Chapter 9: Identity Theft and Refund Fraud. 1 09: Identity Theft and Refund Fraud
|
|
- Godwin Boyd
- 6 years ago
- Views:
Transcription
1 Page Chapter 9: Identity Theft and Refund Fraud 1
2 Learning Objectives Page Upon completion of this seminar, participants should be able to Recognize the threats that apply to practitioners. Describe how to respond to identity theft or tax refund fraud. Identify resources available to assist victims of identity theft. 2
3 Key Developments Page The Security Summit impacts the filing season. Page 136 Additional data elements have been added to business returns for the 2017 processing year. Page 136 The New Threat, Practitioners have become the preferred target of the fraudsters. Page Surviving a data breach. Page Putting in place safeguards from a breach. Page The steps to take when your system is breached. Page 138 The response plan of the IRS. Page
4 Key Developments Page What to expect from the fraudsters after a breach. Page 139 How can we help our clients who are breached. Page What the IRS response to our clients will be. Page The notices used by IRS in processing affected returns. Page The IRS IP PIN program assignment, including on tax return, and taxpayer timeline in the program. Page
5 Page 135 I. What is Identity Theft The current mess: For the first year since the IRS started tracking fraudulent returns the number of such returns has decreased for individual returns (1040) but problems have grown with business returns. 5
6 Page 135 What are the bad guys looking for to steal identities? 1. SSNs 2. DOBs I. What is Identity Theft 3. Logins in and other sites 4. Access to computer systems to install ransom ware. Any kind of data that can facilitate the filing of a return for the purposes of obtaining a false tax refund. 6
7 Page 139 I. What is Identity Theft The problems the IRS is facing: 1. Obtaining false tax refunds 2. False tax documents that are being created: W-2s 1099s Form 1065-K-1s Form 1120, 1120S, 1065 and False employment documents. An unrelenting assault on their computer systems to obtain confidential taxpayer data. 7
8 Page 135 II. The Security Summit To assist the IRS they have formed an industry partnership with organizations that have a stake in tax filing: 1. Tax Preparation and Software Firms 2. State Tax Administrators 3. Payroll and tax financial product processors. 8
9 Page 136-Updated Info II. The Security Summit Reviewing the content of the IRS Security Summit Home Page should be part of the firm routine. irs.gov/privacy-disclosure/security-summit Much of the current focus of IRS Security Summit has switched to practitioners as they have become the target of choice by the black web. 9
10 Page 136 II. The Security Summit For 2017 returns (2018 filing year) the IRS will add several data element requirements to Forms 1065, 1120, 1120S and The Name and SSN of the company official who is authorized to sign the return. 2. Payment Histories a. Were Estimate Payments Made b. The details of those payments Dates Amounts Payment Confirmation Numbers 10
11 Page 136 II. The Security Summit For 2017 returns (2018 filing year) the IRS will add several data element requirements to Forms 1065, 1120, 1120S and If there is a parent company identify with associated details. 4. Certain information associated with deductions claim (Currently not identified). 5. Filing History, identification of other returns filed (Shared Secrets). 11
12 III. The New Threat Attacks on the Practitioner Page 136 Advice from the IRS: The Level of Threat to the Practitioner has never been greater. The practitioner reaction to a breach: Emotional Melt Down Fight or Flight Surrender (Close up the Shop) 12
13 III. The New Threat Attacks on the Practitioner Page Survival when attacked: 1. Work through the issues of identity theft with the client in partnership. 2. Help the client place a credit freeze on their account. 3. Serve as a repository of forms and documents created/obtained. 4. Optional Offering credit monitoring 13
14 III. The New Threat Attacks on the Practitioner Page 137 D. What the participants have determined about practitioner thefts, thieves are well trained on our systems: 1. Upon gaining system access they quickly determine what to do to which returns. 2. Steal data on filed returns to commit filing fraud in a subsequent year. 3. Determine ex-clients for filing in current year outside of practitioner s systems. 14
15 III. The New Threat Attacks on the Practitioner Page 137 The nature and character of firms that survive a breach: a. An annual risk assessment. 15
