Browse Definitions :
Definition

remote deposit capture (RDC)

What is remote deposit capture (RDC)?

Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection. When the bank receives a check image from the customer, it posts the deposit to the customer's account and makes the funds available based upon the customer's particular availability schedule. Banks typically offer RDC to business customers rather than to individuals.

RDC is made possible by the Check 21 Act, passed in October 2003 and implemented in October 2004, which allows banks to clear checks based on images of the original checks, rather than necessarily having the physical checks in hand in order to post the deposit.

RDC is one of the fastest growing trends in banking technology, as it allows customers the convenience of depositing money from any location with a scanner, computer and internet connection, and makes those deposited funds available earlier. For banks, the RDC process circumvents the costly use of paper, and allows check processing to be completed more quickly.

However, RDC presents some particular security challenges. If an unencrypted Internet connection is used to transmit check images, for example, customers' account information could be sniffed and stolen. Another possibility is duplicate check presentment, in which physical checks that have already been scanned and deposited are stolen and re-cashed at a check cashing store. Thus, the privilege of RDC is often extended or denied based on credit worthiness.


Learn More About IT:
> The FFIEC has presented guidance on how to manage RDC risks.
> Learn how AML compliance applies to RDC.

This was last updated in October 2009

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close