Data Thefts and Protecting Client Tax Information
|
|
- Clarence Jennings
- 6 years ago
- Views:
Transcription
1 Data Thefts and Protecting Client Tax Information October 20, 2015 The information contained in this presentation is current as of the date it was presented. It should not be considered official guidance.
2 Data Thefts and Protecting Client Tax Information We are committed to working in partnership with you and the tax professional organizations to protect the integrity of the tax system. IRS Commissioner John A. Koskinen 1
3 Data Thefts and Protecting Client Tax Information Webinar Agenda How to protect Taxpayer information Increase awareness about data loss threats Discuss best practices 2
4 Do you have a question? Select the Ask a Question link under the PowerPoint window and click the submit button. 3
5 Data Thefts and Protecting Client Tax Information Ken Corbin Director, Return Integrity and Compliance Services W&I Division Shawn S. Tiller Executive Director, Criminal Investigation Mark Kahler Senior Analyst, Criminal Investigation David P. Lyons President, Lyons & Lyons, PC 4
6 Challenges to the Tax System Scale of Identity Theft/Data Theft Financial burden of identity theft now exceeds all property crimes combined. Identity theft remains #1 complaint filed with Federal Trade Commission Identity theft victim occurs every two seconds. More than 1 billion personal records stolen in 2014 Large-scale data breaches netted more than 100 million SSNs in 2015 to date Not all data theft is identity theft and not all identity theft is taxrelated identity theft the filing of fraudulent returns. 5
7 Challenges to the Tax System IRS Fraud Filters Improve Each Year 19 million suspicious returns reviewed between $63 billion fraudulent refunds stopped between million suspicious returns rejected or stopped from processing in 2015 through September; 1.2 million confirmed IDT $9.5 billion in fraudulent refunds protected in calendar year 2015 through September 6
8 Combating Tax-Related Identity Theft IRS Actions in Recent Years: Increase fraud filters to 200 in 2015 from 11 in 2012 Limit direct deposits to three refunds in single account Locked accounts of nearly 29 million deceased taxpayers Improved cooperation with local law enforcement 7
9 Combating Tax-Related Identity Theft IRS Actions in Recent Years: Reduced internal use of SSNs Reduced prisoner tax fraud Worked with 286 financial institutions to identify fraudulent refunds, recovered $3 billion past three years. Improved EFIN policies to prevent abuse. 8
10 Combating Tax-Related Identity Theft Security Summit Update: Improve verification of taxpayer/return at time of filing More than 20 new data elements New password standards Improve information sharing Certain providers make weekly reviews for schemes Increase security awareness among taxpayers and professionals Create a new tax preparer work group 9
11 David Lyons, CPA Data breach Cyber attack/data theft Occurred October 2012 Became aware of the theft in February 2013 Homeland Security/IRS Criminal Investigation Bulgarian national 10
12 David Lyons, CPA Data breach Dealing with the theft Hiring additional staff Notifying customers Obtaining credit protection services for clients IRS ID Protection Unit /Taxpayer Advocate Actions taken to prevent future breaches/data thefts Passwords minimum 12 characters long Password protected each client s tax file Restricted hours of remote access software 11
13 Criminal Investigation IDT Remains a CI Priority Initiated 1,800 IDT-related investigations in last two years Over 1,500 sentenced to prison Average sentence exceeded three years; longest 27.5 years 1,100 LEAP partners in 48 states IDT Clearinghouse received over 7,600 leads since FY12 CI lead agency in 70 multi-regional task forces/working groups 12
14 Data Theft Tactics Scams Lead to Data Thefts Phishing s, text or calls Pose as trusted organizations Embed links to fake websites Use malware-infected attachments Risks Account take-overs (Banks, IRS e-services, Tax Software) Computer breaches Educate employees on scams/risks 13
