Form 1075 Tax Information Security Guidelines for Federal, State,

Tax Information Security Guidelines for Federal, State, and Local Agencies

Pub 1075

Tax Information Security Guidelines for Federal, State, and Local Agencies

OMB: 1545-0962

Document [pdf]
Download: pdf | pdf
PUBLICATION 1075
TAX INFORMATION SECURITY
GUIDELINES FOR FEDERAL, STATE
AND LOCAL AGENCIES AND ENTITIES

Safeguards for
Protecting Federal
Tax Returns and
Return Information

TAX
GUIDELINES
FORFOR
FEDERAL,
STATE,
AND LOCAL
TAX INFORMATION
INFORMATIONSECURITY
SECURITY
GUIDELINES
FEDERAL,
STATE,
AND LOCAL
AGENCIES OMB No. 1545-0962

AGENCIES AND ENTITIES OMB No. 1545-0962

Paperwork Reduction Act Notice
The Internal Revenue Service (IRS) asks for the information in the Safeguard
Procedures Report and the Safeguard Activity Report to carry out the requirements of
the Internal Revenue Code (IRC) Section 6103(p).
You are not required to provide the information requested on a form that is subject to the
Paperwork Reduction Act unless the form displays a valid Office of Management and
Budget (OMB) control number. Books or records relating to a form or its instructions
must be retained as long as their contents may become material in the administration of
any Internal Revenue law. Generally, Federal tax returns and return information (FTI)
are confidential, as required by IRC Section 6103.
The information is used by the IRS to ensure that agencies, bodies, and commissions
are maintaining appropriate safeguards to protect the confidentiality of FTI. Your
response is mandatory.
The time needed to provide this information will vary depending on individual
circumstances. The estimated average time is 40 hours.
If you have any comments concerning the accuracy of these time estimates or
suggestions for making this publication simpler, we would be happy to hear from you.
You can write to us at:
Tax Products Coordinating Committee
Internal Revenue Service, SE:W:CAR:MP:T:T:SP
1111 Constitution Avenue, NW, IR-6406
Washington, DC. 20224
Preface
This publication revises and supersedes Publication 1075 (June 2000).

February 2007

Publication 1075

Page i of xi

This page left intentionally blank.

February 2007

Publication 1075

Page ii of xi

HIGHLIGHTS FOR 2007
COMPUTER SECURITY CONTROLS
This document provides updated requirements using the National Institute of Standards and
Technology (NIST) Special Publication (SP) 800-53, Recommended Security Controls for
Federal Information Systems.

SUBMITTING REPORTS AND CORRESPONDENCE
All reports and correspondence should be mailed to:
Office of Safeguards
Internal Revenue Service, OS:MA:PR:S
1111 Constitution Avenue, NW, IR-3619
Washington, DC. 20224.
As an option, all reports (e.g., Safeguard Activity Reports, Safeguard Procedures Reports,
Agency Response to Safeguard Review Reports) and correspondence can be transmitted
electronically—[email protected]—to the Safeguard mailbox.
In transmitting the information electronically, we advise the agency to evaluate the content of
the report to determine whether this is a viable option and consider the risks.

INTERNET ACCESS
Agencies can access Publication 1075 on the Internet by going to http://www.irs.gov and
searching for “publication 1075.”

REPORTING UNAUTHORIZED DISCLOSURES
Unauthorized inspection or disclosure of
Federal tax information must be reported to the appropriate Agent-in-Charge, Treasury
Inspector General.
Mailing Address:
Treasury Inspector General for
Tax Administration
Ben Franklin Station
P.O. Box 589
Washington, DC 20044-0589
Hotline Number:
1-800-366-4484

February 2007

Publication 1075

Page iii of xi

HIGHLIGHTS FOR 2007 (CONTINUED)
APPEAL PROCESS RELATED TO POSSIBLE SUSPENSION AND/OR
TERMINATION OF TAX DATA
Title 26 U. S. Code Section 6103(p)(4) requires external Federal, State and Local agencies and
any other authorized recipients of Federal tax returns and return information (FTI) to establish
procedures to ensure the proactive protection of the confidentiality as well as authorized uses of
the FTI they receive. That provision of the Code also authorizes the Internal Revenue Service
(IRS) to take actions, including suspending or terminating disclosures of FTI to any external
agencies and other authorized recipients, if there is misuse and/or inadequate safeguards in
place to protect the taxpayers’ information. New temporary Federal tax regulation 26 CFR
301.6103(p)(7)-1T establishes a consistent appeal process for all external agencies and other
authorized recipients of FTI. See Exhibit 1, Federal Register.

February 2007

Publication 1075

Page iv of xi

TABLE OF CONTENTS
Section Title

Page

1.0
1.1
1.2

INTRODUCTION ......................................................................................................... 1
General............................................................................................................................. 1
Overview of Publication 1075 ......................................................................................... 1

2.0
2.1
2.2
2.3
2.4
2.5
2.6

REQUESTING FEDERAL TAX INFORMATION AND REVIEWS........................... 3
General............................................................................................................................. 3
Need and Use ................................................................................................................... 3
State Tax Agencies .......................................................................................................... 4
Coordinating Safeguards within an Agency .................................................................... 4
Safeguard Reviews........................................................................................................... 4
Conducting the Review.................................................................................................... 4

3.0
3.1
3.2
3.3
3.4

RECORD KEEPING REQUIREMENTS ...................................................................... 6
General............................................................................................................................. 6
Electronic Files ................................................................................................................ 6
Information Other Than That In Electronic Form ........................................................... 6
Record Keeping of Disclosures to State Auditors ........................................................... 7

4.0
4.1
4.2
4.3
4.3.1
4.3.2
4.3.3
4.3.4
4.3.5
4.3.6
4.3.7
4.3.8
4.3.9
4.3.10
4.3.11
4.4
4.5
4.6
4.7
4.7.1
4.7.2
4.7.3

SECURE STORAGE - IRC 6103(p)(4)(B) ..................................................................... 8
General............................................................................................................................. 8
Minimum Protection Standards (MPS)............................................................................ 8
Security of Tax Information............................................................................................. 8
Restricted Area................................................................................................................. 8
Security Room ................................................................................................................. 9
Secured Interior/Secured Perimeter ............................................................................... 10
Containers ...................................................................................................................... 10
Locked Container........................................................................................................... 10
Security Container ......................................................................................................... 10
Safes/Vaults ................................................................................................................... 10
Locks.............................................................................................................................. 11
Control and Safeguarding Keys & Combinations ......................................................... 11
Locking Systems for Secured Areas .............................................................................. 11
Intrusion Detection Equipment ...................................................................................... 11
Security During Office Moves....................................................................................... 12
Handling and Transporting Federal Tax Information.................................................... 12
Physical Security of Computers and Magnetic Media................................................... 12
Alternate Work Sites...................................................................................................... 13
Equipment ...................................................................................................................... 13
Transmitting and Storing Data....................................................................................... 13
Other Safeguards............................................................................................................ 13

5.0

RESTRICTING ACCESS IRC 6103(p)(4)(C) ............................................................. 16

February 2007

Publication 1075

Page vi of xi

Section Title

Page

5.1
5.2
5.3
5.4
5.5
5.5.1
5.5.2
5.5.3
5.6
5.6.1
5.6.1.1
5.6.1.2
5.6.1.3
5.6.1.4
5.6.2
5.6.2.1
5.6.2.2
5.6.2.3
5.6.2.4
5.6.2.5
5.6.2.6
5.6.2.7
5.6.3
5.6.3.1
5.6.3.2
5.6.3.3
5.6.3.4
5.6.3.5
5.7
5.7.1
5.7.2
5.7.3
5.7.4

General.......................................................................................................................... 16
A Need to Know ........................................................................................................... 16
Commingling ................................................................................................................ 16
Access to Federal Tax Information via State Tax Files or Through Other Agencies... 17
Control Over Processing ............................................................................................... 18
Agency Owned and Operated Facility.......................................................................... 18
Contractor or Agency-Shared Facility for Tax Administration or Federal Debt Collection .... 18
Contractor or Agency Shared Facility for Recipients under the Deficit Reduction Act .......... 19
Computer System Security ........................................................................................... 19
Management Security Controls..................................................................................... 20
Risk Assessment ........................................................................................................... 20
Security Planning .......................................................................................................... 20
System & Services Acquisition .................................................................................... 20
Security Assessment ..................................................................................................... 20
Operational Security Controls....................................................................................... 21
Personnel Security ........................................................................................................ 21
Contingency Planning................................................................................................... 21
Configuration Management .......................................................................................... 21
Maintenance.................................................................................................................. 22
System & Information Integrity.................................................................................... 22
Incident Response ......................................................................................................... 22
Awareness & Training .................................................................................................. 22
Technical Security Controls.......................................................................................... 23
Identification & Authentication .................................................................................... 23
Access Control .............................................................................................................. 23
Audit & Accountability................................................................................................. 24
System & Communications Protection......................................................................... 24
Data Warehouse ............................................................................................................ 25
Transmitting Federal Tax Information.......................................................................... 25
Remote Access.............................................................................................................. 25
Internet/Web Sites......................................................................................................... 26
Electronic Mail.............................................................................................................. 26
Facsimile Machines (FAX)........................................................................................... 26

6.0
6.1
6.2
6.3
6.3.1
6.3.2
6.3.3
6.3.4
6.3.5

OTHER SAFEGUARDS - IRC 6103(p)(4)(D) ......................................................... 27
General.......................................................................................................................... 27
Employee Awareness.................................................................................................... 27
Internal Inspections....................................................................................................... 27
Record Keeping ............................................................................................................ 28
Secure Storage .............................................................................................................. 28
Limited Access.............................................................................................................. 28
Disposal......................................................................................................................... 28
Computer Security ........................................................................................................ 28

February 2007

Publication 1075

Page vii of xi

Section Title

Page

7.0
7.1
7.2
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
7.2.6
7.2.7
7.2.8
7.2.9
7.3
7.4
7.4.1
7.4.2
7.4.3
7.4.4
7.4.5
7.5

REPORTING REQUIREMENTS - IRC 6103(p)(4)(E) .............................................. 29
General.......................................................................................................................... 29
Safeguard Procedures Report........................................................................................ 29
Responsible Officer(s) .................................................................................................. 29
Location of the Data...................................................................................................... 29
Flow of the Data............................................................................................................ 29
System of Records ........................................................................................................ 29
Secure Storage of the Data............................................................................................ 30
Restricting Access to the Data ...................................................................................... 30
Disposal......................................................................................................................... 30
Computer Security ........................................................................................................ 30
Agency Disclosure Awareness Program....................................................................... 30
Submitting Safeguard Procedures Reports ................................................................... 31
Annual Safeguard Activity Report................................................................................ 31
Changes to Information or Procedures Previously Reported........................................ 31
Current Annual Period Safeguard Activities ................................................................ 31
Actions on Safeguard Review Recommendations........................................................ 31
Planned Actions Affecting Safeguard Procedures........................................................ 31
Agency Use of Contractors........................................................................................... 31
Submission Dates for the Safeguard Activity Report ................................................... 32

8.0
8.1
8.2
8.3
8.4

DISPOSING FEDERAL TAX INFORMATION IRC 6103(p)(4)(F) ......................... 32
General.......................................................................................................................... 33
Returning IRS Information to the Source ..................................................................... 33
Destruction Methods..................................................................................................... 33
Other Precautions.......................................................................................................... 33

9.0
9.1
9.2

RETURN INFORMATION IN STATISTICAL REPORTS IRC 6103(j) ................... 35
General.......................................................................................................................... 35
Making a Request ......................................................................................................... 35

10.0
10.1

REPORTING IMPROPER INSPECTIONS OR DISCLOSURES .............................. 36
General........................................................................................................................... 36

11.0
11.1
11.2
11.3
11.4
11.5
11.6
11.7
11.8

DISCLOSURE TO OTHER PERSONS - 6103(n) ...................................................... 37
General.......................................................................................................................... 37
Authorized Disclosures - Precautions........................................................................... 37
State Tax Officials and State and Local Law Enforcement Agencies IRC 6103(d)..... 37
State and Local Child Support Enforcement Agencies IRC 6103(l)(6) ....................... 37
Federal, State, and Local Welfare Agencies IRC 6103(l)(7)........................................ 38
Deficit Reduction Agencies IRC 6103(l)(10) .............................................................. 38
Health Care Financing Administration IRC 6103(l)(12)(C)......................................... 38
Disclosures Under IRC 6103(m)(2).............................................................................. 38

February 2007

Publication 1075

Page viii of xi

Guide

Title

Page

1

EIGHT STEPS OF THE REVIEW PROCESS ............................................................. 5

2

PHYSICAL SECURITY – MINIMUM PROTECTION STANDARDS ................... 15

Exhibit Title

Page

1..................................................................................................................................................... 39
FEDERAL REGISTER: PROCEDURES FOR ADMINISTRATIVE REVIEW OF A
DETERMINATION THAT AN AUTHORIZED RECIPIENT HAS FAILED TO SAFEGUARD
TAX RETURNS OR RETURN INFORMATION
2..................................................................................................................................................... 43
IRC SECTION 6103 CONFIDENTIALITY AND DISCLOSURE OF RETURNS AND
RETURN INFORMATION
3..................................................................................................................................................... 45
IRC SECTION 6103(p)(4) SAFEGUARDS
4..................................................................................................................................................... 47
IRC SECTION 7431 CIVIL DAMAGES FOR UNAUTHORIZED DISCLOSURE OF
RETURNS AND RETURN INFORMATION
5..................................................................................................................................................... 49
IRC SECTIONS 7213 AND 7213A UNAUTHORIZED DISCLOSURE OF INFORMATION
6..................................................................................................................................................... 51
CONTRACT LANGUAGE FOR GENERAL SERVICES ......................................................... 51
7..................................................................................................................................................... 54
DATA WAREHOUSE CONCEPTS & SECURITY REQUIREMENTS ................................... 54
Purpose.............................................................................................................................. 54
Audience ........................................................................................................................... 54
Background ....................................................................................................................... 54
Data Warehousing Implications........................................................................................ 55
Security ............................................................................................................................. 55
Risk Assessment ............................................................................................................... 55
Planning ............................................................................................................................ 56
System and Services Acquisition...................................................................................... 56
Certification, Accreditation, and Security Assessments ................................................... 56
Operational Controls......................................................................................................... 57
Personnel Security ............................................................................................................ 57
February 2007

Publication 1075

Page ix of xi

Physical Security and Environmental Protection.............................................................. 57
Contingency Planning....................................................................................................... 57
Configuration Management .............................................................................................. 57
Maintenance...................................................................................................................... 57
System and Information Integrity ..................................................................................... 57
Media Protection............................................................................................................... 58
Incident Response ............................................................................................................. 58
Awareness & Training ...................................................................................................... 58
Technical Controls ............................................................................................................ 58
Identification & Authentication ........................................................................................ 58
Access Control .................................................................................................................. 58
Audit & Accountability..................................................................................................... 59
System & Communication Protection .............................................................................. 59
8..................................................................................................................................................... 61
SECURITY CONTROLS CATALOG......................................................................................... 61
MANAGEMENT SECURITY CONTROLS ............................................................................... 61
OPERATIONAL SECURITY CONTROLS................................................................................ 63
TECHNICAL SECURITY CONTROLS ..................................................................................... 66
9..................................................................................................................................................... 70
PASSWORD MANAGEMENT GUIDELINES
10................................................................................................................................................... 72
SYSTEM AUDIT MANAGEMENT GUIDELINES
11................................................................................................................................................... 74
ENCRYPTION STANDARDS
12....................................................................................................................................................75
745
GLOSSARY - KEY TERMS AND DEFINITIONS

February 2007

Publication 1075

Page x of xi

This page left intentionally blank.

