1/19/2016. Identity Theft and Client Protection. Remember.. Major Concerns Regarding Identity Theft

Size: px
Start display at page:

Download "1/19/2016. Identity Theft and Client Protection. Remember.. Major Concerns Regarding Identity Theft"

Transcription

1 Identity Theft and Client Protection Kristy Maitre Center for Agricultural Law and Taxation January 19, 2016 Remember.. Not all data theft is identity theft Not all identity theft is tax related identity theft the filing of fraudulent returns Major Concerns Regarding Identity Theft Identity theft is still the #1 complaint filed with the Federal Trade Commission Identity theft victim occurs every 2 seconds In 2014, more than 1 billion personal records were stolen Large scale data breaches netted more than 100 million SSNs in 2015, to date 1

2 Defense Against Tax Related Identity Theft IRS Actions for Protection Increased fraud filters from 11 in 2012, to 200 in 2015 Limit the amount of direct deposits to 3 refunds per single account Locked accounts of nearly 29 million deceased taxpayers Improved cooperation with local law enforcement Reduced internal use of SSNs Reduced prisoner tax fraud Works with 286 financial institutions to identify fraudulent refunds, recovered $3 billion in the past 3 years Improved EFIN policies to prevent abuse What is the IRS Doing to Aid Prevention? Improving fraud filters every year Reviewed 19 million suspicious returns between Stopped $63 billion fraudulent refunds between Rejected or stopped 4.5 million suspicious returns from processing in million of those were confirmed Identity Thefts As of September 2015, $9.5 billion in fraudulent refunds protected Security Summit Update Improve verification of taxpayer/return at the time of filing Include more than 20 new data elements Require new password standards Improve circulation of information Some providers make weekly reviews for schemes Increase security awareness among taxpayers and professionals Create a new tax preparer work group 2

3 How Do They Do It? Hackers will try and get your information through scams and schemes Easiest way for them to obtain information is to ask for it via: Phishing s, texts or phone calls Include links to fake websites Use malware infected attachments May pretend to be a trusted organization such as a bank Risks Involved with Data Theft Account take overs Bank Accounts IRS e Services Tax Software Computer breaches by cyber hackers Some cyber hackers are more skilled and sophisticated than others May not even appear to have been hacked until a much later date Improvements Are Needed in the Identity Protection Specialized Unit to Better Assist Victims of Identity Theft In October 2008, the Internal Revenue Service (IRS) formed the Identity Protection Specialized Unit (IPSU) as part of its strategy to reduce taxpayer burden caused by identity theft The IPSU is a dedicated unit for victims of identity theft to have their questions answered and obtain assistance in resolving their identity theft issues quickly and effectively The IRS reports that the IPSU received a total of 746,942 cases for Calendar Year (CY) 2014 From the week ending January 3, 2015, to that ending June 13, 2015, the IPSU received a total of 232,006 cases 3

4 IRS Processes The Majority of Identity Theft Victims Are No Longer Provided With an Identity Protection Specialized Unit Single Point of Contact In November 2014, the IRS indicated that budgetary constraints did not allow for a single employee to be assigned to each identity theft victim In addition to not providing a single CSR to work with a victim of identity theft, in May 2013, IPSU officials decided that the IPSU would no longer monitor identity theft cases worked by a single IRS function The IPSU s process for issuing required acknowledgement and case status letters to taxpayers does not ensure that taxpayers are timely informed about the IRS s receipt of their supporting documentation or the status of their identity theft claims IRS Processes IRS procedures require the employee receiving a Form 14039, police report, or other correspondence alleging identity theft to acknowledge receipt of the information from the taxpayer by sending Letter 5073C or another appropriate letter to the taxpayer within 30 days of receipt For cases that meet Taxpayer Advocate Service criteria, i.e., ITARmonitored case, acknowledgement Letter 4524C must be sent to the taxpayer within five workdays of IRS receipt of the taxpayer s information In addition, a subsequent Letter 4524C must be sent to the taxpayer every 30 days The letter provides an update to the taxpayer on his or her case IRS Processes Research Is Not Always Effectively Conducted to Identify and Assist Taxpayers Who Submit Identity Theft Claim Documentation Processes and Procedures Are Ineffective to Ensure That Taxpayer Voic Messages Are Timely Addressed 4

5 Risks Involved with Data Theft Account take overs Bank Accounts IRS e Services Tax Software Computer breaches by cyber hackers Some cyber hackers are more skilled and sophisticated than others May not even appear to have been hacked until a much later date What Can You Do? Educate employees on scams and risks IRS will not ask for sensitive information such as passwords or SSNs Increase employee awareness of dangers related to data theft Handling phishing s, phone calls, etc. Check EFIN statistics regularly if stats don t match expectations, consult e Help Desk Protecting Client Information Create and implement a security and data compromise plan Necessary security software to include: Firewall Anti virus File encryption Use encrypted programs to exchange PII information with taxpayers Utilize strong passwords that are required to change periodically 5

6 Protecting Client Information Use a secure wireless connection Wi fi should be password protected Taxpayer information should be backed up with limited access granted to others Any paper files should be stored in secure location In case of breach, contact local stakeholder liaison Find liaison at IRS.gov, keyword Stakeholder Liaison Planning Procedures Data Theft Plan Review FTC Suggestions for Data Theft Response Notify parties Law Enforcement IRS Stakeholder Liaison Major Credit Bureaus Individual(s) affected by theft Information to disclose: How it happened Information jeopardized and taken Actions taken to resolve situation The Identity Thief I ve always wanted a plasma television. High def, of course. I think I ll buy the most expensive model I can find. Why should I worry about what it costs? It s free, at least for me. From the FBI Website 6

7 What is Identity Theft? Identity theft occurs when someone uses your personal information such as: Name Social Security number or Other identifying information Without permission, to commit fraud or other crimes 19 Most misused SSN of all time Happened more than 70 years ago Involved Social Security cards issued by Woolworth At peak, nearly 5,800 people were using SSN More than 40,000 reported as their own SSN As late as 1977, 12 people still using SSN 20 Federal Trade Commission The Federal Trade Commission is at the forefront of combatting Identity theft Their website at provides helpful steps of what a victim needs to do once they determine they have been a victim of ID theft 7

