{"id":526,"date":"2015-08-17T17:36:43","date_gmt":"2015-08-17T22:36:43","guid":{"rendered":"https:\/\/taxprocenter.proconnect.intuit.com\/?p=526"},"modified":"2017-10-17T17:39:41","modified_gmt":"2017-10-17T22:39:41","slug":"securing-client-data-from-id-theft-in-an-accounting-firm","status":"publish","type":"post","link":"https:\/\/accountants.intuit.com\/taxprocenter\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/","title":{"rendered":"Securing Client Data From ID Theft in a Tax Practice"},"content":{"rendered":"<p><span style=\"font-weight:400;\">Ever since the IRS experienced its own electronic security breach in May, many accountants have become all the more conscious of the inherent problem of protecting Social Security numbers in their offices.<\/span><\/p>\n<p><span style=\"font-weight:400;\">A reported 104,000 tax returns were allegedly taken by Russian hackers using the \u201cGet Transcript\u201d function, causing the IRS to temporarily shut down the system. \u201cThese third parties gained sufficient information from an outside source before trying to access the IRS site, which allowed them to clear a multi-step authentication process,\u201d reads the IRS\u2019s statement.<\/span><\/p>\n<p><span style=\"font-weight:400;\">The implications for accountants and their firms are twofold. First, if the IRS is being targeted, a firm might be as well. Second, according to the IRS, hackers had prior information on the targeted accounts, including Social Security information, date of birth, tax filing status and street address. However, such an occurrence does have precedence; in 2013, a Connecticut accounting firm suffered a data breach that may have compromised the data of 900 clients.<\/span><\/p>\n<p><span style=\"font-weight:400;\">Accounting technologists are more alarmed than accounting firms, recently reporting, in a Journal of Accountancy roundtable in June, that a cybersecurity storm is coming. Rick Richardson, CPA.CITP, CGMA, of Richardson Media &amp; Technologies, LLC, warns that many accounting practices are not as protected as they should be.<\/span><\/p>\n<p><span style=\"font-weight:400;\">\u201cCPAs and accountants need to know what they are using,\u201d said Richardson. \u201cAccountants cannot defend themselves if they keep information on an insecure portal like Dropbox and something goes wrong. Going to a portal in the cloud is the best answer for secure communication in the cloud.\u201d<\/span><\/p>\n<p><b>Following the Banks <\/b><span style=\"font-weight:400;\">Banks and accounts receivable firms are already required to demonstrate physical and computer security to protect sensitive data. Interestingly enough, tax accountants possess more sensitive personal data and do not have any requirements to protect the data. The threat is present for accountants, even if the regulation is not. Following the lead of banks would therefore be a wise decision.<\/span><\/p>\n<p><span style=\"font-weight:400;\">Rather than be the subject of a massive security breach, specialists recommend taking data security preventative steps, beginning with encrypting email. Additional steps include requiring that any outsourced servicers who see sensitive data have proper security in place. This includes tax software vendors, payroll services, document management companies and any cloud providers.<\/span><\/p>\n<p><span style=\"font-weight:400;\">Physical security can take a page from outsourced accounts receivable companies by battening down the hatches, so to speak. Perform a gap analysis that includes taking a survey of where data can find its way out of your office. For example, it may be necessary to replace computers with USB drives, from which a thumb drive could easily remove gigabytes of data.<\/span><\/p>\n<p><span style=\"font-weight:400;\">Accounts receivable firms use cameras and require cell phones to be placed in a locker before anyone enters a data secure area. Each room can only be accessed by a personal code, often using the last four digits of the employee\u2019s Social Security number.<\/span><\/p>\n<p><span style=\"font-weight:400;\">Adobe Acrobat was once considered an effective, secure file exchange solution for firms when sending encrypted PDF files as email attachments. However, Richardson does not agree and encourages other various methods of secure file exchange. Richardson uses Citrix ShareFile.<\/span><\/p>\n<p><span style=\"font-weight:400;\">While no human security effort is going to be completely foolproof, accountants should understand the ins and outs of security in the cloud. A reliable cloud server operation will maintain 24\/7\/365 security staff on site, as well as redundancy of all data and data center systems.