February 2007

Publication 1075

Page xi of xi

INTRODUCTION

SECTION 1.0

1.1 General

The sanctions of the IRC are designed
to protect the privacy of taxpayers.

The self-assessment feature is a
distinguishing characteristic and
principal strength of American tax
administration. The Internal Revenue
Service (IRS) is acutely aware that in
fostering our system of taxation, the
public must maintain a high degree of
confidence that the personal and
financial information furnished to us is
protected against unauthorized use,
inspection, or disclosure.

Similarly, the IRS recognizes the
importance of cooperating to the fullest
extent permitted by law with other
Federal, State, and local authorities in
their administration and enforcement of
laws. The concerns of citizens and
Congress regarding individual rights to
privacy make it important that we
continuously assess our disclosure
practices and the safeguards we use to
protect the confidential information
entrusted to us.

Therefore, we must administer the
disclosure provisions of the Internal
Revenue Code (IRC) according to the
spirit and intent of these laws, ever
mindful of this public trust. The IRC
makes the confidential relationship
between the taxpayer and the IRS quite
clear. It also stresses the importance of
this relationship by making it a crime to
violate this confidence. IRC Section
7213 prescribes criminal penalties for
Federal and State employees and
others who make illegal disclosures of
Federal tax returns and return
information (FTI). Additionally, IRC
Section 7213A makes the unauthorized
inspection of FTI a misdemeanor
punishable by fines, imprisonment, or
both. And finally, IRC Section 7431
prescribes civil damages for
unauthorized inspection or disclosure
and upon conviction, the notification to
the taxpayer that an unauthorized
inspection or disclosure has occurred.

Those agencies or agents that receive
FTI directly from either the IRS or from
secondary sources (e.g., Health and
Human Services, Federal entitlement
and lending agencies) must have
adequate programs in place to protect
the data received. Furthermore, as
agencies look more to “contracting out”
certain services, it becomes equally
important that those with whom
contracts exist protect that information
from unauthorized use, access, and
disclosure.
1.2 Overview of Publication 1075
This publication provides guidance in
ensuring that the policies, practices,
controls, and safeguards employed by
recipient agencies or agents and
contractors adequately protect the
confidentiality of the information they
receive from the IRS.

The Internal Revenue Service is acutely
aware that in fostering our system of
taxation the public must have and maintain a
high degree of confidence that the personal
and financial information furnished to us is
protected against unauthorized use,
inspection, or disclosure.

February 2007

The guidelines outlined herein apply to
all FTI, no matter the amount or the
media in which it is recorded. FTI in
electronic form must be afforded the
same levels of protection given to paper
documents or any other media
containing FTI. Security policies and

Page 1

Publication 1075

Security policies and procedures—
systemic, procedural, or manual—
should minimize circumvention.

procedures should minimize
circumvention.
A mutual interest exists in our
responsibility to ensure that FTI is
disclosed only to authorized persons
and used only as authorized by statute
or regulation. The IRS is confident of
your diligence in this area and believes
that Publication 1075 will be helpful.

This publication provides the preliminary
steps to consider before submitting a
request to process FTI, provides
requirements to properly safeguard
information, explains what to expect
from the IRS once the information has
been disclosed, and suggests
miscellaneous topics that may be helpful
in setting up your program. Exhibits 1
through 11, are provided for additional
guidance.

Conforming to these guidelines meets
the safeguard requirements of IRC
Section 6103(p)(4) and makes our joint
efforts beneficial.

Publication 1075 can be accessed
through the Internet at www.irs.gov.

February 2007

Page 2

Publication 1075

REQUESTING FEDERAL TAX INFORMATION AND REVIEWS
2.1 General
Section 6103 of the IRC is a confidentiality
statute and generally prohibits the
disclosure of FTI (see Exhibit 2,
Confidentiality and Disclosure of
Returns and Return Information, for
general rule and definitions). However,
exceptions to the general rule authorize
disclosure of FTI to certain Federal, State,
and local agencies. Generally, these
disclosures are made by the IRS in
response to written requests signed by the
head of the requesting agency or delegate.
FTI so disclosed may be used by the
receiving agency solely for the purpose
described in the exception authorizing the
disclosure. The statutes providing
authorization to disclose FTI contain specific
conditions that may require different
procedures in maintaining and using the
information. These conditions are outlined
under specific sections in this publication.
As a condition of receiving FTI, the
receiving agency must show, to the
satisfaction of the IRS, the ability to protect
the confidentiality of that information.
Safeguards must be designed to prevent
unauthorized access and use. Besides
written requests, the IRS may require formal
agreements that specify, among other
things, how the information will be
protected. An agency must ensure its
safeguards will be ready for immediate
implementation upon receipt of FTI. Copies
of the initial and subsequent requests for
data and of any formal agreement must be
retained by the agency a minimum of five
years as a part of its record keeping system.
Agencies should always maintain the latest
Safeguard Procedures Report (SPR) on file.
The initial request should be followed up by
submitting an SPR. It should be submitted
to the IRS at least 45 days before the
scheduled or requested receipt of FTI (see
Section 7.0, Reporting Requirements).

February 2007

Page 3

SECTION 2.0

The SPR should include the processing and
safeguard procedures for all FTI received,
and it should distinguish between agency
programs and functional organizations using
FTI.
Multiple organizations or programs using
FTI may be consolidated into a single report
for that agency. Agencies requesting Form
8300 information must file separate
Safeguard Procedures Reports for this
program. Each Federal, State, and Local
agency must file separate reports because
they receive data under different sections of
the IRC and for different purposes.
An agency must ensure its safeguards will
be ready for immediate implementation
upon receipt of FTI.

Note: Agencies should use care in outlining
their safeguard program. Reports that lack
clarity or sufficient information will be
returned to the submitting agency.
2.2 Need and Use
Any agency that receives FTI for an
authorized use may not use that information
in any manner or for any purpose not
consistent with that authorized use. If an
agency needs FTI for a different authorized
use under a different provision of IRC
Section 6103, a separate request under that
provision is necessary. An unauthorized
secondary use is specifically prohibited and
may result in discontinuation of disclosures
to the agency and imposition of civil and/or
criminal penalties on the responsible
officials. Because more states are using
contractors to enhance existing systems
and processes, they may want to use IRS
data in the testing stage before
implementation. In this case, need and use

Publication 1075

statements should be revised to cover this
use of IRS data, if not already addressed.
State taxing agencies should check their
statements (agreements) to see if “testing
purposes” is covered.
2.3 State Tax Agencies

official should also be responsible for
ensuring that internal inspections are
conducted (see Section 6.0, Other
Safeguards), for submitting required
safeguard reports to the IRS, and for any
necessary liaison with the IRS.
2.5 Safeguard Reviews

FTI may be obtained by State tax agencies
only to the extent the information is needed
for, and is reasonably expected to be used
for, State tax administration. An agency’s
records of the FTI requests should include
some account of the result of its use (e.g.,
disposition of closed cases and summary of
revenues generated) or include reasons
why the information was not used. If any
agency continually receives FTI that for any
reason it is unable to use, it should contact
the IRS official liaison with respect to
continuing disclosure and modify the
request. In any case, IRS will disclose FTI
only to the extent that a State taxing agency
satisfactorily establishes that the requested
information can reasonably be expected to
be used for an authorized purpose.
Note: IRS conducts “Need and Use” reviews
in conjunction with the on-site Safeguard
review, once every three years.
2.4 Coordinating Safeguards within an
Agency
Because of the diverse purposes that
authorized disclosures may be made to an
agency and the division of responsibilities
among different components of an agency,
FTI may be received and used by several
quasi-independent units within the agency’s
organizational structure. Where there is
such a dispersal of FTI, the agency should
centralize safeguard responsibility and
establish and maintain uniform safeguard
standards consistent with IRS guidelines.
The official assigned these responsibilities
should hold a position high enough in the
agency’s organizational structure to ensure
compliance with the agency’s safeguard
standards and procedures. The selected

February 2007

Page 4

A safeguard review is an on-site evaluation
of the use of FTI and the measures
employed by the receiving agency to protect
the data. This includes FTI received from
the IRS, the Social Security Administration
(SSA), or other agencies. Safeguard
reviews are conducted to determine the
adequacy of safeguards as opposed to
evaluating an agency’s programs. IRS
regularly conducts on-site reviews of
agency safeguards. Several factors will be
considered when determining the need for
and the frequency of reviews. Reviews are
conducted by Mission Assurance & Security
Services Office of Safeguards,
OS:MA:PIP:S within the Office of Privacy.
OS:MA:PR:S,
2.6 Conducting the Review
The IRS initiates the review by verbal
communication with an agency point of
contact. The preliminary discussion will be
followed by a formal engagement letter to
the agency head, giving official notification
of the planned safeguard review.
A safeguard review is an on-site evaluation
of the use of FTI received from the IRS, the
Social Security Administration, or other
agencies and the measures employed by
the receiving agency to protect that data.
The engagement letter outlines what the
review will encompass; for example, it will
include a list of records to be reviewed (e.g.,
training manuals, flowcharts, awareness
program documentation and organizational
charts relating to the processing of FTI), the
scope and purpose of the review, a list of
the specific areas to be reviewed, and

Publication 1075

agency personnel to be interviewed.
Reviews cover the six requirements of IRC
Section 6103(p)(4): Record Keeping,
Secure Storage, Restricting Access, Other
Safeguards, Reporting Requirements, and
Disposal. Computer Security and Need and
Use, as it applies under IRC Section
6103(d) are a part of Restricting Access but
may appear in the report under their own
headings. The six requirements are covered
in depth in this publication.

Note: All findings should be addressed in a
timely fashion. Outstanding issues should
be resolved and addressed by the next
reporting cycle in the Safeguard Activity
Report, or if necessary, the Safeguard
Procedures Report (see Section 7.4.3,
Actions on Safeguard Review
Recommendations).

Observing actual operations is a required
step in the review process. Agency files
may be spot-checked to determine if they
contain FTI. The on-site review officially
begins at the opening meeting where
procedures and parameters will be
communicated. The actual review is
followed by a close-out meeting when the
agency is informed of all findings because
of the evaluation. An interim report will be
issued to document the on-site review
findings and those comments.

Guide 1

Eight Steps of the Review Process
Preliminary Discussions
Engagement Letter
Opening Meeting
On-site Evaluation
Close-out Meeting
Interim Report
Agency Response
Final Report

February 2007

Page 5

Publication 1075

RECORD KEEPING REQUIREMENTS

SECTION 3.0

3.1 General
Federal, State, and local agencies, bodies,
commissions, and agents authorized under
IRC Section 6103 to receive FTI are
required by IRC Section 6103(p)(4)(A) to
establish a permanent system of
standardized records of requests made by
or to them for disclosure of FTI (see Exhibit
3, Sec 6103(p)(4) Safeguards). This record
keeping should include internal requests
among agency employees as well as
requests outside of the agency. The records
are to be maintained for five years or the
applicable records control schedule must be
followed, whichever is longer.
3.2 Electronic Files

Responsible officials must ensure that the
removal of tapes and disks (containing FTI)
from the storage area is properly recorded
on charge-out records. Semiannual
magnetic tape inventories will be conducted.
The agency must account for any missing
tape by documenting search efforts and
notifying the initiator of the loss.
Note: In the event that new information is
provided by IRS to a State tax agency
because of matching tapes, the new
information is considered FTI and must be
afforded the same consideration as other
FTI received and used in the match.
3.3 Non-electronic Files

Authorized employees of the recipient
agency must be responsible for securing
magnetic tapes/cartridges before, during,
and after processing, and they must ensure
that the proper acknowledgment form is
signed and returned to the IRS. Inventory
records must be maintained for purposes of
control and accountability. Tapes containing
FTI, any hard-copy printout of a tape, or any
file resulting from the processing of such a
tape will be recorded in a log that identifies:
• date received
• reel/cartridge control number contents
• number of records, if available
• movement and
• if disposed of, the date and method of
disposition.
Such a log will permit all tapes (including
those used only for backup) containing FTI
to be readily identified and controlled.
In instances where auditors read large
volumes of records containing FTI, whether
in paper or electronic format, the State tax
agency need only identify the bulk records
examined.

February 2007

Page 6

A listing of all documents received from the
IRS must be identified by:
•
•
•
•
•
•
•
•
•

taxpayer name
tax year(s)
type of information (e.g., revenue agent
reports, Form 1040, work papers)
the reason for the request
date requested
date received
exact location of the FTI
who has had access to the data and
if disposed of, the date and method of
disposition.

The agency must account for any missing
tape or disk by documenting search efforts
and notifying the initiator of the loss
If the authority to make further disclosures is
present (e.g., agents/contractors),
information disclosed outside the agency
must be recorded on a separate list that
reflects to whom the disclosure was made,
what was disclosed, and why and when it
was disclosed. Agencies transmitting FTI

Publication 1075

from one mainframe computer to another,
as in the case of the SSA sending FTI to
State Welfare and in instances where the
auditors extract FTI for Child Support
agencies, need only identify the bulk
records transmitted. This identification will
contain the approximate number of taxpayer
records, the date of the transmissions, the
best possible description of the records, and
the name of the individual making/receiving
the transmission.

February 2007

Page 7

3.4 Record Keeping of Disclosures to
State Auditors
When disclosures are made by a State tax
agency to State auditors, these
requirements pertain only in instances
where the auditors extract FTI for further
scrutiny and inclusion in their work papers.
In instances where auditors read large
volumes of records containing FTI, whether
in paper or magnetic tape format, the State
tax agency need only identify bulk records
examined. This identification will contain the
approximate number of taxpayer records,
the date of inspection, a description of the
records, and the name of the individual(s)
making the inspection.

Publication 1075

SECURE STORAGE - IRC 6103(p)(4)(B)
4.1 General
Security may be provided for a document, an
item, or an area in a number of ways. These
include, but are not limited to, locked containers
of various types, vaults, locked rooms, locked
rooms that have reinforced perimeters, locked
buildings, guards, electronic security systems,
fences, identification systems, and control
measures. How the required security is provided
depends on the facility, the function of the activity,
how the activity is organized, and what equipment
is available. Proper planning and organization will
enhance the security while balancing the costs.

SECTION 4.0
(See section 4.3.3 for secured
perimeter/interior.) The two barriers provide
an additional layer of protection to deter,
delay, or detect surreptitious entry.
Protected information must be containerized
in areas where other than authorized
employees may have access after hours.

The IRS has categorized Federal tax and privacy
information as High Security items. Guide 2
should be used as an aid in determining the
method of safeguarding high security items.

Using a common situation as an example,
often an agency desires or requires that
security personnel or custodial service
workers have access to locked buildings
and rooms. This may be permitted as long
as there is a second barrier to prevent
access to FTI. A security guard may have
access to a locked building or a locked
room if FTI is in a locked container. If FTI is
in a locked room, but not in a locked
container, the guard or janitor may have a
key to the building but not the room.

4.2 Minimum Protection Standards (MPS)

4.3 Security of Tax Information

The Minimum Protection Standards (MPS)
system establishes a uniform method of
protecting data and items that require
safeguarding. This system contains minimum
standards that will be applied on a case-by-case
basis. Since local factors may require additional
security measures, management must analyze
local circumstances to determine space,
container, and other security needs at individual
facilities. The MPS has been designed to provide
management with a basic framework of minimum
security requirements.