8 Federal Trade Commission Federal Trade Commission/IRS Report identity theft to the Federal Trade Commission (FTC) and the Internal Revenue Service Complete the FTC s online complaint form : The client should give as many details as they can Many cases of tax return identity theft will not be known until an e filed return has been rejected A copy of the reject acknowledgement should be made available to the client The complaint form is not available on mobile devices, but the client can call to make the report They should print and save the FTC Identity Theft Affidavit immediately Once they leave the page, they will not be able to get the affidavit Tips Act quickly to limit the damage Have Your Clients: Call the companies where the client knows fraud occurred Provide as much information as possible concerning the individual who stole the identity, if known Ask the company to freeze the account so no one can use the account for fraudulent purposes Finally change all logins, passwords and PINS on the accounts Place a fraud alert and get a current credit report Make contact with one of the three credit bureaus, that company is then obligated to inform the other two 8

9 Fraud Alert A fraud alert is free It will make it harder for someone to open new accounts in your client s name Your client will get a letter from each credit bureau It will confirm that the credit bureau has placed a fraud alert on the file Equifax.com/CreditReportAssistance Experian.com/fraudalert TransUnion.com/fraud Credit Reports To get a credit reports right away go to: ww.annualcreditreport.com or Call File a Report with the Local Police Department Go to your local police office with: A copy of your FTC Identity Theft Affidavit A government issued ID with a photo Proof of your address (mortgage statement, rental agreement, or utilities bill) Any other proof you have of the theft (bills, IRS notices, etc.) FTC's Memo to Law Enforcement Tell the police someone stole your identity and you need to file a report If they are reluctant, show them the FTC's Memo to Law Enforcement The client should ask for a copy of the police report This document will be needed to complete other required steps 9

10 Identity Theft Report Create the Identity Theft Report by combining the FTC Identity Theft Affidavit with the police report The identity theft report proves to businesses that someone stole your identity It also guarantees the client certain rights If there is tax related identity theft additional steps are required Types of tax related identity theft Refund related identity theft Identity thief uses a stolen SSN to file a forged tax return and obtain a fraudulent refund early in the filing season Employment related identity theft Identity thief uses a stolen SSN to obtain employment 30 10

11 ID Theft Process Client Has Not Filed Client has received a refund check mark void on the back, and return to the campus on the face of the check with a letter of explanation that a return has not been filed Try file the return electronically get reject code File return on paper with Form and required documentation Attach Form 8948 and complete section 4 If taxpayer has not been contacted by notice or letter send to the normal campus ID Theft Process Client Has Not Filed Client has received a letter that they need more information to complete the processing of the return Letter 12 C, Letter 4883 C or Letter 5071 C Try file the return electronically get reject code File return on paper with Form and required documentation Attach Form 8948 and complete Section 4 Respond to the letter with the return and send to the campus on the letter ID Theft Process Client Has Filed Client has received a letter that they need more information to complete the processing of the return Letter 12 C, Letter 4883 C or Letter 5071 C Respond to the letter with the information requested 11

12 Tax Related Identity Theft Notify the Internal Revenue Service as soon as possible by calling the Identity Theft Hotline at : Then complete IRS Form 14039, Identity Theft Affidavit Mail or fax the form according to the instructions Include proof of your identity, like a copy of your Social Security card, driver s license or passport, and other information Provide this form independently or if your client receives a notice or is unable to file a return electronically attach the form to the return or other correspondence Your client should keep copies of any letters sent Form Form

13 Form Form Other Steps Review Social Security work history by creating an account at: If errors are found the client should, contact their local SSA office Report a misused Social Security number Replace government issued IDs 13

14 Child Identity Theft When a dependent child s identity is stolen you will need to correct the child s credit report, send each credit reporting agency the Minor s Status Declaration form: uniform minor statusdeclaration.pdf This form provides proof that the child is a minor Include a letter with the form that asks for all information associated with the child s name or SSN to be removed If your client does this there is no need to send a blocking request for the child The SSN only search means that any items associated with the child s SSN are included in the report even if the thief used the child s SSN with a different name In addition, because the child is a minor they cannot legally agree to contracts, any debts on the child s credit report are fraudulent by definition UNIFORM MINOR S STATUS DECLARATION UNIFORM MINOR S STATUS DECLARATION 14

15 2016 Filing Season IRS Statement on Identity Theft Stopping identity theft and refund fraud is a top priority for the Internal Revenue Service For the 2016 filing season, the IRS continues to expand these efforts to better protect taxpayers and help victims IRS employees are working to prevent: Refund fraud Investigate identity theft related crimes and Help taxpayers who have been victimized by identity thieves New Steps are Being Taken in 2016 to Deter Identity Theft Software companies are sharing information with the Internal Revenue Services and state revenue departments New data will be shared to assist in better detection and prevention of identity theft Improper or repetitive use of Internet Protocol numbers The time it takes to complete a tax return hoping this will cut down the robo tax returns, created by a machine Information will be provided if the returns come from a foreign address If numerous returns are filed from the same device that will also be able to be identified New password standards for software providers New limits on log in attempts that were unsuccessful The addition of security questions All these new processes will not interfere with the normal processing, and will be seamless to the tax practitioners and their clients. 15