15 Safeguarding Client Data Review Your Security and Make a Plan Use top-notch security software Firewall Anti-virus File Encryption Educate employees on data theft dangers Use strong passwords Secure wireless connection if you use wi-fi in your office; make sure it is password protected. 14
16 Safeguarding Client Data Review Your Security and Make a Plan Use encrypted programs to exchange PII information with taxpayers. Back up taxpayer data frequently, perhaps on an external hard drive and endure that hard-drive is kept in a secure location with limited access by others. If you keep paper files, ensure they are stored in a secure location. Check EFIN stats weekly; if the number is excessive, contact e-help Desk immediately. 15
17 Safeguarding Client Data Federal Laws Apply to Preparers Gramm-Leach-Bliley Act, the Safeguards Rule requires you to ensure the security and confidentiality of customer records and information. Gramm-Leach-Bliley Act, the Financial Privacy Rule deals with privacy notices and information collection and sharing. Internal Revenue Code (IRC) imposes criminal and monetary penalties for knowingly or recklessly making unauthorized disclosures 16
18 New Guidance for Preparer Breaches If you suffer a theft or loss of taxpayer data: Call your local stakeholder liaison to report the loss to the IRS Local listing for your liaison can be found at IRS.gov, keyword Stakeholder Liaison Stakeholder Liaison will notify CI and RICS CI will determine whether to launch an investigation RICS will determine if there is a tax administration impact and will mark taxpayer accounts 17
19 Make a Data Theft Plan Recommendations: Review FTC Suggestions for Data Theft Response Notify Law Enforcement (and IRS Stakeholder Liaison) Notify Major Credit Bureaus Notify Individuals Describe in your notice to clients what you know about the compromise, including how it happened, what information was taken and what actions you have taken to remedy the situation. 18
20 Summary Review Publication 4557 Review your security policy Create a security plan Beware phishing s; educate employees about the phishing/malware dangers Review FTC suggestions for data theft response Create a data theft plan notify IRS of loss Help educate your clients about phishing/malware dangers by sharing Publication 4524 Check EFIN stats weekly during filing season 19
21 Data Thefts and Protecting Client Tax Information Q&A Session Ken Corbin Director, Return Integrity and Compliance Services W&I Division Shawn S. Tiller Executive Director, Criminal Investigation Mark Kahler Senior Analyst, Criminal Investigation David P. Lyons President, Lyons & Lyons, PC 20
22 IRS Video Portal Go to: and click the "All Webinars" tab to view IRS Webinar Archives. 21
IRS UPDATES & Taxes. Security. Together.
IRS UPDATES & Taxes. Security. Together. Dennis Bell Senior Stakeholder Liaison CATA February 3, 2016 Issue 5: Online Tools for Tax Professionals 1 Keeping Current Preparer Guidelines 2 Other Tax Pro Links
More informationCombating ID Theft with the Help of Payroll Professionals
PENNSYLVANIA STATEWIDE PAYROLL CONFERENCE Indiana University Of Pennsylvania Philip G. Yamalis Senior Stakeholder Liaison October 7, 2016 Future State Resources for Payroll Professionals Combating ID Theft
More informationIdentity Theft Information for Tax Professionals. August 2017
Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!
More informationTax-Related Identity Theft
Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman
More informationJason B. Freeman, J.D., CPA
Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman
More informationIRS Resources for Payroll Professionals. Date
IRS Resources for Payroll Professionals Date 4-5-2017 Search Payroll Professional IRS.gov Bullet (28 pt.) Bullet (28 pt.) Bullet (28 pt.) Payroll Professionals Tax Center Bullet (28 pt.) Bullet (28 pt.)