Care must be taken to deny access to areas
containing FTI during duty hours. This can
be accomplished by creating restricted
areas, security rooms, or locked rooms.
Additionally, FTI in any form (computer
printout, photocopies, tapes, notes, etc.)
must be protected during non-duty hours.
This can be done through a combination of
methods: secured or locked perimeter,
secured area, or containerization.

The objective of these standards is to prevent
unauthorized access to FTI. MPS requires two
barriers to access FTI under normal security:
secured perimeter/locked container, locked
perimeter/secured interior, or locked
perimeter/security container. Locked means an
area or container that has
a lock and the keys or combinations are
controlled. A security container is a lockable
metal container with a resistance to forced
penetration, with a security lock and keys or
combinations are controlled.

February 2007

Page 8

4.3.1 Restricted Area
A restricted area is an area that entry is
restricted to authorized personnel
(individuals assigned to the area). All
restricted areas either must meet secured
area criteria or provisions must be made to
store high security items in appropriate
containers during non-duty hours. Using
restricted areas is an effective method for
eliminating unnecessary traffic through
critical areas, thereby reducing the

Publication 1075

opportunity for unauthorized access and./or
disclosure or theft of FTI.
Restricted areas will be prominently posted and
separated from non-restricted areas by physical
barriers that control access. The number of
entrances should be kept to a minimum and must
have controlled access (electronic access control,
key access, door monitor) to prevent
unauthorized entry. The main entrance should be
controlled by locating the desk of a responsible
employee at the entrance to ensure that only
authorized personnel with an official need enter.
Using restricted areas is an effective method for
eliminating unnecessary traffic through critical
areas, thereby reducing the opportunity for
unauthorized disclosure or theft of Federal tax
information.
A restricted area register will be maintained at a
designated entrance to the restricted area and all
visitors (persons not assigned to the area)
entering the area should be directed to the
designated entrance. Visitors entering the area
should enter (in ink) in the register: their name,
signature, assigned work area, escort, purpose of
entry, and time and date of entry.
The entry control monitor should verify the
identity of visitors by comparing the name and
signature entered in the register with the name
and signature of some type of photo identification
card, such as a driver’s license. When leaving the
area, the entry control monitor or escort should
enter the visitor's time of departure.
Each restricted area register should be closed out
at the end of each month and reviewed by the
area supervisor/manager.
It is recommended that a second level of
management review the register. Each review
should determine the need for access for each
individual.

Authorized Access List (AAL) can be
maintained. Each month a new AAL should
be posted at the front desk and vendors
should be required to sign and the monitor
should not be required to make an entry in
the Restricted Area Register. If there is any
doubt on the identity of the individual prior to
permitting entry, the entry control clerk
should verify the identity prior to permitting
entry.
4.3.2 Security Room
A security room is a room that has been
constructed to resist forced entry. The entire
room must be enclosed by slab-to-slab
walls constructed of approved materials—
masonry brick, dry wall, etc.—and
supplemented by periodic inspection. All
doors for entering the room must be locked
in accordance with requirements set forth
below in "Locking Systems for Secured
Areas and Security Rooms," and entrance
limited to specifically authorized personnel.
Door hinge pins must be non-removable or
installed on the inside of the room.
Additionally, any glass in doors or walls will
be security glass [a minimum of two layers
of 1/8 inch plate glass with .060 inch (1/32)
vinyl interlayer, nominal thickness shall be
5/16 inch.] Plastic glazing material is not
acceptable.
Vents or louvers will be protected by an
Underwriters' Laboratory (UL) approved
electronic intrusion detection system that
will annunciate at a protection console, ULapproved central station, or local police
station and given top priority for
guard/police response during any alarm
situation.
Cleaning and maintenance should be
performed in the presence of an employee
authorized to enter the room.

To facilitate the entry of employees who have a
frequent and continuing need to enter a restricted
area, but are not assigned to the area, an

February 2007

Page 9

Publication 1075

4.3.3 Secured Interior/Secured Perimeter

4.3.5 Locked Container

Secured areas are internal areas that have been
designed to prevent undetected entry by
unauthorized persons during non-duty hours.
Secured perimeter/secured area must meet the
following minimum standards:

A lockable container is a commercially
available or prefabricated metal cabinet or
box with riveted or welded seams or metal
desks with lockable drawers. The lock
mechanism may be either a built-in key or a
hasp and lock.

•

This area must be enclosed by slab-to-slab
walls constructed of approved materials and
supplemented by periodic inspection or other
approved protection methods, or any lesser
type partition supplemented by UL-approved
electronic intrusion detection and fire
detection systems.

4.3.6 Security Container
Security containers are metal containers
that are lockable and have a tested
resistance to penetration. To maintain the
integrity of the security container, key locks
should have only two keys and strict control
of the keys is mandatory; combinations will
be given only to those individuals who have
a need to access the container. Security
containers include the following:

•

Unless electronic intrusion detection devices
are used, all doors entering the space must
be locked and strict key or combination
control should be exercised.

•

In the case of a fence and gate, the fence
must have intrusion detection devices or be
continually guarded, and the gate must be
either guarded or locked with intrusion
alarms.

•

Metal lateral key lock files

•

Metal lateral files equipped with lock
bars on both sides and secured with
security padlocks

The space must be cleaned during duty hours
in the presence of a regularly assigned
employee.

•

Metal pull drawer cabinets with center or
off-center lock bars secured by security
padlocks

•

Key lock “Mini Safes” properly mounted
with appropriate key control.

•

4.3.4 Containers
The term container includes all file cabinets (both
vertical and lateral), safes, supply cabinets, open
and closed shelving or desk and credenza
drawers, carts, or any other piece of office
equipment designed for storing files, documents,
papers, or equipment. Some of these containers
are designed for storage only and do not provide
protection (e.g., open shelving). For purposes of
providing protection, containers can be grouped
into three general categories: locked containers,
security containers, and safes or vaults.

February 2007

Page 10

If the central core of a security container
lock is replaced with a non-security lock
core, then the container no longer qualifies
as a security container.
4.3.7 Safes/Vaults
A safe is a General Services Administration
(GSA)-approved container of Class I, IV, or
V, or Underwriters Laboratories Listing of
TRTL-30, TRTL-60. A vault is a hardened
room with typical construction of reinforced
concrete floors, walls, and ceilings, uses

Publication 1075

UL-approved vault doors, and meets GSA
specifications.
4.3.8 Locks
The lock is the most accepted and widely used
security device for protecting installations and
activities, personnel data, tax data, classified
material and government and personal property.
All containers, rooms, buildings, and facilities
containing vulnerable or sensitive items should be
locked when not in actual use. However,
regardless of their quality or cost, locks should be
considered as delay devices only and not
complete deterrents. Therefore, the locking
system must be planned and used in conjunction
with other security measures. A periodic
inspection should be made on all locks to
determine each locking mechanism’s
effectiveness, to detect tampering and to make
replacement when necessary. Accountability
records will be maintained on keys and will
include taking an inventory of total keys available
and issuing keys.
4.3.9 Control and Safeguarding Keys &
Combinations
Access to a locked area, room, or container can
be controlled only if the key or combination is
controlled. Compromising a combination or losing
a key negates the security provided by that lock.
Combinations to locks should be changed when
an employee who knows the combination retires,
terminates employment, transfers to another
position, or at least once a year.
Combinations should be given only to those who
have a need to have access to the area, room, or
container and should never be written on a
calendar pad, desk blotters, or any other item
(even though it is carried on one's person or
hidden from view). The management should
maintain combinations (other than safes and
vaults). An envelope containing the combination
should be secured in a container with the same or
a higher security classification as the highest
classification of the material authorized for
storage in the container or area the lock secures.

February 2007

Page 11

Keys should be issued only to individuals
having a need to access an area, room, or
container. Accountability records should be
maintained on keys and should include an
inventory of total keys available and issuing
keys. A periodic reconciliation should be
done on all key records.
4.3.10 Locking Systems for Secured
Areas
Minimum requirements for locking systems
for secured areas and security rooms are
high security pin-tumbler cylinder locks that
meet the following requirements:
•

Key-operated mortised or rim-mounted
dead bolt lock

•

A dead bolt throw of one inch or longer

•

Double cylinder design. Cylinders are to
have five or more pin tumblers

•

Hardened inserts or be made of steel if
bolt is visible when locked.

Both the key and the lock must be “Off
Master.” Convenience type locking devices
such as card keys, sequenced button
activated locks used in conjunction with
electric strikes, etc., are authorized for use
only during duty hours. Keys to secured
areas not in the personal custody of an
authorized employee and any combinations
will be stored in a security container. The
number of keys or persons with knowledge
of the combination to a secured area will be
kept to a minimum. Keys and combinations
will be given only to those individuals,
preferably supervisors, who have a frequent
need to access the area after duty hours.
4.3.11 Intrusion Detection Equipment
Intrusion Detection Systems (IDS) are
designed to detect attempted breaches of
perimeter areas. IDSs can be used in
conjunction with other measures to provide
forced entry protection for after-hours

Publication 1075

security. Additionally, alarms for individual and
document safety (fire) and other physical hazards
(water pipe breaks) are recommended. Alarms
shall annunciate at an on-site protection console,
a central station, or local police station. Intrusion
Detection Systems include, but are not limited to,
door and window contacts, magnetic switches,
motion designed to set off an alarm at a given
location when the sensor is disturbed.
4.4 Security During Office Moves
When it is necessary for an office to move to
another location, plans must be made to protect
and account for all FTI properly. FTI must be in
locked cabinets or sealed packing cartons while
in transit.
Accountability will be maintained to ensure that
cabinets or cartons do not become misplaced or
lost during the move. FTI must remain in the
custody of an agency employee and
accountability must be maintained throughout the
move.
4.5 Handling and Transporting Federal Tax
Information
Handling FTI must be such that the documents
do not become misplaced or available to
unauthorized personnel.
Only those employees who have a need to know
and to whom disclosure may be made under the
provisions of the statute should be permitted
access to FTI.
Any time FTI is transported from one location to
another, care must be taken to provide
safeguards. In the event the material is handcarried by an individual in connection with a trip
or in the course of daily activities, it must be kept
with that individual and protected from
unauthorized disclosures. For example, when not
in use, and definitely when the individual is out of
the room, the material is to be out of view,
preferably in a locked briefcase or suitcase.
All shipments of FTI (including magnetic media
and microfilm) must be documented on a
transmittal form and monitored to ensure that
each shipment is properly and timely received

February 2007

Page 12

and acknowledged. All FTI transported
through the mail or courier/messenger
service must be double-sealed; that is one
envelope within another envelope. The
inner envelope should be marked
confidential with some indication that only
the designated official or delegate is
authorized to open it. Using sealed boxes
serves the same purpose as double sealing
and prevents anyone from viewing the
contents thereof.
4.6 Physical Security of Computers and
Magnetic Media
Because of the vast amount of data
computers and magnetic media store and
process, the physical security and control of
computers and magnetic media also must
be addressed. Whenever possible,
computer operations must be in a secure
area with restricted access. In situations
such as home work sites, remote terminals,
or office work sites where all of the
requirements of a secure area with
restricted access cannot be maintained, the
equipment should receive the highest level
of protection that is practical. Some security
requirements must be met, such as keeping
FTI locked up when not in use. Tape reels,
disks, or other magnetic media must be
labeled as FTI when they contain such
information.
In the event the material is hand-carried by
an individual in connection with a trip or in
the course of daily activities, it must be kept
with that individual and protected from
unauthorized disclosures.
Magnetic media should be kept in a secured
area under the immediate protection and
control of an authorized employee or locked
up. When not in use, they should be
promptly returned to a proper storage
area/container.
Good security practice requires that
inventory records of magnetic media be

Publication 1075

maintained for control and accountability. Section
3 – Record Keeping Requirements – contains
additional information on these requirements.
4.7 Alternate Work Sites

large objects such as desks or tables.
Smaller, agency-owned equipment should
be locked in a filing cabinet or desk drawer
when not in use.
4.7.2 Transmitting and Storing Data

If the confidentiality of FTI can be adequately
protected, alternative work sites, such as
employee’s homes or other non-traditional work
sites, can be used. Despite location, FTI remains
subject to the same safeguard requirements and
the highest level of attainable security. The
following guidelines set forth minimum standards
that must be established and maintained.
Note: Although the guidelines are written for
employees' homes, the requirements apply to all
alternative-work sites.
4.7.1 Equipment
Only agency-owned computers and software will
be used to process, access, and store FTI. The
agency must retain ownership and control of all
hardware, software, telecommunication
equipment, and data placed in the homes of
employees.
Employees should have a specific room or area
in a room that has the appropriate space and
facilities for the type of work done. Employees
also should have a way to communicate with their
managers or other members of the agency in
case security problems arise.
The agency should give employees locking file
cabinets or desk drawers so that documents,
disks, tax returns, etc., may be properly secured
when not in use. If agency furniture is not
furnished to the employee, the agency must
ensure that an adequate means of storage exists
at the work site.
Despite location, FTI remains subject to the same
safeguard requirements and the highest level of
attainable security.
The agency should provide "locking hardware" to
secure Automated Data Processing equipment to

February 2007

Page 13

FTI may be stored on hard disks only if
agency-approved security access control
devices (hardware/software) have been
installed, are receiving regularly scheduled
maintenance, including upgrades, and is
being used. Access control should include
password security, an audit trail, encryption
or guided media, virus detection, and data
overwriting capabilities.
Note: Additional information on Remote
Access can be found in Section 5.7 Transmitting Federal Tax Information.
4.7.3 Other Safeguards
Only agency-approved security access
control devices and agency-approved
software will be used. Copies of illegal and
non-approved software will not be used.
Magnetic media that are to be reused must
have files overwritten or degaussed.
The implementing agency will prepare a
plan for the security of alternative work site.
The agency should coordinate with the
managing host system(s) and any networks,
and maintain documentation on the test.
Before implementation, the agency will
perform both Unit Tests and Acceptance
Tests, and will certify that the security
controls are adequate for security needs.
Additionally, the agency will promulgate
rules and procedures to ensure that
employees do not leave computers
unprotected at any time. These rules should
address brief absences while employees
are away from the computer.
The agency should provide specialized
training in security, disclosure awareness,
and ethics for all participating employees
and managers. This training should cover

Publication 1075

situations that could occur as the result of an
interruption of work by family, friends, or other
sources.
The agency should conduct periodic inspections
of alternative work sites during the year to ensure
that safeguards are adequate. The results of
each inspection should be fully documented. IRS

February 2007

Page 14

reserves the right to visit alternative work
sites while conducting safeguard reviews.
Changes in safeguard procedures should
be described in detail by the agency in their
Safeguard Activity Report, or, if applicable,
Safeguard Procedures Report (see Section
7.0 - Reporting Requirements - for
details).

Publication 1075

Guide 2
PHYSICAL SECURITY - MINIMUM PROTECTION STANDARDS
ALTERNATIVE 1:
Secured Perimeter - Enclosed by slab-to-slab walls constructed of approved materials
and supplemented by periodic inspection. Any lesser-type partition supplemented by ULapproved electronic intrusion detection and fire detection systems. Unless there is
electronic intrusion detection devices, all doors entering the space must be locked. In the
case of a fence/gate, the fence must have intrusion detection devices or be continually
guarded and the gate must be either guarded or locked with intrusion alarms. Space
must be cleaned during duty hours. This requirement could apply to exterior or interior
perimeters.
Locked Container - A commercially available or prefabricated metal cabinet or box with
riveted or welded seams or metal desks with lockable drawers.
ALTERNATIVE 2:
Locked Perimeter - High security pin-tumbler cylinder locks meeting the following
criteria:
•
•
•
•
•

key operated mortised or rim-mounted dead bolt lock
dead bolt throw of one inch or longer
double cylinder design – must have five or more pin tumblers
if bolt is visible when locked; must contain hardened inserts or be made of steel
both the key and the lock must be “off master.”