16 III. The New Threat Attacks on the Practitioner Page 137 The nature and character of firms that survive a breach: b. Use of an external IT expert to access risks for the firm, use a CISA, Certified Information System Auditor. searchsecurity.techt arget.com/definitio n/certified- Information- Systems-Auditor- CISA 16
17 III. The New Threat Attacks on the Practitioner Page 137 The nature and character of firms that survive a breach: c. Risk training for staff. Most failures are based on a human error. d. Obtain adequate insurance coverage. Business Owners Policy Malpractice Policy Association Policy Stand Alone Policy 17
18 III. The New Threat Attacks on the Practitioner Page What would be the size of breach, IRS says average firm breach is around 500 active clients, with each incident numbering around 4,000 5,000 record files. Expect every record in the file to be accessed. Cost of breach will be larger than anticipated. 18
19 Tax Identity Theft has been Refocused Increasingly practitioners have been the victims of ID theft with the breach of their IT systems. By a show of hands: A.IRS insists on immediate reporting to the service by the practitioner. B.Will work with the practitioner to coordinate a response. C.Request that the practitioner provide a complete list of all taxpayers in their database. D.All of the above. 19
20 III. The New Threat Attacks on the Practitioner Page 138 The practitioner response: 1. Cancel the FEIN immediately. 2. Furnish an all inclusive list of all clients to IRS ASAP. 3. Get in touch with firms insurance carrier. Oops most firms do not have coverage. 4. Notify the attorney general s office in every state firm has filed any kind of return. 20
21 III. The New Threat Attacks on the Practitioner Page 138 Upon being notified of a breach by a practitioner, FYI a requirement of Publication 1345, the E-File requirements handbook. 21
22 III. The New Threat Attacks on the Practitioner Page 138 Publication 1345 requires several steps and responses by the practitioner in the event of a breach. When signing on for e-filing a practitioner promises to comply with all provisions of the Publication. 22
23 III. The New Threat Attacks on the Practitioner Page G. What will the IRS want to do? 1. Ask for a CI investigation, but lack of resources has greatly curtailed this activity. 2. Higher scrutiny of any client filing for at least one year, but likely two. 3. Letter 5747 asking for a validation of identity anytime a return is filed. 23
24 III. The New Threat Attacks on the Practitioner Page 139 The Outcome of the Theft, the Bad Guys will: 1. Attempt to obtain transcripts, of the practitioner also. 2. Obtain the practitioner s credit report. 3. Try to change the EFIN information. 4. Will change information associated with the PTIN. 24
25 Page 139 Looking through the Trash Dumpster diving is not a lost art, particular targets of thieves: Accounting Firms Law Firms IV. How Thieves Obtain Data Health Care Professionals Action Item - Install systems that facilitate the secure disposal of confidential documents. 25
26 Page 139 IV. How Thieves Obtain Data Thefts of Records If you looked around your office would you find: Piles of files after hours Unlocked file cabinets Unprotected computers Poor document destruction practices Because IRS is being trained to observe and report 26
27 Page 140 IV. How Thieves Obtain Data Attacks directed at practitioners. Phone calls to firms indicating they are from your software vendor. Communications masquerading as executives at client firms. Accessing online payroll data. 27
28 Page 141 VI. Steps for Victims A police report is a must to protect your rights. 28
29 Page 142 VI. Steps for Victims The FTC has checklists and requests that you report your theft for inclusion in their data base 29
30 Page 142 VI. Steps for Victims Pickup the phone and contact a credit reporting agency requesting a credit freeze on your account. 30
31 Page 143 The Credit Freeze: VI. Steps for Victims Costs vary from state to state but average $30 There is generally a fee for removal of $10 but some states do not allow this charge. A PIN will be issued allowing the user to unfreeze and refreeze their credit account. 31
32 Page 143-New VI. Steps for Victims The Equifax data breach: The Equifax breach which has grown to over 250 million individuals prompted many individuals to place a credit freeze on their account, however: Most attacks are likely to be imposter scams. IRS expects a rash of tax identity theft with the information obtained by the hackers. Spear phishing using data obtained on bank and brokerage accounts. 32
