How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud March 7, 2014 Ley Mills IRS – SL-Field (804) 916-3892.

Slides:



Advertisements
Similar presentations
IRS Identity Theft Efforts and 2013 Filing Season Improvements
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Red Flag Rules: What they are? & What you need to do
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
IRS Updates January 21, 2015 Columbus Area Tax Administrators Dennis Bell, Senior Tax Specialist.
Internet Safety Dr. Steve Broskoske Misericordia University.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
BUSINESS B1 Information Security.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
What is tax-related identity theft?
Information Security Sharon Welna Information Security Officer.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing and Detecting Identity Theft: Partnering with the IRS to Meet the Challenge Anita Douglas Senior Stakeholder Liaison November 13, 2015.
Jeff loses his identity! Lesson 8: Identity Theft.
TAX-AIDE Identity Theft Pub 4491 – Part 1 – Pages 1 – 5 Pub 4012 – Page P – 1.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
Jeff loses his identity! Lesson 5: Identity Theft.
OKLAHOMA SOCIETY OF CPAS TULSA CHAPTER April 21, 2016 Anita Douglas Senior Stakeholder Liaison 1.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
IRS Resources for Payroll Professionals & IRS Combats ID Theft with the Help of Payroll Professionals June 16, 2016 Nora Huffman.
Protecting Your Assets By Preventing Identity Theft
October 27, 2016 Main Line Association for Continuing Education
Pub 4491 Pub 4012 TaxSlayer Manual
Fraud Protection.
Fraud protection.
Protecting Your Identity:
Data Compromises: A Tax Practitioners “Nightmare”
October 26, 2017 Main Line Association for Continuing Education
Tax Identity Theft Presenter Date
Protecting Your Identity:
Jeff loses his identity!
Red Flags Rule An Introduction County College of Morris
Identity Theft Pub 4012 – Tab P Pub 4491 – Lesson 1
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Land Grant University Tax Education Foundation
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Identity Theft By Kerry Freeman, EA.
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud March 7, 2014 Ley Mills IRS – SL-Field (804)

2 Identity theft occurs when someone uses your personal information such as your name, Social Security number or other identifying information, without your permission, to commit fraud or other crimes What is identity theft?

3 Most misused SSN of all time Happened more than 70 years ago Involved Social Security cards “ issued ” by Woolworth At peak, nearly 5,800 people were using SSN More than 40,000 reported as their own SSN As late as 1977, 12 people were still using SSN

4 Common and costly The 2013 Identity Fraud Report, released by Javelin Strategy and Research, provides some interesting statistics about all types of identity theft: – 1 in 4 recipients of a data breach letter became a victim of identity theft – 12.6 million victims in the past year – or one new victim every three seconds – $21 billion dollars lost

5 Personal identity theft most often occurs from sources outside of IRS: Dumpster diving Skimming Phishing Address changes Theft of records Pre-texting Data breaches Trojan viruses Spyware How ID theft occurs

6 Laws to protect taxpayer information Identity protection laws – IRC § 7216 – USC § 6713 – Privacy Act (5 USC 552a) Additional laws for safeguarding personal information – Gramm-Leach-Bliley-Act (1999) Privacy and Safeguards Rules – Sarbanes-Oxley Act – IRS e-file rules – State laws

7 IRS ’ s response to the threat of identity theft Stopping identity theft and refund fraud is a top priority for the IRS. The agency ’ s work on identity theft and refund fraud continues to grow, touching nearly every part of the organization. For the 2013 filing season, the IRS has expanded these efforts to better protect taxpayers and help victims.

8 Refund-related identity theft – Identity thief uses a stolen SSN to file a forged tax return and obtain a fraudulent refund early in the filing season Employment-related identity theft – Identity thief uses a stolen SSN to obtain employment Types of tax-related identity theft

9 Identification of ID theft victim IRS e-file reject codes indicate that the SSN or personal information has already been used The taxpayer receives notices regarding wages that he did not earn The taxpayer receives bills for accounts he does not have The taxpayer ’ s situation fits the “ Red Flags of Identity Theft, ” listed on FTC website

10 Understanding the IRS ’ s ID theft process The taxpayer attempts to file a return or experiences a loss of PII IRS Form 14039, Identity Theft Affidavit, is filed (with or without a return) IRS codes taxpayer ’ s account to show identity theft documentation was submitted IRS reconciles taxpayer ’ s account to reflect valid return information Identity protection indicator is placed on the taxpayer ’ s account

11 Understanding the IRS ’ s ID theft process IRS issues a CP01 notice to let the taxpayer know an identity theft marker has been placed on her account Before the next filing season, the IRS generally assigns the taxpayer a unique Identity Protection PIN to verify her return If the taxpayer is identified as being deceased, the IRS locks the account to prevent future filing

12 Key IP PIN information Six-digit number assigned to a validated identity theft victim Specific to the tax year and a new IP PIN is issued every year Should not be confused with the five-digit electronic signature ‘ self-select ’ PIN

13 Key IP PIN information Necessary only if the primary taxpayer is the identity theft victim E-filed returns requiring IP PINs will be rejected if the IP PIN is missing or incorrect Taxpayers who misplace their IP PINs will be able to receive replacements by contacting the IRS

