10 Tips To Protect From Identity Theft During Tax Season

ID Analytics offers consumers 10 tax time tips to protect their personal information from identity thieves. Tax season is quickly approaching and many Americans have already begun receiving W-2's and official forms that contain sensitive financial information, including income details, Social Security numbers and bank account numbers.

And with new data from Javelin Strategy & Research showing 4.8 percent of Americans became fraud victims in 2009 -- a projected total of $54 billion in crime--consumers should understand their risk and be proactive about managing their finances this tax season and beyond.

As taxpayers begin to organize their financial documents, prepare tax returns and apply for refunds, Thomas Oscherwitz, chief privacy officer for ID Analytics, Inc. and former U.S. Senate Legislative expert on identity fraud, offers the following precautions to safeguard their identity and assets this tax season.

1. Monitor your mailbox. Keep a lookout for official tax forms, like 1099's and W-2's. Missing or lost documents could be a sign of identity theft and should be investigated immediately.

2. Protect your sensitive tax documents. During tax time, many of the forms consumers handle have sensitive information of immense value to identity thieves. Keep your tax documents in a safe, secure place that is out of public view.

3. Beware of scams. Tax time is a prime time for fraudsters to target consumers with phony emails asking for their personal information. Remember that the Internal Revenue Service (IRS) does not initiate communication with taxpayers through e-mail.

4. Track IRS communications carefully. If you receive an unusual notification from the IRS, such as a report of wages from an employer you do not know, be alert to possible identity theft.

5. Review your personal information for misuse. For the 97.5 million Americans expected to file electronically this year, take a few minutes to visit www.MyIDScore.com while online to check your risk of identity theft. MyIDScore.com is a free online service that gives consumers immediate insight into whether their personal identifiable information is being used fraudulently to obtain assets, goods or services.

6. Examine your credit report. Tax season is also a good time to get your free annual credit report from www.annualcreditreport.com. The report is provided by the three national credit bureaus and you can request your report from each bureau once a year.

7. Check your annual income statement from the Social Security Administration. A fraudster can steal your SSN and use it to get a job. The fraudster's employer would then report the fraudster's wages under your SSN to the IRS. Check for any discrepancies between the income reported and the wages you received. In addition, be aware that the IRS may then think you have not reported all of your income on your tax return.

8. Pay attention to duplicate returns. If someone steals your identity, they could file a tax return first using your SSN. Then when you file your return, the IRS will think you have already received a refund or that you have filed a second copy or duplicate return. This confusion will cause delays in receiving your refund.

9. Contact the IRS if you are victim. The IRS now has a toll-free number to assist identity theft victims. They will mark affected accounts to resolve identity theft issues more quickly. The phone number for the IRS Identity Protection Specialized Unit is 1(800) 908-4490.

10. Prepare for next year. Begin planning ahead for 2011 by creating a file to organize receipts, official forms and documents on an ongoing basis for peace-of-mind and easy access to reference your important information in the future.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3