<\/span><\/p>\n<p><b>Security Levels<\/b><span style=\"font-weight:400;\"> Since data security seems to be the catch-all phrase for IT solutions, it\u2019s wise to determine the actual level of security among cloud computing companies. In many instances, security is little more than what is referred to as \u201cwindow dressing\u201d security. This happens when a company expresses some assessment as if it means more than it does. For example, the SSAE 16 process performed by CPAs is not a measure of data security or an audit, but rather, a test of financial controls, according to the AICPA. Financial controls are required when working on behalf of banks, but the SSAE 16 review is often perceived as a data security audit. The AICPA realizes that it is being misinterpreted, but according to Erin Mackler, CPA, AICPA\u2019s senior technical manager, Business Reporting Assurance &amp; Advisory Services, \u201cWe are not a policing organization.\u201d<\/span><\/p>\n<p><span style=\"font-weight:400;\">Cloud computing companies may state that a firm has performed SSAE 16 procedures to measure financial controls and then claim they are \u201cSSAE 16 certified,\u201d but this is an overstatement. There is no certification process. Even more ridiculous, but in wide use, is the claim of being SAS 70 certified. SAS 70 was replaced by SSAE 16 in 2013. It was also not a certification, audit or a data security assessment.<\/span><\/p>\n<p><span style=\"font-weight:400;\">The alphabet soup of acronyms for versions of data security is growing, and not one provides absolute data security because perfect security does not exist. Whether it is PCI DSS, GLB, HIPAA\/HITECH, FISMA or ISO 27002, they each represent a limited scope review of data security controls. After all, if FISMA (Federal Information Security Management Act), the government standard for data security, worked perfectly, NSA security breaches would not exist.<\/span><\/p>\n<p><span style=\"font-weight:400;\">Accountants should know more about cloud security, not just for themselves, but also to pass on the knowledge (if qualified) to their clients. Since every risk can\u2019t be completely eliminated in any environment, it is vital to ensure data security for your firm and anyone who wants to compute for you in the cloud.<\/span><\/p>\n<p><span style=\"font-weight:400;\">Rather than be embarrassed by a data breach, determine if your firm can pass these 19 data security standards. These standards were derived from the baseline level of cybersecurity controls, described in the Cybersecurity Framework and promulgated by the National Institute of Standards and Technology, to help financial institutions identify their risks and determine their cybersecurity maturity:<\/span><\/p>\n<p><b>DATA SECURITY<\/b><span style=\"font-weight:400;\"> 1. Access to the company\u2019s computer network is protected by firewalls.<\/span><\/p>\n<ol start=\"2\">\n<li><span style=\"font-weight:400;\"> Workstation access is specific to each staff member, controlled through passwords and governed through centralized policies controlled through the server.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> No workstation with email access can attach files without password authentication.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> There are no floppy, CD, DVD drives or USB ports on computers.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> FTP access used for file transfers between clients and servers is only available to a select few with automated-logs of activities. Public chat messengers are not allowed on any computers and none of the user machines can download and install any software.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Access to printer, photocopier and fax is also controlled through unique IDs.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Access to required websites is permitted only on a need basis and a log is maintained and reviewed. By default, all websites are blocked and users have to make a specific request, authorized by the managers, to the IT administrator to permit access to any specific website. Management periodically reviews the list of authorized websites.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Screenshots of each computer are logged at periodic intervals and reviewed.<\/span><\/li>\n<\/ol>\n<p><b>PHYSICAL SECURITY<\/b><\/p>\n<ol start=\"9\">\n<li><span style=\"font-weight:400;\"> The processing office premise requires general access security at the entrance. The office premises have separate electronically controlled access to the main office and additional access control for operations areas.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Intrusion detectors are used during off hours.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Direct, automated link to a 24\/7 security service provider who monitors the office. Specified management members get calls if the office is opened or closed at times not pre-defined as office hours.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Closed circuit TV cameras throughout the premises are monitored by management.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Invisible alarms will activate for emergencies.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Personal mobile phones are not allowed to be carried into operations area.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Lockers are used by staff to keep their cell phones and electronic devices.