This publication responds to the current threat environment characterized by the continued growth of data breaches and the need for companies to become even more vigilant in protecting sensitive customer information. These guidelines provide an overview of the current marketplace and threat landscape, coupled with an analysis and identification of critical information to protect in the ACH transaction lifecycle throughout the debit and credit flow architecture. ACH Network participants will benefit by guidance on how to conduct step-by-step analysis of an ACH transaction flow and from it identify critical points that require data protection/security (e.g., transmission, storage, and use). The guidelines include chapters on how to protect sensitive ACH data, how to understand and define data risks, case studies, best practices for mitigating data risk and a section that identifies additional industry resources. The format of this publication is the equivalent to a technology "dashboard" for transaction monitoring in the ACH Network.