WASHINGTON STATE DEPARTMENT OF REVENUE PROTECTING CONFIDENTIAL TAX INFORMATION.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

FERPA: Family Educational Rights and Privacy Act
CONFIDENTIALITY / PRIVACY. Federal Laws Privacy Act of 1974 PII (Personally Identifiable Information)….Protection of social security numbers……….
Privacy and Information Security Training ( ) VUMC Privacy Website
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
LMC WHAT IS HIPAA AND HOW TO COMPLY WITH IT? Health Insurance Portability and Accountability Act of 1996.
 Privacy Act of 1974 PII (Personally Identifiable Information)….Protection of social security numbers……….
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
NAU HIPAA Awareness Training
June 04, 2013 Robin Thomas, NC III, Presenter. PRIVACY BREACHES A privacy breach is an unauthorized disclosure of PHI/PCI violating either Federal or.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Protecting the Confidentiality of Social Security Numbers Business Procedures Memorandum 66 Revised November 1, 2006 The University of Texas System.
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
Critical Data Management Indiana University HR Summit April 24, 2014.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Security and Confidentiality Practices - Houston Dept. of Health and Human Services Jerald Harms, MPH, CART and Jeff Meyer, MD, MPH HIV/AIDS Surveillance.
Created May 2, Division of Public Health Managing Records What is a Record? What is a Records Retention & Disposition Schedule? Why is this Important?
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Ten Thing IT Staff Need to Know About Education Records Privacy Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith.
Practical Information Management
Information Governance Jym Bates Head of Information Assurance.
Copyright© 2010 WeComply, Inc. All rights reserved. 9/19/2015 Record Management.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
NERCOMP 2002 Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith University Registrar University of Connecticut.
Privacy and Information Management ICT Guidelines.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
HIPAA (health insurance portability and accountability act)
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
FERPA Family Educational Rights and Privacy Act A Tutorial.
© Copyright 2010 Hemenway & Barnes LLP H&B
Elected Officials and Health Department Records Indiana Public Health Foundation February 27, 2008.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
HIPAA: Breach Notification By: Office of University Counsel For: Jefferson IRB Continuing Education September 2014.
Public Records Training Manitowoc City Attorney’s Office.
Zortec Business Tax : Session 1 LOCAL GOVERNMENT CORPORATION
Ticket Training Tuesday Properly Safeguarding Personally Identifiable Information (PII)
How to CORRECTLY Complete a TEASE Access Request Form.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Table of Contents  Protect patients and their personal health information  Became law in 1996.
HIPAA Privacy What Every Staff Member Needs to Know.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Susan McKinney, CRM. RECORDS MANAGEMENT AT THE U Policy: Managing University Records and Information Procedures: Retention of University Records Destruction.
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
Lake Land College FERPA.
Obligations of Educational Agencies: Parents’ Bill of Rights
WHAT IS HIPAA AND HOW TO COMPLY WITH IT?
Disability Services Agencies Briefing On HIPAA
Lesson 3: Medical Records
Move this to online module slides 11-56
Protecting Student Data
State of florida tax information sharing Paula Barfield August 5, 2015
Presentation transcript:

WASHINGTON STATE DEPARTMENT OF REVENUE PROTECTING CONFIDENTIAL TAX INFORMATION

REMEMBER TO “TAKE FIVE”!! BEFORE GIVING OUT INFORMATION, ASK YOURSELF: “IS THIS CONFIDENTIAL TAXPAYER INFORMATION?”

CONFIDENTIALITY LAWS  RCW (3) (PUBLIC RECORDS)  RCW (EXCISE TAX)  RCW (PROPERTY TAX)  RCW (PROPERTY TAX)  RCW (PROPERTY. TAX)  RCW (2) (TOBACCO MFRS)

GET COPIES OF THE LAWS  THE REVISED CODE OF WASHINGTON (RCW) IS AVAILABLE THROUGH THE INTERNET ON THE WASHINGTON LEGISLATURE’S WEBSITE 

EXAMPLES OF CONFIDENTIAL TAX INFO  SOCIAL SECURITY NUMBERS  BUSINESS PHONE NUMBERS OR E- MAIL ADDRESSES LISTED WITH DEPT. OF REVENUE  WHETHER A BUSINESS FILES ITS TAXES MONTHLY, QUARTERLY, OR ANNUALLY

UNAUTHORIZED DISCLOSURE OF TAX INFORMATION  DON’T GIVE TAX INFORMATION TO A TAXPAYER’S: LAWYER SPOUSE (unless listed in record as taxpayer) PERSON WITH GENERAL POWER OF ATTORNEY FOR THE TAXPAYER FORMER BUSINESS PARTNER, EXCEPT FOR TIME PERIOD THEY SHARED OWNERSHIP OF THE BUSINESS  DON’T GIVE TAX INFORMATION CONCERNING HOTELS, B&Bs, ETC. TO CHAMBERS OF COMMERCE OR TOURISM BOARDS  UNDER THE TAX LAW THEY ARE NOT AUTHORIZED TO HAVE ACCESS TO A TAXPAYER’S CONFIDENTIAL INFO

WHAT’S OK TO GIVE OUT?  INFORMATION THAT’S AVAILABLE ON DOR’S BUSINESS RECORDS DATABASE CAN BE DISCLOSED TO ANYONE DOR.WA.GOV/CONTENT/BRD  INFORMATION IDENTIFIED IN RCW (3)( l )

