay
require an agreement between the ODFI and its employees, the Receivers. ABC Payroll is a Third-
the Third Party Sender. Third-Party Senders and Party Service Provider performing the function of
their relationship with the ODFI are discussed in creating the payroll file on behalf of the Originator
Chapter 21 of these Guidelines. and transmitting it to the ODFI. In this scenario,
however, ABC Payroll is not a Third-Party Sender
The following examples help clarify the specific because a direct contractual agreement exists
circumstances in which a Third-Party Service between the ODFI and the Originator that binds
Provider is also considered to be a Third-Party the employer to the NACHA Operating Rules.
Sender.
Example # 3
Example # 1 An employer contracts with ABC Payroll to handle
An employer contracts with ABC Payroll to its payroll processing. ABC Payroll has further
handle its payroll processing. ABC Payroll has contracted with ACH Pay Service Provider for
a contractual agreement with its own financial the origination of its ACH processing into the
institution, MegaBank, to originate ACH activity on ACH Network. ACH Pay Service Provider has
its behalf, and ABC Payroll’s account at MegaBank a contractual agreement with its own financial
is credited or debited by MegaBank for settlement institution, MegaBank, to originate ACH activity on
of the ACH transactions processed by ABC Payroll. its behalf, and ACH Pay Service Provider’s account
In this example, there is no relationship between at MegaBank is credited or debited by MegaBank
the employer and MegaBank, and they do not for the settlement of transactions processed by
have a contractual agreement between them for ACH Pay Service Provider. In this example,
the origination of ACH payments. Instead, ABC there is no relationship between the employer
Payroll is an intermediary between the employer and MegaBank; they do not have a contractual
and MegaBank. agreement between them for the origination of
ACH payments. Similarly, there is no contractual
The employer in this example is the Originator agreement between ABC Payroll and MegaBank
of the payroll file because it is legally obligated
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG137
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
for the origination of ACH payments. In this case, (the employer) and the other Third-Party Sender
there are two intermediaries (ABC Payroll and (ACH Pay Service Provider), under which both
ACH Pay Service Provider) between the employer ABC Payroll and the employer agree to be bound
and MegaBank. to the Rules.
FIGURE 50-1
OG138 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
Example B
Figure 50-2 shows how a Third-Party Service
Provider could be utilized to initiate the ACH file
directly into the ACH Network on behalf of the
ODFI. The Third-Party Service Provider is acting
as the Sending Point on behalf of the ODFI.
FIGURE 50-2
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG139
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
FIGURE 50-3
No agreement exists between the Originator and ODFI, but TPS assumes new obligations through agreement
with ODFI and through agreement with Originator.
OG140 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
FIGURE 50-4
No agreement in place between Originator and ODFI, but TPS assumes new obligations through agreement
with ODFI and through agreement with Originator and Third-Party Senders.
All participants in the origination process must control the dollar value or the type of transaction
clearly understand their roles and responsibilities to be originated. Since the ODFI is responsible for
in processing ACH files when a Third-Party Service the ACH entry, direct access to the ACH Network
Provider is used to perform an ACH processing (i.e., as a Sending Point) by a Third-Party Service
function. The ODFI must be aware that there may Provider should be analyzed very closely by the
not be controls in the ACH Operator software to ODFI.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG141
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
Agreements Example B
The NACHA Operating Rules require either (1) The ODFI must ensure that all agreements with
the execution of a contractual agreement between its ACH Operator(s) properly identify all Sending
the Originator and the ODFI under which the Points when the ODFI uses the facilities of a Third-
Originator agrees to be bound by the Rules and Party Service Provider as indicated in Example B.
acknowledges that it may not initiate entries in
violation of the laws of the United States, or (2) In addition to the agreements with the ACH
the execution of appropriate agreements (i.e., Operator(s), the ODFI must also ensure that proper
between ODFIs and Third-Party Senders, between agreements are in place between the ODFI and all
Third-Party Senders and Originators, and between Originators. Once a third party is established as
multiple Third-Party Senders themselves) under a Sending Point for an ODFI, it is possible that
which the Third-Party Senders agree to be bound entries could be initiated into the ACH Network
by the NACHA Operating Rules and Originators for a new Originator without the knowledge of the
agree to assume the responsibilities of Originators ODFI. The ODFI must establish procedures with
under the Rules and acknowledge that entries its Third-Party Service Provider to keep the ODFI
may not be initiated in violation of the laws of the informed of all ACH activity that is sent into the
United States. ACH system.
OG142 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG143
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
Immediate Origin field in the File Header Record. ODFI does not receive payment from the Third-
Even if the Routing Number in the Immediate Origin Party Sender, the Originator of the entry agrees
field is that of a Third-Party Service Provider, it is to pay the ODFI.
the financial institution represented by the Routing
Number in the Originating DFI Identification Field • Performance of Originator Responsibilities –
that is considered the ODFI. The Third-Party Sender and its Originators are
responsible for the retention and delivery of
For all the reasons discussed above, it is critical any records, documentation and data related to
that ODFIs include use of a Third-Party Service copies of items, copies of source documents or
Provider for origination in their overall procedures records of authorization.
for analyzing risk and fraud.
Reversals/Erroneous Entries
Third-Party Sender Obligations It is critical that responsibility and accountability
Each Third-Party Sender is subject to a number of for errors are identified and understood prior to
additional obligations and liabilities with respect the origination of entries. The following issues
to the transmission of ACH entries. need to be resolved between the ODFI, Originator,
and third party:
• Identification of Originators – The Rules obligate
each Third-Party Sender to provide the ODFI • Who is responsible for detecting errors?
with any information that the ODFI considers
to be reasonably necessary to identify each • Who is responsible for correcting errors?
Originator for which the ODFI transmits entries.
Upon the receipt of a request from the ODFI for • In what time frame can errors be corrected?
such information, the Third-Party Sender must
provide the requested data to the ODFI within • Who will notify the Receiver of a reversing entry
two banking days. (e.g., the Originator, or ODFI/Third Party on
behalf of the Originator)?
• Warranties of/Indemnifications by Third-Party
Senders – Each Third-Party Sender that authorizes • Who is liable for any claim that may result from
an ODFI to transmit entries to a Receiver’s an error?
account warrants to the ODFI that the Originator
has agreed to assume the responsibilities of an Audit Trails
Originator, as required by the NACHA Operating ODFIs that use Third-Party Service Providers must
Rules. In any case in which the Originator fails establish procedures for tracing an entry into the
to perform its obligations as an Originator under ACH system. The organization that is the Sending
the Rules, the Third-Party Sender indemnifies Point is usually responsible for providing the
the ODFI against any loss. necessary data that demonstrates delivery to the
ACH Operator. In addition, some form of audit
• Performance of ODFI Obligations – If a Third- trail must be created in order to track the delivery
Party Sender performs any obligations of an of information from one party to the next until it
ODFI under the Rules, the Third-Party Sender reaches the Sending Point and, subsequently, the
must also perform the requirements of an ODFI ACH Operator.
under the Rules, and must warrant that it is
legally able to do so. The Rules do not relieve Returns/NOCs/Rejected Entries
the ODFI of any of its obligations when they are
Returns, notifications of change, rejected entries,
performed by a Third Party Sender.
and notice of rejected files or rejected batches
need to be handled expeditiously when they are
• Payment to ODFI – Each Third-Party Sender is
received by the ODFI. The ODFI is responsible for
obligated to make payment to the ODFI for all
determining, in its arrangements with Originators
credit entries and for all debit entries that are
and Third-Party Service Providers, who is
returned by the RDFI. In the event that the
responsible for handling these entries.
OG144 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
FIGURE 50-5
FIGURE 50-6
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG145
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 0 T H I R D - PA R T Y S E R V I C E P R O V I D E R S
The responsibilities of the RDFI in both examples that its Receiving Point is processing the ACH files
are outlined in the RDFIs chapters in Section III of in a manner that allows the RDFI to comply with
these Guidelines; however, the following provides the NACHA Operating Rules.
additional information on areas of importance that
should be addressed when a third party is used as Processing Functions
a Receiving Point, as in Example B. The Third-Party Service Provider as Receiving
Point can provide various levels of service to the
Agreements RDFI.
The RDFI needs to execute the appropriate
agreements with its ACH Operator in order to have Delivery Only
ACH files delivered to the proper Receiving Point. An RDFI may choose to use a third party simply
The RDFI should also enter into an agreement with to receive the ACH file. In this instance, the
the Third-Party Service Provider. This agreement Receiving Point usually is able to receive the file
should define the responsibility, accountability, more quickly or more efficiently than the RDFI.
and liability for the handling of ACH files. It All ACH Operators require electronic delivery to
should also address provisions for any additional Receiving Points. Using a third party with electronic
services the processor may offer to the RDFI, such delivery capability would enable the RDFI to meet
as processing returns, notifications of change, etc. the electronic delivery requirements of its ACH
Third-Party Service Providers should be aware that Operator. However, RDFIs that use third parties
the NACHA Operating Rules permit RDFIs to obtain as Receiving Points for the electronic delivery of
and retain ACH records electronically. For detailed ACH files must ensure that subsequent delivery
information on electronic records and electronic of the information to the RDFI is accomplished
record retention, refer to the Chapter 4 of these in such a manner as to ensure compliance with
Guidelines. the NACHA Operating Rules. For example, the
RDFI that uses a third party for electronic delivery
Warranties and Indemnifications and subsequently receives ACH information from
The RDFI is responsible for the entries made that third party via mail or courier will more than
available to it by the ACH Operator, even if the likely not be able to fulfill the requirements of an
RDFI utilizes a Third-Party Service Provider as a RDFI for funds availability and for meeting return
Receiving Point. The RDFI warrants that any Third- deadlines.
