More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

More Than Half of the Consumers Believe the IRS is Responsible for Preventing Tax Identity Theft

As tax identity theft impacts more and more consumers, a new survey from TrustedID, a comprehensive, identity protection and privacy service, indicated that more than half of consumers believe that the IRS is 100% responsible for ensuring that no one can file a return in their name and claim their tax refund.

According to the United States House Committee on Oversight & Government Reform, over 1.1 million tax returns were filed by identity thieves for the 2011 processing year, up more than 21 times from just 51,700 fraudulent returns in 2008. In addition, the Treasury Inspector General for Tax Administration believes that tax identity theft could cost the IRS approximately $21 billion in fraudulent returns in the next five years.

This fast-growing problem has created new challenges that will require the IRS to confront the latest opportunity for identity thieves: stealing tax refunds. National Taxpayer Advocate, Nina Olson, recently reviewed this growing problem, citing internal organizational as well as procedural issues and finding that the IRS has been ineffective in assisting tax identity theft victims. While the IRS is under fire, over 50% of consumers still believe that the IRS is trustworthy when it comes to protecting their social security number and other private information.

"Tax time is among the most vulnerable for consumers, with all of their most valuable personal information being compiled and shared," said Scott Mitic, CEO of TrustedID. "The IRS must find a way to protect consumers from falling victim to this growing threat and work to develop a swift resolution for victims. Additionally, while the IRS has some trust with consumers, the growing number of tax identity theft cases creates a serious and growing gap between perception and reality."

The TrustedID survey also found that more than half of the consumers surveyed were unaware of and confused about what tax identity theft is, and two-thirds of consumers did not have a good understanding of tax identity theft.

"Tax identity theft is a big problem that has grown exponentially over the course of a few short years. The IRS has an obligation to increase awareness of this threat and consumers need to familiarize themselves with the issue and how to protect themselves, especially since effective assistance might not be available, once their identity has been compromised," added Mitic.

To help proactively safeguard information during tax season, TrustedID offers the following tips:

  • Monitor your tax documents closely. Make a list of everyone who pays you, including employers, banks and brokerages. Make sure you receive hard copies in the mail of what they send to the IRS.
  • Beware of IRS-related scams. If you receive an email or phone call asking for your personal or financial information, delete it or send it to the FTC at spam@uce.gov for investigation. The IRS will never email taxpayers about issues related to their accounts or ask for your social security number or financial details over the phone. If you have any doubt whether a contact from the IRS is authentic, call them directly to confirm it.
  • Review carefully, if filing with a third party. When using software, a CPA or national tax agency to prepare your taxes, ensure you are reviewing all the information carefully and that all the original paperwork is returned to you.
  • Be diligent, if e-filing. With e-filing, evidence of fraud is difficult to find—there are no signed tax forms, envelopes, or fingerprints. It's easy for criminals to e-file using a real name, social security number and a phony W-2 or Schedule C. If you're filing your taxes online, be sure to use updated firewall, antivirus, and spyware software.
  • Take precautions, if mailing your filing. If filing by mail, walk the envelope inside the post office and hand it to an employee. Too much mail is stolen out of the USPS and driveway mailboxes. Send your return by certified mail because this alerts each mail carrier that the document needs extra protection. Plus, you will know when it arrives safely.

Methodology

This survey was completed between February 5 -10, 2013 by 1,278 individuals, 25 years old and older, across the country, using Survey Monkey's Targeted Audience. Participants had no affiliation with TrustedID. Key questions included whether or not respondents had heard of tax identity theft (Yes or No); to what extent they agreed that the IRS is 100% responsible for ensuring no one can file a return in their name and claim their refund (Totally Agree, Mostly Agree, Neutral, Somewhat Disagree, Totally Disagree); and how trustworthy the IRS is related to protecting social security numbers and personal information (Extremely Trustworthy, Very Trustworthy, Somewhat Trustworthy, Minimally Trustworthy, Not At All Trustworthy).

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3