16 IRS Filter Program As in prior years the IRS will deploy the identity theft filters, which include characteristics IRS has identified that are common in fraudulently filed tax returns The filter program net, impacts valid as well as fraudulent returns Any return that is still being processed could have falling into the net which will delay the refund Client will need to be patient as IRS goes through the process of determining the valid return Generally, this process can take from six to twelve months, which causes frustration for the tax payer as well as the tax preparer It is important to remember that though the process is far from perfect it is the only current way, among others, to stop fraudulently filed tax returns This process protects the client and the integrity of the tax system As the IRS moves forward with the new partnerships established with public and private sector entities to battle identity theft, we can only hope these small steps will help in the continuing improve crisis IRS Filter Program Generally, this process can take from six to twelve months, which causes frustration for the tax payer as well as the tax preparer It is important to remember that though the process is far from perfect it is the only current way, among others, to stop fraudulently filed tax returns This process protects the client and the integrity of the tax system As the IRS moves forward with the new partnerships established with public and private sector entities to battle identity theft, we can only hope these small steps will help in the continuing improve crisis Information from The Tax Book At a recent tax seminar attended by authors from TheTaxBook, the speaker said certain IRS administration officials with knowledge of the subject told him unofficially that 7% of electronically filed tax returns this past filing season were fraudulent, and that due to budget cuts, only seven IRS employees were available to work on resolving these identity theft cases The IRS is aware that requiring PINs or electronic passwords could prevent most cases of identity thieves from filing fraudulent returns, but their computer systems are too old and outdated to handle all of the PINs that would be required for every taxpayer in the nation to use one 16

17 Resolving Identity Theft B201 A copy of the e file rejection notice (typically provided by the preparer s software) Form 8948, Preparer Explanation for Not Filing Electronically, indicating why the return is not being e filed The e file rejection code should be noted, along with an explanation that the taxpayer is a possible identity theft victim Form 14039, Identity Theft Affidavit, filed for each person affected Resolving Identity Theft B201 A copy of any IRS correspondence received by the taxpayer regarding possible identity theft issues Attach to the return Any erroneous refund checks the taxpayer received mark void on the front and back and return to the campus named on the front of the check File a paper return How Does the Thieves Get The Client s Information? 17

18 How Do the Thieves get the Information? Stealing wallets, purses and your mail (bank and credit card statements, pre approved credit offers, new checks and tax information) Stealing personal information you provide to an unsecured site on the Internet, from business or personnel records at work and personal information in your home Rummaging through your trash, the trash of businesses and public trash dumps for personal data Posing by phone or as someone who legitimately needs information about you, such as employers or landlords or Buying personal information from inside sources For example, an identity thief may pay a store employee for information about you that appears on an application for goods, services or credit How is Identity Theft Discovered? Many have no idea their identity has been stolen until an event happens The client cannot file their annual tax return electronically The client receives a notice from IRS that you worked for a company in Texas The client received an IRS notice to verify their address has changed and they have lived at the current address for many years The client s credit is suddenly not as good as it used to be and you do not know why They are getting phone calls stating they have not paid a credit card bill when you do not have a credit card More than one tax return was filed using your SSN They owe additional tax, refund offset or have had collection actions taken against them for a year they did not file a tax return Business Identity Theft 18

19 What is Business Identity Theft? Business identity theft happens when someone creates, uses or attempts to use the identifying information of a business, without authority, to obtain tax benefits Business identity thieves file fraudulent business returns to receive refundable business credits or to perpetuate individual identity theft Identity Theft Related to Tax Administration Business identity theft is more complex than individual identity theft Many of the same indicators that signify simple filing or processing errors also hint at business identity theft While on the surface these occurrences may appear to indicate business identity theft, they may also stem from something as simple as transposed numbers Your client receives IRS notices about fictitious employees Your client notices activity related to or receives IRS notices regarding a defunct, closed or dormant business after all account balances have been paid Your client s return is accepted as an amended return, but the taxpayer has not filed a return for that year If these things occur, the IRS and the taxpayer will need to do some research before determining the incident is a result of identity theft Identity Theft Related to Tax Administration Identity theft not related to tax administration should be reported to the Federal Trade Commission Clients may be victims of identity theft not related to tax administration if they: Receive bills for business lines of credit or credit cards they do not have Notice that a credit report indicates credit or other open accounts they did not authorize See unexplained bank account withdrawals Don t get their bills or other mail Find unfamiliar accounts or charges on their credit report Get a notice that information was compromised by a data breach at a company where they do business or have an account 19

20 What Protective Actions Should Your Clients Take if Their Business Information Has Been Compromised? Respond immediately to any notices from the IRS If they believe someone fraudulently used their Employer Identification Number, notify the IRS immediately using the contact information on the notice or letter File a police report with the local police department Carefully review and reconcile account statements as soon as they receive them Regularly review business registration information online (for all active and closed businesses) Monitor credit reports for suspicious activity every 12 months What Protective Actions Should Your Clients Take if Their Business Information Has Been Compromised? Place a fraud alert on credit reports by contacting any one of the four nationwide credit reporting companies: Dun & Bradstreet Equifax Experian Trans Union Close any accounts that have been tampered with or opened without their permission File a complaint with the Federal Trade Commission Update virus, malware, and other security software programs on their computers Remain vigilant and be alert for suspicious or unusual activity Laws to Protect Taxpayer Information Identity protection laws IRC 7216 & USC 6713 Privacy Act (5 USC 552a) Additional laws for safeguarding personal information Gramm Leach Bliley Act (1999) Privacy and Safeguards Rules Sarbanes Oxley Act IRS e file rules State laws 60 20

21 Who is Eligible for an IP PIN? Your client is a victim of identity theft and IRS has resolved the case IRS placed an identity theft indicator on the account and in December, they sent your client a CP01A Notice containing an IP PIN, or The client filed a federal tax return in 2015 as a resident of Florida, Georgia or the District of Columbia, or The client received a CP01F Notice or another IRS letter inviting them to voluntarily 'opt in' to get an IP PIN Understanding the IRS s ID theft process IRS issues a CP01 notice to let the taxpayer know an identity theft marker has been placed on her account, Your assigned 2014 IP PIN is:. Before the next filing season, the IRS generally assigns the taxpayer a unique Identity Protection PIN to verify her return If the taxpayer is identified as being deceased, the IRS locks the account to prevent future filing 62 Key IP PIN Information Six digit number assigned to a validated identity theft victim Specific to the tax year and a new IP PIN is issued every year Some IP PIN CP01A Notices will continue to be mailed through mid February, 2016 Should not be confused with the five digit electronic signature self select PIN 63 21

