SlideShare a Scribd company logo
1 of 1
Download to read offline
PROTECTING	TAX	PAYER	DATA	
From	the	Perspective	of	the	Tax	Preparer.	
[Safeguarding	taxpayer	data]	is	the	legal	responsibility	of	…	individuals	that	receive,	maintain,	share,	
transmit,	or	store	taxpayer’s	personal	information.	–	IRS	Pub	4557	
	
Applicable Law and Regulations
GLBA (1999) Federal/Privacy and Security of personal banking information.
FTC Safeguards Rule Ensure security of customer records and information.
Financial Privacy Rule Requires Privacy Notices for how information is used.
IRS Procedure 2007-40 Requires e-file providers to have security systems in place to prevent unauthorized access to taxpayer
accounts and personal info.
General	Security	and	Privacy	Requirements	
	
CREATE A SECURITY PLAN. List responsibilities and security controls
in each of the following areas:
• Physical environment (office, file cabinets, shredding)
• Operations (information flow, storage, transmission,
information requests)
• Systems (WiFi, router, shared network devices,
workstation, laptop)
• Outsourced Services (IT, storage, courier)
TEST CONTROLS ANNUALLY. Self assess the adequacy of controls.
• Use internet scanning services (e.g., Qualys FreeScan,
SecureCheq, Nexpose Community Edition).
• Review security plan for currency and adequacy
• Perform physical inspection
CREATE AND DISTRIBUTE REQUIRED DOCUMENTS. The following
documents are required
• Annual privacy notices (required by FTC privacy rule.
• Service contracts (ensure they require safeguards of your
customer data).
• Acceptable Use Policy (Required and prohibited behaviors
on IT resources)
• Create a contingency plan
ENSURE PHYSICAL SECURITY. Review the following controls:
• Secure all desks, photocopiers, mailboxes, trash cans,
and rooms with personal data stored.
• Remove taxpayer data from all media (e.g., thumb drives,
hard drives) prior to release or disposal.
• Authorize release of information
• Lock doors, cabinets, and drawers.
Getting	Started	
	
! Assess risks. Consider physical, operations, systems, and outsourced services.
! Create safeguard plan. List controls in each of the areas above.
! Carefully review outsourced services
! Revisit program annually.
	
dlandoll@lantego.com			
(512)	633-8405	
www.lantego.com		
Experts	Only	
LOCKDOWN INFORMATION SYSTEM SECURITY. Ensure the following
controls in IT:
• Ensure authorized access only based on need-to-
know. (What passwords does your IT provider have?)
• Work with IT provider to create a contingency plan
(with annual testing).
• Backup files and systems. Regularly.
• Maintain system and application patches.
• Unique identifiers and strong authentication.
Password minimum strength and changes. Consider
2FA.
• Disable inactive accounts.
• Implement network security (firewall, network
segmentation, IDS)
• Encrypt transmissions (email and network
applications)
ANNUALLY CERTIFY YOUR SYSTEMS. Determine and accept risks
annually.
• Perform self-assessment.
• Determine risks.
• Mitigate or accept risks
• Document annual certification for use.
APPROPRIATELY REPORT INCIDENTS. Be prepared to report
incidents as required.
• Create incident response plan (identify incidents,
reporting requirements, responsible parties, and
reporting formats).
• See IRS Pub 5199

More Related Content

What's hot

Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Igor Zboran
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTCIgor Zboran
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small BusinessSYMBIONT, INC.
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityNeha Raju k
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest LectureMurthinty
 
Looking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in UtahLooking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in UtahState of Utah, Salt Lake City
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-enKBIZEAU
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Amr Salah
 
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIdentity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIgor Zboran
 
Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is? Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is? Armor
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLDJack Kessler
 

What's hot (20)

Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 
Internet of Everything & WebRTC
Internet of Everything & WebRTCInternet of Everything & WebRTC
Internet of Everything & WebRTC
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business
 
Online security
Online securityOnline security
Online security
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest Lecture
 