More informationOhio Conference of Payroll Professionals
Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number
More informationVisa s Approach to Card Fraud and Identity Theft
Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting
More informationIdentity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office
Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission
More information2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT
07/13/2017 Version 2 2018 ERO Compliance Training RETURNING CLIENTS FEE COLLECT 2018-2B SECTION ONE: 2018 Fee Collect Program In partnership with your software provider and Santa Barbara Tax Products Group
More information2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER
07/13/2017 Version 2 2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER 2018-2B SECTION ONE: 2018 Product Suite Our portfolio of financial services and our commitment to customer service will
More informationIRS Criminal Investigation
IRS Criminal Investigation Kurt Bertram Special Agent Public Information Officer November 5, 2015 IRS Criminal Investigation Mission Criminal Investigation serves the American public by investigating potential
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More informationACH Tax Refunds: Exceptions, Posting, & Liabilities. Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist
ACH Tax Refunds: Exceptions, Posting, & Liabilities Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist Audio Handouts Questions Dealing with ACH Tax Refunds: Exceptions, Posting & Liabilities
More informationFRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools
FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting
More informationUI ID Theft in Texas UI Director s Conference. Paul Carmona Director, Regulatory Integrity Division
UI ID Theft in Texas 2014 UI Director s Conference Paul Carmona Director, Regulatory Integrity Division Overview Desired End State What We Know What We re Experiencing What We re Doing About It Near-Term
More informationThe Scoop. Agenda 8/14/2018. August 15, 2018
Center for Agricultural Law & Taxation The Scoop August 15, 2018 Agenda IRS Budget Status IRS New Tax Reform Page Updated Postcard a look at Schedule A Minnesota Will Require Remote Sellers and Marketplace
More informationHow To Protect Students Against Identity Theft and Complying with Safeguarding Regulations
How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT 888-692-3964 kreddick@ncmstl.com 1 WHAT DO THESE STARS HAVE
More informationIdentity thieves use a variety of ways to gain access to your personal information:
How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into
More informationEvaluating Your Company s Data Protection & Recovery Plan
Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart
More informationETHICS. Presented by: Melinda Garvin, EA. Melinda Garvin, EA 12/14/2016
ETHICS Presented by: Melinda Garvin, EA Melinda Garvin, EA Melinda is the Founder, President and Co- Owner of Foos-Garvin Accounting, Inc., a full-service, small-town practice serving the needs of 2000
More informationInformation on Identity Theft for Business, Partnerships and Estate and Trusts
Page 1 of 5 HELP MENU Home News Fact Sheets Information on Identity Theft for Business Partnerships and Estate and Trusts Information on Identity Theft for Business, Partnerships and Estate and Trusts
More informationIRS Updates. Due Date. Richard Furlong, Jr. Senior Stakeholder Liaison 1/2/2018
IRS Updates Richard Furlong, Jr. Senior Stakeholder Liaison January 4, 2018 North Jersey Working Together Conference Seton Hall University Due Date Returns and payments otherwise due April 15, 2018, are
More informationCyber Risk Proposal Form
Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information
More informationTax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Shannon Vernieuw
Tax Refund Fraud and Identity Theft IRS Criminal Investigation Special Agent Shannon Vernieuw Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating
More informationChapter 9: Identity Theft and Refund Fraud. 1 09: Identity Theft and Refund Fraud
Page 135-146 Chapter 9: Identity Theft and Refund Fraud 1 Learning Objectives Page 135-146 Upon completion of this seminar, participants should be able to Recognize the threats that apply to practitioners.
More informationIDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018
IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,
More informationBryan Coffey Stakeholder Liaison Internal Revenue Service Small Business/Self-Employed Communications, Outreach, Systems, and Solutions
Bryan Coffey Stakeholder Liaison Internal Revenue Service Small Business/Self-Employed Communications, Outreach, Systems, and Solutions 732-777-7242 Bryan currently works as a Stakeholder Liaison out of
More informationIdentity Theft: Protecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA
More informationCyber-Insurance: Fraud, Waste or Abuse?
SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major
More informationIdentity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation
Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More information6/18/2018. Ethics Doing the Right Thing. Ethics- Doing the Right Thing. Ethics Doing the Right Thing. Jean Nelsen, EA NAEA President.
Ethics Doing the Right Thing Jean Nelsen, EA NAEA President Ethics- Doing the Right Thing I think there is an attitude among some of those who do the most sophisticated tax advising that it s all about
More informationCyber breaches: are you prepared?
Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do
More informationToday s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center
Today s Speakers Lisa Weintraub Schifferle Attorney Federal Trade Commission (FTC) Eva Velasquez CEO & President Identity Theft Resource Center Overview What is identity theft? What is tax identity theft?
More informationSPECIAL REPORT. What to Do If Your Client Is a Victim of Tax-Related Identity Theft
SPECIAL REPORT What to Do If Your Client Is a Victim of Tax-Related Identity Theft What to Do If Your Client Is a Victim of Tax-Related Identity Theft Tax-related identity theft revolves around the fraudulent
More information10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office
Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing
More informationClaims Made Basis. Underwritten by Underwriters at Lloyd s, London
APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds
More informationAnti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide
Anti-Money Laundering and Terrorist Financing Prevention Compliance Program Creation Guide Compliance Program Creation Guide January 2015 1 Compliance Program Creation Guide January 2015 2 Insert Business
More information2017 ERO Compliance Training
2017 ERO Compliance Training Purpose of Compliance Training The purpose of the Refundo Compliance Training is to ensure adequate training, monitoring and supervision of tax preparers in the performance
More informationIRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619)
IRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619) 770-9317 FELICIA.MCCAIN@CI.IRS.GOV Areas of Emphasis for CI Abusive Return Preparers International Fraud Refund
More informationReceive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait!
Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! By Tom Bassett, J.D., CPA Trending Upward Again in 2018 Taxpayer Identity Theft As head of Commerce Trust
More informationSixth Annual Benchmark Study on Privacy & Security of Healthcare Data
Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report
More informationConsumer Federation of America Best Practices for Identity Theft Services. March 10, 2011
Consumer Federation of America Best Practices for Identity Theft Services March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction 3 About
More informationIdentity Theft: Help Your Students Avoid This Epidemic
Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity
More informationROCHESTER INSTITUTE OF TECHNOLOGY
ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3
More informationDo a Paycheck Checkup
Do a Paycheck Checkup Alan Gregerson October 25, 2018 Why a Paycheck Checkup? Some law changes in the Tax Cuts and Jobs Act may affect your withholding. Protect against having too little tax withheld and
More informationA Step By Step Guide To Dealership Compliance Team One research and Training /Summit Group
A Step By Step Guide To Dealership Compliance 2008 Team One research and Training /Summit Group As you probably already know, 2008 has brought the automobile dealer a whole new set of compliance issues
More informationFINAL COPYRIGHT 2016 LGUTEF IRS ISSUES
IRS ISSUES 8 Issue 1: Form 2848, Power of Attorney and Declaration of Representative........ 246 Issue 2: Levels of Representation before the IRS........... 249 Issue 3: IRS Transcripts....... 251 Issue
More informationInsuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a
More information5/4/2017. Cybercrime. The Crime
Don t Let Disaster Destroy Your Office Disaster Proof from Cybercrime May 4, 2017 Cybercrime As the Internal Revenue Service, the state tax agencies and the tax industry make progress combatting identity
More informationDavid H. Creasy, CPA Tuesday, June 23, :02 PM Harry Garmon Cybercrime and Tax Reform.