22 Key IP PIN information Necessary only if the primary taxpayer is the identity theft victim E filed returns requiring IP PINs will be rejected if the IP PIN is missing or incorrect If an IP Pin has been issued the return must contain the IP PIN effective for the 2016 filing season Taxpayers who misplace their IP PINs will be able to receive replacements by contacting the IRS 64 IP PIN Guidance for Tax Professionals Ask your client if he received a letter from the IRS containing an IP PIN If so, input IP PIN in the appropriate area If your client states he misplaced his IP PIN or his return rejects because of a missing IP PIN, have your client contact IRS for a replacement IP PIN If your client says he did not receive an IP PIN letter, continue preparation as usual 65 Lost or Misplaced IP PINs If the client received a CP01A Notice, they can register and create a user profile to get your current IP PIN issued this year The registration process will require that they provide IRS with specific personal information and answer a series of questions to verify your identity This process is essential to protect their personal and tax information If they received a CP01F Notice or participated as a resident of FL, GA or DC, and already have an online account, they simply log into the account with their username and password Follow the prompts to retrieve your IP PIN. 22

23 Replacing a lost IP PIN If they are unable to create an account on IRS.gov or choose not to do so, they may contact the Identity Protection Specialized Unit at The IPSU hours of operation are: Monday Friday, 7 a.m. 7 p.m. your local time (Alaska & Hawaii follow Pacific Time) Using a replacement IP PIN will cause a delay in processing the tax return and the issuance of any refund Tax Practitioner Due Diligence Treasury Department Circular No. 230 (Rev ), Section 10.22, requires practitioners to: Exercise due diligence when preparing or assisting in the preparation of filings for submission to the IRS, and that they determine the correctness of the representations they make, both to the IRS and to clients Tax practitioners play a role in protecting the integrity of the tax filing system through their efforts to authenticate their clients identities 68 Your Tax Clients Can Now Get a Copy of a Fraudulent Return Filed A victim of identity theft or a person authorized to obtain the identity theft victim s tax information may request a redacted copy (one with some information blacked out) of a fraudulent return that was filed and accepted by the IRS using the identity theft victim s name and SSN Due to federal privacy laws, the victim s name and SSN must be listed as either the primary or secondary taxpayer on the fraudulent return; otherwise the IRS cannot disclose the return information For this reason, the IRS cannot disclose return information to any person listed only as a dependent Partial or full redaction will protect additional possible victims on the return However, there will be enough data for the taxpayer hopefully to determine how their personal information was used The process is another NEW addition to IRS s fight against identity theft 23

24 Your Tax Clients Can Now Get a Copy of a Fraudulent Return Filed To make the request, your client will need to prepare a signed letter with the information described below and mail it and any additional documentation to the following address: Internal Revenue Service P.O. Box 9039 Andover, MA The IRS may return the request if it is missing the required information and/or documentation, or is made in a manner other than described in these instructions Required Information and Documentation for a Request by the Identity Theft Victim If your client is a person whose name and SSN was used to file a fraudulent tax return, the letter must contain the following information: Their name and SSN Their mailing address The tax year(s) of the fraudulent return(s) they are requesting, and The following statement, with their signature beneath: I declare that I am the taxpayer. The letter must be accompanied by a copy of your governmentissued identification (for example, a driver s license or passport) As a Representative for Your Client Who is Authorized to Receive the Information the Following Procedure Should be Followed: If you are authorized to obtain the identity theft victim s tax information, the letter must contain the following information: Your name and tax identification number (usually your SSN) Your relationship to the victim of identity theft (for example, parent, legal guardian, or authorized representative) Your mailing address Centralized authorization file (CAF) number if you were assigned one by the IRS for an authorization that is on file with the IRS covering the requested tax year(s) Tax year(s) of the fraudulent return(s) you are requesting The taxpayer s name and SSN The taxpayer s mailing address The following statement, with your signature beneath: I declare that I am a person authorized to obtain the tax information requested. 24

25 As a Representative for Your Client Who is Authorized to Receive the Information the Following Procedure Should be Followed: The letter must be accompanied by a copy of your governmentissued identification (for example, a driver s license or passport) You must also include documents demonstrating your authority to receive the requested tax return information (for example, Form 2848, Form 8821, or a court order) unless: You are requesting return information of your minor child as a parent or legal guardian, or Your authority to obtain return information for the requested tax year(s) is on file with the IRS and you are providing your CAF number How Long Will it Take to Get the Copy of the Fraudulent Return? The time required to fulfill your request will depend on a number of factors One factor is whether there are any open, unresolved issues with a tax return for a tax year requested These are very complex cases, and IRS will need to resolve the underlying identity theft case before they can provide the return The IRS will acknowledge the request within 30 days of receipt and within 90 days the client will receive the return or follow up correspondence Why is Some Information on the Return Redacted? The IRS may disclose return information from a fraudulent return to a person whose name and SSN are listed as the primary or secondary taxpayer when the disclosure does not seriously impair Federal tax administration Although some information will be redacted or partially redacted, the remaining information will allow the client to determine what information the identity thief may have about the client and the client s family 25

26 Why Can t the Client Request a Copy of a Fraudulent Return that Lists Themselves or Their Child as a Dependent? Due to federal privacy laws, the IRS cannot disclose information to a person who is listed on a fraudulently filed tax return unless that person s name and SSN is listed as the primary or secondary taxpayer on the return The Client Received a Letter Returning the Request Because it was for a Business. Why is the IRS Returning Requests for Business Returns? At this time, the client can only request a copy of a fraudulent tax return filed using Forms 1040, 1040A, 1040EZ, 1040NR, or 1040NR EZ The Client Received a Letter Returning the Request Because the Address Didn t Match IRS Records. What does the Client Need to do? IRS will reject a request if the address listed in the request does not match the IRS address of record If the client has recently moved and did not file a Form 8822, Change of Address, with the IRS, they will need to file this to change their address of record They can resubmit the request of a copy of the fraudulent return after the IRS processes the address change 26

