Data Protection and Identity Theft Flashcards

1
Q

Why are tax professionals targets for cybercriminals?

A

Cybercriminals seek to steal client data to file fraudulent tax returns

They use tactics like phishing emails, fake calls, and malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Safeguards Rule?

A

FTC regulation requiring tax preparers to develop written security plans

It falls under FTC 16 CFR Part 314.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the Privacy Rule require from tax preparers?

A

To provide privacy notices and limit sharing of customer information

This is part of FTC 16 CFR Part 313.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List three best practices for data security that all tax preparers should follow.

A
  • Assign responsibility for data security
  • Assess risks to client information
  • Write and implement a security plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the IRS e-file security standards?

A
  • Use Secure Socket Layer (SSL) certificates
  • Conduct weekly vulnerability scans
  • Maintain written privacy policies
  • Protect against bulk filing fraud
  • Register public domain names in the U.S.
  • Report security incidents immediately
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is tax-related identity theft?

A

When someone uses stolen personal or business information to file fraudulent returns

This includes using Social Security or Employer Identification Numbers (EINs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name two warning signs of tax-related identity theft for individuals.

A
  • Multiple tax returns filed under the same SSN
  • IRS notices about wages or accounts from unknown sources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should businesses look for as warning signs of identity theft?

A
  • IRS notices about false employees or dormant businesses
  • Fraudulent credit or account activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: The IRS does not contact taxpayers via ______, text, or social media for personal information.

A

email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What steps should be taken if identity theft occurs?

A
  • File a complaint with the FTC at identitytheft.gov
  • Contact banks to secure compromised accounts
  • Notify the IRS using Form 14039
  • Monitor credit reports and place fraud alerts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is business identity theft?

A

Unauthorized use of a business’s information to gain tax or financial benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List two indicators of business identity theft.

A
  • IRS notices about fictitious employees or activities
  • Fraudulent amendments to tax returns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protective measures should be taken against business identity theft?

A
  • Respond promptly to IRS notices
  • File police and FTC reports
  • Monitor credit reports and account activity
  • Update computer security software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Tax preparers are not required to assess risks to client information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of using encryption in data security?

A

To protect sensitive information from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: Tax preparers must regularly ______ and monitor security measures.

A

update