33 Page 143 Final words of wisdom: VI. Steps for Victims 7. Close accounts that were opened by the fraudulent users. 8. Opt out of unsolicited offers. 33
34 Page Opt out of unsolicited offers. VI. Steps for Victims 34
35 VII. Dealing with the IRS for Tax Account Fraud Page What does the IRS ask the taxpayer to do? 1. File Form 14039, however this is not always in the best interest of the taxpayer. a. IRS may place an IP PIN on the account which may last for one filing period or as long as FOREVER. b. Filing Form does not mean inclusion in the IP PIN program, IRS subjects the request to a 4 level threat ranking. 35
36 VII. Dealing with the IRS for Tax Account Fraud Page143-Update What does the IRS ask the taxpayer to do? 2. Respond to all notices as quickly as possible. 3. Continue to file and pay taxes, even if rejected by e-filing. 4. Review the most recent processes on irs.gov/identity-theft-fraud-scams/identityprotection 36
37 VII. Dealing with the IRS for Tax Account Fraud Page 143 What will the IRS do? 1. Confirm the identity theft profile of the return. 2. Code the taxpayers account indicating the processing of ID Theft investigation. 3. Reconcile the account to determine what is the taxpayer s actual information and what is fraudulent. 4. Place an ID Theft indicator (special processing) if the determination is made. 5. During the investigation the account will be on hold 37
38 VIII. Notices Used by the IRS For Identity Theft Page 143 IRS uses a collection of notices to correspond with taxpayers affected by identity fraud, some they disclose and others are only known as practitioners communicate with each other. To understand what IRS is looking for any notice go to irs.gov: In the search box enter Basic Tools for Tax Professionals 38
39 VIII. Notices Used by the IRS For Identity Theft Page 143 Type Here 39
40 VIII. Notices Used by the IRS For Identity Theft Page143 Type Here
41 VIII. Notices Used by the IRS For Identity Theft Page 144 Some demand a response and others to inform 41
42 VIII. Notices Used by the IRS For Identity Theft Page 144 While others are indicating a step in the process 42
43 Page 144 IX. Identity Protection Personal Identification Number (IP PIN) The IRS is using the IP PIN as a link to the SSN assuming that only the legitimate taxpayer will ever be in possession of that security number. The number will be delivered by Notice CP01A. Once in the IP PIN program the taxpayer must use an IP PIN to file their return for 1 year, 4 years or a lifetime. If the taxpayer fails to receive the above notice they should obtain a replacement number. 43
44 Page 144 IX. Identity Protection Personal Identification Number (IP PIN) When CP01A notices do not EXACTLY reflect the taxpayer s information. What should the taxpayer do? CALL to correct the account IMMEDIATELY. 44
45 Page 145 IX. Identity Protection Personal Identification Number (IP PIN) If the taxpayer does not receive or misplaces their IP PIN they can obtain a replacement through Secure Access at irs.gov/identity-theft-fraudscams/get-an-identity-protection-pin or call. 45
46 Page 145 IX. Identity Protection Personal Identification Number (IP PIN) Once assigned an IP PIN indicator the taxpayer account is locked and they must: Use an IP PIN when e-filing Use an IP PIN when paper filing Will receive a NEW IP PIN every year in late December or early January Can replace the number at the IP PIN online site at IRS (if they can register) If the cannot or choose not to register then call IRS at to obtain their IP PIN 46
47 X. Obtaining a Copy of the Fraudulent Returns Filed A helpful piece of information for the taxpayer is a copy of the fraudulent return(s). Why? Local law enforcement will use to pursue the case. BUT IRS will decline to release until the investigation is complete. Why? To insure the requester of the fraudulent returns is in fact the injured taxpayer. Page
48 X. Obtaining a Copy of the Fraudulent Returns Filed Page The IRS continues to insist that they not only are required to protect the identity of the injured taxpayer but that of the scammer. However, Chief Counsel s office says: The fraudulent return is a nullity, as it does not qualify as a return per IRC 6103 BUT still is subject to disclosure restrictions of IRC 6103(a). IRS 48
Tax-Related Identity Theft
Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman
More informationJason B. Freeman, J.D., CPA
Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman
More informationIdentity Theft Information for Tax Professionals. August 2017
Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!
