Unpacking the §45Z Clean Fuel Production Credit
Because of tax credits created by the Inflation Reduction Act (IRA) for clean fuel production, some farmers may in the near future receive a higher price for selling crops to renewable fuel…
September 23rd, 2024
The requirement for tax preparation firms to have a written information security plan, or WISP, is not new. The requirement arose from the Graham-Leach-Bliley Act (GLBA), enacted 25 years ago. The GLBA assigned enforcement responsibility to the Federal Trade Commission (FTC). In the intervening years, we’ve seen big improvements in computer security, but sadly, also more attempts by criminals to steal taxpayers’ personally identifiable information (PII).
The GLBA designated tax professionals as financial institutions. It gave the same responsibilities to small tax practices as to large banks, although banks realistically have much more complex security needs.
In August, the IRS released an update to Publication 5708, Creating a Written Information Security Plan for your Tax & Accounting Practice. In News Release IR-24-208, the IRS notified tax professionals of two significant changes.
With the new 2024 WISP, MFA is required for access as defined by 15 USC § 6805 and 16 CFR §314.4(c.5). This regulation requires MFA for anyone accessing any information system. An exception is allowed only if a tax practice’s data security coordinator signs a written exception. This exception must be based on the firm providing an equivalent security access control.
In contrast, the 2022 WISP required 2-factor authentication (2FA) only for remote access.
An MFA is a security system that requires at least one additional factor to authenticate a user’s identity and grant them access to a security system. In addition to their password, the user may be required to enter one of the following.
A 2FA system is a type of MFA. More than two factors can provide additional security, which entails additional costs. And the costs extend beyond the authentication itself, as each authentication system brings its own costs for its management and maintenance. For example, if a user leaves their authentication device at home, a system administrator may need to arrange temporary access.
Tax practices have several alternatives for satisfying the MFA requirement. If they use Microsoft Windows, tax practitioners can implement smartphone authenticator applications to provide security codes that permit computer access. Alternatively, they can implement an MFA security key to regulate access to a computer. These security keys interact with a tax practitioner’s computer through one of the computer’s USB ports. Security keys can also use this standard if the computer has near-field communication (NFC) capability, as many smartphones do.
Although these practices may require some planning to implement, they make it much harder for hackers to infiltrate a small tax practice’s systems.
Although the previous version of Pub. 5708 mentioned 2FA as a requirement for remote communication, tax practitioners should take it seriously now if they haven’t yet. It can significantly lessen the worry of a tax practice’s systems being hacked, and it is worth the sleep it saves. The new WISP cites a federal regulation as the authority that requires tax professionals to implement MFA.
Security events are what MFA is intended to prevent: a hacker compromising a tax practice’s client information. The new WISP includes security events as a minor change in terms. More importantly, though, a security event now must be reported to the FTC if 500 or more people are affected because their information was acquired. Just being able to access an encryption key is enough to presume that customer data has been unencrypted. The FTC need not prove that the hostile actor has acquired the data. Instead, a security event is presumed unless a tax practitioner can prove that the customer data could not reasonably have been acquired.
If anyone associated with the tax practice learns that a security event occurred, the tax practice’s DSC must notify the FTC within 30 days. This requirement includes outside agents or employees who may discover an unauthorized person has acquired unencrypted customer information. Thus, all employees and vendors should be required to notify the tax practice’s principals immediately if they discover the theft of data or the compromise of an encryption key.
The 2024 WISP continues to require tax practitioners to notify the following agencies and groups.
The previous version of Publication 5708, issued in 2022, required “reportable events” to be reported to the IRS stakeholder liaison and the FTC if 500 or more people were affected. The 2024 WISP incorporated more specific language in the FTC Safeguards Rule. The language introduced the presumption of unauthorized customer data access even if only an encryption key has been compromised.
A cursory look at the new document provided one additional surprise. The previous version of the WISP required password changes every 90 days. The latest version requires changes every at least 365 days. However, it makes sense to change passwords more often than that.
These requirements aren’t just about interacting with federal agencies but also about interacting with insurance companies, which may require a copy of a tax practice’s WISP as a condition of offering insurance. Unsurprisingly, complying with these requirements drives up the cost of preparing tax returns. The cost to maintain the system may not directly affect the costs a tax practice incurs to prepare a tax return. Nevertheless, tax practices must incur these indirect costs as they are dramatically less than the indirect costs of a data breach, which could threaten a firm’s survival.
By John W. Richmann, EA, MBA
Tax Materials Specialist, U of I Tax School
Sources
Disclaimer: The information referenced in Tax School’s blog is accurate at the date of publication. You may contact taxschool@illinois.edu if you have more up-to-date, supported information and we will create an addendum.
University of Illinois Tax School is not responsible for any errors or omissions, or for the results obtained from the use of this information. All information in this site is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information. This blog and the information contained herein does not constitute tax client advice.
Join 2,200 of your colleagues and get notified each time a new post is added.