Party Service Provider that performs a function
of ACH processing on behalf of the RDFI with Delivery and Processing
regard to entries has conducted an annual audit An RDFI may choose to use a third party to receive
of compliance with the provisions of the NACHA and process its ACH activity. In this instance, the
Operating Rules and is otherwise in compliance third party usually posts the ACH entries to the
with the rules compliance audit requirements customers’ accounts for the RDFI and generates
governing the RDFI. reports to the RDFI indicating the functions it has
performed. The RDFI must receive these activity
The RDFI is identified by the Routing Number reports expeditiously in order to fulfill the various
in the Receiving DFI Identification Field of the responsibilities required of an RDFI for processing
Entry Detail Record of ACH files. The Receiving ACH entries, such as reviewing prenotifications,
Point is identified by the Routing Number in the initiating returns and notifications of change. The
Immediate Destination field of the File Header Third-Party Service Provider must ensure that all
Record. If these two numbers are different, the of the payment information is passed to the RDFI
organization represented by the number in the exactly as it was received from the ACH Operator.
Immediate Destination field is the Third-Party
Service Provider acting as a Receiving Point, and The processing function can also include data
the financial institution represented by the number retention, statement processing, fulfilling disclosure
in the Receiving DFI Identification field of the requirements, etc. The RDFI should also ensure
Entry Detail Record is the RDFI. Even if the RDFI that its processor is recognizing addenda records
is not the Receiving Point, the RDFI must ensure that accompany ACH entries and is processing
OG146 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 3 I N T E R P R E TAT I V E R U L E S
them according to regulatory requirements or the The annual audit under these rules compliance
specific requirements of the RDFI or the RDFI’s audit provisions must be completed by December
account holders. For additional information on 31 of each year.
processing addenda records for business Receivers,
see Chapter 39 of these Guidelines. The audit provisions contained in the Rules do not
prescribe a specific methodology to be used for
Additional Services the completion of an audit, but instead identify key
In addition to performing the processing functions rule provisions that should be examined during
for an RDFI to properly receive ACH entries, the audit process. ODFIs and their Third-Party
the third party may also handle returns and Service Providers, and RDFIs and their Third-Party
notifications of change for the RDFI. The RDFI Service Providers should rely on the guidance of
must ensure that the appropriate agreements have their auditors with respect to the specific auditing
been completed with the ACH Operator that will practices and procedures that must be followed.
enable the RDFI to use the Third-Party Service Please see Appendix Eight of the NACHA Operating
Provider for those functions. Rules for a complete list of audit requirements.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG147
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 3 I N T E R P R E TAT I V E R U L E S
Association (either on its own behalf or on the Following an initial review of the issue, NACHA
behalf of its financial institution members), (3) an staff will forward the issue, along with a summary
ACH Operator, (4) a member of the NACHA Board of its preliminary evaluation of the issue, as
of Directors, or (5) NACHA staff. described above, to the Rules & Operations
Committee for action.
The request for interpretation must be submitted in
writing on the official letterhead of one of the ACH RULES & OPERATIONS COMMITTEE
participants defined above and must be signed by ACTION ON REQUEST FOR
an officer of the organization. INTERPRETATION
A written request for interpretation of the Rules Upon receipt of a written request for rules
must, at a minimum, include the following interpretation and appropriate documentation from
information: NACHA staff, the Rules & Operations Committee
will conduct an evaluation of the request and
• a detailed description of the issue or business determine which of the following criteria is
process to be evaluated; applicable:
• a complete analysis (i.e., legal, rules, etc.) of the The issue is a misinterpretation of existing rules
1.
issue or business process, as applicable; and does not raise an issue of significance.
2. appears to require a rule amendment to address 3. The issue requires a formal interpretation of
the concern; or the Rules.
OG148 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
CHAPTER 54 RETURN FEE ENTRIES
wide, it will, with the assistance of NACHA staff, PERIODIC REVIEW OF WRITTEN
develop a recommended interpretation (with INTERPRETATIONS
appropriate legal review) and forward that
When amendments to the NACHA Operating Rules
written interpretation to the NACHA Board of
are implemented, it is possible that the change
Directors for its review, approval, and issuance.
may affect a section of the Rules about which a
All formal, written interpretations will include a
formal interpretation has been issued. In such
reference to the section(s) of the Rules to which
situations, the Rules & Operations Committee
the interpretation relates.
will review existing written interpretations to
determine whether such interpretations are still
NACHA BOARD OF DIRECTORS’ ACTION relevant and appropriate. If the Committee makes
ON PROPOSED INTERPRETATION a recommendation that these interpretations
The NACHA Board of Directors will review all should be removed, the Board of Directors would
proposed interpretations of the Rules recommended vote on such recommendation.
by the Rules & Operations Committee. If such
interpretations are approved by the Board, they
will be issued to the membership as discussed
later in this Chapter. In the event that a proposed CHAPTER 54
interpretation requires modification, the Rules
& Operations Committee will be requested to Return Fee Entries
develop a revised interpretation, which will be
re-presented to the Board for further review and
approval. A Return Fee is a fee charged by an Originator
(such as a merchant or biller) to a Receiver for a
debit Entry or other item (such as a check) that
CONFLICTS OF INTEREST
was returned for insufficient or uncollected funds.
Members of the Rules & Operations Committee or Many merchants and billers assess a Return Fee to
Board of Directors that represent an organization help recover costs associated with the collection
requesting the issuance of a formal rules of payments returned unpaid, including payments
interpretation will be precluded from participating returned because of insufficient or uncollected
in the development and approval process for that funds.
particular rules interpretation to avoid the potential
for any conflict of interest. Return Fees are often governed by state law. Most
states and the District of Columbia explicitly allow
ISSUANCE OF FORMAL RULES for the collection of a Return Fee when a check or
INTERPRETATIONS ACH debit is dishonored. Typically, the maximum
Once approved by the NACHA Board of Directors, amount of the return fee ranges from $20 to $50;
a formal, written interpretation of the NACHA it may also be calculated as a percentage of the
Operating Rules will be distributed to the NACHA face value of the check or ACH debit. Most states
family in the form of an Operations Bulletin. require notification to the check writer that a
These Operations Bulletins will also be accessible return fee will be assessed if the item is returned
via NACHA’s website. unpaid.
Formal rules interpretations will also be published COLLECTION OF RETURN FEES VIA
within the NACHA Operating Rules & Guidelines: THE ACH NETWORK
A Complete Guide to Rules Governing the ACH Originators may choose to collect Return Fees
Network and included as part of the ACH Rules via the ACH Network through the initiation of a
Online. Return Fee Entry. A Return Fee Entry is defined as
a Single-Entry debit to the Receiver’s account for
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG149
S E C T I O N V I – S p e c i a l To p i c s
CHAPTER 54 RETURN FEE ENTRIES
the purpose of collecting a Return Fee. ACH debit is authorized or the underlying check
is accepted. Notice meeting the requirements
An Originator may originate a Return Fee Entry, of Regulation E satisfies the authorization
to the extent permitted by applicable legal requirements for a Return Fee Entry regardless of
requirements, in relation to the return of: whether the account to be debited is a Consumer
Account or a non-Consumer Account.
(a) a debit Entry to a Consumer Account of a
Receiver; The notice must include the following, or
substantially similar, language:
(b)
an ARC, BOC or POP Entry to a non-
Consumer Account of a Receiver; or “If your payment is returned unpaid,
you authorize us to make a one-time
(c) an item that was eligible to be converted electronic fund transfer from your
to a debit Entry, but was not converted to account to collect a fee of [$ ];”
an Entry.
or
An Originator may initiate a Return Fee Entry based
on the return of an ACH debit Entry identified “If your payment is returned unpaid,
above only if that Entry has been returned for you authorize us to make a one-time
insufficient or uncollected funds and contains electronic fund transfer from your
the return reason code R01 or R09. For a Return account to collect a fee. The fee will be
Fee Entry based on the return of a Check, the determined [by/as follows]: [ ].”
returned Check must be marked to indicate that it
was returned due to “Not Sufficient Funds, “ NSF,” A Return Fee Entry authorized by notice must be
“Uncollected Funds,” or comparable language. originated using the PPD Standard Entry Class
Code. More detailed information on formatting
OBLIGATIONS OF ORIGINATORS Return Fee Entries is provided later within this
chapter.
