OKLAHOMA SOCIETY OF CPAS TULSA CHAPTER April 21, 2016 Anita Douglas Senior Stakeholder Liaison 1.

Slides:



Advertisements
Similar presentations
[your name, organization] Protecting Your Identity: What to Know, What to Do.
Advertisements

By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Protecting Personal Information Guidance for Business.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
IRS Updates January 21, 2015 Columbus Area Tax Administrators Dennis Bell, Senior Tax Specialist.
How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud March 7, 2014 Ley Mills IRS – SL-Field (804)
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Be Cautious of Identity Theft By: Sydney Langley.
What is tax-related identity theft?
Louisiana Department of Revenue Electronic Filing.
Information Security Sharon Welna Information Security Officer.
By: Asfa Khan and Huda Mukhtar
Preventing and Detecting Identity Theft: Partnering with the IRS to Meet the Challenge Anita Douglas Senior Stakeholder Liaison November 13, 2015.
Jeff loses his identity! Lesson 8: Identity Theft.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
IDENTITY THEFT. WHAT IS IDENTITY THEFT? Identity theft refers to stealing someone else’s personal information in order to obtain credit or other benefits.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
IRS Resources for Payroll Professionals & IRS Combats ID Theft with the Help of Payroll Professionals June 16, 2016 Nora Huffman.
IRS Tax Updates October 6, 2016 Northstar Payroll Association.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
December 14, 2016 CPA Continuing Education Society of PA
October 27, 2016 Main Line Association for Continuing Education
Employment Tax Updates
Attention Identity theft Definition
Digital Citizenship Middle School
Private Debt Collection
Protecting Your Identity:
Data Compromises: A Tax Practitioners “Nightmare”
October 26, 2017 Main Line Association for Continuing Education
How to Monitor your EFIN
Tax Identity Theft Presenter Date
Cybersecurity Awareness
Partnering to Minimize the Impact of Data Compromises
Protecting Your Identity:
Protecting Personal Information Guidance for Business.
Jeff loses his identity!
Red Flags Rule An Introduction County College of Morris
Protecting Your Information Assets
Identity Theft Pub 4012 – Tab P Pub 4491 – Lesson 1
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Land Grant University Tax Education Foundation
December 12, 2018 CPA Continuing Education Society of PA
Identity Theft By Kerry Freeman, EA.
Presentation transcript:

OKLAHOMA SOCIETY OF CPAS TULSA CHAPTER April 21, 2016 Anita Douglas Senior Stakeholder Liaison 1

IRS Identity Theft Victim Assistance The Process and the Improvements 2

Three Warning Signs Taxpayer learns of a duplicate SSN either from an IRS notice or e-file return rejects IRS notice about additional tax owed, refund offset or collection action when no return filed Taxpayer receives information from an employer unknown to them Tax-Related Identity Theft 3

Taxpayer Protection Program generates: Letter 4883C for prior-year suspicious returns Letter 5071C for current-year suspicious returns – Most common correspondence – Taxpayer self-verifies at Idverify.IRS.gov Letter 5447C for suspicious returns with foreign addresses Tax-Related Identity Theft 4

Complete and file IRS Form Respond to any IRS letters or notices Continue to pay taxes, even if by paper Place a “fraud alert” on credit accounts by contacting one of the three main credit bureaus Close any accounts opened by criminals File a complaint with the FTC Steps for Victims of Tax-Related Identity Theft 5

Most victim assistance work centralized under one director New Identity Theft Victim Assistance organization created Policy and operations under one leadership team More consistent treatment for taxpayers Reviewing IDTVA process for improvements Centralizing Victim Assistance 6

Six-digit number that adds an additional layer of protection along with the SSN or ITIN Victims notified once tax-related IDT case resolved Taxpayer will receive a CP01A notice containing a new IP PIN each year Some taxpayers have the option of getting an IP PIN from IRS.gov Enter numbers for all IP PIN holders About the Identity Protection PIN (IP PIN) 7

We’ve centralized most of identity theft victim assistance work We’re reviewing victim assistance procedures We’re continuing to test the IP PIN in three locations, and We’re strengthening verification procedures for Get Transcript and IP PIN Recap Victim Assistance Changes 8

Business Identity Theft Know the Warning Signs; Steps to Take Date Presenter’s name 9