<\/span><\/li>\n<\/ol>\n<p><b>LEGAL SECURITY<\/b><\/p>\n<ol start=\"16\">\n<li><span style=\"font-weight:400;\"> Non-disclosure and confidentiality agreements are signed by each employee.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> A \u201cComputer use policy\u201d is signed by each employee to enable taking legal action in case of a breach.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Explain to staff that the safety, security and confidentiality of client data are of paramount importance. Top management has utilities by which it can view the monitor of any computer from their own desktop. Explain clearly to all employees that it is the right of the company to do so and the company computers may be accessed randomly without any prior notice to any employee.<\/span><\/li>\n<li><span style=\"font-weight:400;\"> Data security includes compliance, reputation, and liability risk. It must work with popular applications, file storage, devices, cloud, and content management systems across all communication channels: trusted, untrusted, private or public.<\/span><\/li>\n<\/ol>\n<p><b>Data Encryption<\/b><span style=\"font-weight:400;\"> If nothing else, at least use email and file access encryption with the ability to remotely delete files. Encryption is a means to not allow unauthorized people to see data they shouldn\u2019t see. When a user accesses the cloud, standard security log on requirements are in play. This is especially true in the accounting office, where an accounting professional has to access a customer\u2019s financial files.<\/span><\/p>\n<p><span style=\"font-weight:400;\">Richardson noted that secure file systems \u201cwere once out of the realm of smaller firms, but now, affordable systems like Citrix ShareFile are available. Accountants should stay away from recommending data security to clients, unless they use and become well-versed on its use.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ever since the IRS experienced its own electronic security breach in May, many accountants have become all the more conscious of the inherent problem of protecting Social Security numbers in their offices. A reported 104,000 tax returns were allegedly taken by Russian hackers using the \u201cGet Transcript\u201d function, causing the IRS to temporarily shut down<\/p>\n","protected":false},"author":107201845,"featured_media":10762,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rkv_browse_by_id":0,"rkv_cta_id":0,"rkv_optimize_for_pagespeed":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"useModifiedDate":false,"customPublishDate":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false},"categories":[561584],"tags":[130072316],"intuit_collection":[],"intuit_series":[],"coauthors":[509474198],"class_list":["post-526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-client-relationships","tag-fraud-and-security"],"header_image":"","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Client Data From ID Theft in a Tax Practice - Tax Pro Center | Intuit<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/accountants.intuit.com\/taxprocenter\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Client Data From ID Theft in a Tax Practice - Tax Pro Center | Intuit\" \/>\n<meta property=\"og:description\" content=\"Ever since the IRS experienced its own electronic security breach in May, many accountants have become all the more conscious of the inherent problem of protecting Social Security numbers in their offices. A reported 104,000 tax returns were allegedly taken by Russian hackers using the \u201cGet Transcript\u201d function, causing the IRS to temporarily shut down\" \/>\n<meta property=\"og:url\" content=\"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/\" \/>\n<meta property=\"og:site_name\" content=\"Tax Pro Center | Intuit\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IntuitAccountants\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-17T22:36:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-17T22:39:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"655\" \/>\n\t<meta property=\"og:image:height\" content=\"364\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"T. Steel Rose, CPA, CPA Magazine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntuitAccts\" \/>\n<meta name=\"twitter:site\" content=\"@IntuitAccts\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"T. Steel Rose, CPA, CPA Magazine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/\"},\"author\":{\"name\":\"T. Steel Rose, CPA, CPA Magazine\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#\\\/schema\\\/person\\\/8de048a10aeb1a412a0f2454f2d7281f\"},\"headline\":\"Securing Client Data From ID Theft in a Tax Practice\",\"datePublished\":\"2015-08-17T22:36:43+00:00\",\"dateModified\":\"2017-10-17T22:39:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/\"},\"wordCount\":1485,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/fraud-and-security-e1535552252328.jpg\",\"keywords\":[\"fraud and security\"],\"articleSection\":[\"Client Relationships\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/\",\"url\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/\",\"name\":\"Securing