More informationCombating ID Theft with the Help of Payroll Professionals
PENNSYLVANIA STATEWIDE PAYROLL CONFERENCE Indiana University Of Pennsylvania Philip G. Yamalis Senior Stakeholder Liaison October 7, 2016 Future State Resources for Payroll Professionals Combating ID Theft
More informationOhio Conference of Payroll Professionals
Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number
More informationIdentity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office
Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission
More informationWHEN BAD THINGS HAPPEN TO YOUR GOOD NAME
WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card
More informationInformation on Identity Theft for Business, Partnerships and Estate and Trusts
Page 1 of 5 HELP MENU Home News Fact Sheets Information on Identity Theft for Business Partnerships and Estate and Trusts Information on Identity Theft for Business, Partnerships and Estate and Trusts
More informationIRS UPDATES & Taxes. Security. Together.
IRS UPDATES & Taxes. Security. Together. Dennis Bell Senior Stakeholder Liaison CATA February 3, 2016 Issue 5: Online Tools for Tax Professionals 1 Keeping Current Preparer Guidelines 2 Other Tax Pro Links
More informationIDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018
IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,
More informationc» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:
Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security
More informationSPECIAL REPORT. What to Do If Your Client Is a Victim of Tax-Related Identity Theft
SPECIAL REPORT What to Do If Your Client Is a Victim of Tax-Related Identity Theft What to Do If Your Client Is a Victim of Tax-Related Identity Theft Tax-related identity theft revolves around the fraudulent
More informationProtect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently
Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity
More informationData Thefts and Protecting Client Tax Information
Data Thefts and Protecting Client Tax Information October 20, 2015 The information contained in this presentation is current as of the date it was presented. It should not be considered official guidance.
More informationConsumer Federation of America Best Practices for Identity Theft Services. March 10, 2011
Consumer Federation of America Best Practices for Identity Theft Services March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction 3 About
More informationHere is some more information on the Equifax Breach and how you may protect yourself in the aftermath...
UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More informationVisa s Approach to Card Fraud and Identity Theft
Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting
More informationIt s not going away. (c) 2014 huberis.net. Identity Theft
It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity
More informationFINAL COPYRIGHT 2016 LGUTEF IRS ISSUES
IRS ISSUES 8 Issue 1: Form 2848, Power of Attorney and Declaration of Representative........ 246 Issue 2: Levels of Representation before the IRS........... 249 Issue 3: IRS Transcripts....... 251 Issue
More informationDrexel and FMFCU. Presented By
Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission
More informationIdentity thieves use a variety of ways to gain access to your personal information:
How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into
More informationToday s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center
Today s Speakers Lisa Weintraub Schifferle Attorney Federal Trade Commission (FTC) Eva Velasquez CEO & President Identity Theft Resource Center Overview What is identity theft? What is tax identity theft?
More informationUNIT 3-4 Preventing Identity Theft
UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information
More informationIdentity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.
Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should
More informationID Theft Security. Michael G. Solomon. CISSP PMP CISM
ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible
More informationIRS Criminal Investigation
IRS Criminal Investigation Kurt Bertram Special Agent Public Information Officer November 5, 2015 IRS Criminal Investigation Mission Criminal Investigation serves the American public by investigating potential
More informationIdentity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation
Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an
More informationv ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service
www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the
More informationProtecting New Yorkers from Identity Theft. Senator David Carlucci
Protecting New Yorkers from Identity Theft Senator David Carlucci Identity Theft According to USA Today, identity theft incidence rates rose 16% between 2015 and 2016, alone. 15.4 million Americans were
More informationIdentity Theft: Protecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA
More informationReceive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait!
Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! By Tom Bassett, J.D., CPA Trending Upward Again in 2018 Taxpayer Identity Theft As head of Commerce Trust
More information2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER
07/13/2017 Version 2 2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER 2018-2B SECTION ONE: 2018 Product Suite Our portfolio of financial services and our commitment to customer service will
More informationEdward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:
Edward J. Finn 1275 Drummers Lane, Suite 302 Office: 267-930-4776 Wayne, PA 19087 Fax: 267-930-4771 Email: efinn@mullen.law VIA U.S. MAIL AND EMAIL Office of the Attorney General 1125 Washington Street
More informationIRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619)
IRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619) 770-9317 FELICIA.MCCAIN@CI.IRS.GOV Areas of Emphasis for CI Abusive Return Preparers International Fraud Refund
More informationAdditional Information on the Dirty Dozen
Additional Information on the Dirty Dozen 1. Identity Theft Topping this year s list Dirty Dozen list is identity theft. In response to growing identity theft concerns, the IRS has embarked on a comprehensive
More informationTAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT
TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity
More informationOffer in Compromise. Ley Mills COSS SL-Field. December 21, 2016
Offer in Compromise Ley Mills COSS SL-Field December 21, 2016 Offer in Compromise Pre-Qualifier Tool Good candidate? Reasonable offer amount? Use as guide for Doubt as to Collectibility offer 2 Offer in
More information2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT
07/13/2017 Version 2 2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT 2018-2B SECTION ONE: 2018 Fee Collect Program In partnership with your software provider and Santa Barbara Tax Products Group
More informationIRS Updates. Due Date. Richard Furlong, Jr. Senior Stakeholder Liaison 1/2/2018
IRS Updates Richard Furlong, Jr. Senior Stakeholder Liaison January 4, 2018 North Jersey Working Together Conference Seton Hall University Due Date Returns and payments otherwise due April 15, 2018, are
More informationHow to Freeze Your Credit Files
Avoid Identity Theft! How to Freeze Your Credit Files County of Bucks Department of Consumer Protection/ Weights and Measures 1260 Almshouse Rd., 4th Floor Doylestown, Pa. 18901 215-348-6060 1-800-942-2669
More informationIntroduction to Fraud Detective Kirby Shoemake
Introduction to Fraud Detective Kirby Shoemake Fraud In criminal law, fraud is an intentional deception or coercion made for personal gain and to damage another individual in some way shape or form. Types
More informationA new tax transcript to better protect taxpayer data
A new tax transcript to better protect taxpayer data FS-2018-16, September 2018 On Aug. 22, 2018, the IRS announced a change in the format of tax transcripts and provided a preview of proposed changes
More informationFOX VALLEY ORTHOPEDICS. Identity Compliance Program
I. ADOPTION OF WRITTEN PROGRAM ( Program ) Fox Valley Orthopedics (the Practice ) adopts this written program to assist in identifying sensitive information, as well as identifying, detecting and mitigating
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationEveryone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud. Capital of Texas Enrolled Agents CPE November 3, 2009
Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud Capital of Texas Enrolled Agents CPE November 3, 2009 When was the first significant instance of identity theft in
More informationHacking Healthcare: Attacks on the Highest Value Asset
Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product
More informationBank Secrecy Act OFAC FinCEN
Bank Secrecy Act OFAC FinCEN SOUTHEAST DIRECTORS AND SUPERVISORY COMMITTEE CONFERENCE SEPTEMBER 18, 2017 Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer
More informationGet the most out of your membership
PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account
More informationContents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.
Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing
More informationNews Release IR IRS Releases the "Dirty Dozen" Tax Scams for 2014; Identity Theft, Phone Scams Lead List
Page 1 TEXT: News Release IR 2014-16 IRS Releases the "Dirty Dozen" Tax Scams for 2014; Identity Theft, Phone Scams Lead List IR 2014-16; 2014 IRB LEXIS 130 February 19, 2014 WASHINGTON - The Internal
More informationUI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division
UI ID Theft in Texas 2014 UI Director s Conference Paul Carmona Director, Regulatory Integrity Division Overview Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term
More informationCharge It Right. FDIC Money Smart for Young Adults. Building: Knowledge, Security, Confidence
Charge It Right FDIC Money Smart for Young Adults PNC is proud to work with the FDIC to offer their Money Smart program to our customers, to support lifelong learning in Financial Education. Building:
More informationBank Secrecy Act OFAC FinCEN
Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence
More informationIdentity Theft Protection Plans
Identity Theft Protection Plans V E R I F Y P R O T E C T R E C O V E R IN 2017, DATA BREACHES REACHED ECONOMIC PROPORTIONS A victim may need to spend time at work trying to recover their good name and
More informationPage Related Parties - Compensation and Loans 1
Page 121-144 07 - Related Parties - Compensation and Loans 1 Page 121 I. Owner Compensation Issues in General Some basic facts we know but our clients do not: A. All shareholders MUST take a reasonable
More informationGeneral Instructions Section references are to the Internal Revenue Code unless otherwise noted.