27 How Many Tax Years Can the Client Request? The client can request copies of fraudulent returns for the current tax year and previous six tax years The Client Attempted to e file their Return and it was Rejected because Someone Already Filed using their Social Security Number. Can the Client Request this Information Now? The client may make a request at any time, but IRS must resolve the identity theft case before they can share the return If IRS has just found the client is a victim, have them review the Taxpayer Guide to Identity Theft for the best steps to take to resolve the case What Information will be Redacted on the Copies the Client Receives? 27

28 IRS Tests W 2 Verification Code for Filing Season 2016 For filing season 2016, the Internal Revenue Service will test a capability to verify the authenticity of Form W 2 data This test is one in a series of steps to combat tax related identity theft and refund fraud The objective is to verify Form W 2 data submitted by taxpayers on e filed individual tax returns The IRS has partnered with certain Payroll Service Providers (PSPs) to include a 16 digit code and a new Verification Code field on a limited number of Form W 2 copies provided to employees The code will be displayed in four groups of four alphanumeric characters, separated by hyphens. Example: XXXX XXXX XXXX XXXX IRS Tests W 2 Verification Code for Filing Season 2016 The Verification Code will appear on some versions of payroll firms Form W 2 copies B and C, in a separate, labeled box (Copy B is "To be filed with employee's federal tax return" and Copy C is "For employee's records.") The form will include these instructions to taxpayer and tax preparers: Verification Code. If this field is populated, enter this code when it is requested by your tax return preparation software It is possible your software or preparer will not request the code The code is not entered on paper filed returns. Some Forms W 2 employees receive will have a Verification Code box which is blank These taxpayers do not need to enter any code data into their tax software product IRS Tests W 2 Verification Code for Filing Season 2016 For the purposes of the test, omitted and incorrect W 2 Verification Codes will not delay the processing of a tax return The IRS will analyze this pilot data in a test and learn review to see if it is useful in evaluating the integrity of W 2 information The code will not be included in Forms W 2 or W 2 data submitted by the PSPs to the Social Security Administration or any state or local departments of revenue Nor will this pilot affect state and local income tax returns or paper federal returns 28

29 Tax Guidance : Identity Protection Services B205 The IRS announced that the value of identity protection services provided by an organization to a victim of identity theft should not be included in the victim s gross income for tax purposes This rule applies to any taxpayer who believes the safety of their personal information may have been breached Identity protection and data protection services include credit monitoring and reporting services, identity theft insurance policies, and services to restore victims identities Publication 4557 "Safeguarding Taxpayer Data A Guide for Your Business" Not in Book "Safeguarding Taxpayer Data A Guide for Your Business" The purpose of this publication is to provide information on legal requirements to safeguard taxpayer data Safeguarding taxpayer data is a top priority It is the legal responsibility of government, businesses, organizations and individuals that receive, maintain, share, transmit or store taxpayers personal information Cybersecurity for Tax Preparers B 205 B206 Get a Transcript breach Password guidance Change password periodically (every 90 days) The password must be a minimum of eight characters in length Any three of the following elements must be used Upper case letters Lower case letters Numbers Special characters (such as! or & ) 29

30 Additional Security Measures B 207 Hard drive encryption Full encryption of each hard drive in the tax preparer s office provides an extra layer of protection against unauthorized access that password protection does not provide Back up all data using a remote location Backing up data in a secure, remote location ensures that there is a complete copy of sensitive client data that can still be used if the original data is damaged or compromised Use portable backup devices that are secure Use of secure portable storage devices ensures that if the device is stolen or lost, no one else can access the information and use it for identity theft or other illegal purposes Protecting your Business and Clients Physical Safeguards Lock rooms and cabinets Store records in secured area Protect against destruction and damage Inventory hardware Dispose of information and hardware securely 89 Protecting your Business and Clients System safeguards Use strong passwords: Minimum of eight alphanumeric characters Change passwords periodically Use timed, password activated screen savers Don t post or share passwords Encrypt sensitive data when: Transmitting over networks Storing on servers or media Encrypt entire computers, media 90 30

31 Protecting your Business and Clients If you have a security breach: Notify law enforcement Notify FTC, visit for and phone numbers Notify customers and business partners Take corrective actions Prevent other breaches 91 What Can You Do? Educate employees on scams and risks IRS will not ask for sensitive information such as passwords or SSNs Increase employee awareness of dangers related to data theft Handling phishing s, phone calls, etc. Check EFIN statistics regularly if stats don t match expectations, consult e Help Desk Protecting Client Information Create and implement a security and data compromise plan Necessary security software to include: Firewall Anti virus File encryption Use encrypted programs to exchange PII information with taxpayers Utilize strong passwords that are required to change periodically 31

32 Protecting Client Information Use a secure wireless connection Wi fi should be password protected Taxpayer information should be backed up with limited access granted to others Any paper files should be stored in secure location In case of breach, contact local stakeholder liaison Find liaison at IRS.gov, keyword Stakeholder Liaison Planning Procedures Data Theft Plan Review FTC Suggestions for Data Theft Response Notify parties Law Enforcement IRS Stakeholder Liaison Major Credit Bureaus Individual(s) affected by theft Information to disclose: How it happened Information jeopardized and taken Actions taken to resolve situation Summary Fighting identity theft is an ongoing battle that requires a collaborative effort among the IRS, practitioners and taxpayers 96 32