Secured Interior Area - Same specifications as secured perimeter.
ALTERNATIVE 3:
Locked Perimeter - See above.
Security Container - Metal containers that are lockable and have a resistance to
penetration. The containers should have only two keys. Strict control of keys is
mandatory. Examples are mini safes, metal lateral key lock files, and metal pull drawer
cabinets with center/off center lock bars secured by padlocks.

February 2007

Page 15

Publication 1075

RESTRICTING ACCESS IRC 6103(p)(4)(C)
•

5.1 General
Agencies are required by IRC Section
6103(p)(4)(C) to restrict access to FTI only
to persons whose duties or responsibilities
require access (see Exhibit 3, Sec.
6103(p)(4) Safeguards and Exhibit 4, IRC
Sec. 7431 Civil Damages for
Unauthorized Disclosure of Returns and
Return Information). To assist with this
requirement, FTI should be clearly labeled
"Federal Tax Information" and handled in
such a manner that it does not become
misplaced or available to unauthorized
personnel. Additionally, warning banners
advising of safeguarding requirements
should be used for computer screens.
5.2 A Need to Know
Good safeguard practice dictates that
access to FTI must be strictly on a need-toknow basis. FTI must never be
indiscriminately disseminated, even within
the recipient agency, body, or commission.
Agencies must evaluate the need for FTI
before the data is requested or
disseminated. This evaluation process
includes the agency as a whole, down to
individual employees and computer
systems/data bases.
Restricting access to designated personnel
minimizes improper access or disclosure.
An employee's background and security
clearance should be considered when
designating authorized personnel. The IRS
recognizes that often it is not feasible to limit
access to FTI to the individual who receives
it; the official may need to forward FTI to
technical and clerical employees for
necessary processing. However, no person
should be given more FTI than is needed for
performance of his or her duties.
Examples:

February 2007

Page 16

SECTION 5.0
When documents are given to a
clerk/typist, no FTI should be included
unless it is needed for performing
clerical or typing duties.

Good safeguard practice dictates that
access to FTI must be strictly on a need-toknow basis. FTI must never be
indiscriminately disseminated, even within
the recipient agency, body, or commission.
•

When information from a Federal tax
return is passed to a technical
employee, the employee should be
provided only that portion of the return
that the employee needs to examine.

•

In a data processing environment,
individuals may require access to media
used to store FTI to do their jobs but do
not require access to FTI (e.g., a tape
librarian or a computer operator).

5.3 Commingling
It is recommended that FTI be kept
separate from other information to the
maximum extent possible to avoid
inadvertent disclosures. Agencies should
strive to not maintain FTI as part of their
case files.
In situations where physical separation is
impractical, the file should be clearly labeled
to indicate that FTI is included and the file
should be safeguarded. The information
itself also will be clearly labeled. Before
releasing the file to an individual or agency
not authorized access to FTI, care must be
taken to remove all such FTI.
If FTI is recorded on magnetic media with
other data, it should be protected as if it
were entirely Federal tax information. Such
commingling of data on tapes should be
avoided if practicable. When data

Publication 1075

by the individual or third party,
commingling has occurred and the
document must also be labeled and
safeguarded. If the individual or a third
party from their own source provides the
information, this is not return
information. "Provided" means actually
giving the information on a separate
document, not just verifying and
returning a document that includes
return information.

processing equipment is used to process or
store FTI and the information is mixed with
agency data, access must be controlled by:
•

Systemic means, including labeling. See
Section 5.6 - Computer System
Security for additional information.

•

Restricting computer access only to
authorized personnel.

•

Degaussing all of the data being
removed after each use.

•

Note: Commingled data with multi-purpose
facilities results in security risks that must
be addressed. If your agency shares
physical and/or computer facilities with other
agencies, departments, or individuals not
authorized to have FTI, strict controls—
physical and systemic—must be maintained
to prevent unauthorized disclosure of this
information.
In the case of a Data Warehouse, FTI can
be commingled if the proper security
controls are installed. This would require
data monitoring software that can
administer security down to databases, data
profiles, data tables, or data columns and
rows. The FTI within any of the above can
be back-end labeled and tagged with an
IRS identifier. The same would pertain to
any reports generated from the Data
Warehouse. An example would be a server
with Sequel software security. It can be
administered down to any of the above
levels and an end user without IRS access
permission will not see the data.
See Exhibit 7, Data Warehouse Concepts
& Security Requirements.
Examples of commingling include:
•

If FTI is included in an inquiry or
verification letter or in an internal data
input form, the FTI never loses its
character as FTI even if it is
subsequently verified. If the document
has both FTI and information provided

February 2007

Page 17

If a new address is received from
Internal Revenue Service records and
entered into a computer database, then
the address must be identified as FTI
and safeguarded. If the individual or
third party subsequently provides the
address, the information will not be
considered return information, as long
as the source code is revised. Again,
"provided" means using the individual's
or third party's knowledge or records as
the source of information.

5.4 Access to FTI via State Tax Files or
Through Other Agencies
Some State disclosure statutes and
administrative procedures permit access to
State tax files by other agencies,
organizations, or employees not involved in
tax matters. As a general rule, IRC Section
6103(d) does not permit access to FTI by
such employees, agencies, or other
organizations. The IRC clearly provides that
FTI will be furnished to State tax agencies
only for tax administration purposes and
made available only to designated State tax
personnel and legal representatives or to
the State audit agency for an audit of the tax
agency. If you have any questions about
particular State employees entitled to
access FTI, forward your inquiry to the
Disclosure Manager at the IRS Office that
serves your location. The IRC does not
permit State tax agencies to furnish FTI to
other State agencies, tax or non-tax, or to
political subdivisions, such as cities or
counties, for any purpose, including tax

Publication 1075

administration. Likewise, State tax agencies
may not furnish FTI to any other states,
even where agreements have been made,
informally or formally, for the reciprocal
exchange of State tax information. Also,
non-government organizations, such as
universities or public interest organizations
performing research cannot have access to
FTI.
The IRC does not permit State tax agencies
to furnish FTI to other State agencies, tax or
non-tax, or to political sub-divisions, such as
cities or counties, for any purpose, including
tax administration.
State tax agencies are specifically
addressed in the previous paragraph for a
number of reasons.
However, the situation applies to all
agencies authorized to receive FTI.
Generally, statutes that authorize disclosure
of FTI do not authorize further disclosures.
Unless IRC Section 6103 provides for
further disclosures by the agency, the
agency cannot make such disclosures. This
applies both within the agency, such as
employees or divisions not involved in the
specific purpose that the disclosure is
authorized, and outside the agency,
including contractors or agencies with which
data exchange agreements exist. Agencies
may be authorized to obtain the same FTI
for the same purposes, such as State tax
agencies, and subdivisions of the same
agency may obtain the same type of FTI for
different purposes, such as welfare
agencies participating in both welfare
eligibility verification (IRC Section
6103(l)(7)) and child support enforcement
(IRC Section 6103(l)(6)). However, in most
cases, the disclosure authority does not
permit agencies or subdivisions of agencies
to exchange or make subsequent
disclosures of this information.

When an agency is participating in more
than one disclosure authorization, i.e.,
different programs or purposes, each
exchange or release of FTI must have a
separate agreement or be accomplished
directly with the IRS or SSA. Unless
specifically authorized by the IRC, agencies
are not permitted to allow access to FTI to
agents, representatives, or contractors.
5.5 Control Over Processing
Processing of FTI in magnetic media mode,
microfilms, photo impressions, or other
formats (including tape reformatting or
reproduction or conversion to punch cards
or hard copy printout) will be performed
pursuant to one of the following three
procedures:
5.5.1 Agency Owned and Operated
Facility
Processing under this method will take
place in a manner that will protect the
confidentiality of the information on the
magnetic media. All safeguards outlined in
this publication also must be followed and
will be subject to IRS Safeguard Reviews.
5.5.2 Contractor or Agency-Shared
Facility for Tax Administration or Federal
Debt Collection
This method may be used only by an
agency that processes FTI for tax
administration or Federal debt collection
purposes. The requirements in Exhibit 6,
Contract Language for General Services,
must be included in the contract in
accordance with IRC Section 6103(n).
The agency must make periodic inspections
of the contractor or agency-shared
computer facility and keep a written record
of such inspections. The contractor or
agency-shared computer facility is also
subject to IRS Safeguard Reviews.

Each agency must have its own exchange
agreement with the IRS or with the SSA.

February 2007

Page 18

Publication 1075

5.5.3 Contractor or Agency Shared
Facility for Recipients under the Deficit
Reduction Act

storing and transmitting Federal tax
information in agency computing
environments.

Examples of Deficit Reduction Act agencies
are those involved with eligibility verification
of welfare or other benefit’s program (IRC
Section 6103(l)(7)) or those to whom child
support obligations are sought to
established or enforced pursuant to the
provisions of part D of title IV of the Social
Security Act (IRC Section 6103(l)(6)), and
the refund offset disclosures (IRC Section
6103(l)(10)). Recipients of return
information disclosed by the IRS or by SSA
under the Deficit Reduction Act are allowed
to use a shared facility but only in a manner
that does not allow access to FTI to
employees of other agencies using the
shared facility, or by any other person not
entitled to access under provisions of the
Act.

Sequencing security controls into
management, operational, and technical
security categories achieves the mission of
the Office of Safeguards, fosters
consistency with the organizational structure
of NIST SP 800-53 controls, and conforms
to the security control classifications
promulgated by the Office of Management &
Budget (OMB).

Note: The above rules also apply to
releasing magnetic media to a private
contractor or other agency office even if the
purpose is merely to erase the old media for
reuse.

For convenience, “computers”, “computer
systems,” “systems,” or “information
systems” will be used interchangeably to
represent agency information systems.
Agency information systems are
categorized as Tier I; Tier II; or Tier III
systems. Examples of Tier 1 systems
include Mainframe computing systems.
Examples of Tier II systems include Unixbased operating systems. Examples of Tier
III systems include Windows-based
operating systems. Also, see Section 7.2.8,
Computer Security, for more comprehensive
descriptions of tiered systems. Note: The
tiers of systems are a label applied to the
type of system. This does not have any
impact on the security controls of the
system.

5.6 Computer System Security
This section includes significant
enhancements to the computer security
standards agencies should meet to
adequately protect Federal tax information
under their administrative control.
The revised computer security framework
was primarily developed using applicable
guidelines specified in National Institute of
Standards & Technology (NIST) Special
Publication (SP) 800-30 Risk Management
Guide for Information Technology Systems
and (NIST) Special Publication (SP) 800- 53
Recommended Security Controls for
Federal Information Systems. Accordingly,
the security controls selected from the NIST
SP 800-53 moderate impact level were
used to identify the common and unique risk
elements associated with processing,

February 2007

Page 19

All agency information systems used for
processing, storing and transmitting Federal
tax information must enforce the security
provisions described in this section. Agency
information systems include hardware,
software, firmware, applications,
information, communications, and
personnel.

The control selection and specification
process was based on the NIST SP 800-53
security profile for information protection
requirements commensurate with the
moderate impact level. Impact levels used
in this document are described in the
Federal Information Processing Standards
(FIPS) Standards for Security
Categorizations of Federal Information and

Publication 1075

Information Systems. NIST documents are
available at:
http://csrc.nist.gov/publications/nistpubs/ind
ex.html.

Management security controls focus on
managing organizational risk and
information system security and devising
sufficient countermeasures or safeguards
for mitigating risk to acceptable levels.
Management security control families
include risk assessment, security planning,
system and services acquisition, and
security assessment.

Section 7.2, Safeguard Procedures
Report) by describing the security
requirements, current controls and planned
controls, for protecting agency information
systems and Federal tax information. The
system security plan must be updated to
account for significant changes (see
Section 7.4, Annual Safeguard Activities
Report) in the security requirements,
current controls and planned controls for
protecting agency information systems and
Federal tax information. Agencies must
develop, document, and establish a set of
rules describing their responsibilities and
expected behavior for information system
use for users of the information system.

5.6.1.1 Risk Assessment

5.6.1.3 System & Services Acquisition

Risk assessment policy and procedures
must be developed, documented,
disseminated and updated as necessary to
facilitate implementing risk assessment
controls. Such risk assessment controls
include risk assessments and risk
assessment updates. Agencies must
conduct a risk assessment of the
information system to identify the
organizational risk imposed on FTI and
information systems used to process, store
and transmit such information and to
determine the potential magnitude of harm
resulting from the unauthorized use, access
to, or disclosure of FTI. Risk assessments
must be updated to account for significant
changes in the agency information systems,
assets, operations, personnel, and
supporting facilities.

System and services acquisition policy and
procedures must be developed,
documented, disseminated, and updated as
necessary to facilitate implementing system
and services acquisition controls. Such
system and services acquisition controls
include information system documentation
and outsourced information system
services. Agencies must ensure that there
is sufficient information system
documentation, such as a Security Features
Guide. Agencies must ensure third-party
providers of information systems, who are
used to process, store and transmit Federal
tax information, employ security controls
consistent with Safeguard computer security
requirements.

5.6.1.2 Security Planning

Security assessment policy and procedures
must be developed, documented,
disseminated and updated as necessary to
facilitate implementing security assessment
controls. Such security assessment
controls include security assessments,
plans of action and milestones, and
continuous monitoring. Agencies must
conduct a security assessment of the
information system to determine if security
controls, described in the system security

5.6.1 Management Security Controls

Security planning policy and procedures
must be developed, documented,
disseminated and updated as necessary to
facilitate implementing security planning
controls. Such security planning controls
include system security plans, system
security plan updates and rules of behavior.
Agencies must develop, document, and
establish a system security plan (see

February 2007

Page 20

5.6.1.4 Security Assessment

Publication 1075

plan, are implemented correctly and
operating as intended. Agencies must
develop, document, and update a plan of
action and milestones (POA&M) for the
information system to include corrective
actions for mitigating the computer security
vulnerabilities identified in the security
assessment.

organization. Appropriate access
agreements must be completed before
authorizing access to users requiring
access to the information system and
Federal tax information. Personnel security
requirements must be established for thirdparty providers and monitored for provider
compliance.

5.6.2 Operational Security Controls

5.6.2.2 Contingency Planning

Operational security controls focus on
mechanisms primarily implemented by
people as opposed to systems. These
controls are established to improve the
security of a group, a specific system, or
group of systems. Operational security
controls require technical or specialized
expertise and often rely on management
and technical security controls. Operational
security control families include personnel
security, contingency planning,
configuration management, maintenance,
system and information integrity, incident
response, and awareness and training.

Contingency planning policy and
procedures must be developed,
documented, disseminated, and updated as
necessary to facilitate implementing
contingency planning security controls. In
addition, plans must be periodically tested
to ensure procedures and staff are able to
provide recovery capabilities within
established timeframes. Such contingency
planning security controls include alternate
storage sites, alternate processing sites,
telecommunications services, and
information system and information
backups. Agencies must identify alternate
storage sites and initiate necessary
agreements to permit the secure storage of
information system and FTI backups.
Agencies must identify alternate processing
sites and/or telecommunications
capabilities, and initiate necessary
agreements to facilitate secure resumption
of information systems used to process,
store and transmit FTI if the primary
processing site and/or primary
telecommunications capabilities become
unavailable. Agencies must conduct
backups of user-level information, systemlevel information, and FTI and store such
backups at a secure location.

