Slide 1

    Tax Professional Data Theft and Protection

    Communications & Liaison

    STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 2

    Webinar Topics

    Taxes-Security-Together Checklist Steps

    A. Implement the “Security Six” basic protections

    B. Create a written data security plan

    C. Educate yourself on phishing scams

    D. Recognize the signs of client data theft

    E. Create a data theft recovery plan

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 3 Taxes-Security-Together Checklist – Item A:

    Implement the “Security Six” Basic Protections

    1. Anti-virus software

    2. Firewalls

    3. Two-factor authentication

    4. Backup software/services

    5. Drive encryption

    6. Virtual Private Network (VPN)

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 4

    “Security Six” Basic Protection # 1 – Anti-virus

    Software

    • Scans computer files for malicious software

    • Automatic scans

    • Manual scans of email attachments, web downloads,

    and portable media

    • Protection against spyware and phishing

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 5

    “Security Six” Basic Protection # 2 – Firewalls

    • Provide protection against outside attackers

    • Shield computer or network

    • Firewalls are categorized as:

    • Hardware – external devices

    • Software – built-in or purchase

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 6

    “Security Six” Basic Protection # 3 – Two-

    factor authentication

    • Adds an extra layer of protection beyond a password

    • User must enter credentials

    • username and password plus another step (such as a

    security code sent via text to a mobile phone)

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 7 Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 8 Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 9 Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 10 Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 11

    “Security Six” Basic Protection # 4 – Backup

    Software/Services

    • Critical files on computers should routinely be backed up to external sources

    • Backup files may be stored either using an online service or on an external disk

    • Encrypt the back-up data for the safety of the information

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 12

    “Security Six” Basic Protection # 5 – Drive

    Encryption

    • Use drive or disk encryption software for full-disk encryption

    • Transforms data on the computer into unreadable files for an unauthorized person

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 13

    “Security Six” Basic Protection # 6 – Virtual

    Private Network (VPN)

    A VPN provides a secure, encrypted tunnel to transmit data between a remote user via the internet and the company network

    Search for “Best VPNs” to find a legitimate vendor

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 14

    How to get started with the “Security Six”

    Protections

    • Review professional insurance policy

    • Some offer coverage for data thefts

    • Review IRS Publication 4557, Safeguarding Taxpayer

    Data

    • Small Business Information Security:

    The Fundamentals by National Institute of Standards

    and Technology (NIST) – www.nist.gov

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 15

    Five key pillars of the successful and holistic cybersecurity program

    NIST Cybersecurity Framework

    Source: www.nist.gov/cyberframework

    National Institute of Standards & Technology – Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 16

    • Identify physical and software assets

    • Identify cybersecurity policy

    NIST Cybersecurity Framework

    Source: www.nist.gov/cyberframework

    The Identify Function

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 17

    Source: www.nist.gov/cyberframework

    The Identify Function – Risk Management

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 18

    • Establish a Data security protection plan – Confidentiality, Integrity, Availability (CIA)

    • Manage Protective Technology

    • Equipment

    Source: www.nist.gov/cyberframework

    The Protect Function

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 19

    • Confidentiality – protecting information from unauthorized access and disclosure.

    • Integrity – protecting information from unauthorized modification.

    • Availability – preventing disruption in how you access information.

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    The Protect Function – Confidentiality, Integrity, Availability (CIA)

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 20

    • Physical Security

    • Personnel Security

    • Contingency Planning and Disaster Recovery

    • Operational Security

    • Privacy

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    The Protect Function – Protect Devices and Information

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 21

    • Install anti-malware/anti-virus security software

    • Use strong passwords, protect wireless devices

    • Encrypt all sensitive files/emails

    • Back up sensitive data to a safe (external source)

    • Wipe clean or destroy old equipment

    • Limit access to taxpayer data (need to know)

    Source: www.nist.gov/cyberframework

    The Protect Function – Review Internal Controls

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 22

    • Implementing security continuous monitoring capabilities to monitor cybersecurity events

    • Ensuring anomalies and events are detected, and their potential impact is understood

    • Verifying the effectiveness of protective measures

    Source: www.nist.gov/cyberframework

    The Detect Function

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 23

    • Electronic Return Rejected (Paper Return)

    • Verification Letters (5071C or 4883C)

    • https://www.irs.gov/individuals/irs-notice-or-letter-for-individual-filers External

    • Transcripts

    • Receipt of US Treasury Refund Check

    • Receipt of Reloadable Prepaid Card

    • Receipt of Refund Transfer Company Check

    Detect Function – Signs of a Breach- The Victim Experience

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 24

    Detect Function – Recognize a Phishing Scam

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 25

    • Usually comes in the form of Phishing email and has attachments or links.

    • Ransomware is a type of malware that restricts access to infected computers and requires victims to pay a ransom to regain access to their data

    • Typical ransoms are in the range of $100 – $300, and are often demanded in the form of digital currency, such as Bitcoin

    Detect Function – Ransomware

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 26

    Detect Function – Ransomware

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 27

    • Cybercriminals are able to identify chief operating officers, school executives or others in position of authority (Social Engineering).