General Instructions Section references are to the Internal Revenue Code unless otherwise noted. Future developments. Information about developments affecting Form W-9 (such as legislation enacted after
More informationIdentity Theft.
Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.
More informationCREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1
CREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1 DO NOW: T/F? 1. Using credit can lead to serious problems. 2. When you charge a purchase with a credit card, you can withhold payment if the product is defective.
More informationDALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES. October 26, 2016
DALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES October 26, 2016 TIGTA & You: Protecting Clients and Taxpayers Tom Traxinger Assistant Special Agent in Charge, Treasury
More informationIdentity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types
More informationIdentity Theft: World s Fastest Growing Crime!!
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all
More informationIdentity Theft Solutions
Identity Theft Solutions Identity Theft Solutions August 12, 2015 2 A Complete IDENTITY THEFT SOLUTION Identity theft is the fastest growing financial crime in America, striking thousands of victims each
More informationFRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools
FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting
More informationBryan Coffey Stakeholder Liaison Internal Revenue Service Small Business/Self-Employed Communications, Outreach, Systems, and Solutions
Bryan Coffey Stakeholder Liaison Internal Revenue Service Small Business/Self-Employed Communications, Outreach, Systems, and Solutions 732-777-7242 Bryan currently works as a Stakeholder Liaison out of
More informationFinancial Literacy Course. East High School Module 9
Financial Literacy Course East High School Module 9 What will you learn about? Identity Theft and Consumer Fraud Protecting Against and Identity Theft and Consumer Fraud Fair Debt Collection Practices
More informationJanuary to June 2016 fraud update: Payment cards, remote banking and cheque
January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.
More informationFinancial Crime: Awareness & Prevention. Jon Jarosinski
Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit
More informationROCHESTER INSTITUTE OF TECHNOLOGY
ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3
More information10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office
Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing
More informationProtecting Yourself from Fraud including Identity Theft Advanced Level
Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial
More informationAffordable Care Act (ACA) Employer Provisions
Affordable Care Act (ACA) Employer Provisions Determining ALE Status An employer is considered an ALE if it has 50 or more full-time employees or full-time equivalent employees Number of employees and
More informationTax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Shannon Vernieuw
Tax Refund Fraud and Identity Theft IRS Criminal Investigation Special Agent Shannon Vernieuw Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating
More informationFraudulent Check, Credit Card Fraud and ID Theft Guide
Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not
More informationWhen Your Child s Identity Is Stolen
When Your Child s Identity Is Stolen What is child identity theft? CONSUMER INFORMATION SHEET 3B 2/16/08 Adults are not the only targets of identity theft. In fact, children under the age of 18 can also
More informationID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
More informationSection references are to the Internal Revenue Code unless otherwise noted.
General Instructions Section references are to the Internal Revenue Code unless otherwise noted. Future developments. The IRS has created a page on IRS.gov for information about Form W 9, at www.irs.gov/w9.
More informationEvaluating Your Company s Data Protection & Recovery Plan
Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart
More informationYear-end 2016 fraud update: Payment cards, remote banking and cheque
Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments
More informationIRS Resources for Payroll Professionals. Date
IRS Resources for Payroll Professionals Date 4-5-2017 Search Payroll Professional IRS.gov Bullet (28 pt.) Bullet (28 pt.) Bullet (28 pt.) Payroll Professionals Tax Center Bullet (28 pt.) Bullet (28 pt.)