5.6.2.1 Personnel Security
Personnel security policy and procedures
must be developed, documented,
disseminated, and updated as necessary to
facilitate implementing personnel security
controls. Such personnel security controls
include position categorization, personnel
screening, personnel termination, personnel
transfer, and access agreements.
Agencies must assign risk designations to
all positions and establish screening criteria
for individuals filling those positions.
Individuals must be screened before
authorizing access to information systems
and information. Agencies must terminate
information system access, conduct exit
interviews, and ensure return of all
information system-related property when
employment is terminated. Agencies must
review information system access
authorizations and initiate appropriate
actions when personnel are reassigned or
transferred to other positions within the

February 2007

Page 21

For safeguarding FTI, the IRS will be
concerned that contingency planning be
addressed.
5.6.2.3 Configuration Management
Configuration management policy and
procedures must be developed,
documented, disseminated and updated as

Publication 1075

necessary to facilitate implementing
configuration management security controls.
Such configuration management security
controls include:
• restrict access for change, configuration
settings, and provide the least
functionality necessary
• enforce access restrictions associated
with changes to the information system
• configure the security settings of
information technology products to the
most restrictive mode consistent with
information system operational
requirements
• configure the information system to
provide only essential capabilities
• prohibit the use of functions, ports,
protocols, and services not required to
perform essential capabilities for
processing, storing, or transmitting
Federal tax information.
5.6.2.4 Maintenance
Maintenance policy and procedures must be
developed, documented, disseminated, and
updated as necessary to facilitate
implementing maintenance security
controls. Such maintenance security
controls include maintenance tools and
remote maintenance. Agencies must
approve, control, and routinely monitor the
use of information system maintenance
tools and remotely-executed maintenance
and diagnostic activities.
5.6.2.5 System & Information Integrity
System and information integrity policy and
procedures must be developed,
documented, disseminated and updated as
necessary to facilitate implementing system
and information integrity security controls.
Such system and information integrity
security controls include flaw remediation,
intrusion detection tools and techniques,
information input restrictions, and
information output handling and retention.

February 2007

Page 22

The information system must implement
protection against malicious code (e.g.,
viruses, worms, Trojan horses) that, to the
extent possible, includes a capability for
automatic updates. Intrusion detection tools
and techniques must be employed to
monitor system events, detect attacks, and
identify unauthorized use of the information
system and FTI.
Agencies must restrict information system
input to authorized personnel (or processes
acting on behalf of such personnel)
responsible for processing, storing, or
transmitting FTI. Agencies must handle and
retain output from the information system.
5.6.2.6 Incident Response
Incident response policy and procedures
must be developed, documented,
disseminated, and updated as necessary to
facilitate the implementing incident
response security controls. Such incident
response security controls include incident
response training and incident reporting and
monitoring.
Agencies must train personnel in their
incident response roles on the information
system and FTI. Incident response training
must provide individuals with an
understanding of incident handling
capabilities for security events, including
preparation, detection and analysis,
containment, eradication, and recovery.
Agencies must routinely track and
document information system security
incidents potentially affecting the
confidentiality of FTI.
5.6.2.7 Awareness & Training
Awareness and training policy and
procedures must be developed,
documented, disseminated, and updated as
necessary to facilitate implementing
awareness and training security controls.
Such awareness and training security
controls include security awareness and

Publication 1075

security training. Agencies must ensure all
information system users and managers are
knowledgeable of security awareness
material before authorizing access to the
system. Agencies must identify personnel
with significant information system security
roles and responsibilities, document those
roles and responsibilities and provide
sufficient security training before authorizing
access to the information system and FTI.

(ii) disabling user accounts timely; (iii)
archiving inactive or terminated user
accounts; and (iv) developing and
implementing standard operating
procedures for validating system users who
request reinstatement of user account
privileges suspended or revoked by the
information system.

5.6.3 Technical Security Controls

Access control policy and procedures must
be developed, documented, disseminated,
and updated, as necessary, to facilitate
implementing access control security
controls. Such access control security
controls include account management,
access enforcement, limiting access to
those with a need-to-know, information-flow
enforcement, separation of duties, least
privilege, unsuccessful login attempts,
system use notification, session locks,
session termination, and remote access.

Technical security controls focus on the
security controls executed by the computer
system through mechanisms contained in
the hardware, software, and firmware
components of the system. Technical
security control families include
identification and authentication, access
control, audit and accountability, and
system and communications protection.
Exhibit 8, Security Controls Catalog, Exhibit
9, Password Management Guidelines, and
Exhibit 10, System Audit Management
Guidelines contain information that is
intended to clarify the technical controls of
this document.
5.6.3.1 Identification & Authentication
Identification and authentication policy and
procedures must be developed,
documented, disseminated, and updated,
as necessary, to facilitate implementing
identification and authentication security
controls. The information system must be
configured to identify users via the
assignment of unique user accounts and
validate users (or processes acting on
behalf of users) using standard
authentication methods such as passwords,
tokens, smart cards, or biometrics.
Agencies also must manage the user
accounts assigned to the information
system. Examples of effective user-account
management practices include (i) obtaining
authorization from appropriate officials to
issue user accounts to intended individuals;

February 2007

Page 23

5.6.3.2 Access Control

Agencies must manage information system
user accounts, including establishing,
activating, changing, reviewing, disabling,
and removing user accounts. The
information system must enforce assigned
authorizations for controlling system access
and the flow of information within the
system and between interconnected
systems.
Agencies must ensure the information
system enforces separation of duties
through assigned access authorizations.
The information system must enforce the
most restrictive access capabilities users
need (or processes acting on behalf of
users) to perform specified tasks.
The information system must limit the
number of consecutive unsuccessful access
attempts allowed in a specified period and
automatically perform a specific function
(e.g., account lockout, delayed logon) when
the maximum number of attempts is
exceeded. The information system must
display an approved system usage
notification before granting system access

Publication 1075

informing potential users that (i) the system
contains U.S. Government information; (ii)
users actions are monitored and audited;
and (iii) unauthorized use of the system is
prohibited and subject to criminal and civil
penalties. Policy must be enforced so that a
workstation and/or application are locked
after a pre-defined period. This will ensure
that unauthorized staff or staff without a
need-to-know cannot access FTI.

Agencies must routinely review audit
records for indications of unusual activities,
suspicious activities or suspected violations,
and report findings to appropriate officials
for prompt resolution. To support the audit
of activities, all agencies must ensure that
audit information is archived for six years to
enable the recreation of computer-related
accesses to both the operating system and
to the application wherever FTI is stored.

Agencies must document all remote access
capabilities used on the system.

5.6.3.4 System & Communications
Protection

5.6.3.3 Audit & Accountability

System and communications policy and
procedures must be developed,
documented, disseminated and updated as
necessary to facilitate implementing
effective system and communications
security controls.

Audit and accountability policy and
procedures must be developed,
documented, disseminated, and updated as
necessary to facilitate implementing audit
and accountability security controls. Such
audit and accountability security controls
include auditable events; content of audit
records; audit storage capacity; audit
processing; audit monitoring, analysis and
reporting; time stamps; protecting audit
information and audit retention.
The information system must generate audit
records for all security-relevant events,
including all security and system
administrator accesses. Security-relevant
events must enable the detection of
unauthorized access to FTI data. System
and/or security administrator processes will
include all authentication processes to
access the system, for both operating
system and application-level events.
Audit logs must enable tracking activities
taking place on the system. Exhibit 10,
System Audit Management Guidelines,
contains guidelines that can be used for
creating audit-related processes.
Agencies must configure the information
system to allocate sufficient audit record
storage capacity to record all necessary
auditable items.

February 2007

Page 24

These controls shall include the following:
• procedures to remove residual data
• procedures to provide transmission
confidentiality and to validate
cryptography.
This reallocation of memory (storage) for
reuse by the information system is known
as object reuse. Information systems must
be configured to prevent residual data from
being shared with, recovered, or accessed
by unauthorized users (or processes acting
on behalf of users) once such data is
removed from the information system and
the memory once occupied by such data is
reallocated to the information system for
reuse.
The information system must protect the
confidentiality of FTI during electronic
transmission. When cryptography
(encryption) is employed within the
information system, the system must
perform all cryptographic operations using
Federal Information Processing Standard
(FIPS) 140-2 validated cryptographic
modules with approved modes of operation.
Cryptographic data transmissions are

Publication 1075

ciphered and consequently unreadable until
deciphered by the recipient.
5.6.3.5 Data Warehouse
The concept of data warehousing consists
of a collection of multi-dimensional
integrated databases that are used to
provide accessible information to clients or
end users. The data can be manipulated
through different categories or dimensions
to facilitate analyzing data in relational
databases. The result can provide the client
or end user with an enterprise view or
snapshot of the information.
Security requirements apply to data
warehousing environments, as well as to
typical networked environments. These may
appear to be different, because of the
complexity of the systems, use of multiple
databases, etc.
Exhibit 7, Data Warehouse Concepts &
Security Requirements, provides those
unique requirements for this environment.

radio (microwave) transmission. Additional
precautions should be taken to protect the
cable, (e.g., burying the cable underground
or in walls or floors and providing access
controls to cable vaults, rooms, and
switching centers).
Note: Employing intrusion detection
devices, auditing capability with periodic
monitoring, and other security measures will
further reduce threats and vulnerabilities
when using this (guided media) method of
transmitting sensitive data.
5.7.1 Remote Access
Accessing databases containing FTI from a
remote location, i.e., a location not directly
connected to the Local Area Network (LAN),
will require adequate safeguards to prevent
unauthorized entry. The IRS policy for
allowing access to systems containing FTI
is outlined below.
•

Authentication is provided through ID
and password encryption for use over
public telephone lines.

•

Authentication is controlled by
centralized Key Management
Centers/Security Management Centers
with a backup at another location.

•

Standard access is provided through a
toll-free number and through local
telephone numbers to local data
facilities.

•

Both access methods (toll free and local
numbers) require a special (encrypted)
modem for every workstation and a
smart card (microprocessor) for every
user. Smart cards should have both
identification and authentication features
and should provide data encryption as
well.

5.7 Transmitting Federal Tax Information
The two acceptable methods of transmitting
FTI over telecommunication devices are the
use of encryption or guided media.
Encryption involves altering data objects in
a way that the objects become unreadable
until deciphered. Guided media involves
using protected microwave transmissions or
end-to-end fiber optics.
The IRS has adopted cryptography
standards that can be used to provide
guidance for encryption, message
authentication codes or digital signatures,
including digital signatures associated with
a certification infrastructure.
Unencrypted cable circuits of copper or fiber
optics is an acceptable means of
transmitting FTI. Measures are to be taken
to ensure that circuits are maintained on
cable and not converted to unencrypted

February 2007

Page 25

Publication 1075

5.7.2 Internet/Web Sites
5.7.4 Facsimile Machines (FAX)
Federal, State, and Local agencies that
have Internet capabilities and connections
to host servers are cautioned to perform risk
analysis on their computer system before
subscribing to their use. Connecting the
agency's computer system to the Internet
will require that adequate security measures
are employed to restrict access to sensitive
data. (See Section 5.6, Computer System
Security).

Generally, the telecommunication lines used
to send fax transmissions are not secure.
To reduce the threat of intrusion, observe
the following:
•

Have a trusted staff member at both the
sending and receiving fax machines.
locked room for the fax machine with
custodial coverage over outgoing and
incoming transmissions

•

Accurately maintain broadcast lists and
other preset numbers of frequent
recipients of FTI. Place fax machines in
a secured area.

•

Include a cover sheet on fax
transmissions that explicitly provides
guidance to the recipient, which
includes:

5.7.3 Electronic Mail
Generally, FTI should not be transmitted or
used on E-mail systems. If necessary, the
following precautions should be taken to
protect FTI sent via E-mail:
•

Do not send FTI unencrypted in the text
of the E-mail

•

Messages containing FTI must be
attached and encrypted

•
•

-

A notification of the sensitivity of
the data and the need for
protection and

-

A notice to unintended recipients
to telephone the sender—collect
if necessary—to report the
disclosure and confirm
destruction of the information.

Ensure that all messages sent are to the
proper address, and
Employees should log off the computer
when away from the area.

February 2007

Page 26

Publication 1075

OTHER SAFEGUARDS - IRC 6103(p)(4)(D)
•

6.1 General
IRC Section 6103(p)(4)(D) requires that
agencies receiving FTI provide other
safeguard measures as appropriate to
ensure the confidentiality of the FTI. A good
security awareness program is by far the
most effective and least expensive method
agencies can use to protect sensitive
information.

•

Place security articles in employee
newsletters

•

Route pertinent articles that appear in
the technical or popular press to
members of the management staff

•

Display posters with short simple
educational messages (e.g., instructions
on reporting unauthorized access
“UNAX” violations, address, and hotline
number)

•

Use warning banners during initial logon
on computers housing FTI

•

Send e-mail and other electronic
messages to inform users.

6.2 Employee Awareness
Granting agency employee access to FTI
should be preceded by certifying that each
employee understands the agency’s
security policy and procedures for
safeguarding IRS information. As a follow
up, employees should be required to
maintain their authorization to access FTI
through annual recertification. The initial
certification and recertification should be
documented and placed in the agency's
files for review. As part of the certification
and at least annually afterwards, employees
should be advised of the provisions of IRC
Sections 7431, 7213(a), and 7213A (see
Exhibit 4, IRC Sec. 7431 Civil Damages
for Unauthorized Disclosure of Returns
and Return Information and Exhibits 5,
IRC Sec. 7213 Unauthorized Disclosure
of Information).
Note: Agencies should make employees
aware that disclosure restrictions and the
penalties apply even after employment with
the agency has ended. Security information
and requirements can be expressed to
appropriate personnel by using a variety of
methods, such as:
•

Formal and informal training

•

Discussion at group and managerial
meetings

February 2007

SECTION 6.0
Install security bulletin boards
throughout the work areas

6.3 Internal Inspections
Another measure IRS requires is Internal
Inspections by the recipient agency. The
purpose is to ensure that adequate
safeguard or security measures have been
maintained. The agency should submit
copies of these inspections to the IRS with
the annual Safeguard Activity Report (see
Section 7.4 – Annual Safeguard Activity
Report). To provide an objective
assessment, the inspection should be
conducted by a function other than the
using function.
It should be certified that employees
understand security policy and procedures
requiring their awareness and compliance.
To provide reasonable assurance that FTI is
adequately safeguarded, the inspection
should address the safeguard requirements
the IRC and the IRS impose. Agencies
should establish a review cycle so that all
local offices receiving FTI are reviewed

Page 27

Publication 1075

within a three-year cycle. Headquarters
office facilities housing FTI and the agency
computer facility should be reviewed within
an 18-month cycle.
These requirements are discussed in
greater detail throughout this publication.
Key areas that should be addressed
include:
6.3.1 Record Keeping
Each agency, and functions within that
agency, shall maintain a log of all requests
for return information, including receipt
and/or disposal of returns or return
information. Return information will include
any medium containing FTI, such as
computer tapes, cartridges, or compact
disks (CDs). Receipt of information shall
include all information received either
directly or indirectly.
6.3.2 Secure Storage

security features should be included in the
report.
6.3.4 Disposal
Upon completion of use, agencies should
ensure that the FTI is destroyed or returned
to the IRS or the SSA according to the
guidelines contained in Section 8.0,
Disposal of Federal Tax Information.
6.3.5 Computer Security
The agency’s review of the adequacy of
their computer security provisions should
provide reasonable assurance that:
•

Access to FTI is limited to those
personnel who have a need-to-know.
This need-to-know must be enforced
electronically as well as physically. (see
Section 5.6, Computer Security).