33 Farm Tax Schools 2016 November 2, 2016 to December 13, Locations in Iowa and Online Webinar Save the Date for the 2016 Annual Farm and Urban Income Tax Schools The program is intended for tax professionals and is designed to provide up to date training on current tax law and regulations November 2 3: Maquoketa November 7 8: Red Oak November 9 10: Sheldon November 14 15: Mason City November 17 18: Ottumwa November 21 22: Waterloo December 5 6: Denison December 12 13: Ames and Live Webinar Summer Webinars S Corporation Reasonable Compensation ABLE Accounts Travel, Meals and Entertainment Preparing for a Gambling Audit Your Client Dies, What s Next? Innocent Spouse Above the Line Deductions Roth IRA s Net Operating Losses The Portability Election IRS Return Preparer Penalties Overview Miscellaneous Income New Developments Employee vs. Independent Contractor Cancellation of Debt Tax Research with Limited Resources Injured Spouse IRS Representation Let s Talk Dependents Inventory Issues Retirement Options for Small Business Preparing for an IRS Audit Getting your Client Right with IRS Appeals How to Write Your Appeals Request Start Up Costs Federal Energy Credits Overview Hobby Losses Summer Webinars 33

34 Beginning Tax Preparers Class CALT is working on offering a basic class for NEW tax preparers this fall in October The week long webinar will cover the basics an individual needs to know such as: Requirement to file Dependents Filing Status Itemized deductions Earned Income Tax Education Credits Other issues a first or second year preparer needs to know as well as a refresher for others who need to brush up on issues The class will be a week long or more and will be offered at a special rate The Scoop Throughout the filing season two Scoops will be held on Scoop Dates 8:00 8:30 am Central time 12:00 12:30 Central time This assists with accommodating our west coast practitioners The same information will be shared at both sessions You have the option of registering for whatever session suits your schedule node field seminardate/month The CALT Staff John D. Lawrence Interim Director Associate Dean, College of Agriculture & Life Sciences Extension Programs and Outreach Director, Agriculture & Natural Resources Extension 132 Curtiss Hall Iowa State University Ames, Iowa Kristine A. Tidgren Staff Attorney E mail: ktidgren@iastate.edu Phone: (515) Fax: (515)

35 The CALT Staff Kristy S. Maitre Tax Specialist E mail: ksmaitre@iastate.edu Phone: (515) Fax: (515) Tiffany L. Kayser Program Administrator E mail: tlkayser@iastate.edu Phone: (515) Fax: (515)

News Release Date: 11/23/15

News Release Date: 11/23/15 News Release Date: 11/23/15 Identity Theft Cross References www.irs.gov IRS Pub 4557, Safeguarding Taxpayer Data IRS Pub 5027, Identity Theft Information for Taxpayers IRS Pub 5199, Tax Preparer Guide

More information

How the IRS Helps Taxpayers and Assists Victims

How the IRS Helps Taxpayers and Assists Victims How the IRS Helps Taxpayers and Assists Victims Combating Identity Theft and Online Fraud Justin McCarty January, 2014 What is identity theft? Identity theft occurs when someone uses your personal information

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Marc Standig Enrolled Agent What is tax-related identity theft? Tax-related identity

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Brian Wozniak IRS Stakeholder Liaison

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Brian Wozniak IRS Stakeholder Liaison Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Brian Wozniak IRS Stakeholder Liaison November 4, 2015 1 Prevention and Detection In recent years, the IRS has made numerous

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud What is tax-related identity theft? Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Bill Wilde Local Taxpayer Advocate Taxpayer Advocate Service Revised February 1, 2015

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Anita Douglas, Senior Stakeholder Liaison May 27, 2015

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Anita Douglas, Senior Stakeholder Liaison May 27, 2015 Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Anita Douglas, Senior Stakeholder Liaison May 27, 2015 What is tax-related identity theft? Tax-related identity theft occurs

More information

IRS Identity Theft Efforts and 2013 Filing Season. Dennis Bell Dennis.c.bell@irs.gov 614-621-7536 February 6, 2013

IRS Identity Theft Efforts and 2013 Filing Season. Dennis Bell Dennis.c.bell@irs.gov 614-621-7536 February 6, 2013 IRS Identity Theft Efforts and 2013 Filing Season Dennis Bell Dennis.c.bell@irs.gov 614-621-7536 February 6, 2013 Identity Theft It is not a new problem The most misused SSN of all time Happened more than

More information

Taxes & Identity Theft

Taxes & Identity Theft Taxes & Identity Theft Brian Wozniak IRS Stakeholder Liaison June 4, 2015 What is tax-related identity theft? Tax-related identity theft occurs when someone uses your Social Security Number (SSN) to file

More information

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number

More information

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such

More information

How the IRS Helps Taxpayers and Assist Victims

How the IRS Helps Taxpayers and Assist Victims How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?

More information

What s New Collection Fall 2015

What s New Collection Fall 2015 What s New Collection Fall 2015 Anita Douglas Senior Stakeholder Liaison December 2, 2015 1 What s New Collection Compliance realignment What s Collection look like today Federal Tax Deposit Alerts Early

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud. Maggie Romaniello SL Field Area Manger Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud Glenn Gizzi Senior Stakeholder Liaison Robert Glantz Criminal Investigator Maggie Romaniello SL Field Area Manger What is

More information

The World of Identity Theft from the IRS s Point of View

The World of Identity Theft from the IRS s Point of View 1 The World of Identity Theft from the IRS s Point of View Becky Chiaramida, Director IRS Office of Privacy, Governmental Liaison and Disclosure October 2, 2012 Identity theft: It is not a new problem

More information

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012 Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is

More information

Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims

Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims Narina Bchtikian Stephen Connor Senior Stakeholder Liaison IRS Small Business/Self-Employed

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Helping the Identity Theft Victim

Helping the Identity Theft Victim Helping the Identity Theft Victim Seminar Objectives Increase awareness of how to help IDT victims Improve understanding of Taxpayer Protection Program, Identity Protection Specialized Unit, and Identity

More information

IMMEDIATE STEPS 5 NEXT STEPS 13

IMMEDIATE STEPS 5 NEXT STEPS 13 INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity Theft Report 9 NEXT STEPS 13 Review Your Credit Reports 13 Dispute Errors with Credit Reporting

More information

The Scoop. Social Security News 1/20/2016. Kristy Maitre Tax Specialist Center for Agricultural Law and Taxation January 20, 2016

