Self-Study
2
Basic
Taxes
There are no prerequisites

Course Description

The annual global cost of cybercrime is high and getting higher all the time. In fact, cyber criminals reap a windfall from their activities that is estimated to have been $450 billion in 2015 and is anticipated to climb to an annual $6 trillion average by 2021. Almost all of that cybercrime began with--and continues to start with--a social engineering concept known as 'phishing.”

Certain business organizations, among which are those referred to as 'financial institutions,” are charged by the FTC with taking particular steps to protect their customers' financial information. Included in the category of financial institutions are professional tax preparers. Professional tax preparers normally maintain a significant amount of taxpayer information in various files--electronic and paper--that would be a treasure trove for cyber criminals. 

In this course, tax preparers are introduced to the problem of cybercrime and its costs, offered methods that can be expected to reduce the chances of becoming a cybercrime victim, and informed of proper steps to take if they do become victims of cybercrime. Accordingly, it will examine cybercrime and will discuss:

  • The extent of the cybercrime problem;
  • The potential costs to a tax preparer whose taxpayer data has been breached;
  • The best practices a tax preparer may implement to avoid becoming a cybercrime victim; and
  • What a tax preparer should do if its taxpayer data has been breached.



Instructor

Paul Winn

Paul Winn CLU ChFC is a writer with more than 30 years experience in the life insurance and securities industry as an agent/registered representative, an agency head, a marketing vice president for a life insurance company and the president of a corporate registered investment adviser. He was a long serving member of the advisory board to the New York State insurance department. He is a published book author and creator of more than 200 taxation, insurance and securities training courses.



Course Specifics

Taxes
Feb 6, 2020
There are no prerequisites
SS8202646
74
None


Compliance Information

103220
IRS Provider #: 0MYXB
IRS Course ID: 0MYXB-T-01486-20-S
IRS Federal Tax Law Credits: 2
CTEC Provider #: 2071
CTEC Course ID: 2071-CE-1382
CTEC Federal Tax Law Credits: 2
Qualifies for CA Fraud: No


Learning Objectives

Upon successful completion of this course, participants will be able to:

Chapter 1

  • Identify the source of the most frequent type of malicious access to a firm's taxpayer information;
  • List the most common types of cyber attack;
  • Describe how a denial-of-service attack operates to impede business operations; and
  • Recognize the dangers of Trojan horses.

Chapter 2
  • List the principal federal laws and regulations governing the security of taxpayer information;
  • Understand the objectives and requirements of the Safeguards Rule;
  • Identify the notification requirements imposed by the Financial Privacy Rule; and
  • Distinguish between a customer and a consumer under FTC regulations.
Chapter 3
  • List the principal causes of a data breach involving customer records;
  • Identify the investigation and remediation activities normally undertaken by an organization following a data breach involving customer information;
  • Recognize the average costs of a data breach in the United States; and
  • Understand the probability of a business experiencing a data breach within the next 24 months
Chapter 4
  • Recognize the function of a firm's Information Security Plan;
  • List the principal sections of an Information Security Plan;
  • Identify the role of an Information Security Plan's physical security procedures; and
  • Describe the elements comprising a firm's information and computer system.
Chapter 5
  • List the data use and retention areas generally vulnerable to unauthorized access of taxpayer information; and
  • Identify best practices for securing taxpayer information.
Chapter 6
  • Identify the steps that should be taken by a business to stop or limit additional data loss if a data breach has occurred involving its clients;
  • Recognize the need for a comprehensive communications plan; 
  • List the entities that should be notified in the event of a data breach; and
  • Identify the additional protections that may be recommended if a data breach involves the compromise of clients' Social Security numbers.




Choose Your Preferred Format


Online Access

Get immediate access to a robust collection of learning and reference materials, allowing you to dive deep into the information you need. Our self-study materials are authored by top-quality, industry experts who focus on helping you grasp concepts quickly using real-life examples. Download your CPE to any device, and take it with you so you can learn when and wherever you want. Complete your CPE with an online exam, and enjoy instant grading with the option to print your certificate immediately upon passing.

online access
Hard Copy

Our self-study materials are authored by top-quality, industry experts. You’ll receive a bound notebook of all the course materials, shipped to you within one business day. In addition, you’ll also have full online access. Each self-study package includes a robust collection of learning and reference materials to help you cover the information efficiently and put it into practice immediately.

hard copy
Self-Study Video

Experience high-quality instruction with our Self-Study Videos, available to you 24/7. With more than 80+ videos currently in the Western CPE Self-Study Video library, you can see and hear our expert instructors deliver the information you need in a dynamic way that allows you to immediately apply your learning. Unlike a live course or webcast, you can complete the course on your own time, playing and pausing as needed. Self-Study Videos allow you to complete your CPE requirements on your own time.

hard copy


Back to top