OK TO DISCLOSE, ACCORDING TO RCW (3)  TAXPAYER NAME & TRADE NAME  ENTITY TYPE  BUSINESS ADDRESS  MAILING ADDRESS  TAX REGISTRATION/UBI NUMBERS  NAICS OR SIC CODES  DATES OF BUSINESS OPENING AND CLOSING  REET CONTROLLING INTEREST INFO

USE INFORMATION ONLY FOR PURPOSE AUTHORIZED  DATA-SHARING AGREEMENTS SET OUT THE ONLY PURPOSES AUTHORIZED  EACH EMPLOYEE WITH ACCESS TO TAX INFO MUST KNOW AND UNDERSTAND LIMITATIONS ON USE OF TAX INFO  IF YOUR NEEDS FOR USE OF THE INFO CHANGE OR EXPAND, GET A NEW OR AMENDED DATA-SHARING AGREEMENT

WHO MAY HAVE ACCESS TO TAX INFORMATION?  ONLY THOSE AUTHORIZED MAY HAVE ACCESS TO TAX INFORMATION  ONLY THOSE WITH NOTARIZED SECRECY CLAUSE AFFIDAVITS ON FILE WITH CITY AND WITH DOR MAY BE AUTHORIZED  MAKE SURE YOUR CONTRACTORS HAVE NOTARTIZED AFFIDAVITS ON FILE  IF USING ON-LINE DATA, ACCESS IS GRANTED TO EACH INDIVIDUAL—CAN’T SHARE ANOTHER PERSON’S ON-LINE ACCESS

SECRECY CLAUSE AFFIDAVITS  WHO? EACH EMPLOYEE OR AGENT WITH ACCESS TO CONFIDENTIAL TAX INFORMATION  WHEN? BEFORE ACCESS TO TAX INFORMATION UPDATE IF ANY PERSONNEL CHANGES  HOW? NOTARIZED  WHERE? KEPT ON FILE BY EACH CITY AND SUBMITTED TO DEPT. OF REVENUE  WHY? ASSURE UNDERSTANDING OF LAWS AND PENALTIES FOR VIOLATION

DATA SECURITY  KEEP ALL DATA SECURE, REGARDLESS OF MEDIUM  BEST PRACTICES: DON’T PRINT OUT TAX INFO YOU DON’T NEED TO  OK to print out to give to a taxpayer, but be sure you’re standing by the printer as the document prints! DON’T COPY OR DOWNLOAD TAX INFO ELECTRONICALLY UNLESS YOU REALLY NEED TO DON’T COMMUNICATE ANY TAX INFO IN AN MESSAGE, OR IN AN ATTACHMENT TO AN MESSAGE

DATA SECURITY (cont’d)  ELECTRONIC DATA PCs  PROTECT ACCESS WITH ADEQUATE PASSWORDS  AUTOMATIC SCREENSAVER AFTER SHORT PERIOD OF TIME  MAKE SURE SCREENS NOT VIEWABLE BY OTHERS (Don’t use to communicate tax info!) LAPTOPS (Don’t download tax info onto laptops unless you’ll be able to keep them secure at all times) CDs and DATA STICKS (Don’t download tax info unless you must, and keep secure always)

DATA SECURITY (cont’d)  HARD COPIES-if you must print out tax info  DON’T LEAVE DOCUMENTS ON DESKS/COUNTERS/IN A CAR  LOCK UP DOCUMENTS (in office, desk, file drawer, etc.)  IF LOCKS AREN’T FEASIBLE, DESTROY COPIES AT END OF EACH DAY (check with your records retention expert to make sure it’s ok)

DATA SECURITY (cont’d)  HARD COPIES (cont’d) DON’T THROW TAX INFO IN TRASH BIN! PAPER MUST BE MADE ILLEGIBLE BY DISPOSAL PROCESS (SHRED, BURN, HYDROPULP) ONLY AUTHORIZED PERSONS MAY TAKE DOCUMENTS TO DESTROY THEM (Don’t just hand them to the janitor to shred) IF DESTROYED BY CONTRACTOR OR OFF-SITE, MAKE SURE TRANSPORTATION AND DESTRUCTION ARE SECURE

PENALTIES  WHAT ARE PENALTIES FOR BREACH OF CONFIDENTIALITY? RCW  MISDEMEANOR  SANCTIONS INCLUDE:  UP TO $1000 FINE  UP TO 90 DAYS IN JAIL  LOSS OF JOB  BARRED FROM EMPLOYMENT BY STATE OR LOCAL GOVERNMENT FOR TWO YEARS

NOTIFICATION OF ELECTRONIC SECURITY BREACHES  RCW  “UNAUTHORIZED ACQUISITION OF [UNENCRYPTED] COMPUTERIZED DATA THAT COMPROMISED THE SECURITY, CONFIDENTIALITY, OR INTEGRITY OF PERSONAL INFORMATION MAINTAINED BY THE AGENCY”  NOTICE IN “MOST EXPEDIENT TIME POSSIBLE AND WITHOUT UNREASONABLE DELAY”

QUESTIONS? CALL DOR FOR HELP !

DEPARTMENT OF REVENUE STAFF  TIFFANY JOHNSON, LOCAL TAX MANAGER 360/  MAUREEN O’CONNELL, PUBLIC RECORDS OFFICER’S DESIGNEE 360/  SUZANNE MAGER, PUBLIC RECORDS COUNSEL 360/

QUESTIONS???