    • Fraudsters mask themselves as executives or people in authoritative positions and send emails to payroll or human resources requesting copies of Forms W-2. (Grooming

    Detect Function – Business Email Compromise

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 28

    • Form W-2 contains the following (Exchange of Information)

    • Employment Identification Numbers (EIN)

    • Social Security Numbers

    • Income / Withholdings (Federal, State, Local)

    • Address

    • Retirement Plan

    • Health Benefits Plan

    Detect Function – Business Email Compromise

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 29

    —–Original Message—–

    From: Mickey Mouse <[email protected]>

    Sent: Tuesday, January 22, 2019 1:03 PM

    To: Minnie Mouse <[email protected]>

    Subject: Request

    Hi Minnie,

    I need you to email me 2018 W2s of all employees. How soon can you get me those?

    Regards

    Mickey Mouse

    Detect Function – Business Email Compromise

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 30

    Detect Function – Example: Warning Labels

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 31

    • Ensuring Response Planning processes are executed during and after an incident

    • Managing Communications during and after an event

    • Analyzing effectiveness of response activities

    Respond Function – Signs of a Breach- The Victim Experience

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 32

    • Contact IRS Stakeholder Liaison When Compromise Detected

    • Stakeholder Liaison will refer Information within IRS (i.e. Criminal Investigations, Return Integrity & Compliance Services)

    • Follow State Reporting Requirements (i.e. State Attorney General, State Consumer Protection Bureaus, State Police)

    • Report Compromise to FBI, US Secret Service, Federal Trade Commission

    Respond

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 33

    • Contact experts:

    • Security expert – to determine the cause and scope of the breach, to stop the breach and to prevent further breaches from occurring.

    • Insurance company – to report the breach and to check if your insurance policy covers data breach mitigation expenses.

    Respond

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 34

    • Contact experts:

    • Security expert – to determine the cause and scope of the breach, to stop the breach and to prevent further breaches from occurring.

    • Insurance company – to report the breach and to check if your insurance policy covers data breach mitigation expenses.

    Respond

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 35

    • Ensuring the organization implements Recovery Planning processes and procedures

    • Implementing improvements based on lessons learned

    • Coordinating communications during recovery activities

    Recover

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 36

    • Update your IRS Stakeholder Liaison with developments;

    • Review FTC’s Data Breach Response: A Guide for Business

    • Determine how the intrusion or theft occurred Develop a continuity plan.

    • Make full backups of all business data and files. If you weren’t doing it before the data loss, start as soon as your systems are clean.

    Recover

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 37

    • A routine backup means a data loss or ransomware attack (as well as a hurricane or flood) will not destroy all files.

    • Encrypt backed up files.

    • Consider a monthly backup schedule, or more often during the filing season.

    • Backup files after completing a routine system scan.

    • Use an external hard drive or cloud storage; encrypt files prior to uploading to the cloud.

    Recover

    Source: www.nist.gov/cyberframework

    NIST Cybersecurity Framework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 38

    Five key pillars of the successful and holistic cybersecurity program

    NIST Cybersecurity Framework

    Source: www.nist.gov/cyberframework

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 39 Taxes-Security-Together Checklist – Item B:

    Create a Data Security Plan

    • Required under federal law

    • Gramm-Leach-Bliley (GLB) Act, the “Safeguards Rule” , administered

    by the FTC, requires you to ensure the security and confidentiality of

    customer records and information

    • GLB Act “Financial Privacy Rule” deals with privacy notices,

    information collection and sharing

    • IRC imposes criminal and monetary penalties for knowingly or

    recklessly making unauthorized disclosures

    • IRS Revenue Procedure 2007-40 for Authorized IRS e-file Provider

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 40

    Taxes-Security-Together Checklist – Step C:

    Educate Yourself on Phishing Scams

    • Many data thefts start with a phishing email

    • Click on a link to a fake website

    • Open an attachment with embedded malware

    • Spear phishing email to pose as a trusted source

    • Account Takeover

    • Ransomware

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 41

    Steps to Help Protect Data

    • Use separate personal and business emails

    • Protect with strong passwords

    • Two-factor authentication

    • Install anti-phishing tools

    • Use security software

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 42

    Steps to Help Protect Data – continued

    • Never open or download attachments from unknown senders

    • Password-protect and encrypt documents

    • Do not respond to suspicious or unknown emails; if IRS related, forward to [email protected]

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 43

    Taxes-Security-Together Checklist – Step D:

    Recognize the Signs of Client Data Theft

    • Tax professionals should learn the signs of a possible data theft

    • Data theft may result in fraudulent tax returns being filed in their clients’ names

    • Cybercriminals are tax savvy in their attempts to gain sensitive tax data

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 44

    Signs of Client Data Theft

    • Client e-filed returns begin to reject

    • Clients who haven’t filed tax returns begin to receive authentication letters (5071C, 4883C, 5747C) from the IRS

    • Clients who haven’t filed tax returns receive refunds

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 45

    Signs of Client Data Theft – continued

    • Clients/Practitioners receive tax transcripts that they did not request

    • Clients who created an IRS Online Services account are notified that their account was accessed or disabled

    • Another variation: Clients receive notice that an account was created in their names

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 46

    Signs of Client Data Theft – continued

    • The number of returns filed with tax practitioner’s Electronic Filing Identification Number (EFIN) or their Practitioner Tax Identification Number (PTIN) exceeds number of clients assisted.