Harry Garmon From: Sent: To: Subject: David H. Creasy, CPA Tuesday, June 23, 2015 2:02 PM Harry Garmon Cybercrime and Tax Reform The Creasy Report Dear Harry, JUNE 2015 In
More informationNews Release IR IRS Releases the "Dirty Dozen" Tax Scams for 2014; Identity Theft, Phone Scams Lead List
Page 1 TEXT: News Release IR 2014-16 IRS Releases the "Dirty Dozen" Tax Scams for 2014; Identity Theft, Phone Scams Lead List IR 2014-16; 2014 IRB LEXIS 130 February 19, 2014 WASHINGTON - The Internal
More informationInternal Revenue Service Criminal Investigation
Tax Refund Fraud and Identity Theft IRS - Criminal Investigation John Collins Acting Special Agent In Charge Boston Field Office Internal Revenue Service Criminal Investigation Criminal Investigation serves
More informationIdentity Theft. Help Your Students Avoid This Epidemic Sun Ow
Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution
More informationNATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE
NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance
More informationWhite Collar Crime: An IRS-CI Perspective. Focused on ID Theft
White Collar Crime: An IRS-CI Perspective Focused on ID Theft Special Agents Bill Beckham Brooke Tetzlaff What is IRS-CI? OBJECTIVES Divisions, Mission, Workforce Types of Investigations Tax Evasion, Money
More informationFrequently Asked Questions
Frequently Asked Questions How do you monitor my identity? We use our exclusive software to proactively monitor various sources for suspicious activity. With PrivacyArmor : You will be able to set thresholds
More informationN e w s - J u l y
C o n t e n t s Trade Shows IRS Developers Conference Identity Theft & Security Wintax Next Generation Trade Show Dates We look forward to seeing you at various seminars and trade shows. Be sure to stop
More informationPAI Secure Program Guide
PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS
More informationThe Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage
The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT
More informationFees There are currently no separate monthly or transaction fees assessed by the Bank for use of the Online Banking Service including the External
Online Banking Account Agreement General This Online Banking Agreement (Agreement) for accessing your TrustTexas Bank, SSB account(s) via the Internet explains the terms and conditions of Online Banking.
More informationProtect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently
Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity
More informationCYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING
CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,
More informationTAX PREPARATION COMPLIANCE MANUAL
TAX PREPARATION COMPLIANCE MANUAL Tax Season 2015 2014 Jackson Hewitt Inc. All Rights Reserved. The Tax Preparation Compliance Manual (Compliance Manual) is confidential and proprietary and should be available
More informationFrequently Asked Questions
Frequently Asked Questions How do you protect my identity? We use our proprietary software to proactively monitor various sources. Through PrivacyArmor, you will also have the power to create thresholds
More informationCrime Coverage Section Application (Large Public Company > $1B revenues)
Crime Coverage Section Application (Large Public Company > $1B revenues) BY COMPLETING THIS CRIME APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH CHUBB INSURANCE COMPANY OF CANADA (THE COMPANY
More informationDrexel and FMFCU. Presented By
Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission
More informationTax News and Industry Updates
2018 Volume 6, Issue 2 Tax News and Industry Updates Nyle G Taylor CPA Chartered 611 Wilson Ave. Ste 6c Pocatello, Idaho 83201 (208) 232-5900 Phishing Schemes Make IRS Dirty Dozen List of Tax Scams IR-2018-39,
More informationFive Key Steps to Developing an nformation Security Program
Five Key Steps to Developing an nformation Security Program Driving Business Advantage Five Key Steps to Developing an Information Security Program by Gabriel M. Helmer Foley Hoag ebook Contents Introduction...
More informationOLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE
OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS
More informationTestimony. Submitted for the Record. American Bankers Association. Financial Institutions and Consumer Credit Subcommittee
Testimony Submitted for the Record from the American Bankers Association for the Financial Institutions and Consumer Credit Subcommittee of the Committee on Financial Services United States House of Representatives
More informationProtecting against and recovering from fraud and identity theft WHAT TO DO
Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls
More informationFraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer
Fraud and Cyber Insurance Discussion Will Carlin Ashley Bauer Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and no organization is immune The changing business
More informationBusiness Taxes for the Self-Employed: The Basics
Business Taxes for the Self-Employed: The Basics Business Taxes for the Self- Employed: The Basics Welcome media SBSE.webinars@irs.gov Questions Feedback Contact information Business Taxes for the Self-
More informationIdentity Theft Prevention. Red Flags. Training Program
Identity Theft Prevention Red Flags Training Program 1 Red Flags Training Program Adoption Amendment passed in 2003 to the Fair Credit Reporting Act called The Fair and Accurate Credit Transactions Act
More informationPRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.
PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity
More informationTREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Results of the 2015 Filing Season August 31, 2015 Reference Number: 2015-40-080 This report has cleared the Treasury Inspector General for Tax Administration
More informationThree D s of safeguarding your personal data
Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D
More informationOffer in Compromise. Ley Mills COSS SL-Field. December 21, 2016
Offer in Compromise Ley Mills COSS SL-Field December 21, 2016 Offer in Compromise Pre-Qualifier Tool Good candidate? Reasonable offer amount? Use as guide for Doubt as to Collectibility offer 2 Offer in
More informationDesigning Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016
Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions June 2016 Program Overview Regulatory Environment Who Needs a Privacy Program and Common Questions Components of a Comprehensive
More information2016 September Tax Preparer Script
2016 September Tax Preparer Script Hello and thank you for joining us today. I m Terri Steenblock Assistant Commissioner of Individual Taxes. Today, we will discuss Minnesota legislation enacted on June
More information2018 Tax Software Provider National Standards Letter of Intent
2018 Tax Software Provider National Standards Letter of Intent This form provides revenue agencies with information regarding your company s compliance with the national security summit standards and requirements.
More informationIdentity theft can occur even if you have been careful about protecting your personal information.
Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared
More informationGREENPATH FINANCIAL WELLNESS SERIES
GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves
More informationDALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES. October 26, 2016
DALLAS CPA SOCIETY CONTINUING EDUCATION CORPORATION MEMBER APPRECIATION CPE SERIES October 26, 2016 TIGTA & You: Protecting Clients and Taxpayers Tom Traxinger Assistant Special Agent in Charge, Treasury
More informationMEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional
THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional Services: $100,000 $250,000 $500,000 $1,000,000 $2,000,000 Other:$ Technology Product
More informationEveryone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud. Capital of Texas Enrolled Agents CPE November 3, 2009
Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud Capital of Texas Enrolled Agents CPE November 3, 2009 When was the first significant instance of identity theft in
More informationFinancial Industry Developments
2016 INVESTMENT MANAGEMENT CONFERENCE Financial Industry Developments Nicholas S. Hodge, Partner, Boston Michael W. McGrath, Partner, Boston Copyright 2016 by K&L Gates LLP. All rights reserved. Hedge
More informationHIPAA and Lawyers: Your stakes have just been raised
HIPAA and Lawyers: Your stakes have just been raised October 16, 2013 Presented by: Harry Nelson e: hnelson@fentonnelson.com Claire Marblestone e: cmarblestone@fentonnelson.com AGENDA Statutory & Regulatory
More informationCYBER AND INFORMATION SECURITY COVERAGE APPLICATION
NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT
More informationCYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY
CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention
More informationIdentity Protection 101: Protect your good name from identity theft.
Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social
More informationCyber Risk Insurance Policy Application
5 W. Hargett Street, 4th Floor, Raleigh, NC 27601 Fax: (919) 834-7039 Email: Underwriting@SuretyOne.org Cyber Risk Insurance Policy Application INSURING AGREEMENT I.B. OF THIS POLICY IS WRITTEN ON A CLAIMS
More informationIdentity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.
Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should
More informationAS PASSED BY HOUSE AND SENATE H Page 1 of 37 H.764. An act relating to data brokers and consumer protection
2018 Page 1 of 37 H.764 An act relating to data brokers and consumer protection It is hereby enacted by the General Assembly of the State of Vermont: Sec. 1. FINDINGS AND INTENT (a) The General Assembly
More informationIDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY PC 6.9 Date of Last Update: May 05, 2009 Approved By: President's Cabinet Responsible Office: Business and Finance POLICY STATEMENT Grand Valley State University (GVSU)
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationServices and Features
Services and Features IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific services and features.
More informationProtecting New Yorkers from Identity Theft. Senator David Carlucci
Protecting New Yorkers from Identity Theft Senator David Carlucci Identity Theft According to USA Today, identity theft incidence rates rose 16% between 2015 and 2016, alone. 15.4 million Americans were
More information