IRS notices about fictitious employees IRS notices about a defunct, closed or dormant business IRS accepts your tax return as an amended return Warning Signs of Business Identity Theft 10

W-2 Verification Code Pilot – Testing a 16-digit code for the Form W-2 – Taxpayer enters code on return as part of W-2 entries – Code helps verify authenticity information on the Form W-2 Improved return filtering and modeling – Help stop business refundable credit fraud IRS efforts to combat Business Identity Theft 11

Respond immediately to any IRS notice Review account statements Review business registration information online Monitor credit reports for suspicious activity Close any accounts tampered with or opened File a complaint with FTC Steps for Business Victims of Identity Theft 12

Place a fraud alert on credit reports; contact one of four business reporting companies: Dun & Bradstreet – ; smallbusiness.dnb.com Equifax – ; equifax.com Experian – ; experian.com TransUnion – ; transunion.com Steps for Business Victims of Identity Theft 13

Use top-notch security software – Firewall – Anti-virus protection – File Encryption Education employees about safe online practices – Recognize and avoid phishing s and schemes – Never click a link or download attachments from unknown sources Protect Your Employee/Client Data 14

Create a security plan – IRS Publication 4557 checklist Create a data loss action plan – Review FTC.gov suggestions – Notify law enforcement – Notify affected businesses – Notify affected individuals Protect Your Employee/Client Data 15

Join IRS, State and Industry efforts to increase public awareness about security online and at home Share IRS Publication 4524 or other educational materials with employees and customers Increased awareness helps protect your company Taxes. Security. Together 16

One in a series of steps to combat ID theft and tax fraud Pilot will test capability to verify authenticity of W-2 data filed with federal tax returns in 2016 IRS will soon name Payroll Service Providers PSPs will reach out to some clients Algorithm generates alphanumeric codes from selected data fields of the W-2 Verification codes appear on employees’ W-2s W-2 Verification Code Pilot 17

Taxpayers enter verification codes on their e- filed federal tax returns When processing returns, IRS recalculates codes Matching codes = genuine W-2s Verification codes not included in W-2 data submitted to SSA, states or local departments of revenue Won’t affect state or local tax returns W-2 Verification Code Pilot 18

We stress: – Omitting or using incorrect W-2 verification codes will not delay the processing of taxpayers federal tax returns “test-and-learn” review after pilot If integrity of W-2 information submitted by taxpayers increases, verification codes will remain an element of W-2s in the future W-2 Verification Code Pilot 19

Data Theft and Securing Client Tax Information

The risk is real; preparers are prime targets for identity thieves Cybercriminal tactics constantly evolve Data loss can occur so many ways: – Burglar steals office computers – Cybercriminal breaches your systems using phishing and malware schemes – Disgruntled employees steals client info – Dispose of old devices without erasing data Bullet Point Slide (36pt.)

Phishing s, text or calls – Pose as trusted organizations – Embed links to fake websites – Use malware-infected attachments Risks of opening phishing scams – Account take-overs (Banks, IRS e-Services, Tax Software) – Computer breaches Educate employees on scams/risks Data Theft Tactics

IRS reviewing improvements to EFIN safeguards – Stepped up efforts to expel EFIN abusers; – Increased on-site visits as part of monitoring process EFIN holders should review return numbers during filing season – e-Services Account updated weekly – Excessive numbers can be reported to e-Help Desk Protect your EFIN

Read Publication 4557, Safeguarding Taxpayer Data Review current security measures Create a security plan – Use top-notch software security – Educate all employees – Use strong passwords – Secure Wi-Fi – Encrypt PII s – Backup files Steps to Protect Client Data

Create a reaction plan for data theft – Call IRS Stakeholder Liaison (found on IRS.gov) Review Federal Trade Commission’s “Business Center” to assist businesses with data losses – Notify police – Notify businesses – Notify clients Plan Ahead for Data Loss

IRS, state tax administrators and tax industry working together to increase public awareness about security protections online and at home. Review Publication 4524, Security Awareness for Taxpayers Consider printing and sharing this one-page guide with your clients Help Educate Clients

The risk is real Make a security plan Make a data loss plan Contact Stakeholder Liaison if you experience a data compromise Summary

Anita Douglas New! THANK YOU!!!!