Agreements with ODFIs
An Originator must enter into a contractual The following are examples of how Originators
agreement with the ODFI for the origination of can obtain authorization for a Return Fee Entry
ACH payments, in which the Originator agrees via notice.
to be bound to the requirements of the NACHA
Operating Rules. Originators should work with – A merchant accepts a check eligible for
their ODFIs to determine what specific issues, if conversion from a customer but does not
any, should be included within that agreement convert the check to ACH (i.e., the merchant
with respect to the origination of Return Fee processes the payment as a check). The
Entries (e.g., formatting requirements, processing merchant can obtain authorization for a
obligations, timing, etc.). Return Fee Entry by posting notice at the
point-of-sale in conformance with Regulation
Authorization Requirements for Return E. If the check is returned for insufficient or
Fee Entries uncollected funds, the merchant can originate
Originators must obtain the Receiver’s authorization a Return Fee Entry.
prior to initiating a Return Fee Entry. This can be
accomplished in either of two ways. – A merchant accepts a check from a consumer
and converts it to a BOC Entry. Authorization
Authorization by Notice for the BOC Entry is obtained in conformance
Originators may obtain authorization for a Return with Regulation E and the Rules by posting
Fee Entry by providing the Receiver/check writer a conspicuous notice with clear and readily
with notice that conforms to the requirements understandable terms, and then obtaining the
of Regulation E at the time that the underlying customer’s signed check. The merchant can
OG150 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
CHAPTER 54 RETURN FEE ENTRIES
obtain authorization for a Return Fee Entry by 2. Telephone – the merchant directs
conforming to the Regulation E requirements the customer to call into a customer
in the same notice that served as authorization service center, where the customer
of the original BOC Entry. If the BOC Entry provides authorization for an ACH
is returned for insufficient or uncollected debit for the Return Fee (SEC Code
funds, the merchant can originate a Return “TEL”);
Fee Entry.
3. Web site – the merchant directs the
– A billing company obtains a written, signed customer to a corporate web site,
authorization to enroll a customer in monthly where the customer authorizes an
Direct Payment, which is collected via a ACH debit for the Return Fee (SEC
recurring PPD debit. The Originator can Code “WEB”).
obtain authorization for a Return Fee Entry
by providing notice in conformance with – A billing company obtains a written, signed
Regulation E in the authorization for recurring authorization to enroll a customer in monthly
debits. If any PPD debit is returned for Direct Payment, which is collected via a
insufficient or uncollected funds, the billing recurring PPD debit. One of the PPD debits is
company can originate a Return Fee Entry returned for insufficient or uncollected funds.
related to that specific PPD debit. The biller subsequently contacts the customer,
who agrees to pay a return fee. The customer
Authorization Other Than by Notice goes to the billing company’s web site and
Originators may also obtain authorization for authorizes an ACH debit for the return fee
a Return Fee Entry in any other form permitted (SEC Code “WEB”).
by the Rules with respect to any SEC Code for a
debit Entry to a Consumer Account (e.g., written Formatting Requirements
authorization for PPD or WEB, oral authorization Standard Entry Class Code
for TEL). A Return Fee Entry authorized in When notice is used as authorization, the
this manner must comply with the formatting Originator must format the Return Fee Entry as
requirements of the particular SEC Code used. a PPD (Prearranged Payment and Deposit) Entry.
More detailed information on formatting Return When the Return Fee Entry is authorized in a
Fee Entries is provided later within this chapter. manner other than by notice, the Originator must
format the Return Fee Entry using the Standard
Below are examples of how an Originator can Entry Class Code that corresponds to the manner
obtain authorization for a Return Fee Entry in a in which authorization was obtained (i.e., PPD
manner other than by notice. for written authorization, WEB for written
authorization via the Internet or mobile device,
– A merchant accepts a check from a customer TEL for oral authorization).
and does not convert the check to ACH (i.e.,
processes as a check). The check is returned Company Entry Description
for insufficient or uncollected funds. The
Originators must populate the Company/Entry
merchant subsequently contacts the customer,
Description field of each Return Fee Entry with
who agrees to pay a Return Fee. The merchant’s
the words “RETURN FEE” (all capitals) to enable
options for obtaining authorization include:
Receivers to identify Return Fee Entries to their
accounts. This descriptive statement applies to all
1. In-person – the merchant directs
Return Fee Entries, regardless of the manner in
the customer to return to the store
which authorization was obtained, the nature of
or location, and obtains written
the underlying transaction, or the SEC Code used
authorization for an ACH debit for
in the Entry.
the Return Fee (SEC Code “PPD”);
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG151
S E C T I O N V I – S p e c i a l To p i c s
CHAPTER 54 RETURN FEE ENTRIES
OG152 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 5 H E A LT H C A R E E F T R E G U L AT I O N S A N D T H E A C H N E T W O R K
CHAPTER 55
PATIENT PROTECTION AND
AFFORDABLE CARE ACT
Healthcare EFT Regulations and On March 23, 2010, the Patient Protection and
the ACH Network Affordable Care Act (ACA) became law. Section
1104, Administrative Simplification, of the
Affordable Care Act requires the Department of
This chapter provides information on recent Health and Human Services (HHS) to adopt a
Federal healthcare regulations, the adoption standard for healthcare EFT transactions, as well
of a healthcare electronic funds transfer (EFT) as industry-vetted operating rules regarding the
standard, and the adoption of healthcare industry use of the transactions. On January 10, 2012,
operating rules for EFT and electronic remittance HHS issued an Interim Final Rule with Comment
advices (ERA). The chapter also describes the (“January IFC”) on Administrative Simplification:
impacts of this healthcare legislation on financial Adoption of Standards for Health Care Electronic
institutions and outlines efforts undertaken by Funds Transfers (EFTs) and Remittance Advice.9
NACHA in support of the healthcare industry. For The January IFC: 1) adopted the NACHA Corporate
detailed information on the Healthcare EFT & Credit or Debit with Addenda Record (CCD+) as the
ERA Operating Rules, please refer to the Council standard for healthcare EFT; 2) adopted the ASC
on Affordable Quality Healthcare (CAQH)’s X12 835 TRN Segment (“reassociation number”) as
Committee on Operating Rules for Information the standard for the data content of the Addenda
Exchange (CORE) at http://www.caqh.org/CORE_ Record of the CCD; and 3) discussed NACHA’s
phase3.php role in the development and maintenance of the
CCD+ through the NACHA Operating Rules.10
BACKGROUND – LEGISLATION AND The IFC became a final rule on July 10, 2012 and
HEALTHCARE INDUSTRY RULES clarified that if a healthcare provider requests that
Since 1996, three major pieces of healthcare a health plan use the standard EFT transaction (the
legislation have been passed that address CCD+), the health plan is required to do so. The
administrative simplification within the healthcare compliance date for all covered entities is January
industry via the adoption of standard transactions 1, 2014.
between health plans and healthcare providers.
These laws are the: The Healthcare EFT Standard
In the January IFC, HHS divided the ACH
• Health Insurance Portability and Accountability transaction flow into three chronological stages,
Act of 1996 (HIPAA) each of which includes a separate electronic
transmission of information:
• American Recovery and Reinvestment Act
(ARRA) – 2009, which contained the Health • Stage 1 – Payment Initiation – a health plan’s
Information Technology for Economic and order, instruction, or authorization to its financial
Clinical Health Act (HITECH) institution to make a healthcare claim payment
using an electronic funds transfer (EFT) through
• Patient Protection and Affordable Care Act the ACH Network.
(ACA) of 2010
• Stage 2 – Transfer of Funds – the transfer and
This chapter focuses on the new regulations and settlement of funds from one account to another
mandates included in the ACA and their impact on account.
the financial services industry.
9
http://www.gpo.gov/fdsys/pkg/FR-2012-01-10/pdf/2012-132.pdf
10
HHS finalized the rule on July 10, 2012 with no changes.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG153
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 5 H E A LT H C A R E E F T R E G U L AT I O N S A N D T H E A C H N E T W O R K
11
From CMS FAQs, “While the implementation specifications in the
2011 NACHA Operating Rules & Guidelines are the adopted standard
for the CCD+Addenda, any version of the NACHA Operating Rules &
Guidelines can be used as long as the implementation specifications for
the CCD+Addenda do not differ from those in the 2011 version.”
12
Note: HHS adopted only the chapter and appendices of the NACHA
Operating Rules that include implementation specifications for the
CCD+Addenda rather than all rules governing CCD entries.
OG154 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 5 H E A LT H C A R E E F T R E G U L AT I O N S A N D T H E A C H N E T W O R K
Health Provider’s
Plan’s FI FI
Treasury Treasury
(ODFI) (RDFI)
Adoption of Healthcare Operating Rules • Phase III CORE EFT & ERA Reassociation
On August 20, 2012, HHS issued another IFC (CCD+/835) Rule; and
(“August IFC”) on Administrative Simplification:
Adoption of Operating Rules for Health Care • Phase III CORE Health Care Claim Payment/
Electronic Funds Transfers (EFT) and Remittance Advice Infrastructure Rule
Advice Transactions13. The August IFC adopted
the CAQH CORE Phase III CORE EFT & ERA Of the five CORE Operating Rules adopted, the
Operating Rule Set as the industry-vetted operating EFT & ERA Reassociation Rule will have the most
rules for EFT and ERA. The CORE rule set includes direct impact on financial institutions for the
the following: reasons below.