Looking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in UtahLooking back and forward: Improving Health Data Security in Utah
Looking back and forward: Improving Health Data Security in Utah
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
 
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy ProtectionIdentity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
Identity-Based Privacy (IBP) - Cloud Computing and Privacy Protection
 
Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is? Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is?
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
 

Similar to Tax Preparers Presentation

Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research dataTomppa Järvinen
 
Mailjet Security Presentation 2017
Mailjet Security Presentation 2017Mailjet Security Presentation 2017
Mailjet Security Presentation 2017Mailjet
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
Enabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy LawsEnabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy LawsAmazon Web Services
 

Similar to Tax Preparers Presentation (20)

Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Mailjet Security Presentation 2017
Mailjet Security Presentation 2017Mailjet Security Presentation 2017
Mailjet Security Presentation 2017
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Unit v
Unit vUnit v
Unit v
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
Enabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy LawsEnabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy Laws
 
199 baseline security
199 baseline security199 baseline security
199 baseline security
 

Tax Preparers Presentation

  • 1. PROTECTING TAX PAYER DATA From the Perspective of the Tax Preparer. [Safeguarding taxpayer data] is the legal responsibility of … individuals that receive, maintain, share, transmit, or store taxpayer’s personal information. – IRS Pub 4557 Applicable Law and Regulations GLBA (1999) Federal/Privacy and Security of personal banking information. FTC Safeguards Rule Ensure security of customer records and information. Financial Privacy Rule Requires Privacy Notices for how information is used. IRS Procedure 2007-40 Requires e-file providers to have security systems in place to prevent unauthorized access to taxpayer accounts and personal info. General Security and Privacy Requirements CREATE A SECURITY PLAN. List responsibilities and security controls in each of the following areas: • Physical environment (office, file cabinets, shredding) • Operations (information flow, storage, transmission, information requests) • Systems (WiFi, router, shared network devices, workstation, laptop) • Outsourced Services (IT, storage, courier) TEST CONTROLS ANNUALLY. Self assess the adequacy of controls. • Use internet scanning services (e.g., Qualys FreeScan, SecureCheq, Nexpose Community Edition). • Review security plan for currency and adequacy • Perform physical inspection CREATE AND DISTRIBUTE REQUIRED DOCUMENTS. The following documents are required • Annual privacy notices (required by FTC privacy rule. • Service contracts (ensure they require safeguards of your customer data). • Acceptable Use Policy (Required and prohibited behaviors on IT resources) • Create a contingency plan ENSURE PHYSICAL SECURITY. Review the following controls: • Secure all desks, photocopiers, mailboxes, trash cans, and rooms with personal data stored. • Remove taxpayer data from all media (e.g., thumb drives, hard drives) prior to release or disposal. • Authorize release of information • Lock doors, cabinets, and drawers. Getting Started ! Assess risks. Consider physical, operations, systems, and outsourced services. ! Create safeguard plan. List controls in each of the areas above. ! Carefully review outsourced services ! Revisit program annually. dlandoll@lantego.com (512) 633-8405 www.lantego.com Experts Only LOCKDOWN INFORMATION SYSTEM SECURITY. Ensure the following controls in IT: • Ensure authorized access only based on need-to- know. (What passwords does your IT provider have?) • Work with IT provider to create a contingency plan (with annual testing). • Backup files and systems. Regularly. • Maintain system and application patches. • Unique identifiers and strong authentication. Password minimum strength and changes. Consider 2FA. • Disable inactive accounts. • Implement network security (firewall, network segmentation, IDS) • Encrypt transmissions (email and network applications) ANNUALLY CERTIFY YOUR SYSTEMS. Determine and accept risks annually. • Perform self-assessment. • Determine risks. • Mitigate or accept risks • Document annual certification for use. APPROPRIATELY REPORT INCIDENTS. Be prepared to report incidents as required. • Create incident response plan (identify incidents, reporting requirements, responsible parties, and reporting formats). • See IRS Pub 5199