March 2020 E-Newsletter

HOME     FIRM OVERVIEW     CLIENT SERVICES     INFO CENTER     RESOURCES     CONTACT

CPA NEWS

The IRS Data Theft Problem 
The IRS has 52 Internet applications to help U.S. citizens comply with their tax obligations. But these online portals, which collect, process and store large amounts of personal information and tax data, are also a potential gateway for online criminals and identity thieves. While the IRS’s electronic authentication security controls have improved, the Treasury Inspector General recently said that the IRS’s internet applications are not yet compliant with the National Institute of Standards and Technology guidelines.

Here’s what you can do to protect your tax-related identity and information while the IRS tries to improve its security controls:

Use the IRS’s Internet applications judiciously. Think you need to use one of the IRS’s online applications? Consider requesting or obtaining certain information via the U.S. Postal service. Simply decide if you’re willing to take a risk using an application that isn’t compliant with the National Institute of Standards and Technology.

Get an IP PIN. An Identity Protection PIN (IP PIN) is a six-digit number that helps prevent filing fraudulent federal income tax returns. If you are a confirmed victim of identity theft, the IRS will mail you an IP PIN after the fraudulent tax issue has been identified. If you are not the victim of tax-related identity theft, you can voluntarily ask the IRS to issue you an IP PIN if you live in certain states. Additional states will be added until the IP PIN program is available nationwide.

Review your credit report once a year. Check your credit report for any unauthorized activity or errors. This periodic review can often be the earliest warning that your private information is compromised.





(516) 294-0400

(516) 938-0491



 415 CROSSWAYS PARK DR.
 SUITE C
 WOODBURY, NY 11797


KVLSMCPA.COM

© 2020 KVLSM LLP - CERTIFIED PUBLIC ACCOUNTANTS AND ADVISORS - NEW YORK

This e-mail and any attachments are intended exclusively for the individual or entity to which it is addressed. It may be confidential or legally privileged. If you received this
message in error or are not the intended recipient, you should destroy the e-mail message and any attachments or copies, and you are prohibited from retaining,
distributing, disclosing or using any information contained herein. Please inform us of the erroneous delivery by return e-mail. Thank you for your cooperation.