Note: The review of the computer facility
also should include computer security.

FTI (including tapes, cartridges, or other
removable media) must be stored in a
secure location, safe from unauthorized
access.
6.3.3 Limited Access
Access to returns and return information
(including tapes, cartridges, or other
removable media) must be limited to only
those employees or officers who are
authorized access by law or regulation and
whose official duties require such access.

Inspection reports, including a record of
corrective actions, should be retained by the
agency for a minimum of three years from
the date the inspection was completed. IRS
personnel may review these reports during
an on-site Safeguard Review. A summary of
the agency's findings and the corrective
actions taken to correct any deficiencies
should be included with the annual
Safeguard Activity Report submitted to the
IRS.

The physical and systemic barriers to
unauthorized access should be reviewed
and reported. An assessment of facility

February 2007

Page 28

Publication 1075

REPORTING REQUIREMENTS - IRC 6103(p)(4)(E)

SECTION 7.0

7.1 General

7.2.2 Location of the Data

IRC Section 6103(p)(4)(E) requires
agencies receiving FTI to file a report that
describes the procedures established and
used by the agency for ensuring the
confidentiality of the information received
from the IRS. The Safeguard Procedures
Report (SPR) is a record of how FTI is
processed by the agency; it states how it is
protected from unauthorized disclosure by
that agency.

An organizational chart or narrative
description of the receiving agency, that
includes all functions within the agency
where FTI will be processed or maintained.
If the information is to be used or processed
by more than one function, then the
pertinent information must be included for
each function.

Annually thereafter, the agency must file a
Safeguard Activity Report (SAR). This
report advises the IRS of minor changes to
the procedures or safeguards described in
the SPR. It also advises the IRS of future
actions that will affect the agency's
safeguard procedures, summarizes the
agency's current efforts to ensure the
confidentiality of FTI, and finally, certifies
that the agency is protecting FTI pursuant to
IRC Section 6103(p)(4) and the agency's
own security requirements.
Note: Agencies are requested to submit a
new SPR whenever significant changes
occur in their safeguard program.
7.2 Safeguard Procedures Report
The SPR must be on an agency's
letterhead, signed by the head of the
agency or delegate, dated, and contain the
following information:
7.2.1 Responsible Officer(s)
The name, title, address, and telephone
number of the agency official authorized to
request Federal tax information from the
IRS, the SSA, or other authorized agency.
The name, title, address, and telephone
number of the agency official responsible for
implementing the safeguard procedures.

February 2007

Page 29

The Safeguard Procedures Report is a
record of how FTI is processed by the
agency; it states how it is protected from
unauthorized disclosure by that agency.

7.2.3 Flow of the Data
A chart or narrative describing the flow of
FTI through the agency from its receipt
through its return to the IRS or its
destruction, how it is used or processed,
and how it is protected along the way (See
specific safeguard requirements below.)
Indicate if FTI is commingled or transcribed
into data kept by the agency. Any data
turned over to an agency contractor for
processing must be fully disclosed and
provide accurate accounting.
7.2.4 System of Records
A description of the permanent record(s)
used to document requests for, receipt of,
distribution of (if applicable), and disposition
(return to IRS or destruction) of the FTI
(including tapes or cartridges). Agencies are
expected to be able to provide an "audit
trail" for information requested and
received, including any copies or distribution
beyond the original document or media.

Publication 1075

safeguards should address each applicable
tier level.

7.2.5 Secure Storage of the Data

A. Mainframe Computing Systems (Tier 1)
A description of the security measures
employed to provide secure storage for the
data when it is not in current use. Secure
storage encompasses such considerations
as locked files or containers, secured
facilities, key or combination controls, offsite storage, and restricted areas.
Note: It is requested that Federal Agencies
submit a Vulnerability Assessment based on
General Services Administration standards
for their building(s) as it addresses physical
security.
7.2.6 Restricting Access to the Data

Additional comments regarding the
safeguards employed to ensure the
protection of the computer system are also
appropriate, including security features of
the facility.
B. Unix-based Operating Systems (Tier II)

A description of the procedures or
safeguards to ensure access to FTI is
limited to those individuals who are
authorized access and have a need to
know. Describe how the information will be
protected from unauthorized access when in
use by the authorized recipient.
The physical barriers to unauthorized
access should be described (including the
security features where FTI is used or
processed) and systemic or procedural
barriers.
7.2.7 Disposal
A description of the method(s) of disposal of
the different types of FTI provided by the
IRS when not returned to the IRS. The IRS
will request a written report that documents
the method of destruction and that the
records were destroyed (See 7.2.4 above.)
7.2.8 Computer Security
All automated information systems and
networks that receive, process, store, or
transmit FTI must have adequate safeguard
measures in place to restrict access to
sensitive data (see Section 5.6.3). These

February 2007

Describe the systemic controls employed to
ensure all IRS data is safeguarded from
unauthorized access or disclosure. Include
the procedures to be employed to ensure
secure storage of the disks and the data,
limit access to the disk(s), or computer
screens, and the destruction of the data.

Page 30

Describe in detail the security precautions
undertaken if the agency’s computer
systems are connected or planned to be
connected to other systems.
C. Windows-based Operating Systems
(Tier III)
In the event that FTI is (or is likely to be)
used or processed by agency employees on
personal computers, the Safeguard
Procedures Report must include procedures
for ensuring that all data is safeguarded
from unauthorized access or disclosure.
Include the procedures to be employed to
ensure secure storage of the disks and the
data, limit access to the disk(s) or computer
screens, and the destruction of data.
7.2.9 Disclosure Awareness Program
Each agency receiving FTI should have an
awareness program that annually notifies all
employees having access to FTI of the
confidentiality provisions of the IRC, a
definition of what returns and return
information is, and the civil and criminal
sanctions for unauthorized inspection or
disclosure. A description of the formal
program should be included in the SPR.

Publication 1075

imposed for unauthorized inspection or
disclosure of return information.

7.3 Safeguard Procedures Report
Federal, Child Support Enforcement, State
Welfare agencies, Revenue Agencies, and
Local Taxing Authorities requesting FTI
should submit their report to:
Office of Safeguards
OS:MA:PIP:S
Internal Revenue Service, OS:MA:PR:S
1111 Constitution Avenue, NW, IR-3619
Washington, DC. 20224.

Copies of a representative sampling of the
Inspection Reports and a narrative of the
corrective actions taken (or planned) to
correct any deficiencies should be included
with the annual SAR.
D. Disposal of FTI
Report the disposal or the return of FTI to
the IRS or source. The information should
be adequate to identify the material
destroyed and the date and manner of
destruction.

7.4 Annual Safeguard Activity Report
The SAR must be on an agency's
letterhead, signed by the head of the
agency or delegate, and address the
information contained in the following
sections.

Note: Including taxpayer information in the
disposal record is not necessary and should
be avoided.

7.4.1 Changes to Information or
Procedures Previously Reported

7.4.3 Actions on Safeguard Review
Recommendations

A. Responsible Officers or Employees
B. Functional Organizations Using the
Data
C. Computer Facilities or Equipment and
System Security – Changes or
Enhancements
D. Physical Security – Changes or
Enhancements
E. Retention or Disposal Policy or
Methods
7.4.2 Current Annual Period Safeguard
Activities
A. Agency Disclosure Awareness
Program:
Describe the efforts to inform all employees
having access to FTI of the confidentiality
requirements of the IRC, the agency's
security requirements, and the sanctions

February 2007

B. Reports of Internal Inspections

Page 31

The agency should report all actions taken,
or being initiated, regarding
recommendations in the Final Safeguard
Review Report issued because of the latest
safeguard review.
7.4.4 Planned Actions Affecting
Safeguard Procedures
Any planned agency action that would
create a major change to current
procedures or safeguard considerations
should be reported. Such major changes
would include, but are not limited to, new
computer equipment, facilities, or systems.
7.4.5 Agency Use of Contractors
Agencies must account for the use of all
contractors, permitted by law or regulation,
to do programming, processing, or
administrative services requiring access to
FTI.

Publication 1075

7.5 Submission Dates for the Safeguard
Activity Report
The mailing address for all reports is:

State Welfare Agencies and the
DC Retirement Board should submit their
reports for the processing year (July 1
through June 30) by September 30.

Office of Safeguards
OS:MA:PIP:S
Internal Revenue Service, OS:MA:PR:S
1111 Constitution Avenue, NW, IR-3619
Washington, DC. 20224.
Federal Agencies should submit their
reports for the calendar year by January 31
of the following year.
Law Enforcement Agencies receiving
Form 8300, under IRC Section 6103(l)(15),
information should submit their reports for
the processing year (May 1 through April
30) by June 30.

February 2007

State Tax Agencies should submit their
reports for the calendar year by January 31
of the following year.

Page 32

State Child Support Enforcement
Agencies should submit their reports for the
calendar year by January 31 of the following
year.
Note: Educational institutions receiving FTI
under IRC Section 6103(m)(4)(B) should
send reports to the oversight agency.

Publication 1075

DISPOSING FEDERAL TAX INFORMATION IRC 6103(p)(4)(F)
8.1 General

•

Shredding precautions: To make
reconstruction more difficult, the paper
should be inserted so that lines of print
are perpendicular to the cutting line and
not maintain small amounts of shredded
paper. The paper should be shredded to
effect 5/16 inch wide or smaller strips;
microfilm should be shredded to effect a
1/35- inch by 3/8- inch strips. If
shredding is part of the overall
destruction of FTI, strips can in effect be
set at the industry standard (currently
½"). However, when deviating from IRS’
5/16" requirement, FTI as long as it is in
this condition (i.e., strips larger than
5/16"), must be safeguarded until it
reaches the stage where it is rendered
unreadable.

•

Pulping should be accomplished so that
all material is reduced to particles one
inch or smaller.

Users of FTI are required by IRC Section
6103(p)(4)(F) to take certain actions after
using Federal tax information to protect its
confidentiality (see Exhibit 3, Sec
6103(p)(4) Safeguards, and Exhibit 5, IRC
Sec. 7431 Civil Damages for
Unauthorized Disclosures of Returns
and Return Information). Agency officials
and employees either will return the
information (including any copies made) to
the office that it was originally obtained or
make the information “undisclosable.”
Agencies will include in their annual report
(SAR) a description of the procedures used.
8.2 Returning IRS Information to the
Source
Agencies electing to return IRS information,
must use a receipt process and ensure that
the confidentiality is protected at all times
during transport (see Section 4.5,
Handling and Transporting Federal Tax
Information).
8.3 Destruction Methods
FTI furnished to the user and any material
generated therefrom, such as extra copies,
photo impressions, computer printouts,
carbon paper, notes, stenographic notes,
and work papers should be destroyed by
burning, mulching, pulping, shredding, or
disintegrating.
The following precautions should be
observed when destroying FTI:
•

Burning precautions: The material is to
be burned in either an incinerator that
produces enough heat to burn the entire
bundle or the bundle should be
separated to ensure that all pages are
consumed.

February 2007

Page 33

SECTION 8.0

8.4 Other Precautions
FTI must never be disclosed to an agency’s
agents or contractors during disposal unless
authorized by the Internal Revenue Code.
Generally, destruction should be witnessed
by an agency employee. The Department of
Justice, State tax agencies, and the Social
Security Administration may be exempted
from the requirement of having agency
personnel present during destruction by a
contractor, if the contract includes the
safeguard provisions required by the Code
of Treasury Regulations (CTR) 301.6103(n)1. The required safeguard language is
contained in Exhibit 6, Contract Language
for General Services. If this method is used,
it is recommended that periodically the
agency observe the process to ensure
compliance. Destruction of FTI should be
certified by the contractor when agency
participation is not present.

Publication 1075

Magnetic tape containing FTI must not be
made available for reuse by other offices or
released for destruction without first being
subjected to electromagnetic erasing. If
reuse is not intended, the tape should be
destroyed by cutting into lengths of 18
inches or less or by burning to effect
complete incineration.
Whenever disk media leaves the physical or
systemic control of the agency for
maintenance, exchange, or other servicing,
any FTI on it must be destroyed by:
•

Completely overwriting all data tracks a
minimum of three times using maximum

February 2007

Page 34

current that will not damage or impair
the recording equipment; or
•

Running a magnetic strip, of sufficient
length to reach all areas of the disk over
and under each surface a minimum of
three times. If the information cannot be
destroyed as suggested, the disk will be
damaged in an obvious manner to
prevent use in any disk drive unit and
discarded.

Note: Hand tearing, recycling, or burying
information in a landfill are unacceptable
methods of disposal.

Publication 1075

RETURN INFORMATION IN STATISTICAL REPORTS IRC 6103(j)

SECTION 9.0

9.1 General

9.2 Making a Request

IRC Section 6103 authorizes the
disclosure of FTI for use in statistical
reports, for tax administration purposes,
and certain other purposes specified in
IRC Section 6103(j). However, such
statistical reports may only be released
in a form that cannot be associated with,
or otherwise identify, directly or
indirectly, a particular taxpayer.

Agencies seeking statistical information
from IRS should make their requests
under IRC 6103(j). The requests should
be addressed to:
Director, Statistics of Income Division
Internal Revenue Service, OS:P:S
1111 Constitution Avenue, NW.
Washington, DC 20224.

Agencies authorized to produce
statistical reports must adhere to the
following guidelines or an equivalent
alternative that has been approved by
the IRS:
•

Access to FTI must be restricted to
authorized personnel;

•

No statistical tabulation may be
released with cells containing data
from fewer than three returns;

•

Statistical tabulations prepared for
geographic areas below the State
level may not be released with cells
containing data from fewer than 10
returns, and

•

Tabulations that would pertain to
specifically identified taxpayers or
that would tend to identify a
particular taxpayer, either directly or
indirectly, may not be released.

February 2007

Page 35

Publication 1075

REPORTING IMPROPER INSPECTIONS OR DISCLOSURES

SECTION 10.0

10.1 General
Upon discovering a possible improper inspection or disclosure of FTI by a Federal
employee, a State employee, or any other person, the individual making the observation
or receiving information should contact the office of the appropriate Special Agent-inCharge, Treasury Inspector General for Tax Administration.
Field Division

Jacksonville

States Served by
Field Division
Alabama, Arkansas, Georgia,
Louisiana, Mississippi, North
Carolina, South Carolina,
Tennessee
Connecticut, Maine,
Massachusetts, New
Hampshire, Rhode Island,
Vermont
Illinois, Iowa, Kansas,
Minnesota, Missouri, North
Dakota, South
Dakota, Wisconsin, Nebraska
Indiana, Kentucky, Ohio,
Michigan, West Virginia
Oklahoma, Texas
Arizona, Colorado, Idaho,
Montana, New Mexico,
Nevada, Utah, Wyoming
Florida

Los Angeles

Southern California

(213) 894-4527

New York
New Jersey, Pennsylvania
Alaska, Hawaii, Northern
California, Oregon,
Washington
Delaware, Maryland, Virginia,
Washington DC
Commonwealth of Puerto
Rico, Virgin Islands, Guam,
American Samoa,
Commonwealth of Northern
Mariana Islands, Trust
Territory of the Pacific Islands

(212) 637-6800
(215) 861-1000
(510) 637-2558

Atlanta

Boston

Chicago
Cincinnati
Dallas
Denver

New York
Philadelphia
San Francisco
Washington
Special Inquiries and
Inspection

Mailing Address:

Hotline Number:

February 2007

Telephone Number
(404) 338-7400

(617) 565-7750

(312) 886-0533

(513) 263-3040
(972) 308-1400
(303) 446-1880
(904) 665-1185

(202) 283-3000
(703) 812-1688

Treasury Inspector General for Tax Administration
Ben Franklin Station
P.O. Box 589
Washington, DC 20044-0589
1-800-366-4484

Page 36

Publication 1075

DISCLOSURE TO OTHER PERSONS - 6103(n)
11.1 General
Disclosure of FTI is generally prohibited
unless authorized by statute. Agencies
having access to FTI are not allowed to
make further disclosures of that information
to their agents or to a contractor unless
authorized by statute. The terms agent and
contractor are not synonymous.
Agencies are encouraged to use specific
language in their contractual agreements to
avoid ambivalence or ambiguity.
Note: Absent specific language in the IRC
or where the IRC is silent in authorizing an
agency to make further disclosures, IRS’
position is that further disclosures are
unauthorized.
11.2 Authorized Disclosures Precautions
When disclosure is authorized, the agency
should take certain precautions prior to
engaging a contractor, namely:
•

Has the IRS been given sufficient prior
notice before releasing information to a
contractor?

