Join  |  Login  |   Cart    

Notary Rotary
FTC Red Flag Rules Policy & Procedures effective Aug 1st
Notary Discussion History
 
FTC Red Flag Rules Policy & Procedures effective Aug 1st
Go Back to July, 2009 Index
 
 

Posted by John_NorCal on 7/31/09 1:38pm
Msg #298272

FTC Red Flag Rules Policy & Procedures effective Aug 1st

This may or may not help you in your privacy procedures; but I thought you all may want to be aware of this.

Most CPAs, EAs and Tax Preparers will be affected by the new “Red Flag” regulations that will take effect on August 1, 2009. These are the same regulations that apply to financial institutions not regulated by the FTC beginning last November.

Procedure policy follows:

Red Flag Rules Policy & Procedure

Company Name:
Street Address:
City, State and ZIP:

Responsible Individual:
Phone:
E-mail:

I. Application: This policy and procedure is a written identity theft prevention program developed by the Company as required by the Fair and Accurate Credit Transactions (FACTA) Act of 2003. The Company has determined based on Federal Trade Commission (FTC) regulations that the Company is by definition a “creditor” with “covered accounts” and thus is subject to the “Red Flag Rules.”
II. Purpose: The purpose of this policy and procedure is to develop a customized program for the Company that will identify, detect, and respond to business practices or specific activities referred to as “Red Flags” that could result in identity theft. The programs must include procedures to protect against potential identity theft and provide a remedial procedure should identity theft occur.
III. Responsibility: The Red Flag Rules requires that an individual within the Company be designated with the responsibility to oversee the program. For purposes of the program, the responsible individual (designated above) will have the following responsibities; (1) oversee the implementation of the program, (2) monitor the program’s effectiveness, (2) be diligent in identifying any “Red Flags” not initially identified for the program or created by a procedural change within the company and revise the written program accordingly, (3) take the appropriate actions prescribed in this program should an identity theft or potential identity theft occur, (4) review the program when office procedures are revised or when a potential breach of identity security is identified, (5) periodically but not less than semi-annually review the program, and (6) insure that each employee has read and understands the program.
IV. Staff Training: All existing employees and any future new hires are required to review this document and adhere to policies and procedure contained herein.
V. Identified Red Flags: “Red Flag” Rules generally focus on identity theft associated with a creditor’s covered accounts which has very limited applicability to this company, which only extends credit to clients for accounting, tax preparation and related services that are only of value to the individual to which they are provided. The company does not sell a tangible product which a thief can convert to their own use nor does the company advance cash to covered account holders that a potential thief can access.
The greater threat to identity theft for a company providing accounting, tax preparation and related services come from the internal procedures employed by the company and the transferring of data between the company, the client, and contractors providing services to the company.
The company has identified the following Red Flags and provided associated prevention procedures (policy solutions) as follows:
1) Mailing documents to an incorrect address – There is the possibility of mailing documents to a client at a prior address or to the address of another client, thus exposing a client’s identity information to a third party.
Policy Solution – Each time a service is provided for a client, the client’s current address must be verified and the appropriate client files updated.
2) Sending documents to clients via e-mail – E-mail is not a secure medium; there is always the chance of someone hacking into it and gaining access to sensitive documents that include a client’s identity information.
Policy Solution – Whenever sending documents that include a client’s or potential client’s identity information, convert them to password protected PDF or ZIP files that only the recipient can open with the correct password. Another option would be to use a password-protected internet lockbox.
3) New clients attempting to file fraudulently - There is the remote possibility of someone in possession of a stolen identity attempting to have a fraudulent tax return prepared for various reasons.
Policy Solution – Ask new clients for some sort of ID, keeping in mind that identity thieves could also be in possession of forged documents. If there is any suspicion raised by the documents presented that do not match the client’s age, general description, suspicious addresses, etc., then additional verification is required that a thief would probably not be in possession of such as birth certificates, utility bills, etc.
4) Unsecured client files – Clients and others come and go frequently in an accounting and tax preparation business office. Client files left unattended on office work spaces are susceptible to being stolen or having data copied.
Policy Solution – Do not leave files unattended in the presence of anyone. Do not allow unescorted office visitors in office areas where client files are stored.
5) E-file rejection – When e-filing tax returns, the IRS will reject those where the name and SSN do not match the Social Security Master file. There is a chance that the client may be using someone else’s ID in an attempt to secure an illicit refund.
Policy Solution – If the client is new and the rejection cannot be traced to a reasonable cause, ask for additional verification including items that would not be included in a stolen wallet or purse.
6) Requests for client data – It is not uncommon to receive requests for certain client information from attorneys, financial planners, brokers, lenders and even other tax preparation firms preparing another entity return of the client. Providing information to unsubstantiated requests could lead to disclosure of information that will result in identity theft.
Policy Solution – IRC Code Section 7216 and its regulations preclude tax preparers from disclosing tax return information to third parties without a client’s written consent. This Company shall not provide any third party any information related to the client without the client’s written permission. The Company shall make every effort to avoid the third party disclosure and the need for client consents by providing the information directly to the client who can then forward the information to the third party.
7) Technical assistance – Occasionally, the Company may seek assistance from other professionals or peers outside of the firm. Frequently, there is a need for the other professional to review and analyze certain documents as part of the provided assistance. Not knowing whether the other professional is compliant with the Red Flag Rules can cause the Company to be non-compliant.
Policy Solution – As a company policy, all client documents provided to other professionals outside of the Company shall have all client identity made illegible by some appropriate means whether by cutting out with scissors, blacking with a magic marker, or other suitable means. The exception to this rule is where IRC Code Section 7216 and its regulations permit disclosures without client consent and where the professional from whom the assistance is requested is compliant with the Red Flag Rules.
VI. Responding to Red Flags – If red flags are detected, the service being provided shall be immediately suspended until the red flag issue is resolved. Where it is determined that there was or is a possibility that client identity information has been compromised, the affected clients shall be immediately notified. Where criminal activity is evident, the appropriate authorities should be notified.
VII. Contractors – The Red Flag regulations make the Company responsible for insuring that every contractor from which the Company receives services and shares client identity is Red Flag compliant. As a matter of policy, the Company will make inquiries to insure all of its contractors are also compliant. For the tax and accounting business, this would include but is not limited to an e-file provider, certain software providers where the client data is hosted by the software provider, and credit card processing companies.
This policy is adopted by the Company effective ________, 2009.