• Phase III CORE EFT Enrollment Data Rule; • It requires health plans to proactively inform
healthcare providers during EFT enrollment that
• Phase III CORE ERA Enrollment Data Rule; the healthcare provider will need to contact its
financial institution to arrange for the delivery
• Phase III CORE Uniform Use of CARCs and of the CORE-required Minimum CCD+ Data
RARCs14 Rule, including CORE-required Code Elements. It also states that the “healthcare
Combinations for CORE-defined Business
Scenarios;
http://www.gpo.gov/fdsys/pkg/FR-2012-08-10/pdf/2012-19557.pdf
13
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG155
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 5 H E A LT H C A R E E F T R E G U L AT I O N S A N D T H E A C H N E T W O R K
provider must proactively contact its financial (PHI) they receive and process on behalf of their
institution to arrange for the delivery of the customers. The healthcare EFT standard does not
CORE-required Minimum CCD+ Data Elements.” carry PHI in the addenda record. It is mandated to
carry only the TRN Reassociation Trace Number,
• It identifies the Core-required Minimum CCD+ which does not contain PHI. As a result, RDFIs
Data Elements as three fields in the ACH CCD that only receive and process the CCD+Addenda
record that are used for reassociation of the for their healthcare customers are not subject to
ACH Entry and the Electronic Remittance Advice HIPAA Privacy and Security regulations.
(ERA): 1) the Effective Entry Date field (CCD
Record 5, Field 9); 2) the Amount field (CCD The Medicare EFT mandate, the identification of
Record 6, Field 6); and 3) the Payment Related the CCD+ as the healthcare EFT standard, and the
Information field (CCD Record 7, Field 3). development and implementation of the EFT &
ERA Reassociation Trace Number operating rules
Due to the CORE EFT & ERA Reassociation will impact all financial institutions that service
Rule, financial institutions that have healthcare healthcare providers and health plans.
providers as customers can expect an increase
in requests to receive this information for To meet the ACA goals for Administrative
reassociation. The August IFC estimates that there Simplification, more health plans will require EFT
are 708,842 healthcare providers in the U.S. It claims reimbursement payments for healthcare
further estimates that the current usage of EFT providers that accept their medical insurance
by the healthcare industry of 33 percent for all coverage, and a larger portion of the 2.5 billion
healthcare claim payments will rise to 84 percent health claims paid16 annually will move to EFT.
by 2023.15 The combination of the percentage For financial institutions, this shift has the potential
increase across a large number of entities would to impact not only the ACH department — with
result in a significantly larger number of healthcare additional volumes and mandatory delivery of the
EFT payments received by RDFIs, for which remittance information — but also the lockbox
reassociation information will be contained within and check processing departments as volumes
the ACH record. move from check to ACH, as well as the cash
management or treasury management areas as
Medicare Mandate healthcare providers and health plans request
The final rule also mandates the use of EFT additional services.
for the reimbursement of all Medicare claims
reimbursement, effective January 1, 2014. This should be viewed as an opportunity for
financial institutions to improve and strengthen
their relationships with their healthcare customers
International Healthcare Payments
through education and product or service outreach
The Final Rule recognizes that the healthcare EFT rather than a regulatory requirement. Healthcare
standard CCD+ Addenda record cannot be used for providers are sometimes unaware of products and
payments made to or from countries outside the services that financial institutions can provide to
United States and that all international transactions help them automate and improve their back-office
must utilize the NACHA IAT format. processing. Repackaging existing products (e.g.,
equipment and facilities loans, Direct Payment via
IMPACT OF HEALTHCARE LEGISLATION ACH for the collection of patient outstanding debt,
ON FINANCIAL INSTITUTIONS ACH Debit Blocks and Filters, etc.) that focus on
The impact of healthcare legislation on financial proactive outreach and education to healthcare
institutions varies, depending on the products and customers can strengthen customer relationships
services they provide to the healthcare industry and demonstrate financial institutions’ willingness
and what, if any, Protected Health Information to help their healthcare customers meet new
healthcare legislation requirements.
ttp://www.gpo.gov/fdsys/pkg/FR-2012-08-10/pdf/2012-19557.pdf
h
15 16
cKinsey Quarterly. Overhauling the US health care payment system,
M
Table 6, EFT and ERA Usage between 2013 and 2023 June 2007, page 8.
OG156 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 5 H E A LT H C A R E E F T R E G U L AT I O N S A N D T H E A C H N E T W O R K
Delivery of Payment Related Information For financial institutions, this means that any
Healthcare customers’ increased demand for the healthcare provider customers not currently
delivery of the data contained in the Payment receiving the payment related information from the
Related Information Field of the CCD+ Addenda CCD+ transactions will be requesting the CORE-
Record will impact all financial institutions. The required Minimum CCD+ Reassociation Data
payment related information for the healthcare Elements from customer-facing staff (e.g., branch
CCD+ will contain the TRN Reassociation Trace staff, customer service staff, cash management
Number created by the health plan. This number staff, etc.). Financial institutions will need to
allows the healthcare provider to tie the CCD+ recognize requests for CORE-required Minimum
payment to the correct ERA, which is currently CCD+ Reassociation Data Elements and either
received through another channel. The ERA direct healthcare providers to appropriate staff to
contains information on the paid claim, along with setup the information delivery service, or setup
any adjustments to the claims adjudication process. the service for them.
Readers should note that, among ACH participants, The delivery of the contents of the Payment Related
the Payment Related Information is commonly Information Field is required by the NACHA
referred to as the “remittance information.” For a Operating Rules once requested by the Receiver;
CCD that is a Health Care EFT, the Payment Related after such a request it is not an optional service.
Information will always contain the “reassociation All financial institutions must be able to deliver
number” (i.e., the ASC X12 835 TRN Segment), and the information contained in the Payment Payment
not detailed remittance information that contains Related Information field of the CCD+ Addenda
Protected Health Information. Readers should not Record to the healthcare providers (or any
confuse the common ACH usage of “remittance Receiver) if it is requested. The NACHA Operating
information” with the terms “remittance advice” Rules do not define how the information must be
or “electronic remittance advice (ERA)” as used delivered; rather, the delivery method to be utilized
in the health care industry to mean the detailed is determined between the financial institution and
explanation of benefits. the healthcare provider. Financial institutions may
offer a variety of methods to deliver the remittance
TRN Reassociation Trace Number data (e.g., fax, print and mail, email, Internet, or
The TRN Reassociation Trace Number is the key direct send) depending on their capabilities and
piece of information that the healthcare provider customer demand.
must have to tie the EFT payment to the ERA
and to update the patient payment records. The While not addressed within the NACHA Operating
identification of information contained in the Rules, NACHA recommends, as a best practice,
Payment Related Information field of the Addenda that RDFIs require a healthcare provider to enroll
record as part of the CORE-required Minimum only once in order to receive all of their CCD+
CCD+ Reassociation Data Elements will impact remittance information, applying the provider’s
financial institutions. During the EFT enrollment request to the receipt of all future CCD+ entries.
process, health plans will be required to instruct
healthcare providers to request the delivery of the
“CORE-required Minimum CCD+ Reassociation
Data Elements” from their financial institutions.
The CORE EFT & ERA Reassociation Rule will also
require healthcare providers to ask their financial
institutions for the “CORE-required Minimum
CCD+ Reassociation Data Elements.”
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG157
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 5 H E A LT H C A R E E F T R E G U L AT I O N S A N D T H E A C H N E T W O R K
COMPARING THE ACH TRACE NUMBER Trace Number used by healthcare providers to tie
AND THE TRN REASSOCIATION TRACE the EFT payment to the ERA.
NUMBER
Figure 55-2 identifies the differences between the
ACH Trace Number and the TRN Reassociation
FIGURE 55-2
SOURCE • NACHA CCD+ Field 11 of Entry Detail Record • HIPAA-adopted ASC X12N 005010X221 835, Table 1
TRN Reassociation Trace Number Segment (see Note 1
• The ACH Trace number is assigned by the ODFI as
below) TRN02-127 Trace Number
specified in the NACHA Operating Rules
• ASC X12 TRN Reassociation Trace number is placed
in the Payment Related Information field of the CCD+
Addenda Record (this number is assigned by the payer)
PRIMARY • Uniquely identifies each Entry within a batch in an ACH • Uniquely identifies the transaction set and aids in
FUNCTION input File reassociating payments and remittance advices that
have been separated.
