2026 Nacha Rule Changes: What You Need to Know
What Is Nacha?
The ACH Network supports millions of electronic payments every day, including payroll, vendor payments, direct deposits, and more.
Why These Changes Matter
If your business processes electronic payments of any kind, these changes likely apply to you.
Your Responsibilities as an ACH Originator
- Knowing and complying with current Nacha Rules
- Staying informed about upcoming rule changes
- Maintaining internal controls that meet Nacha’s requirements
What's Changing in 2026
1. Enhanced Fraud Monitoring
This includes:
- More proactive monitoring of ACH activity
- Validating transactions that seem inconsistent or unexpected
- Ensuring your business has controls aligned with Nacha’s expanded security expectations
2. New Company Entry Description Requirements
- PAYROLL - Required for all PPD credit entries used for wages, salaries, or similar compensation.
- PURCHASE - Required for all e-commerce purchase transactions.
For example:
| Transaction Type | Correct Example | Incorrect Example | Why |
|---|---|---|---|
| Payroll (PPD Credits) | PAYROLL-WK | WEEKPAY | Must begin with PAYROLL |
| Payroll (PPD Credits) | PAYROLL01 | EMPPAY | Description must clearly identify payroll |
| E-Commerce Purchase | PURCHASE1 | ONLINEPAY | Must begin with PURCHASE |
| E-Commerce Purchase | PURCHASEA | WEBORDER | Required descriptor not present |
Key Requirements
The first 7 characters must contain PAYROLL or PURCHASE and be capitalized.
The Company Entry Description field allows up to 10 characters.
Compliance Dates to Know
Phase 1 — March 20, 2026
Phase 2 — June 19, 2026
Preparing Your Business
- Stronger internal controls
- Reduced exposure to fraudulent activity
- A smoother transition as the March and June deadlines approach
- Better protection for your clients and your business
ACH Originator Compliance Checklist – (June 2026 NACHA Rules)
Fraud Monitoring Controls
- We have written fraudâmonitoring procedures that apply to all ACH activity, including ACH credits and ACH debits.
- Our monitoring looks for both unauthorized transactions and transactions that were authorized but based on fraud (such as business email compromise or fake vendor requests).
- We understand what “normal” ACH activity looks like for the company (including usual dollar amounts, volumes, timing, and recipients).
- We promptly review and investigate any unusual or suspicious ACH activity.
- We review and update our ACH fraudâmonitoring procedures at least once a year to address new or emerging risks.
- We ensure we use the Bank’s multi factor authentication method to login to our account(s)
Payment Instructions, Dual Control & Change Verification
- ACH transactions follow the bank’s dualâcontrol requirements and proper separation of duties.
- One authorized employee creates or enters the ACH transaction.
- A different authorized employee reviews and approves the ACH transaction before it is released.
- When vendor or payroll payment instructions change, we independently verify the change using a different communication method (for example, calling a known phone number instead of replying to an email).
- Employees are not allowed to rely only on emails when confirming changes to payment instructions.
Standard Company Entry Descriptions
- Payroll ACH credits use the Company Entry Description “PAYROLL” in all capital letters.
- Consumer webâbased debit transactions use the Company Entry Description “PURCHASE” in all capital letters.
- Company Entry Descriptions are used consistently across all ACH files.
- ACH software and file formats have been updated to ensure these descriptions are applied correctly.
ACH Authorizations & Recordkeeping
- We have valid, NACHAâcompliant authorizations for every ACH transaction we originate.
- Authorizations are kept on file and can be provided upon request, consistent with NACHA recordâretention rules.
- Our authorization process is reviewed at least once a year.
Annual Employee Training & Awareness
- Employees involved in ACH origination are trained on common fraud risks such as business email compromise, payroll diversion, and invoice fraud.
- Training explains how and when to escalate suspicious ACH activity.
- Employees clearly understand their responsibilities for ACH entry, approval, verification, and release.
Additional Resources