IRS Publication 1075

To foster a tax system based on voluntary compliance, the public must maintain a high degree of confidence that the personal and financial information maintained by the Internal Revenue Service (IRS) is protected against unauthorized use, inspection, or disclosure. IRS Publication 1075 provides guidance to ensure the policies, practices, controls, and safeguards employed by recipient agencies, agents, or contractors adequately protect the confidentiality of Federal Tax Information (FTI). FTI is defined by the IRS as any return or return information received from the IRS or secondary source (e.g. Social Security Association).

Publication 1075, Tax Information Security Guidelines for Federal, State and Local Agencies and Entities provide very detailed audit requirements. Publication 1075 documents the managerial, operational, and technical security controls that must be implemented as a condition of receipt of FTI. IRS has mapped the IRS Publication 1075 control requirements to the National Institute of Standards and Technology (NIST) control requirements (NIST SP 800-53). IRS Publication 1075 has the following key Sections:

  • Section 1.0, Introduction
  • Section 2.0, Federal Tax Information and Reviews
  • Section 3.0, Record Keeping Requirement
  • Section 4.0, Secure Storage
  • Section 5.0, Restricting Access
  • Section 6.0, Other Safeguards
  • Section 7.0, Reporting Requirements
  • Section 8.0, Disposing of FTI
  • Section 9.0, Computer System Security

Schneider Downs specializes in the implementation and ongoing support of IRS Publication 1075 programs that align with this IRS publication. We apply a risk-based, top-down approach that drives both efficiency and effectiveness into the programs.

Detailed Approach to IRS Publication 1075

Schneider Downs dedicated IT, financial and operational audit professionals have experience working with a wide variety of industries of all sizes. We partner with you to assist your company in complying with the IRS Publication 1075 requirements.

case studies

 
big problem:
Ransomware attack halted a global manufacturer's operations.
big thinking:
Recover and secure the system – fast – save $1 million in ransom.
 
big problem:
High tax burden for family-owned franchisor.
big thinking:
Comprehensive planning for a 15% tax reduction.

our thoughts on

The Wolf, the Goat and the Kid: An Unexpected Tale of Invoice Redirection Fraud

In the 1668 La Fontaine fable "The Wolf, the Goat, and the Kid", a mother goat leaves home in search of food, warning her daughter about the

read more >

#1 Mobile App Garners Concerns Over Data Privacy

If you haven't already downloaded FaceApp, you have probably either heard of it or witnessed your Facebook turn from an office party to a nursing home

read more >

Can RPAs Help Higher Education?

Higher education remains one of the most heavily regulated areas of commerce. As a result, the volume of administrative burden can be significant, and

read more >

The Privacy of Consumer Banking Data and the Financial Data Exchange

As cyber threats and global regulations continue to intensify, the privacy and protection of consumer banking data remains a high priority of the financial

read more >

ACFE releases Anti-Fraud Technology Benchmarking Report

With the advancement of technology over the years, the avenues for fraud perpetration, protection and detection have multiplied. In an effort to gain a

read more >

Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us

contact us

Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

contactsd@schneiderdowns.com
p:412.261.3644     f:412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

contactsd@schneiderdowns.com
p:614.621.4060     f:614.621.4062

Map of Washington Office
Washington, D.C.

1660 International Drive, Suite 600
McLean, VA 22102