• Source: HIPAA-adopted ASC X12N 005010X221 835
DELIVERY TO • Flows unchanged from the ODFI to the RDFI through • ASC X12 TRN Reassociation Trace Number is placed
HEALTHCARE the ACH Network in the CCD+ Addenda Record Payment Related
PROVIDER Information field; flows through the ACH Network
unchanged
• Flows unchanged from the payer to the ODFI, through
the ACH Network to the RDFI and ultimately to the
healthcare provider
OG158 2 0 1 3 O P E R AT I N G G U I D E L I N E S
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 5 H E A LT H C A R E E F T R E G U L AT I O N S A N D T H E A C H N E T W O R K
ISSUES • The ACH Trace Number is not used to reassociate the • When the CCD Entry does not include the Addenda
EFT and ERA; it is used primarily for customer service Record containing the Payment Related Information
and transaction research, and to aid in identifying field, the CCD cannot carry the ASC X12 TRN
returned transactions Reassociation Trace Number
• If a health plan creates an ACH Trace Number, it will • The NACHA Operating Rules require the RDFI to
be modified or overwritten by the ODFI to conform with provide the ASCX12 TRN Reassociation Trace Number
NACHA Operating Rules’ requirements and the ODFI’s in the CCD+ Payment Related Information field to the
numbering system healthcare provider by opening of business on the
2nd banking day after Settlement Date – if it has been
requested by the healthcare provider
• The NACHA Operating Rules do not specify how this
information is provided – healthcare providers should
contact their banks to arrange for the method and timing
of delivery.
EXPLANATORY The ACH Trace Number and the X12 TRN Reassociation Trace Number are NOT the same number.
NOTE 3
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG159
S E C T I O N V I – S p e c i a l To p i c s
C H A P T E R 5 5 H E A LT H C A R E E F T R E G U L AT I O N S A N D T H E A C H N E T W O R K
TRN *1*12345*1512345678*9999999\
OG160 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION VII – Appendices
APPENDIX A HISTORY OF THE ACH SYSTEM
Appendices
exchange pilot project, with a goal of establishing
a nationwide ACH Network if the pilot project
proved a viable means of transferring funds.
By the end of 1977, the pilot had demonstrated
that the ACH would prove a workable means of
transmitting certain types of electronic payments
throughout the country. The next logical step was
APPENDIX A
the expansion of the program to provide for a
History of the ACH System coast-to-coast ACH Network. Arrangements were
made between NACHA and the Federal Reserve
System to implement an interregional exchange
The financial industry recognized the imperative system by the end of 1978. The ACH Network
need to improve the nation’s payments system in allowed a financial institution in one geographic
the late 1960s. Special task forces began to develop region to originate and/or receive entries from
a workable alternative to paper checks before the an ACH Operator in another geographic region.
volume became overwhelming. A direct result Processing arrangements and agreements had to
of the early groundwork was the establishment be in place prior to the handling of entries in this
of the first automated clearing house (ACH) for manner.
the exchange of paperless entries, the Calwestern
Automated Clearing House Association (CACHA), Significant changes have occurred since the initial
in 1972. At the same time, several other clearing development of the system. In 1979, format
house associations set up Special Committees on revisions to support Customer Initiated Entries
Paperless Entries (SCOPE) to implement similar (CIE) and Machine Transfer Entries (MTE) were
automated facilities. In most areas, agreements introduced to support new services. In 1981, an
were made between the local ACH associations Extended Processing Cycle, which permits a next-
and the Federal Reserve Bank serving the area day settlement with a later cutoff for Originators, was
to provide the facilities, equipment, and staff to implemented to provide for more rapid collection
operate an automated clearing house. of funds for corporate consolidation. This cycle
was initially restricted to debits and delayed ACH
As the number of ACH associations increased, files but was later expanded to support electronic
some elected to contract with the regional Federal return entries. Restrictions were later removed so
Reserve Bank or a private organization to operate any transaction could be processed in that cycle.
ACH processing facilities. Those ACH associations
that elected to operate their own facilities settled In 1982, NACHA sponsored a study in which
transactions through the local Federal Reserve Bank. corporations defined their needs for the movement
In 1974, the National Automated Clearing House of both funds and other data. As a result, the
Association (NACHA) was formed to coordinate NACHA Operating Rules were modified to support
the ACH movement nationwide. By 1978, there corporate transfers. These modifications permitted
were multiple ACH associations covering the entire multiple addenda records to be used with each
continental United States, operating under the funds transfer entry, thus enabling the Originator
standards established by NACHA. Alaska, Hawaii, to supply accounting and other information
Guam, and Puerto Rico are also served by ACH concerning the transaction to the Receiver.
associations.
The Corporate Trade Payment (CTP) format
For the most part, an ACH Operator processed was developed to permit the transmission of
entries on a local basis, serving the depository remittance information to the Receiver using a
financial institutions in its geographic area of fixed field format. During the same time frame in
responsibility. However, in early 1977, as a result which CTP was introduced, the American National
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG161
SECTION VII – Appendices
APPENDIX A HISTORY OF THE ACH SYSTEM
Standards Institute’s (ANSI) Accredited Standards As NACHA moved through the 1990s, the use of ANSI
Committee (ASC) X12 was working to develop ASC X12 standards for electronic data interchange
electronic data interchange standards for common (EDI) became more popular among corporations.
business transactions and other transactions This increased popularity encouraged greater use
between corporate buyers and sellers. All ANSI of both the CCD and CTX formats. Both ODFIs
ASC X12 messages, including the X12.4 Payment and RDFIs began to offer a variety of services to
Order/Remittance Advice, use a variable length corporations for the processing of remittance data,
message with a broad data dictionary. Because on both the originating and receiving sides of the
the CTP format and X12.4 Payment Order/ ACH transaction.
Remittance Advice format were not compatible,
NACHA and ANSI committees met in 1985 to In 1992, a new application, the Death Notification
resolve these discrepancies. The ANSI ASC X12.4 Entry (DNE), was adopted to support the efforts
Payment Order/Remittance Advice was modified of the U.S. Department of the Treasury to allow
and additional fields were added to communicate a government agency (e.g., Social Security
information concerning the transfer of funds when Administration) to notify a financial institution
transmitting through several payment mechanisms. that the recipient of a government benefit payment
These new fields permitted an Originating has died. Also new in 1992, the Destroyed Check
Depository Financial Institution (ODFI) to convert Entry (XCK) application established the means for
the ASC X12.4 Payment Order/Remittance Advice a financial institution to utilize the ACH Network
to the CTP format. to facilitate the clearing of certain checks when
those checks have been inadvertently destroyed in
A new ACH transaction, called the Corporate Trade the check clearing process.
Exchange (CTX), was developed so the X12.4
data could accompany the funds transfer without In 1996, the Automated Enrollment Entry (ENR)
reformatting. The CTX format incorporated the was developed as an optional alternative to the
strengths of both the NACHA fixed record format paper enrollment methods used by many Federal
and the variable length record format of ASC X12. Government Agencies, enabling the ACH Network
The traditional 94-character fixed format was to be utilized by depository financial institutions
used in the Company/Batch Records so the funds to transmit consumer ACH credit enrollment
transfer could be executed with the ACH software information on behalf of their customers to Federal
already in place. A revised addenda record was Government Agencies. In 1998, the Automated
developed that continued the support of the Enrollment process was expanded to allow
94-character standard. However, 80 characters enrollments for both future ACH credit and ACH
of each addenda record were made available for debit transactions to be transmitted to Federal
payment related information. This innovation Government Agencies by DFIs on behalf of both
meant that the ANSI ASC X12.4 Payment Order/ consumers and businesses.
Remittance Advice could be transmitted via the
ACH delivery mechanism by using these payment- In 1997, the ACH Network was expanded to permit
related fields; the funds transfer could be effected; the transmission of Acknowledgment Entries
and the payment-related data could be delivered (ACK/ATX) by RDFIs, at their option, to indicate
to the receiving corporation in the X12.4 format. that corporate credit entries (CCD or CTX entries)
With this approach, the funds transfer, accounting, have been received by the RDFI and that the RDFI
and payment related information remain together. will attempt to post the payments to the Receivers’
As a result of the versatility of the CTX format, the accounts.
CTP format was eliminated in September 1996.
In 1998, the ACH Network began to accommodate
Point-of-Sale specifications, effective in 1985 and re-presented check entries, which allow for the
amended in 1988, allow the ACH to be used as a truncation and electronic collection of checks that
delivery mechanism for debit card transactions. are returned due to insufficient or uncollected
funds. In September 2000, a new Standard Entry
OG162 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION VII – Appendices
APPENDIX A HISTORY OF THE ACH SYSTEM
Class Code, RCK, was implemented for this In 2006, the rules governing the ARC and POP
application. applications were further modified to enable
Originators to more readily identify business
In 1999, the ACH Network was further expanded checks that are ineligible for conversion to
to test the acceptance of two additional ACH debit electronic check transactions and exclude them
applications designed to facilitate the electronic from their ACH processing. Specifically, checks or
conversion/truncation of consumer check sharedrafts bearing an Auxiliary On-Us Field within
payments made either in-person at the point-of- the MICR line, and those checks or sharedrafts in
purchase (point of purchase entries) or delivered an amount greater than $25,000, became ineligible
to the Originator via the U.S. mail or at a dropbox for conversion to ARC and POP entries.
location (accounts receivable entries). These
debit applications, which required a consumer to In 2007, a new Standard Entry Class Code,
provide the merchant with a check from which the BOC (Back Office Conversion Entries), was
consumer’s bank routing and account information implemented, establishing the legal framework
would be drawn, provided Originators with an and technical specifications to enable retailers and
alternative to presenting the consumer’s check other merchants to accept checks for payment at
through the check clearing system. Short-term the point of purchase and convert those checks to
rules defining the legal framework and allowing ACH debit entries during back office processing.
testing for this type of check conversion/truncation
activity were established using the PPD format. In 2009, a new Standard Entry Class Code, IAT
(International ACH Transaction), was adopted to
In 2000, distinct rules and Standard Entry Class provide a more robust rules framework for the
Codes (CBR for Corporate Cross-Border Payment exchange of international payments via the ACH
and PBR for Consumer Cross-Border Payment) Network, replacing the earlier CBR and PBR
were implemented to facilitate the transmission applications. The Rules governing IAT entries
of payments internationally. Also in 2000, a new require clear identification of all international
SEC Code, POP (Point of Purchase Entries), was payment transactions transmitted via the ACH
implemented, establishing the legal framework Network and mandate the inclusion of specific
and unique technical specifications to support information defined within the Bank Secrecy Act’s
the conversion of checks presented at the point “Travel Rule” so that all parties to the transaction
of purchase and replacing the short-term rules for have the information necessary to comply with U.S.
this application. law, which includes the programs administered by
the Office of Foreign Assets Control (OFAC).