Client Data From ID Theft in a Tax Practice - Tax Pro Center | Intuit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/fraud-and-security-e1535552252328.jpg\",\"datePublished\":\"2015-08-17T22:36:43+00:00\",\"dateModified\":\"2017-10-17T22:39:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/fraud-and-security-e1535552252328.jpg\",\"contentUrl\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/fraud-and-security-e1535552252328.jpg\",\"width\":655,\"height\":364,\"caption\":\"Hand silhouette working on a laptop keyboard\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/client-relationships\\\/securing-client-data-from-id-theft-in-an-accounting-firm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Client Data From ID Theft in a Tax Practice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#website\",\"url\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/\",\"name\":\"Tax Pro Center | Intuit\",\"description\":\"Tax Pro Center\",\"publisher\":{\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#organization\",\"name\":\"Tax Pro Center | Intuit\",\"url\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Tax_Pro_Center_Logo_Final_large.webp\",\"contentUrl\":\"https:\\\/\\\/taxprocenter.proconnect.intuit.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Tax_Pro_Center_Logo_Final_large.webp\",\"width\":872,\"height\":160,\"caption\":\"Tax Pro Center | Intuit\"},\"image\":{\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/IntuitAccountants\",\"https:\\\/\\\/x.com\\\/IntuitAccts\",\"https:\\\/\\\/www.instagram.com\\\/intuitaccountants\\\/?hl=en\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/intuit-accountants\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/#\\\/schema\\\/person\\\/8de048a10aeb1a412a0f2454f2d7281f\",\"name\":\"T. Steel Rose, CPA, CPA Magazine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8493a5cc896813773273800587ea5204e9e35a25778bbba1b28b9bf4944515de?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8493a5cc896813773273800587ea5204e9e35a25778bbba1b28b9bf4944515de?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8493a5cc896813773273800587ea5204e9e35a25778bbba1b28b9bf4944515de?s=96&d=identicon&r=g\",\"caption\":\"T. Steel Rose, CPA, CPA Magazine\"},\"description\":\"T. Steel Rose, CPA, is editor of CPA Magazine.\",\"url\":\"https:\\\/\\\/accountants.intuit.com\\\/taxprocenter\\\/author\\\/taxpro58\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Client Data From ID Theft in a Tax Practice - Tax Pro Center | Intuit","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/accountants.intuit.com\/taxprocenter\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/","og_locale":"en_US","og_type":"article","og_title":"Securing Client Data From ID Theft in a Tax Practice - Tax Pro Center | Intuit","og_description":"Ever since the IRS experienced its own electronic security breach in May, many accountants have become all the more conscious of the inherent problem of protecting Social Security numbers in their offices. A reported 104,000 tax returns were allegedly taken by Russian hackers using the \u201cGet Transcript\u201d function, causing the IRS to temporarily shut down","og_url":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/","og_site_name":"Tax Pro Center | Intuit","article_publisher":"https:\/\/www.facebook.com\/IntuitAccountants","article_published_time":"2015-08-17T22:36:43+00:00","article_modified_time":"2017-10-17T22:39:41+00:00","og_image":[{"width":655,"height":364,"url":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg","type":"image\/jpeg"}],"author":"T. Steel Rose, CPA, CPA Magazine","twitter_card":"summary_large_image","twitter_creator":"@IntuitAccts","twitter_site":"@IntuitAccts","twitter_misc":{"Written by":"T. Steel Rose, CPA, CPA Magazine","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/#article","isPartOf":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/"},"author":{"name":"T. Steel Rose, CPA, CPA Magazine","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#\/schema\/person\/8de048a10aeb1a412a0f2454f2d7281f"},"headline":"Securing Client Data From ID Theft in a Tax Practice","datePublished":"2015-08-17T22:36:43+00:00","dateModified":"2017-10-17T22:39:41+00:00","mainEntityOfPage":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/"},"wordCount":1485,"commentCount":0,"publisher":{"@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#organization"},"image":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/#primaryimage"},"thumbnailUrl":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg","keywords":["fraud and security"],"articleSection":["Client Relationships"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/","url":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/","name":"Securing Client Data From ID Theft in a Tax Practice - Tax Pro Center | Intuit","isPartOf":{"@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#website"},"primaryImageOfPage":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/#primaryimage"},"image":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/#primaryimage"},"thumbnailUrl":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg","datePublished":"2015-08-17T22:36:43+00:00","dateModified":"2017-10-17T22:39:41+00:00","breadcrumb":{"@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/#primaryimage","url":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg","contentUrl":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg","width":655,"height":364,"caption":"Hand silhouette working on a laptop keyboard"},{"@type":"BreadcrumbList","@id":"https:\/\/taxprocenter.proconnect.intuit.com\/client-relationships\/securing-client-data-from-id-theft-in-an-accounting-firm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/taxprocenter.proconnect.intuit.com\/"},{"@type":"ListItem","position":2,"name":"Securing Client Data From ID Theft in a Tax Practice"}]},{"@type":"WebSite","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#website","url":"https:\/\/accountants.intuit.com\/taxprocenter\/","name":"Tax Pro Center | Intuit","description":"Tax Pro Center","publisher":{"@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/accountants.intuit.com\/taxprocenter\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#organization","name":"Tax Pro Center | Intuit","url":"https:\/\/accountants.intuit.com\/taxprocenter\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#\/schema\/logo\/image\/","url":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2022\/10\/Tax_Pro_Center_Logo_Final_large.webp","contentUrl":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2022\/10\/Tax_Pro_Center_Logo_Final_large.webp","width":872,"height":160,"caption":"Tax Pro Center | Intuit"},"image":{"@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IntuitAccountants","https:\/\/x.com\/IntuitAccts","https:\/\/www.instagram.com\/intuitaccountants\/?hl=en","https:\/\/www.linkedin.com\/company\/intuit-accountants\/"]},{"@type":"Person","@id":"https:\/\/accountants.intuit.com\/taxprocenter\/#\/schema\/person\/8de048a10aeb1a412a0f2454f2d7281f","name":"T. Steel Rose, CPA, CPA Magazine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8493a5cc896813773273800587ea5204e9e35a25778bbba1b28b9bf4944515de?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8493a5cc896813773273800587ea5204e9e35a25778bbba1b28b9bf4944515de?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8493a5cc896813773273800587ea5204e9e35a25778bbba1b28b9bf4944515de?s=96&d=identicon&r=g","caption":"T. Steel Rose, CPA, CPA Magazine"},"description":"T. Steel Rose, CPA, is editor of CPA Magazine.","url":"https:\/\/accountants.intuit.com\/taxprocenter\/author\/taxpro58\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg","jetpack_shortlink":"https:\/\/wp.me\/pazjGh-8u","jetpack-related-posts":[{"id":12773,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/tax-law-and-news\/irs-warns-tax-pros-of-new-scam-posing-as-professional-associations\/","url_meta":{"origin":526,"position":0},"title":"IRS Warns Tax Pros of New Scam Posing as Professional Associations","author":"Intuit Accountants Team","date":"May 31, 2018","format":false,"excerpt":"Find out more about a new IRS scam involving sending phishing emails posing as professional associations to tax pros.","rel":"","context":"In &quot;Tax Law and News&quot;","block_context":{"text":"Tax Law and News","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/tax-law-and-news\/"},"img":{"alt_text":"ID theft","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2016\/09\/idtheft-e1508457156188.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":22487,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/practice-management\/how-the-irs-protects-taxpayers-from-tax-related-identity-theft\/","url_meta":{"origin":526,"position":1},"title":"How the IRS protects taxpayers from tax-related identity theft","author":"Intuit Accountants Team","date":"March 5, 2021","format":false,"excerpt":"Help protect your firm and clients with current information about security and fraud.","rel":"","context":"In &quot;Practice Management&quot;","block_context":{"text":"Practice Management","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/practice-management\/"},"img":{"alt_text":"Security","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2021\/02\/Security.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2021\/02\/Security.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2021\/02\/Security.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2021\/02\/Security.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":17403,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/tax-law-and-news\/protect-client-data-with-the-irs-taxes-security-together-checklist\/","url_meta":{"origin":526,"position":2},"title":"Protect Client Data With the IRS Taxes-Security-Together Checklist","author":"Intuit Accountants Team","date":"August 28, 2019","format":false,"excerpt":"Get a checklist distributed by the IRS to help protect your tax firm's data, as well as your clients' sensitive information.","rel":"","context":"In &quot;Tax Law and News&quot;","block_context":{"text":"Tax Law and News","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/tax-law-and-news\/"},"img":{"alt_text":"Tax fraud","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2015\/08\/fraud-and-security-e1535552252328.