•

Has the agency been given reasonable
assurance through an on-site visitation
or received a report certifying that all
security standards (physical and
computer) have been addressed?

•

Does the contract requiring the
disclosure of FTI have the appropriate
safeguard language (see Exhibit 6
Contract Language for General
Services)?

Agencies should fully report to the IRS all
disclosures of FTI to contractors in their
SPR. Additional disclosures to contractors
should be reported on the annual SAR.

February 2007

Page 37

Section 11.0
Engaging a contractor who may have
incidental or inadvertent access to FTI does
not come under these requirements. Only
those contractors whose work will involve
disclosing FTI in performing their duties are
required to address these issues.
11.3 State Tax Officials and State and
Local Law Enforcement Agencies IRC
Section 6103(d)
State taxing authorities are authorized by
statute to disclose information to contractors
for the purpose of, and to the extent
necessary in, administering State tax laws.
However, the IRS, pursuant to Treasury
Regulation 301.6103(n)-1, requires that
agencies notify the IRS prior to executing
any agreement to disclose to such a person
(contractor), but in no event less than 45
days prior to the disclosure of FTI. See
Section 5.4 Access to Federal Tax
Information via State Tax Files or
Through Other Agencies for additional
information.
11.4 State and Local Child Support
Enforcement Agencies IRC Section
6103(I)(6)
In general, no officer or employee of any
State and local child support enforcement
agency can make further disclosures of FTI.
However, the Welfare Reform Act of 1998
gave authorization to disclose limited
information to agents or contractors of the
agency for the purpose of, and to the extent
necessary in, establishing and collecting
child support obligations from, and locating
individuals owing such obligations.
The information that may be disclosed to an
agent or a contractor is limited to:
•

the address

Publication 1075

•

•

11.6 Deficit Reduction Agencies IRC
Section 6103(I)(10)

social security number(s) of an
individual with respect to whom child
support obligations are sought to be
established or enforced, and
the amount of any reduction under IRC
Section 6402(c) in any overpayment
otherwise payable to such individual.

Note: Forms 1099 and W-2 information is
not authorized by statute to be disclosed to
contractors under the IRC Section
6103(I)(6) program.
11.5 Federal, State, and Local Welfare
Agencies IRC Section 6103(I)(7)
No officer or employee of any Federal,
State, or local agency administering certain
programs under the Social Security Act, the
Food Stamp Act of 1977, or Title 38, United
States Code, or certain housing assistance
programs is permitted to make further
disclosures of FTI.
Note: Forms 1099 and W-2 information is
not authorized by statute to be disclosed to
contractors under the IRC Section
6103(I)(7) program.

February 2007

Page 38

Agencies receiving FTI under deficit
reduction IRC Section 6402(c) and IRC
Section 6402(d) are prohibited from making
further disclosures to contractors.
11.7 The Center for Medicare and
Medicaid Services IRC Section
6103(l)(12)(C)
The Center for Medicare and Medicaid
Services (CMS) is authorized under IRC
Section 6103(l)(12) to disclose FTI it
receives from SSA to its agents for the
purpose of, and to the extent necessary in,
determining the extent that any Medicare
beneficiary is covered under any group
health plan. A contractual relationship must
exist between CMS and the agent. The
agent, however, is not authorized to make
further disclosures of IRS information.
11.8 Disclosures Under IRC Section
6103(m)(2)
Disclosures to agents of a Federal agency
under IRC Section 6103(m)(2) are
authorized for the purposes of locating
individuals in collecting or compromising a
Federal claim against the taxpayer in
accordance with sections 3711, 3717, and
3718 of Title 31.

Publication 1075

Exhibit 1
FEDERAL REGISTER:
PROCEDURES FOR
ADMINISTRATIVE REVIEW OF A
DETERMINATION THAT AN
AUTHORIZED RECIPIENT HAS
FAILED TO SAFEGUARD TAX
RETURNS OR RETURN
INFORMATION AND
PROCEDURES FOR
ADMINISTRATIVE REVIEW OF A
DETERMINATION THAT AN
AUTHORIZED RECIPIENT HAS
FAILED TO SAFEGUARD TAX
RETURNS OR RETURN
INFORMATION

Federal Register / Vol. 71, No. 37 /
Friday, February 24, 2006 / Proposed
Rules 9487

the temporary regulations published in
the Rules and Regulation section of this
issue of the Federal Register serves as
the text of the proposed regulations.
DATES: Written and electronic comments and
requests for a public hearing must be received
by May 25, 2006.
ADDRESSES: Send submissions to:
CC:PA:LPD:PR (REG–157271–05), Room
5203, Internal Revenue Service, P.O. Box
7604, Ben Franklin Station,
Washington, DC 20044. Submissions
may be hand-delivered between the
hours of 8 a.m. and 4 p.m. to
CC:PA:LPD:PR (REG–157271–05),
Courier’s Desk, Internal Revenue
Service, 1111 Constitution Avenue,
NW., Washington, DC, or sent
electronically, via the IRS Internet site
at http://www.irs.gov/regs, or via the
Federal eRulemaking Portal at http://
www.regulations.gov (IRS and REG–
148864–03).

[REG–157271–05]

FOR FURTHER INFORMATION
CONTACT:
Concerning submission of comments,
Treena Garrett, (202) 622–7180;
concerning the temporary regulations,
Melinda K. Fisher, (202) 622–4580 (not
toll-free numbers).

RIN 1545–BF21

SUPPLEMENTARY INFORMATION:

Procedures for Administrative Review
of a Determination That an Authorized
Recipient Has Failed To Safeguard Tax
Returns or Return Information

Background

DEPARTMENT OF THE TREASURY
Internal Revenue Service
26 CFR Part 301

AGENCY: Internal Revenue Service
(IRS), Treasury.
ACTION: Notice of proposed
rulemaking by cross-reference to
temporary regulations.
SUMMARY: In the Rules and
Regulations section of this issue of the
Federal Register, the IRS is issuing
temporary regulations regarding
administrative review procedures for
certain government agencies and other
authorized recipients of tax returns or
return information (authorized
recipients) whose receipt of returns and
return information may be suspended or
terminated because they do not
maintain proper safeguards. The
temporary regulations provide guidance
to responsible IRS personnel and
authorized recipients as to these
administrative procedures. The text of

February 2007

Under section 6103 of the Internal
Revenue Code (Code), tax returns and
return information are protected from
disclosure except in specifically
enumerated circumstances. Where
disclosure is permitted, section 6103
generally imposes strict safeguarding
requirements and requires the IRS to
monitor and enforce compliance with
those requirements. Section 6103(p)(7)
requires the Secretary of the Treasury to
prescribe procedures providing for
administrative review of any
determination under section 6103(p)(4)
that an agency, body, or commission
receiving returns or return information
pursuant to section 6103(d) has failed to
meet the safeguarding requirements.
Withdrawn § 301.6103(p)(7)–1 set forth
the procedures for terminating future
disclosures to these authorized
recipients. These proposed regulations
provide the intermediate review and
termination procedures for all
authorized recipients identified in
section 6103(p)(4).

Page 39

With an increasing volume of
authorized disclosures of returns and
return information, it is critical that
authorized recipients of returns and
return information adhere to the strict
safeguard requirements of the Code and
that the IRS take all necessary steps to
ensure that those requirements are met.
If unauthorized disclosures do occur, it
is similarly important that the IRS take
steps to address them and ensure that
they are not repeated. Such steps
include, as appropriate, suspension or
termination of further disclosures to an
authorized recipient. Nevertheless,
because the authority to receive returns
and return information is provided by
law, authorized disclosures should not
be suspended or terminated for failure
to maintain adequate safeguards without
appropriate administrative review
procedures. The temporary regulations
set forth procedures to ensure that
authorized recipients provide the proper
security and protection to returns and
return information.
Temporary regulations in the Rules
and Regulations section of this issue of
the Federal Register amend the
Procedure and Administration
Regulations (26 CFR part 301) relating to
section 6103(p)(4) and (p)(7). The
temporary regulations provide the
intermediate review and termination
procedures for all authorized recipients.
The text of the temporary regulations
also serves as the text of these proposed
regulations. The preamble to the
temporary regulations explains the
proposed regulations.
Special Analyses
It has been determined that this notice
of proposed rulemaking is not a
significant regulatory action as defined
in Executive Order 12866. Therefore, a
regulatory assessment is not required.
Pursuant to the Regulatory Flexibility
Act (5 U.S.C. chapter 6), it is hereby
certified that these regulations will not
have a significant economic impact on
a substantial number of small
businesses. These regulations do not
impose burdens or obligations on any
person, but instead provide certain
rights of administrative review.
Accordingly, a regulatory flexibility
analysis is not required. Pursuant to
section 7805(f) of the Code, these
proposed regulations will be submitted

Publication 1075

to the Chief Counsel for Advocacy of the
Small Business Administration for
comment on their impact on small
business.
Comments and Requests for a Public
Hearing
Before these proposed regulations are
adopted as final regulations,
consideration will be given to any
electronic and written comments (a
signed original and eight (8) copies) that
are submitted timely to the IRS. The IRS
and Treasury Department specifically
request comments on the clarity of the
proposed regulations and how they can
be made easier to understand. All
comments will be available for public
inspection and copying. A public
hearing may be scheduled if requested
in writing by a person who timely
submits comments. If a public hearing is
scheduled, notice of the date, time, and
place for the hearing will be published
in the Federal Register.

regulations is Melinda K. Fisher, Office
of the Associate Chief Counsel
(Procedure & Administration),
Disclosure and Privacy Law Division.
List of Subjects in 26 CFR Part 301
Employment taxes, Estate taxes,
Excise taxes, Gift taxes, Income taxes,
Penalties, Reporting and recordkeeping
requirements.
Proposed Amendments to the
Regulations
Accordingly, 26 CFR part 301 is
proposed to be amended as follows:
PART 301—PROCEDURE AND
ADMINISTRATION
Paragraph 1. The authority citation
for part 301 is amended, in part, by
adding an entry in numerical order to
read as follows:

The principal author of these

Authority: 26 U.S.C. 7805 * * * Sections
301.6103(p)(4)–1 and 301.6103(p)(7)–1 also
issued under 26 U.S.C. 6103(p)(4) and (7) and
(q); * * *
Par. 2. Section 301.6103(p)(4)–1 is

Federal Register / Vol. 71, No. 37 /
Friday, February 24, 2006 / Rules and
Regulations 9449

recipients) whose receipt of returns and
return information may be suspended or
terminated because they do not

DEPARTMENT OF THE TREASURY

maintain proper safeguards. The
temporary regulations provide guidance
to responsible IRS personnel and
authorized recipients as to these
administrative procedures. The text of
these temporary regulations serves as
the text of the proposed regulations set
forth in the notice of proposed rulemaking on
this subject in the Proposed Rules section of
this issue of the Federal Register.

Drafting Information

Internal Revenue Service
26 CFR Part 301
[TD 9252]
RIN 1545–BF22
Procedures for Administrative Review
of a Determination That an Authorized
Recipient Has Failed to Safeguard Tax
Returns or Return Information
AGENCY: Internal Revenue Service
(IRS), Treasury.
ACTIONS: Temporary regulations.
SUMMARY: This document contains
temporary regulations regarding
administrative review procedures for
certain government agencies and other
authorized recipients of tax returns or
return information (authorized

February 2007

DATES: Effective Date: These regulations
are effective February 24, 2006.
Applicability Date: For dates of
applicability, see § 301.6103(p)(7)–1T(e).
FOR FURTHER INFORMATION
CONTACT:
Melinda Fisher, (202) 622–4580 (not a
toll-free number).
SUPPLEMENTARY INFORMATION:

added to read as follows:
§ 301.6103(p)(4)–1 Procedures relating to
safeguards for returns or return
information.
[The text of proposed § 301.6103(p)(4)–1 is
the same as the text of § 301.6103(p)(4)–1T
published elsewhere in this issue of the
Federal Register].
Par. 3. Section 301.6103(p)(7)–1 is
added to read as follows:
§ 301.6103(p)(7)–1 Procedures for
administrative review of a determination
that an authorized recipient has failed to
safeguard tax returns or return information.
[The text of proposed § 301.6103(p)(7)–1 is
the same as the text of § 301.6103(p)(7)–1T
published elsewhere in this issue of the
Federal Register].
Mark E. Matthews,
Deputy Commissioner for Services and
Enforcement.
[FR Doc. 06–1714 Filed 2–23–06; 8:45 am]
BILLING CODE 4830–01–U

Revenue Code (Code), tax returns and
return information are protected from
disclosure except in specifically
enumerated circumstances. Where
disclosure is permitted, section 6103
generally imposes strict safeguarding
requirements and requires the IRS to
monitor and enforce compliance with
those requirements. Section 6103(p)(7)
requires the Secretary of the Treasury to
prescribe procedures providing for
administrative review of any
determination under section 6103(p)(4)
that an agency, body, or commission
receiving returns or return information
pursuant to section 6103(d) has failed to
meet the safeguarding requirements.
Withdrawn § 301.6103(p)(7)–1 set forth the
procedures for terminating future
disclosures to these authorized
recipients. These temporary regulations
provide the intermediate review and
termination procedures for all
authorized recipients identified in
section 6103(p)(4).