During 2001, two new Standard Entry Class
Codes, WEB (Internet-Initiated Entries) and TEL In response to the rapid growth and use of
(Telephone-Initiated Entries), became effective. mobile phones to access the Internet, the Internet-
These SEC Codes facilitate access to the ACH Initiated Entry (WEB) was enhanced in 2010 to
Network by providing Originators with additional include this communication channel. WEB is now
options (i.e., the Internet and the telephone) defined as an Internet-Initiated/Mobile Entry, and
for obtaining a Receiver’s authorization for ACH adds debit entries that are authorized or initiated
debit entries while, at the same time, heightening over the Internet using a mobile device to the WEB
security requirements for ACH entries authorized description.
via alternative media that bear a potentially greater
risk profile. Although the ACH Network has always provided
a channel for Originators to collect Return Fees
In 2002, a new Standard Entry Class Code, ARC electronically, the NACHA Operating Rules did not
(Accounts Receivable Entries), was introduced and always distinguish an ACH debit for the purpose
established a legal framework for the conversion of collecting a Return Fee from any other ACH
of consumer checks received by Originators via debit, nor were there explicit rules related to
the U.S. mail or at a dropbox location into ACH the origination of entries for such purposes. An
debit entries to consumers’ accounts. Originator was required to have obtained the
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG163
SECTION VII – Appendices
APPENDIX A HISTORY OF THE ACH SYSTEM
Receiver’s explicit authorization in order to collect being able to identify a particular transaction as a
the fee via the ACH Network, with the general Return Fee and in reconciling his account, leading
requirement that the authorization be signed or to customer service inquiries for RDFIs. In 2010,
similarly authenticated by the Receiver. The manner these issues were addressed through rule changes
in which authorization was obtained depended specifically requiring authorization and transaction
upon the application used for the collection of the identification requirements for ACH debits used to
fee. A written authorization was required for a PPD collect Return Fees.
(or WEB if via the Internet); a return fee collected
by a TEL Entry would require a separate call and The chart in Appendix B of these Guidelines
compliance with the TEL rules. gives a brief overview of the Standard Entry Class
Codes currently used in the ACH Network, and a
By contrast, in a 2006 amendment to Regulation reference for more information.
E, the Federal Reserve Board clarified its position
allowing businesses to collect return fees via an
electronic funds transfer. To do so, a business
must provide notice to the customer that a one-
time return item fee will be collected electronically
from the customer’s account if an underlying
transaction is returned unpaid. As a result of this
revision to Regulation E, the Rules became more
restrictive than the regulation.
OG164 2 0 1 3 O P E R AT I N G G U I D E L I N E S
APPENDIX B
2 0 1 3 O P E R AT I N G G U I D E L I N E S
Automated Accounting Non-Monetary N/A Agreement — ODFI/RDFI Section I - General Information
ADV Advice and ACH Operator Chapter 1 - Overview of the System
Accounts Receivable Entry Debit Consumer or Written Notice = 2002 Section V - Standard Entry Class Codes
ARC Non-Consumer Authorization Chapter 37 - Accounts Receivable Entries
Single Entry
Financial EDI Non-Monetary N/A N/A 1997 Section V - Standard Entry Class Codes
ATX Acknowledgement (Acknowledges CTX Chapter 36 - Acknowledgement Entries
Credit Entry)
Back Office Debit Consumer or Posted Notice and Written 2007 Section V - Standard Entry Class Codes
BOC Conversion Entry Non-Consumer Notice = Authorization Chapter 38 - Back Office Conversion Entries
Single Entry
Corporate Credit or Debit Credit or Debit Non-Consumer Agreement — Originator 1983 Section V - Standard Entry Class Codes
CCD Entry Single Entry or and Receiver Chapter 39 - Corporate Credit or Debit/Corporate
Recurring Entry Trade Exchange Entries
Customer Initiated Entry Credit Consumer Agreement — Originator 1979 Section V - Standard Entry Class Codes
CIE Originated and Receiver Chapter 40 - Customer Initiated Entries
Single Entry
Notification of Change or Non-Monetary Consumer or N/A 1980 ODFIs - Section II, Part One
Refused Notification of Non-Consumer Chapter 11
Change Originators - Section II, Part Two
COR
Chapter 19
RDFIs - Section II, Part Three
Chapter 28
Corporate Trade Credit or Debit Non-Consumer Agreement — Originator 1985 Section V - Standard Entry Class Codes
Exchange and Receiver Chapter 39 - Corporate Credit or Debit/Corporate
CTX
Single Entry or Trade Exchange Entries
Recurring Entry
OG165
SECTION VII – Appendices
A P P E N D I X B S TA N D A R D E N T R Y C L A S S C O D E C H A R T
STANDARD ENTRY CLASS CODES
OG166
STANDARD
TRANSACTION ACCOUNT AGREEMENT OR YEAR REFERENCES
ENTRY CLASS TITLE
TYPE TYPE AUTHORIZATION IMPLEMENTED IN GUIDELINES
(SEC) CODE
DNE Death Notification Entry Non-Monetary Consumer N/A 1992 Section V - Standard Entry Class Codes
(Federal Chapter 41 - Death Notification Entries
Government
Agency use
only.)
Automated Enrollment Entry Non-Monetary Non-Consumer Request by Receiver / 1996 Section V - Standard Entry Class Codes
SECTION VII – Appendices
Corporate —
Agreement between
A P P E N D I X B S TA N D A R D E N T R Y C L A S S C O D E C H A R T
Point-of-Purchase Entry Debit Consumer or Posted Notice and in 2000 Section V - Standard Entry Class Codes
Non-Consumer writing and signed or Chapter 44 - Point-of-Purchase Entries
POP
Single Entry similarly authenticated
Point-of-Sale Entry Debit Consumer In writing and signed or 1985 Section I - General Information
POS similarly authenticated Chapter 1 - Overview of the System
Single Entry
Prearranged Payment and Credit or Debit Consumer Consumer Debit — in 1975 Section V - Standard Entry Class Codes
Deposit writing and signed or Chapter 45 - Prearranged Payment and Depost
Single Entry or similarly authenticated. Entries
Recurring Entry
PPD
Consumer Credit — orally
or other non-written
means.
2 0 1 3 O P E R AT I N G G U I D E L I N E S
STANDARD ENTRY CLASS CODES
STANDARD
TRANSACTION ACCOUNT AGREEMENT OR YEAR REFERENCES
ENTRY CLASS TITLE
TYPE TYPE AUTHORIZATION IMPLEMENTED IN GUIDELINES
(SEC) CODE
Re-presented Check Entry Debit Consumer Posted Notice = 2000 Section V - Standard Entry Class Codes
RCK authorization Chapter 46 - Re-presented Check Entries
Single Entry
Shared Network Transaction Debit Consumer Agreement — ODFI and Section I - General Information
SHR RDFI Chapter 1 - Overview of the System
Single Entry
Telephone-Initiated Entry Debit Consumer Orally authorized over 2001 Section V - Standard Entry Class Codes
telephone = authorization Chapter 47 - Telephone-Initiated Entries
2 0 1 3 O P E R AT I N G G U I D E L I N E S
TEL
Single Entry or
Recurring En try
Truncated Entry Debit Consumer or Agreement — ODFI and Section I - General Information
TRC Non-Consumer RDFI Chapter 1 - Overview of the System
Single Entry
Truncated Enties Exchange Debit Consumer or Agreement — ODFI and Section I - General Information
TRX Non-Consumer RDFI Chapter 1 - Overview of the System
Single Entry
Internet-Initiated/Mobile Debit Consumer In writing and signed or 2001 Section V - Standard Entry Class Codes
Entry similarly authenticated = Chapter 48 - Internet-Initiated/Mobile Entries
WEB Single Entry or authorization (Revised to add
Recurring Entry Mobile 2010)
Destroyed Check Entry Debit Consumer or N/A 1992 Section V - Standard Entry Class Codes
XCK
Non-Consumer Chapter 49 - Destroyed Check Entries
OG167
SECTION VII – Appendices
A P P E N D I X B S TA N D A R D E N T R Y C L A S S C O D E C H A R T
SECTION VII – Appendices
APPENDIX C ISSUES TO BE ADDRESSED IN THE AGREEMENT BETWEEN THE ODFI AND THE ORIGINATOR
OR THIRD-PARTY SENDER
APPENDIX C
X X X X The place and time the Entries or Entry information is to be furnished by the Originator.