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":5435,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/tax-law-and-news\/irs-security-summit-partners-announce-national-tax-security-awareness-week-beginning-dec-5-2016\/","url_meta":{"origin":526,"position":3},"title":"IRS, Security Summit Partners Announce \u201cNational Tax Security Awareness Week\u201d Beginning Dec. 5, 2016","author":"Intuit Accountants Team","date":"December 6, 2016","format":false,"excerpt":"The IRS and its Security Summit partners announced the start of \u201cNational Tax Security Awareness Week.\u201d As part of the Security Summit effort, the IRS, the states and the tax community will share a variety of information throughout the week to educate taxpayers on steps they should take to protect\u2026","rel":"","context":"In &quot;Tax Law and News&quot;","block_context":{"text":"Tax Law and News","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/tax-law-and-news\/"},"img":{"alt_text":"identity theft and fraud","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2016\/02\/identity-theft-fraud-security-e1535552558136.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2016\/02\/identity-theft-fraud-security-e1535552558136.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2016\/02\/identity-theft-fraud-security-e1535552558136.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":9464,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/proconnect\/above-the-forms-enhanced-security-efforts-benefit-accountants-and-clients\/","url_meta":{"origin":526,"position":4},"title":"Above the Forms: Enhanced Security Efforts Benefit Accountants and Clients","author":"CeCe Morken","date":"August 10, 2017","format":false,"excerpt":"You play a critical role in the ongoing industry-wide battle against tax fraud. That\u2019s why I was so honored to represent Intuit\u00ae and our customers at the IRS Security Summit press conference on July 25. At the conference, we heard the latest from IRS Commissioner John Koskinen about the contributions\u2026","rel":"","context":"In &quot;Intuit\u00ae Accountants News&quot;","block_context":{"text":"Intuit\u00ae Accountants News","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/proconnect\/"},"img":{"alt_text":"Security for tax professionals","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/10\/security1-e1535552671928.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/10\/security1-e1535552671928.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/10\/security1-e1535552671928.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":6469,"url":"https:\/\/accountants.intuit.com\/taxprocenter\/client-relationships\/make-your-clients-aware-w-2-email-scam-resurfaces\/","url_meta":{"origin":526,"position":5},"title":"Make Your Clients Aware: W-2 Email Scam Resurfaces","author":"Intuit Accountants Team","date":"January 30, 2017","format":false,"excerpt":"The W-2 email scam that threatened the nation last year has resurfaced, according to the IRS. Just last year, cybercriminals posed as corporate officers to lure payroll and human resource staff into providing them with employee names, Social Security numbers (SSNs) and income information, which they would then use to\u2026","rel":"","context":"In &quot;Client Relationships&quot;","block_context":{"text":"Client Relationships","link":"https:\/\/accountants.intuit.com\/taxprocenter\/category\/client-relationships\/"},"img":{"alt_text":"identity theft and fraud","src":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/08\/identity-theft-fraud-e1535552551114.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/08\/identity-theft-fraud-e1535552551114.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/taxprocenter.proconnect.intuit.com\/wp-content\/uploads\/2017\/08\/identity-theft-fraud-e1535552551114.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/posts\/526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/users\/107201845"}],"replies":[{"embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/comments?post=526"}],"version-history":[{"count":4,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/posts\/526\/revisions"}],"predecessor-version":[{"id":10763,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/posts\/526\/revisions\/10763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/media\/10762"}],"wp:attachment":[{"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/media?parent=526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/categories?post=526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/tags?post=526"},{"taxonomy":"intuit_collection","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/intuit_collection?post=526"},{"taxonomy":"intuit_series","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/intuit_series?post=526"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/accountants.intuit.com\/taxprocenter\/wp-json\/wp\/v2\/coauthors?post=526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}