Safeguarding
Taxpayer
Data











Cook & Co. Tax Advisors
Data Center

Gregory J. Cook, EA, CPA


Author Gregory J. Cook, EA, CPA Accredited Tax Advisor Chartered Global Management Accountant

 October 18, 2016

 Arab, Alabama 


If you handle taxpayer information you may be subject to the Gramm-Leach Bliley Act (GLB Act) and the Federal Trade Commission (FTC) Financial Privacy and Safeguards Rules. Whether or not you are subject to the GLB Act and the FTC Rules, you could benefit from implementing the general processes and best practices outlined in FTC information privacy and safeguards guidelines.


Financial institutions as defined by FTC include professional tax preparers, data processors, their affiliates and service providers who are significantly engaged in providing financial products or services. They must take the following steps to protect taxpayer information. Other businesses, organizations and individuals handling taxpayer information should also follow these steps because they represent best practices for all.


Take responsibility or assign an individual or individuals to be responsible for safeguards;


Assess the risks to taxpayer information in your office, including your operations, physical environment, computer systems and employees.


open file cabinet with file folder illustrating data file securityMake a list of all the locations where you keep taxpayer information (computers, filing cabinets, bags and boxes taxpayers may bring you);


Write a plan of how you will safeguard taxpayer information. Put appropriate safeguards in place;


Use only service providers who have policies in place to also maintain an adequate level of information protection; and


Monitor, evaluate and adjust your security program as your business or circumstances change.


The FTC has fact sheets and guidelines on privacy and safeguards for businesses on their website. In addition, you may seek outside professional help to assess your information security needs.


To safeguard taxpayer information, you must determine the appropriate security controls for your environment based on the size, complexity, nature and scope of your activities. Security controls are the management, operational and technical safeguards you use to protect the confidentiality, integrity and availability of your customers’ information.


Security is a 24/7 proposition. Here, I'm checking on the office from home during a brief power outage. We had zero down time.


Greg checking a video monitor alarm at the office from home6 Examples of Cook & Co. Security Controls are:


1) Auto-Locking Doors that restrict physical access to our Computer Servers.


2) Requiring passwords to restrict Virtual Access to Server Files which are only accessible within the building.


3) Encrypt electronically stored data.


4) Keep multiple, secured backups of data.


5) Shredding paper after it's scanned.


6) All email is encrypted.


Authorized IRS e-file providers that act as an online provider must follow these six security, privacy and business standards to better serve taxpayers and protect their individual income tax information collected, processed and stored.


All authorized IRS e-file providers who own or operate a website through which taxpayer information is collected, transmitted, processed or stored must register their uniform resource locator (URL).


For additional examples of security controls, see the National Institute of Standards and Technology (NIST) SP 800-53 publication listed on Wikipedia here, with a link to the 463 page document.



Greg Cook is an Enrolled Agent, licensed by the U.S. Treasury Department to represent taxpayers before all administrative levels of the Internal Revenue Service (IRS). He is also a Certified Public Accountant licensed by the states of Alabama and Tennessee.



More Articles From Cook & Co. Tax Advisors in Arab, Alabama

Voluntary Compliance
Undisclosed Offshore Accounts
Taxes in the United States
Taxes in the United States
IRS Email
IRS Email

Connect