14 Expansion of the IP PIN Program For tax year 2012, the IRS expanded the use of the IP PIN to more than 770,000 taxpayers Beginning in TY 2012, the IP PIN was allowed as a transmittable item on e-filed Forms 1040 PR/SS Beginning in TY 2013, the paper Form 1040 PR/SS will include a space for an IP PIN

15 IP PIN guidance for tax professionals Ask your client if he received a letter from the IRS containing an IP PIN – If so, input IP PIN in the appropriate area – If your client states he misplaced his IP PIN or his return rejects because of a missing IP PIN, have your client contact IRS for a replacement IP PIN If your client says he did not receive an IP PIN letter, continue preparation as usual

16 IRS screening filters Prevent fraudulent returns from posting before they can have any negative effect on taxpayers ’ accounts Increase revenue protection by applying additional filters to existing business rules which in turn identify fraudulent and noncompliant returns in a pre-refund environment while providing refunds to compliant taxpayers timely

17 Improved screening filters For TY 2012, IRS increased the number of filters dedicated to identity theft from 32 to 79. IRS also uses “ clustering techniques ” to target multiple refunds with similar characteristics. This not only increases coverage of the identity theft filters but also allows new schemes to be identified in real time.

18 Increased refund fraud detection and prevention During 2012 (TY 2011), the IRS protected $20 billion in fraudulent refunds, including those related to identity theft, which is a 30 percent increase from TY 2010 ($14 billion).

19 Increased investigations IRS Criminal Investigation tripled the number of identity theft investigations in fiscal year 2012 From October 2012 through March 2013, CI opened more than 670 identity theft investigations

20 Expanded law enforcement assistance efforts In 2011, IRS piloted a program that allows disclosure of tax return information to local law enforcement agencies, allowing them to obtain tax return data (with the victim ’ s permission) and better investigate and pursue identity thieves. In the fall of 2012, IRS expanded the program to nine states and in March 2013, the program went nationwide.

21 Assisting financial institutions The IRS is collaborating with more than 130 financial institutions to identify identity theft fraud schemes and block refunds. This effort has protected hundreds of millions of dollars so far.

22 Increasing efforts to help victims In the first four months of 2013, the IRS worked with victims to resolve and close more than 340,000 cases. IRS has placed specialized identity theft groups in each of its core business units to resolve issues as soon as they are discovered.

23 Maintaining a well-trained workforce By late 2012, the IRS assigned more than 3,000 IRS employees — more than double from 2011 — to work on identity theft-related issues. IRS has trained 35,000 employees who work with taxpayers to recognize signs of identity theft and help people victimized by identity theft.

24 Online fraud One of the simplest ways you and your clients can avoid becoming victims of identity theft is to be aware of and avoid online scams

25 Phishing website This is an image of a typical IRS phishing webpage. The site suggests you can get your tax refund credited to your VISA or Mastercard.

26 Malicious This message targets tax professionals. The malicious code is attached to the message.

27 How does the IRS mitigate online fraud? De-register malicious domains Remove malicious/fraudulent content Suspend accounts Disable telephone and/or FAX numbers Report unregistered securities entities

28 The IRS uses social media

29 How your clients may prevent online identity theft Don ’ t respond to suspicious IRS s, texts, faxes Secure computers (i.e., firewalls, antvirus/anti- phishing/anti-spam, etc.) Use strong passwords Back up critical personal information Limit the personal information you provide on social media Never answer ‘ yes ’ to pop-up screens Visit

30 If you or a client receive a suspicious IRS-related communication Report all unsolicited claiming to be from the IRS to Go to IRS.gov, scroll to the bottom of the homepage and click on ‘ Report Phishing ’

31 Tax practitioner due diligence Treasury Department Circular No. 230 (Rev ), Section 10.22, requires practitioners to: Exercise due diligence when preparing or assisting in the preparation of filings for submission to the IRS, and that they determine the correctness of the representations they make, both to the IRS and to clients Tax practitioners play a role in protecting the integrity of the tax filing system through their efforts to authenticate their clients’ identities

32 Assisting identity theft victims Call the Identity Theft Specialized Unit at Complete the Form 14039, Identity Theft Affidavit, with all documentation Take additional “non-tax” steps to protect the victim’s identity: – File police report – Place fraud alert on credit accounts by calling one of the credit bureaus – File a complaint with the Federal Trade Commission at

33 Physical safeguards Lock rooms and cabinets Store records in secured area Protect against destruction and damage Inventory hardware Dispose of information and hardware securely Protecting your business and clients

34 System safeguards – Use strong passwords: Minimum of eight alphanumeric characters – Change passwords periodically – Use timed, password-activated screen savers – Don’t post or share passwords Encrypt sensitive data when: – Transmitting over networks – Storing on servers or media Encrypt entire computers, media Protecting your business and clients

35 Protecting your business and clients More system safeguards Don’t store sensitive data on a machine with an internet connection Back up system periodically on secure media Maintain updated firewalls, anti-virus, software updates, security patches, anti- spyware and anti-ad ware Provide central management security tools and passwords/security protections

36 Protecting your business and clients If you have a security breach: Notify law enforcement Notify FTC, visit for and phone numbers Notify customers and business partners Take corrective actions Prevent other breaches

37 Summary Fighting identity theft is an ongoing battle that requires a collaborative effort among the IRS, practitioners and taxpayers

38 Contact information Office of Privacy, Governmental Liaison and Disclosure Visit IRS.gov, search Keyword “ ID Theft ”

39 Any Questions? Ley Mills (804)