The Scoop. Social Security News 1/20/2016. Kristy Maitre Tax Specialist Center for Agricultural Law and Taxation January 20, 2016 The Scoop Kristy Maitre Tax Specialist Center for Agricultural Law and Taxation January 20, 2016 Social Security News 2015 was a special year for Social Security They launched their very first blog, Social

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT Introduction 3 Immediate steps 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

WRITTEN TESTIMONY OF JOHN A

WRITTEN TESTIMONY OF JOHN A WRITTEN TESTIMONY OF JOHN A. KOSKINEN COMMISSIONER INTERNAL REVENUE SERVICE BEFORE THE SENATE FINANCE COMMITTEE ON UNAUTHORIZED ATTEMPTS TO ACCESS TAXPAYER DATA JUNE 2, 2015 Chairman Hatch, Ranking Member

More information

Identity Theft/Credit Fraud Kit

Identity Theft/Credit Fraud Kit Provided by: Your source for information on Credit Reports and Credit Scores, where you can also safely order your own 3 Bureau Credit Report online that includes your credit information from Equifax,

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone

More information

www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director PIERSON Technological advances of the

More information

TYPES OF POSSIBLE IDENTITY THEFT

TYPES OF POSSIBLE IDENTITY THEFT Identity Theft What is Identity Theft? Identity theft occurs when someone uses your personal information such as your name, social security number, and or other identifying information without your permission

More information

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available

More information

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA Taxpayer Guide to Identity Theft Protect yourself By Beatriz Landa-Sanchez, EA What is tax-related identity theft? Tax-related identity theft occurs when someone uses your stolen Social Security number

More information

Identity Theft and Tax Administration

Identity Theft and Tax Administration PREPARED STATEMENT OF BETH TUCKER IRS DEPUTY COMMISSIONER FOR OPERATIONS SUPPORT BEFORE SUBCOMMITTEE ON FISCAL RESPONSIBILITY AND ECONOMIC GROWTH SENATE FINANCE COMMITTEE ON IDENTITY THEFT MAY 25, 2011

More information

Presented by Dave Olsen, CPA, President

Presented by Dave Olsen, CPA, President Presented by Dave Olsen, CPA, President My Frame of Reference 15 Years in Public Practice 11 Years in Tax & Accounting Software (20% of prof. e-files) 3 Year term on IRS ETAAC committee and Security Sub-Group

More information

Citi Identity Theft Solutions

Citi Identity Theft Solutions Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the

More information

IRS Resources for Payroll Professionals

IRS Resources for Payroll Professionals IRS Resources for Payroll Professionals Glenn Gizzi Winter 2015 American Payroll Association Leading advocate for advancement of payroll professionals Connects payroll industry with employers and government

More information

June 2015 Newsletter

June 2015 Newsletter June 2015 Newsletter News From Silver Bridge CPAs TAX TIPS & TRICKS Consider Setting Up an Idaho Medical Savings Account! The state of Idaho has established a tax deduction for contributions made to an

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Dear Concerned Consumer,

Dear Concerned Consumer, Dear Concerned Consumer, Identity theft is a growing problem of the Information Age. You have already taken the first important step in combating the problem by contacting HomeStar Bank & Financial Services.

More information

Prepared by Sgt. Gibbs, Thomas B. 82-11

Prepared by Sgt. Gibbs, Thomas B. 82-11 Prepared by Sgt. Gibbs, Thomas B. 82-11 Collaborative partnerships between the law enforcement agency and the individuals and organizations they serve to develop solutions to problems and increase trust

More information

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Identity Protection Personal Identification Numbers Are Not Provided to All Eligible Taxpayers September 24, 2014 Reference Number: 2014-40-086 This report

More information

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide Pasco County Sheriff's Office Economic Crime Unit Identity Theft Guide This kit was designed to assist you in working through the process of resolving the theft of your personal information and to clear

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

Guide to IRS Collections. Tax Payment Options and Solutions. Offer in Compromise 4/30/2015

Guide to IRS Collections. Tax Payment Options and Solutions. Offer in Compromise 4/30/2015 Guide to IRS Collections Kristy Maitre Tax Specialist Center for Agricultural Law and Taxation May 4, 2015 Tax Payment Options and Solutions When to submit an Offer in Compromise Releasing a Federal Tax

More information

Identity Theft. Prevention and Recovery Information Kit

Identity Theft. Prevention and Recovery Information Kit Identity Theft Prevention and Recovery Information Kit A step-by-step guide designed to help you protect your identity and recover if you ve been victimized. 800-522-4100 valleynationalbank.com 2012 Valley

More information

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE? 1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to IDENTITY THEFT IDENTITY theft Identity theft can happen to anyone. Previously, criminals stole your wallet for your cash. Now they want your wallet to steal your good name. Protect yourself and your identity.

More information

A persistent threat to taxpayers. IRS Identity Theft Efforts and 2013 Filing Season Improvements 4/10/2013. The most misused SSN of all time

A persistent threat to taxpayers. IRS Identity Theft Efforts and 2013 Filing Season Improvements 4/10/2013. The most misused SSN of all time IRS Identity Theft Efforts and 2013 Filing Season Improvements Ley Mills IRS CSO SL/Field herbert.mills@irs.gov 804-448-2723 April 2013 The most misused SSN of all time Happened more than 70 years ago

More information

Identity Theft Simple ways to keep your sensitive information safe.

Identity Theft Simple ways to keep your sensitive information safe. Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

EL/Civics Lesson Plan

EL/Civics Lesson Plan Program Name Staff Responsible for Lesson MVCTC EL/Civics Program Mary Ann Oatney Date(s) Used 11/2007 Civics Category Civics Objective Time Frame to Complete Lesson EFL(s) II. Civics Participation II.