The level of security to be established for delivering the payment data from the
X X X X Originator to the ODFI, such as transmittals with authorized signatures, the method
used to verify authenticity of telecommunicated data, etc.
X X The time when funds are to be provided to the ODFI by the Originator.
The charges or fees by the ODFI for providing services to the Originator under the
X X X X
Origination Agreement.
Procedures for terminating the Origination Agreement and time frames under which the
X X X X
processing of Entries under that Origination Agreement will cease.
X X X X The right of the ODFI to terminate or suspend an agreement for breach of the Rules.
OG168 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION VII – Appendices
APPENDIX C ISSUES TO BE ADDRESSED IN THE AGREEMENT BETWEEN THE ODFI AND THE ORIGINATOR
OR THIRD-PARTY SENDER
The use of appropriate encryption standards for ACH Entries involving banking
X X X X
information that is Transmitted or exchanged via an Unsecured Electronic Network.
Responsibilities of the ODFI and Originator with respect to handling Acknowledgment
X
Entries, if such transactions are desired by the Originator.
An acknowledgment by the Originator that ACH transactions it originates comply with
X X X X
the provisions of U.S. law.
The Originator’s responsibility for matters warranted or agreed by the ODFI in the Rules
X X X X pertaining to Entries exchanged through the ACH Network, which may vary depending
on the Entry Type.
For International ACH Transactions, (IAT entries),
• The terms and conditions for the allocation of gains, losses and the assumption
X X X X
of risk for foreign exchange conversion.
• The rights and responsibilities of the ODFI in the event of an Erroneous Entry.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG169
APPENDIX D
OG170
Document Retention Schedule
Record of Entries One Year from Date Six Years from Date Operator or DFI - provide copy of Operator - Article Four,
Received or of Entry of Entry information relating to Entry if requested Section 4.5
Transmitted by DFI or other ACH Operator.
DFI - Article One, Subsection 1.4.1 & 1.4.2
Authorizations Two Years from Originator - provide copy to ODFI in order Article Two, Subsection 2.3.2.5
Termination or for the ODFI to provide to the requesting
Revocation of RDFI within ten Banking Days of request.
Authorization
Eligible Source Two Years from Originator - provide copy of front of Article Two, Subsection 2.5.1.5 (ARC)
Document for ARC & Settlement Date of Entry source document to ODFI in order for the
BOC (front only) ODFI to provide to the requesting RDFI Article Two, Subsection 2.5.2.5 (BOC)
within ten Banking Days of request made
APPENDIX D DOCUMENT RETENTION SCHEDULE
2 0 1 3 O P E R AT I N G G U I D E L I N E S
APPENDIX E
2 0 1 3 O P E R AT I N G G U I D E L I N E S
Of $25,000 Check Serial Number
Serial Number And Signed
Or Less Encoded In Magnetic Ink
By Receiver
Eligible Source Document Notice to Receiver Originator must use
via U.S. mail or dropbox. a reading device to
As of March 16, 2012, also capture the MICR line
ARC via a delivery service or in from the check.
person for payment of a
bill at a manned location.
Eligible Source Document Notice to Receiver Originator must use
at point-of-purchase or and copy of notice or a reading device to
manned bill payment similar language to capture the MICR line
BOC location for conversion Receiver at time of from the check.
during back-office transaction
processing
Originator must Eligible Source Document Notice to Receiver Source document is
use a reading at point-of-purchase or and copy of notice voided and returned to
device to capture manned bill payment or similar language the Receiver.
POP the MICR line location to Receiver at time
from the blank of transaction and a Source document has
check written authorization not been used for a prior
from the Receiver POP entry.
Must be in an An RCK is used to collect Notice to the Check is dated 180 days
amount less than the amount of a check that Receiver of the or less from the date of
$2,500 has been returned NSF or terms for initiating an the RCK entry.
uncollected funds RCK entry prior to
receiving the source Consumer accounts
RCK document to which only.
the RCK relates
2 times as a check,
1 time as RCK or
1 time as a check and
2 times as RCK.
OG171
APPENDIX E SOURCE DOCUMENT ELIGIBILITY CHARTS
SECTION VII – Appendices
INELIGIBLE SOURCE DOCUMENTS FOR ARC, BOC, POP, AND RCK ENTRIES
OG172
Check
Check That Check That Is An Check Drawn
Check Drawn On An Check Drawn On Check
Check Draft That Accesses Obligation Of A On The Treasury
Contains Investment A State Or Local Payable In
Payable Does Not Credit Card Financial Institution Of The United
Auxillary Company (As Government That A Medium
To Person Contain Account, Home (e.g. Official Check, States, A Federal
On-Us Field Defined In The Is Not Payable Other Than
Other Than Signature Of Equity Line, Or Cashier’s Check, Reserve Bank, Or
In The Micr Investment Through Or At A United States
Originator Receiver Other Form Of Travelers Check, A Federal Home
Line Company Act Participating DFI Currency
Credit Money Order) Loan Bank
Of 1940)
SECTION VII – Appendices
ARC
BOC
Check is
not required
to contain
POP
signature, but
APPENDIX E SOURCE DOCUMENT ELIGIBILITY CHARTS
cannot be a
paper draft
RCK
2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION VII – Appendices
A P P E N D I X F S A M P L E A U T H O R I Z AT I O N F O R D I R E C T D E P O S I T
APPENDIX F
Sample Authorization for Direct Deposit and Split Deposit via ACH
(ACH Credit)
Date___________ Signature(s)___________________________________________________________________
1
The NACHA Operating Rules do not require the consumer’s express authorization to initiate Reversing Entries to correct
erroneous transactions. However, Originators should consider obtaining express authorization of debits or credits to correct
errors.
2
Written credit authorizations must provide that the Receiver may revoke the authorization only by notifying the Originator in
the time and manner stated in the authorization. The reference to notification should be filled with a statement of the time and
manner that notification must be given in order to provide company a reasonable opportunity to act on it (e.g., “In writing by
mail to 100 Main Street, Anytown, NY that is received at least three (3) days prior to the proposed effective date of the termination
of authorization”).
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG173
SECTION VII – Appendices
A P P E N D I X G S A M P L E A U T H O R I Z AT I O N F O R D I R E C T PAY M E N T
APPENDIX G
Direct Payment via ACH is the transfer of funds from a consumer account for the purpose
of making a payment.
Checking Account/ Savings Account (select one) at the depository financial institution named below
(“DEPOSITORY”). I (we) agree that ACH transactions I (we) authorize comply with all applicable law.
Depository Name_________________________________
Amount of debit(s) or method of determining amount of debit(s) [or specify range of acceptable dollar
amounts authorized]: _________________________________________________.
I (we) understand that this authorization will remain in full force and effect until I (we) notify COMPANY
[insert manner of revocation, i.e., in writing, by phone, location, address, etc.] that I (we) wish to revoke
this authorization. I (we) understand that COMPANY requires at least [X days/weeks] prior notice in
order to cancel this authorization.2
Name(s)______________________________________________________________________________________
(Please Print)
Date___________ Signature(s)___________________________________________________________________
1
The NACHA Operating Rules do not require the consumer’s express authorization to initiate Reversing Entries to correct
erroneous transactions. However, Originators should consider obtaining express authorization of debits or credits to correct
errors.
2
Written debit authorizations must provide that the Receiver may revoke the authorization only by notifying the Originator in
the time and manner stated in the authorization. The reference to notification should be filled with a statement of the time and
manner that notification must be given in order to provide company a reasonable opportunity to act on it (e.g., “In writing by
mail to 100 Main Street, Anytown, NY that is received at least three (3) days prior to the proposed effective date of the termination
of authorization”).
OG174 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION VII – Appendices
A P P E N D I X H G U I D E L I N E S F O R C O N S U M E R A U T H E N T I C AT I O N
APPENDIX H
INTERNET/ONLINE
TELEPHONE1
NETWORK
Minimum Acceptable
Who Initiates Call? Minimum Acceptable Authentication
Authentication
RECURRING
Existing Relationship2 Similarly authenticate using Consumer (Receiver) or Option 1 (Confirmation of a previously-provided written
a method compliant with Company (Originator) authorization document): Similarly authenticate written terms
E-Sign4 and that evidences of authorization previously delivered to a consumer (Receiver)
the consumer’s (Receiver’s) using a method that evidences the consumer’s identity and
identity and assent to the assent to the authorization
authorization
Example: Written terms of the authorization have previously
Example: Consumer enters been delivered to the consumer in explanation of telephone
a digital signature, PIN, payment option. Consumer (Receiver) authenticates
password or shared secret to agreement to the terms of authorization by key-entering into
authorize the Entry.3 a VRU or speaking into a recorded line a PIN that identifies
the consumer.