More informationRequest for Taxpayer Identification Number and Certification
Form W-9 (Rev. August 2013) Department of the Treasury Internal Revenue Service Name (as shown on your income tax return) Request for Taxpayer Identification Number and Certification Give Form to the requester.
More informationScam Type #1: Wire Fraud Scams
2015 Scam Type #1: Wire Fraud Scams The Goal of Wire Fraud Scams is to have the victim wire or otherwise send money to the Scammer through non-refundable, non-traceable methods such as Wire Transfer; Money
More informationNATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE
NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance
More informationPRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.
PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity
More informationGREENPATH FINANCIAL WELLNESS SERIES
GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves
More informationIdentity Theft: Help Your Students Avoid This Epidemic
Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity
More informationPirelli World Challenge Prize Money
Pirelli World Challenge Prize Money Payment Prize Money for Car Number(s): Should be paid to: Payment Method: ACH: Check: Check Payment Complete this section if Prize Money is to be paid via check. Address:
More informationProtecting Yourself Against Frauds & Scams
Protecting Yourself Against Frauds & Scams Trust & Respect Integrity Accountability Excellence Teamwork Justice Progress Through Participation What you need to know Why do con artists target seniors? How
More informationJanuary 16, The Honorable Max Baucus, Chairman Senate Committee on Finance 219 Dirksen Senate Office Building Washington, DC 20510
American Institute of CPAs 1455 Pennsylvania Avenue, NW Washington, DC 20004 The Honorable Max Baucus, Chairman Senate Committee on Finance 219 Dirksen Senate Office Building Washington, DC 20510, Ranking
More informationCrime Coverage Section Application (Large Public Company > $1B revenues)
Crime Coverage Section Application (Large Public Company > $1B revenues) BY COMPLETING THIS CRIME APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH CHUBB INSURANCE COMPANY OF CANADA (THE COMPANY
More informationEQUIFAX DATA BREACH WHAT YOU NEED TO KNOW
EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the
More informationLearn about identity theft. Investor education
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationThe Ultimate Travel Solution SSN/EIN CHANGE FORM
The Ultimate Travel Solution SSN/EIN CHANGE FORM I,, an Independent Representative for Surge365, desire to change the Tax Identification Number on file for my account(s). I understand all commissions beginning
More informationGreenPath Financial Wellness Series
GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial
More informationGleim EA Review Updates to Part Edition, 1st Printing April 2016
Page 1 of 6 Gleim EA Review Updates to Part 3 2016 Edition, 1st Printing April 2016 NOTE: Text that should be deleted is displayed with a line through it. New text is shown with a blue background. This
More informationSENIOR SAFETY PRESENTATION
SENIOR SAFETY PRESENTATION Presentation Overview Elder Abuse Problem How the Calgary Police Service responds to this issue Most Prevalent Frauds/Scams Case Studies Contributing Societal Trends Elder Abuse
More informationMay 15, VIA
King & Spalding LLP 1700 Pennsylvania Ave, NW Suite 200 Washington, D.C. 20006-4707 Tel: +1 202 737 0500 www.kslaw.com Nicholas A. Oldham Direct Dial: +1 202 626 3740 noldham@kslaw.com VIA EMAIL: SecurityBreach@atg.wa.gov
More informationTREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Detection Has Improved; However, Identity Theft Continues to Result in Billions of Dollars in Potentially Fraudulent Tax Refunds September 20, 2013 Reference
More informationTax News and Industry Updates
2018 Volume 6, Issue 2 Tax News and Industry Updates Nyle G Taylor CPA Chartered 611 Wilson Ave. Ste 6c Pocatello, Idaho 83201 (208) 232-5900 Phishing Schemes Make IRS Dirty Dozen List of Tax Scams IR-2018-39,
More informationSeptember 14, Richard F. Smith Chairman and Chief Executive Officer Equifax, Inc Peachtree Street, NE Atlanta, GA Dear Mr.
September 14, 2017 Richard F. Smith Chairman and Chief Executive Officer Equifax, Inc. 1550 Peachtree Street, NE Atlanta, GA 30309 Dear Mr. Smith: Consumers Union, the policy and mobilization division
More information