By: _________________________________________ Title: ______________________



Reply by John/CT on 7/31/09 1:58pm
Msg #298279

Re: FTC Red Flag Rules Policy & Procedures, Section VII

Hmmmm ... what will be the test to assure we are "Red Flag compliant"?

Reply by Teddog/CO on 7/31/09 2:04pm
Msg #298281

John just can't wait to see what happens :) n/m

Reply by John_NorCal on 7/31/09 3:15pm
Msg #298287

I'm not sure---

perhaps black helicopters landing special ops teams peeking through your window? ;-)

Reply by Kitty Brendell on 7/31/09 3:51pm
Msg #298294

Re: FTC Red Flag Rules Policy & Procedures, Section VII

FTC announced that it will delay enforcement of the Red Flags Rule until November 1, 2009 and make adjustments to assist low-risk entities with compliance.

Reply by notaryinmo on 7/31/09 3:51pm
Msg #298293

As long as CPA's, EA's, and tax preparers all follow the policies as set out by the Internal Revenue Service to make sure that anyone who is filing a tax return has sufficient proof of identity (social security card - not just the number for everyone on the return) and for the primary and secondary tax client, a valid (non-expired) driver's license or state idenitification card. In the event that a social security card is not available, a letter from the Social Security Administration verifying the social security number should be sufficient as long as other identification is proper.

Do not be surprised if the IRS sends out people to spot check to ensure compliance. This is really intended to put a stop to fraudulent returns - of which most are prepared by national tax preparation chains.

It is not in my best interest to prepare a fraudulent return and I make sure to verify the identity of everyone contained on the return. I've turned people away because they had questionable identification. Lost business? Sure I have but I would rather turn suspicious returns away than face the penalties. Sometimes the best business we can do is the business we turn away.

Reply by John_NorCal on 7/31/09 8:54pm
Msg #298319

Main focus is privacy and identity theft more so than....

identifying the taxpayer. At a recent IRS tax forum that I attended in San Diego one of the many seminars offered dealt with identity theft, and safe guarding of taxpayer information. Another presentration concerned fraudulent returns filed by tax preparers and tax preparers who rip off refunds from tax payers. Nothing was brought up concerning identifying tax payers, all they care about is getting their money either from legals or illegals.

Reply by notaryinmo on 8/1/09 11:04pm
Msg #298385

Re: Main focus is privacy and identity theft more so than....

When I had a public tax office, whenever the clients left the office and their files were finished, they were placed in a locking filing cabinet. The keys were never kept in the office and there were only two people who had access to the files.

Were these IRS rules? No, but they went a long way in making our clients information safe and they realized that.


 
Find a Notary  Notary Supplies  Terms  Privacy Statement  Help/FAQ  About  Contact Us  Archive  NRI Insurance Services
 
Notary Rotary® is a trademark of Notary Rotary, Inc. Copyright © 2002-2013, Notary Rotary, Inc.  All rights reserved.
500 New York Ave, Des Moines, IA 50313.