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 47

    Taxes-Security-Together Checklist – Step E:

    Create a Data Theft Recovery Plan

    • An action plan can save valuable time and protect your clients and yourself

    • Make calling the IRS an immediate action item

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 48

    Data Compromise Action Items

    Contact IRS and law enforcement

    • Tax professionals contact IRS Stakeholder Liaisons

    immediately

    • Search “stakeholder liaisons” on IRS.gov

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 49

    Data Compromise Action Items – continued

    Contact State Agencies:

    • State revenue agencies – email Federation of Tax

    Administrators for state agency contacts at

    [email protected]

    • State Attorneys General

    Contact experts:

    • Security expert

    • Insurance company

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 50

    Data Compromise Action Items – continued

    Contact Clients and Other Services

    • FTC for guidance for businesses

    • Email: [email protected]

    • Credit Bureaus

    • Clients

    Review guidance at IRS.gov/identitytheft

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 51 Use the Checklists in IRS Pub 4557

    Source: IRS Pub 4557

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 52

    Publications

    • Publication 4557, Safeguarding Taxpayer Data

    • Publication 4524, Security Awareness for Taxpayers

    • Publication 5293, Data Security Resource Guide for Tax Professionals

    Related IRS.gov Resources

    • Videos, alerts, fact sheets, news releases

    Sources

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 53

    Federal Trade Commission “Start With Security”

    https://www.ftc.gov/tips-advice/business-center/guidance/start-security-guide-business

    Department of Commerce’s National Institute of Standards and Technology (NIST)

    Small Business Information Security: The Fundamentals

    https://www.nist.gov/cyberframework

    Center for Internet Security (CIS)

    https://www.cisecurity.org/critical-controls.cfm

    Sources

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 54

    Resources – continued

    IRS.gov websites:

    • www.IRS.gov/securitysummit

    • www.IRS.gov/ProtectYourClients

    • www.IRS.gov/IdentityTheft

    Communications & Liaison STAKEHOLDER LIAISON

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 55

    Monitor Your EFIN, PTIN and CAF Numbers

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 56 • Thieves impersonate tax pros to:

    • File fraudulent returns

    • Submit Power of Attorney forms

    • Call Practitioner Priority Service line

    • Attempt to access client accounts

    • Attempt to access e-Services

    • IRS responses include:

    • 2-factor authentication for e-Services accounts

    • Authorization requirements for PPS callers

    • Redacted tax transcripts

    Stolen EFINs, PTINs and CAFs

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 57

    • Only the IRS can issue EFINs

    • Review periodically for accuracy and updates

    • Update change in business operations within 30 days

    • Changes in address, phone numbers or personnel

    • Add or remove authorized users (responsible officials, principal consent, delegated users, etc.)

    • Know when a new EFIN is needed

    • New ownership of a firm (EFIN not transferable)

    • New location that transmits e-File returns

    Maintain Your EFIN Application

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 58

    For EFIN weekly totals:

    • Go to e-Services

    • Access e-File Application

    • Search by name

    • Select “EFIN Status”

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 59 Report Suspected EFIN Abuse

    • Too many returns filed with your EFIN?

    Contact e-Help Desk (866) 255-0654

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 60 • Monitor “Returns Filed per PTIN”

    • Information available via online PTIN system for tax preparers who meet both of the following criteria:

    • Have a professional credential or are an Annual Filing Season Program participant, and

    • Have at least 50 Form 1040 series tax returns processed in the current year

    Monitor Your PTIN

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 61 • A CAF number is assigned the first time you file a

    third-party authorization with IRS.

    • Review your Power of Attorney submissions annually

    • Withdraw your POA for clients you no longer represent by mailing or faxing the existing POA to the IRS using the “Where to File” chart. Write “Withdraw” at the top.

    Maintain Your POA Files

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 62 • To access “Returns Filed Per PTIN” information,

    follow these steps:

    1. Log into your PTIN account

    2. From the Main Menu, find “Additional Activities”

    3. Under Additional Activities, select “Summary of Returns Filed.”

    How to Access PTIN Information

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 63 Summary of Returns Filed Chart

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 64 Report Misuse of your PTIN

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 65 • A CAF number is assigned the first time you file a

    third-party authorization with IRS.

    • Review your Power of Attorney submissions annually

    • Withdraw your POA for clients you no longer represent by mailing or faxing the existing POA to the IRS using the “Where to File” chart. Write “Withdraw” at the top.

    Maintain Your POA Files

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    Slide 66 • Using stolen CAF numbers to try to obtain tax

    transcripts is the latest ID theft trend.

    • Receiving unexpected tax transcripts is a sign of identity theft.

    • Contact the IRS if there is suspected abuse of your CAF number.

    • Review Publication 4557, Safeguarding Taxpayer Data, for additional security steps

    Monitor Your CAF Number

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

    ___________________________________

                                                                                                                                      Order Now