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level Click to edit Master title Fighting Back Against Click to edit Master text s Presented by Fifth Office levelof Privacy, Information Protection & Data Security Identity Theft and Online Fraud 1 Click Privacy

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

Identity Theft Information

Identity Theft Information Identity Theft Information Houston Police Department Criminal Investigations Command Financial Crimes Unit 713-308-2500 The information contained on this page is intended to assist the citizens of Houston

More information

Identity Theft Assistance: Information for Recovering Your Good Name

Identity Theft Assistance: Information for Recovering Your Good Name Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

How To Get Help From The Police Department

How To Get Help From The Police Department IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification

More information

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft. IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit

More information

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012 IRS Payroll Topics Alan Gregerson March 15, 2012 VOH to Hires Act of 2011 Qualified Veteran WOTC 1 The New Voluntary Classification Settlement Program (VCSP) No Expiration VCSP Advantages The application

More information

May 11, 2016. Re: Notice of a Data Breach. Dear

May 11, 2016. Re: Notice of a Data Breach. Dear Processing Center P.O. BOX 141578 Austin, TX 78714 May 11, 2016 Re: Notice of a Data Breach Dear Kalamazoo College is committed to maintaining the privacy and security of our current and former employees

More information

Identity Theft. Emergency Repair Kit

Identity Theft. Emergency Repair Kit Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair

More information

2015 Identity Theft Guide

2015 Identity Theft Guide 2015 Identity Theft Guide www.feddesk.com FREE Federal & Military Guides Since 2002 2015 Identity Theft Guide Written by John D. Whitney Published by Feddesk.com FREE Federal and Military Guides Since

More information

What is Identity Theft?

What is Identity Theft? What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More information

Corona Police Department

Corona Police Department By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft About Medical Identity Theft and Health Information Breaches... 1 What is medical identity theft?... 1 What are the dangers of medical identity theft?... 1 How do

More information

Federal and State Government Identity Theft and Protection Initiatives

Federal and State Government Identity Theft and Protection Initiatives Federal and State Government Identity Theft and Protection Initiatives Jill Runow May 1, 2012 Identity theft: It is not a new problem 2 The most misused SSN of all time Happened more than 70 years ago

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Instructions for Completing

Instructions for Completing Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and to enhance existing efforts to educate Hoosiers about

More information

IDENTITY THEFT. How To Avoid Theft And What To Do If It Happens To You. Securities Industry Association

IDENTITY THEFT. How To Avoid Theft And What To Do If It Happens To You. Securities Industry Association IDENTITY THEFT How To Avoid Theft And What To Do If It Happens To You Securities Industry Association SIA thanks its members for their thoughtful review and contributions to this publication. Illustrator:

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso Police Department and obtained a police report number related to your identity

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY

More information

Ohio Attorney General Mike DeWine s SELF-HELP GUIDE. Repairing, Rectifying, and Resolving Identity Theft WELCOME & INTRODUCTION 1 IMMEDIATE STEP 2

Ohio Attorney General Mike DeWine s SELF-HELP GUIDE. Repairing, Rectifying, and Resolving Identity Theft WELCOME & INTRODUCTION 1 IMMEDIATE STEP 2 Ohio Attorney General Mike DeWine s SELF-HELP GUIDE Repairing, Rectifying, and Resolving Identity Theft WELCOME & INTRODUCTION 1 IMMEDIATE STEP 2 Place an Initial Fraud 3 Place A Security Freeze 4 Order

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

what you need to know

what you need to know A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:

More information

The University of North Carolina at Charlotte Identity Theft Prevention Program

The University of North Carolina at Charlotte Identity Theft Prevention Program The University of North Carolina at Charlotte Identity Theft Prevention Program Program Adoption As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule ( Rule ),

More information

NOTICE OF DATA BREACH. As an integral part of our dōterra family, we understand how important data security is to you.

NOTICE OF DATA BREACH. As an integral part of our dōterra family, we understand how important data security is to you. AllClear ID Processing Center P.O. BOX 141578 Austin, TX 78714 00001 ACD1234 00001 JOHN Q. SAMPLE 1234 MAIN STREET ANYTOWN US 12345-6789 April 18, 2016 Dear John Sample, NOTICE OF DATA BREACH As an integral

More information

WHAT S IT ALL ABOUT?

WHAT S IT ALL ABOUT? WHAT S IT ALL ABOUT? Introduction The 1990 s spawned a new variety of crooks called identity thieves. Their stock in trade? Your everyday transactions, which usually reveal bits of your personal information:

More information

Reclaiming your identity

Reclaiming your identity Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist

More information

INTRODUCTION HOW IDENTITY THEFT OCCURS

INTRODUCTION HOW IDENTITY THEFT OCCURS The following information is from the Federal Trade Commission s booklet on Identity Theft. For more information, access the Federal Trade Commission at www.ftc.gov or contact them at 1-877-ID-THEFT. INTRODUCTION

More information

Identity Theft Problem and Solutions

Identity Theft Problem and Solutions Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist Identity Theft Victim Checklist THE FOLLOWING CHECKLIST PROVIDES THE STEPS YOU SHOULD TAKE TO MINIMIZE DAMAGE TO YOUR FUNDS, FINANCIAL ACCOUNTS AND PERSONAL REPUTATION. Before you start Telephone calls

More information

SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the credit reporting agency.

SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the credit reporting agency. SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the credit reporting agency. The credit reporting agency shall not charge a fee to victims

More information

New IRS Tax Payments Online!

New IRS Tax Payments Online! 166 W. University Parkway; Suite B Tel: (731) 664-7777 Fax: (731) 664-1544 sipescpa.com August 2015 New IRS Tax Payments Online! You can now make a payment online direct to the Internal Revenue Service.

More information

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466 FRAUD PACKET Instructions and Useful Information Please read entire packet and follow instructions to complete this packet properly. **This packet should ONLY be completed if you are a victim of Identity

More information

How To Get A Credit Card From A Credit Union

How To Get A Credit Card From A Credit Union Refuse to be a target of identity crime. Protecting the Real You and Only You. The International Association of Chiefs of Police 515 N. Washington Street, Alexandria, VA 22314 Telephone: 1.800.843.4227

More information