SEC Code: WEB
SEC Code: PPD
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG175
SECTION VII – Appendices
A P P E N D I X H G U I D E L I N E S F O R C O N S U M E R A U T H E N T I C AT I O N
INTERNET/ONLINE
TELEPHONE1
NETWORK
Minimum Acceptable
Who Initiates Call? Minimum Acceptable Authentication
Authentication
No Relationship Similarly authenticate using Consumer (Receiver) Option 1 (Confirmation of a previously-provided written
a method compliant with authorization document): Similarly authenticate written terms
E-Sign4 and that evidences of authorization previously delivered to a consumer (Receiver)
the consumer’s (Receiver’s) using a method that evidences the consumer’s identity and
identity and assent to the assent to the authorization
authorization
Example: Terms of the authorization are delivered to the
Example: Originator verifies consumer in a catalog mailed on an unsolicited basis.
identity in a commercially Consumer (Receiver) authenticates agreement to the terms
reasonable manner using an of authorization by key-entering into a VRU or speaking into a
identity database.3 recorded line a PIN printed in the catalog.
OG176 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION VII – Appendices
A P P E N D I X H G U I D E L I N E S F O R C O N S U M E R A U T H E N T I C AT I O N
INTERNET/ONLINE
TELEPHONE1
NETWORK
Minimum Acceptable
Who Initiates Call? Minimum Acceptable Authentication
Authentication
NON-RECURRING
Existing Relationship2 Similarly authenticate using Consumer (Receiver) or Option 1 (Confirmation of a previously-provided written
a method compliant with Company (Originator) authorization document): Similarly authenticate written terms
E-Sign4 and that evidences of authorization previously delivered to a consumer (Receiver)
the consumer’s (Receiver’s) using a method that evidences the consumer’s identity and
identity and assent to the assent to the authorization
authorization
Example: Terms of the authorization are delivered to the
Example: use of a digital consumer in a catalog mailed on an unsolicited basis.
signature, PIN, password or Consumer (Receiver) authenticates agreement to the terms
shared secret3 of authorization by key-entering into a VRU or speaking into a
recorded line a PIN printed in the catalog.
SEC Code: WEB
SEC Code: PPD
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG177
SECTION VII – Appendices
A P P E N D I X H G U I D E L I N E S F O R C O N S U M E R A U T H E N T I C AT I O N
INTERNET/ONLINE
TELEPHONE1
NETWORK
Minimum Acceptable
Who Initiates Call? Minimum Acceptable Authentication
Authentication
No Relationship Similarly authenticate using Consumer (Receiver) Option 1 (Confirmation of a previously-provided written
a method compliant with authorization document): Similarly authenticate written terms
E-Sign4 and that evidences of authorization previously delivered to a consumer (Receiver)
the consumer’s (Receiver’s) using a method that evidences the consumer’s identity and
identity and assent to the assent to the authorization
authorization
Example: Terms of the authorization are delivered to the
Example: Originator verifies consumer in a catalog mailed on an unsolicited basis.
identity in a commercially Consumer (Receiver) authenticates agreement to the terms
reasonable manner using an of authorization by key-entering into a VRU or speaking into a
identity database.3 recorded line a PIN printed in the catalog.
1
he Originator must retain a record of any authentication code provided by the consumer. If the consumer verbally expresses the authentication
T
code, the consumer’s statement of the code must be recorded. Consider the following best practices when using the telephone to similarly
authenticate: Code should be a minimum of four digits; if there is no existing relationship between the Originator and Receiver, the code should
be printed on the written authorization form that is in the consumer’s possession when this telephone conversation occurs in order to demonstrate
the consumer’s possession of the authorization language. Please note that many telephone authorizations are also subject to the Federal Trade
Commission’s Telemarketing Sales Rule, 16 C.F.R. Part 310.
2
here is an Existing Relationship when there is a written agreement in place between the Originator and the consumer, or when the consumer has
T
purchased goods or services from the Originator in the past two years.
3
Must be encrypted with a minimum of 128-bit RC4 encryption technology or equivalent technology.
4
The Electronic Signatures in Global and National Commerce Act (15 U.S.C. 7001 et seq).
5
utbound calls by an Originator to a consumer where there is no prior relationship pose heightened risks for obtaining a properly authenticated,
O
bona fide authorization. Originators in such circumstances should pay particular attention to compliance with the Telemarketing Sales Rule and
should take steps to ensure that their authorization language is clear, conspicuous and readily understood by the Receiver, and that their means of
authentication unambiguously indicates the Receiver’s assent to the transaction. The TEL code cannot be used in this situation.
OG178 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION VII – Appendices
APPENDIX J BASIC ASC X12 RULES
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG179
SECTION VII – Appendices
APPENDIX J BASIC ASC X12 RULES
FUNCTIONAL GROUP
the originating and receiving companies. The
Transaction Set Trailer
SE structure of this envelope is defined by the ASC
Transaction Set Header
X12 Application Control Structure. Collectively,
ST
COMMUNICATIONS SESSION
the headers and trailers of these two segments
INTERCHANGE ENVELOPE allow data to be segregated logically for easy
Detail Data
interpretation by the receiver.
Segments
OG180 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION VII – Appendices
APPENDIX J BASIC ASC X12 RULES
envelope per CTX entry. This limitation applies to (01 to 12), and DD is the day in the month (01
the ISA/IEA, GS/GE and ST/SE envelopes.) to 31).
Data elements within a particular data segment The following is an example of a $100.00 positive
will have one of the following three types of integer value in the BPR data segment for the
designators which define their requirement within “Monetary Amount” data element (variable length
that segment: of one to fifteen characters):
1. M
andatory (M) – The data element must be *100*
present in the segment (presence means a data
element must not be empty). The next example illustrates a $100.02 fractional
value in the same data segment and data element:
2. O
ptional (O) – This element may or may not
be used, depending on the requirements of the *100.02*
Originator. Optional fields not used will be
flagged by an “*”. ID – Identifier
An identifier data element always contains a value
3. R
elational (X) – Relational conditions may exist
from a predefined list of values that is maintained
among two or more data elements within the
by the X12 Committee or some other body
same data segment based on the presence or
recognized by the X12 Committee. Trailing spaces
absence of one of those elements.
should be suppressed unless necessary to satisfy
minimum length.
DATA ELEMENT TYPES
Data element types are described as follows: Nn – Numeric
A numeric data element is represented by one
DT – Date or more digits with an optional leading sign
A date data element is used to express the ISO representing a value in the normal base 10. The
standard date in YYMMDD format in which YY is value of a numeric data element includes an implied
the year in the century (00 to 99), MM is the month decimal point. It is used when the position of
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG181
SECTION VII – Appendices
APPENDIX J BASIC ASC X12 RULES
the decimal point within the data is permanently following the Monetary Amount (782), or $2,000,
fixed and is not to be transmitted with the data. the segment is terminated using a backslash.
The data element dictionary defines the number
of implied decimal positions. The representation One use of CTX is for the RDFI to send the
for this data element type is Nn where N indicates receiving corporation pure X12 information that
that it is numeric and n indicates the number of has been stripped from the CTX addenda records.
decimal positions to the right of the fixed implied This requires less time and effort than reformatting
decimal point. For negative values, the leading the information into another industry standard.
minus sign (-) is used. Absence of a sign indicates To retrieve the pure X12 message from the CTX
a positive value. The plus sign (+) should not be transaction, the RDFI will need to:
transmitted. Leading zeros should be suppressed
unless necessary to satisfy a minimum length • insert the Settlement Date in the DTM segment
requirement. The length of a numeric type data (translating the Julian date in the ACH batch
element does not include the optional sign. header to a YYMMDD format);
OG182 2 0 1 3 O P E R AT I N G G U I D E L I N E S
SECTION VII – Appendices
APPENDIX J BASIC ASC X12 RULES
Figure J-2 explains the components of a segment Data Element Separator – The character
4.
and an element. selected by the sender which precedes every
data element, whether the data element is used
SEGMENT DIAGRAM KEY or not. The data element separator must be
different from the segment terminator and, once
Figure J-2 illustrates how a data segment provides
selected, must not appear in a data element
references to codes and terms used in the ASC
value.
X12 standards. (Note that the actual interchange
of information does not include all the reference
5. Data Element Name – The name of the data
characters shown in the diagram. Only the data
element.
segment identifier characters, the values for each
data element, the data element separator, and the
Segment Terminator – The character selected
6.
data segment terminator characters are actually
by sender to end each data segment. The
transmitted.)
segment terminator must be different from
the data element separator and, once selected,
1 2 3 4 5 6 must not appear in a data element value. (For
CCD and PPD payments with addenda, this will
always be a backslash.)
DTM01 374 DMT02 373 DTM03 337 DTM04 624 DTM05 624
7.
Data Element Requirement Designator –
Defines the circumstances under which a data
Date/Time
DTM *
Qualifier
* Date * Time * Time Code * Century * N/L
element must be present or not present in a
particular data segment. The Data Element
Requirement Designators are: mandatory,
M ID 3/3 X DT 6/6 X TM 4/6 O ID 2/2 O N 2/2 optional, or relational.
2 0 1 3 O P E R AT I N G G U I D E L I N E S OG183