Background
Under section 6103 of the Internal

Page 40

With an increasing volume of
authorized disclosures of returns and

Publication 1075

return information, it is critical that
authorized recipients of returns and
return information adhere to the strict
safeguard requirements of the Code and
that the IRS take all necessary steps to
ensure that those requirements are met.
If unauthorized disclosures do occur, it
is similarly important that the IRS take
steps to address them and ensure that
they are not repeated. Such steps
include, as appropriate, suspension or
termination of further disclosures to an
authorized recipient. Nevertheless,
because the authority to receive returns
and return information is provided by
law, authorized disclosures should not
be suspended or terminated without
appropriate administrative review
procedures. These temporary
regulations set forth procedures to
ensure that authorized recipients
provide the proper security and
protection to returns and return
information.
Explanation of Provisions
There are four basic parts to the
statutory scheme Congress created in
section 6103 of the Code to protect the
confidentiality of tax returns and return
information:
1. The general rule that makes returns
and return information confidential
except as expressly authorized in the
Code;
2. The exceptions to the general rule
detailing permissible disclosures;
3. Technical, administrative, and
physical safeguard provisions to prevent
authorized recipients of returns and
return information from inspecting,
using, or disclosing the returns and
return information in an unauthorized
manner, and accounting, recordkeeping
and reporting requirements that detail
what inspections and disclosures are
made for certain purposes to assist in
oversight; and
4. Criminal penalties for the willful
unauthorized inspection or disclosure of
returns and return information and a
civil cause of action for the taxpayer
whose returns or return information has
been inspected or disclosed in a manner
not authorized by the Code.
Section 6103(p)(4) provides that no
returns or return information may be

February 2007

disclosed by the IRS to certain
government agencies and other
authorized recipients unless they
establish procedures satisfactory to the
IRS for safeguarding the returns and
return information they receive. These
procedures are set forth in Publication
1075, Tax Information Security
Guidelines for Federal, State and Local
Agencies, which is available at http://
www.irs.gov/formspubs/list. Disclosure
of returns and return information to the
authorized recipients described in
section 6103(p)(4) is conditioned on the
recipient maintaining a secure place for
storing the returns and return
information, restricting access to returns
and return information to persons
whose duty requires access and to
whom disclosure can be made under the
internal revenue laws, providing other
safeguards necessary to keeping the
returns and return information
confidential, reporting to the IRS on the
safeguard procedures, and returning to
the IRS or destroying the returns and
return information upon completion of
use. The IRS reviews, on a regular basis,
safeguards established by authorized
recipients of returns and return
information.
If there are any unauthorized
inspections or disclosures of returns or
return information by authorized
recipients, further disclosures may be
terminated or suspended until the IRS is
satisfied that adequate protective
measures have been taken to prevent a
recurrence of unauthorized inspection
or disclosure. In addition, the IRS may
terminate or suspend disclosure to any
authorized recipient if the IRS
determines that adequate safeguards are
not being maintained.
The Code, in section 6103(p)(4),
(p)(7), and (q) authorizes the IRS to
promulgate regulations to carry out its
statutory safeguard responsibilities.
More specifically, section 6103(p)(7)
requires that the IRS promulgate
regulations establishing procedures for
an administrative review of any
determination by the IRS under section
6103(p)(4) that a State tax agency
authorized to receive returns and return
information under section 6103(d) has
failed to meet the requirements of
section 6103(p)(4). See Tax Reform Act
of 1976, S. Rep. 94–938, 94th Cong., 2d
Sess. 345 (1976). Under current

Page 41

§ 301.6103(p)(7)–1 of the Procedure and
Administration Regulations (26 CFR
Part 301), the IRS has established
procedures whereby State tax agencies
that receive returns and return
information pursuant to section 6103(d)
have an opportunity, prior to a
suspension or termination of disclosure,
to contest a preliminary finding by the
IRS of inadequate safeguards or
unauthorized disclosure, or to establish
that a State tax agency has taken steps
to prevent a recurrence of the violation.
This document adopts temporary
regulations that extend the
administrative review procedure
applicable to State tax agencies to any
authorized recipient specified in section
6103(p)(4) with respect to which the IRS
has made a preliminary finding of
inadequate safeguards or unauthorized
disclosure. The temporary regulations
also apply this administrative review
procedure to any such authorized
recipient with respect to which the IRS
has made a preliminary finding as to
unauthorized inspection of returns or
return information. The temporary
regulations treat unauthorized
inspection in the same manner as
unauthorized disclosure because both
unauthorized acts are proscribed by the
Code. In particular, section 7213A,
enacted by the Taxpayer Browsing
Protection Act of 1997, Public Law 105–
35 (111 Stat. 1104), specifically treats
the unauthorized inspection of a return
or return information as a misdemeanor.
Special Analyses
It has been determined that these
temporary regulations are not a
significant regulatory action as defined
in Executive Order 12866. Therefore, a
regulatory assessment is not required.
Pursuant to 5 U.S.C. 553(b)(B) it has
been determined that prior notice and
public comment on these temporary
regulations are unnecessary and
contrary to the public interest. These
regulations do not impose any burdens
or obligations on any person, but
instead provide certain rights of
administrative review. Moreover, these
regulations are necessary to protect
taxpayer confidentiality and the
integrity of return information. For the
same reasons, it has been determined
pursuant to 5 U.S.C. 553(d)(3) that good
cause exists to dispense with a delayed
effective date for these regulations. For

Publication 1075

applicability of the Regulatory
Flexibility Act (5 U.S.C. chapter 6),
please refer to the cross-reference notice
of proposed rulemaking published
elsewhere in this issue of the Federal
Register. Pursuant to section 7805(f) of
the Code, these temporary regulations
will be submitted to the Chief Counsel
for Advocacy of the Small Business
Administration for comment on their
impact on small business.
Drafting Information
The principal author of these
temporary regulations is Melinda K.
Fisher, Office of the Associate Chief
Counsel (Procedure & Administration),
Disclosure and Privacy Law Division.
List of Subjects in 26 CFR Part 301
Employment taxes, Estate taxes,
Excise taxes, Gift taxes, Income taxes,
Penalties, Reporting and recordkeeping
requirements.
Amendments to the Regulations
Accordingly, 26 CFR Part 301 is
amended as follows:
PART 301—PROCEDURE AND
ADMINISTRATION
Paragraph 1. The authority citation
for part 301 is amended by adding an
entry in numerical order to read, in part,
as follows:
Authority: 26 U.S.C. 7805 * * *
Sections 301.6103(p)(4)–1 and
301.6103(p)(7)–1T also issued under 26
U.S.C. 6103(p)(4) and (7) and (q), * * *
Par. 2. Section 301.6103(p)(4)–1T is
added to read as follows:
§ 301.6103(p)(4)–1T Procedures
relating to safeguards for returns or
return information
(temporary).
For security guidelines and other
safeguards for protecting returns and
return information, see guidance
published by the Internal Revenue
Service. For procedures for
administrative review of a
determination that an authorized
recipient has failed to safeguard returns
or return information, see
§ 301.6103(p)(7)–1T.
§ 301.6103(p)(7)–1 [Removed]

February 2007

Par. 3. Section 301.6103(p)(7)–1 is
removed.
Par. 4. Section 301.6103(p)(7)–1T is
added to read as follows:
§ 301.6103(p)(7)–1T Procedures for
administrative review of a determination
that an authorized recipient has failed to
safeguard returns or return information
(temporary).
(a) In general. Notwithstanding any
section of the Internal Revenue Code,
the Internal Revenue Service (IRS) may
terminate or suspend disclosure of
returns and return information to any
authorized recipient specified in
subsection (p)(4) of section 6103, if the
IRS makes a determination that:
(1) The authorized recipient has
allowed an unauthorized inspection or
disclosure of returns or return
information and that the authorized
recipient has not taken adequate
corrective action to prevent the
recurrence of an unauthorized
inspection or disclosure, or
(2) The authorized recipient does not
satisfactorily maintain the safeguards
prescribed by section 6103(p)(4), and
has made no adequate plan to improve
its system to maintain the safeguards
satisfactorily.
(b) Notice of IRS’s intention to
terminate or suspend disclosure. Prior
to terminating or suspending authorized
disclosures, the IRS will notify the
authorized recipient in writing of the
IRS’s preliminary determination and of
the IRS’s intention to discontinue
disclosure of returns and return
information to the authorized recipient.
Upon so notifying the authorized
recipient, the IRS, if it determines that
tax administration otherwise would be
seriously impaired, may suspend further
disclosures of returns and return
information to the authorized recipient
pending a final determination by the
Commissioner or a Deputy
Commissioner described in paragraph
(d)(2) of this section.
(c) Authorized recipient’s right to
appeal. An authorized recipient shall
have 30 days from the date of receipt of
a notice described in paragraph (b) of

Page 42

this section to appeal the preliminary
determination described in paragraph
(b) of this section. The appeal shall be
made directly to the Commissioner.
(d) Procedures for administrative
review. (1) To appeal a preliminary
determination described in paragraph
(b) of this section, the authorized
recipient shall send a written request for
a conference to: Commissioner of
Internal Revenue (Attention:
SE:S:CLD:GLD), 1111 Constitution
Avenue, NW., Washington, DC 20224.
The request must include a complete
description of the authorized recipient’s
present system of safeguarding returns
or return information, as well as a
complete description of its practices
with respect to the inspection,
disclosure, and use of the returns or
return information it (including any
authorized contractors or agents)
receives under the Internal Revenue
Code. The request then must state the
reason or reasons the authorized
recipient believes that such system, or
practice, including improvements, if
any, to such system or practice expected
to be made in the near future, is or will
be adequate to safeguard returns or
return information.
(2) Within 45 days of the receipt of
the request made in accordance with the
provisions of paragraph (d)(1) of this
section, the Commissioner or Deputy
Commissioner personally will hold a
conference with representatives of the
authorized recipient, after which the
Commissioner or Deputy Commissioner
will make a final determination with
respect to the appeal.
(e) Effective date. This section is
applicable to all authorized recipients of
returns and return information that are
subject to the safeguard requirements set
forth in section 6103(p)(4) on or after
February 23, 2006.
Mark E. Matthews,
Deputy Commissioner for Services and
Enforcement.
Approved: February 11, 2006.
Eric Solomon,
Acting Deputy Assistant Secretary of the
Treasury (Tax Policy).
[FR Doc. 06–1713 Filed 2–23–06; 8:45 am]
BILLING CODE 4830–01–U

Publication 1075

EXHIBIT 2

IRC SEC. 6103. CONFIDENTIALITY AND DISCLOSURE OF
RETURNS AND RETURN INFORMATION.
(a) General rule
Returns and return information shall be confidential, and except as authorized by this
title—
(1) no officer or employee of the United States,
(2) no officer or employee of any State, any local law enforcement agency receiving
information under subsection (i)(7)(A), any local child support enforcement agency, or
any local agency administering a program listed in subsection (l)(7)(D) who has or had
access to returns or return information under this section, and
(3) no other person (or officer or employee thereof) who has or had access to returns or
return information under subsection (e)(1)(D)(iii), paragraph (6), (12), (16), (19), or (20)
of subsection (l), paragraph (2) or (4)(B) of subsection (m), or subsection (n),
shall disclose any return or return information obtained by him in any manner in
connection with his service as such an officer or an employee or otherwise or under the
provisions of this section. For purposes of this subsection, the term “officer or employee”
includes a former officer or employee.
(b) Definitions
For purposes of this section—
(1) Return
The term “return” means any tax or information return, declaration of estimated tax, or
claim for refund required by, or provided for or permitted under, the provisions of this title
which is filed with the Secretary by, on behalf of, or with respect to any person, and any
amendment or supplement thereto, including supporting schedules, attachments, or lists
which are supplemental to, or part of, the return so filed.
(2) Return information
The term “return information” means—
(A) a taxpayer’s identity, the nature, source, or amount of his income, payments,
receipts, deductions, exemptions, credits, assets, liabilities, net worth, tax liability, tax
withheld, deficiencies, overassessments, or tax payments, whether the taxpayer’s return
was, is being, or will be examined or subject to other investigation or processing, or any
other data, received by, recorded by, prepared by, furnished to, or collected by the
Secretary with respect to a return or with respect to the determination of the existence,
or possible existence, of liability (or the amount thereof) of any person under this title for
any tax, penalty, interest, fine, forfeiture, or other imposition, or offense,
(B) any part of any written determination or any background file document relating to
such written determination (as such terms are defined in section 6110 (b)) which is not
open to public inspection under section 6110,
(C) any advance pricing agreement entered into by a taxpayer and the Secretary and
any background information related to such agreement or any application for an advance
pricing agreement, and
(D) any agreement under section 7121, and any similar agreement, and any background
information related to such an agreement or request for such an agreement,
but such term does not include data in a form which cannot be associated with, or
otherwise identify, directly or indirectly, a particular taxpayer. Nothing in the preceding
sentence, or in any other provision of law, shall be construed to require the disclosure of

February 2007

Page 43

Publication 1075

standards used or to be used for the selection of returns for examination, or data used or
to be used for determining such standards, if the Secretary determines that such
disclosure will seriously impair assessment, collection, or enforcement under the internal
revenue laws.
(3) Taxpayer return information
The term “taxpayer return information” means return information as defined in paragraph
(2) which is filed with, or furnished to, the Secretary by or on behalf of the taxpayer to
whom such return information relates.
(4) Tax administration
The term “tax administration”—
(A) means—
(i) the administration, management, conduct, direction, and supervision of the execution
and application of the internal revenue laws or related statutes (or equivalent laws and
statutes of a State) and tax conventions to which the United States is a party, and
(ii) the development and formulation of Federal tax policy relating to existing or proposed
internal revenue laws, related statutes, and tax conventions, and
(B) includes assessment, collection, enforcement, litigation, publication, and statistical
gathering functions under such laws, statutes, or conventions.
(5) State
The term “State” means—
(A) any of the 50 States, the District of Columbia, the Commonwealth of Puerto Rico, the
Virgin Islands, the Canal Zone, Guam, American Samoa, and the Commonwealth of the
Northern Mariana Islands, and
(B) for purposes of subsections (a)(2), (b)(4), (d)(1), (h)(4), and (p) any municipality—
(i) with a population in excess of 250,000 (as determined under the most recent
decennial United States census data available),
(ii) which imposes a tax on income or wages, and
(iii) with which the Secretary (in his sole discretion) has entered into an agreement
regarding disclosure.
(6) Taxpayer identity
The term “taxpayer identity” means the name of a person with respect to whom a return
is filed, his mailing address, his taxpayer identifying number (as described in section
6109), or a combination thereof.
(7) Inspection
The terms “inspected” and “inspection” mean any examination of a return or return
information.
(8) Disclosure
The term “disclosure” means the making known to any person in any manner whatever a
return or return information.
(9) Federal agency
The term “Federal agency” means an agency within the meaning of section 551 (1) of
title 5, United States Code.
(10) Chief executive officer
The term “chief executive officer” means, with respect to any municipality, any elected
official and the chief official (even if not elected) of such municipality.
(11) Terrorist incident, threat, or activity
The term “terrorist incident, threat, or activity” means an incident, threat, or activity
involving an act of domestic terrorism (as defined in section 2331 (5) of title 18, United
States Code) or international terrorism (as defined in section 2331(1) of such title).

February 2007

Page 44

Publication 1075

EXHIBIT 3

SEC. 6103(p)(4) SAFEGUARDS
Any Federal agency described in subsection (h)(2), (h)(5), (i)(1), (2), (3), (5), or (7), (j)(1),
(2), or (5), (k)(8), (l)(1), (2), (3), (5), (10), (11), (13), (14), or (17), or (o)(1), the General
Accounting Office, the Congressional Budget Office, or any agency, body, or
commission described in subsection (d), (i)(3)(B)(i) or (7)(A)(ii), or (l)(6), (7), (8), (9),
(12), (15), or (16) or any other person described in subsection (l)(16), (17), (19), or (20)
shall, as a condition for receiving returns or return information—
(A) establish and maintain, to the satisfaction of the Secretary, a permanent system of
standardized records with respect to any request, the reason for such request, and the
date of such request made by or of it and any disclosure of return or return information
made by or to it;
(B) establish and maintain, to the satisfaction of the Secretary, a secure area or place in
which such returns or return information shall be stored;
(C) restrict, to the satisfaction of the Secretary, access to the returns or return
information only to persons whose duties or responsibilities require access and to whom
disclosure may be made under the provisions of this title;
(D) provide such other safeguards which the Secretary determines (and which he
prescribes in regulations) to be necessary or appropriate to protect the confidentiality of
the returns or return information;
(E) furnish a report to the Secretary, at such time and containing such information as the
Secretary may prescribe, which describes the procedures established and utilized by
such agency, body, or commission, the General Accounting Office, or the Congressional
Budget Office for ensuring the confidentiality of returns and return information required
by this paragraph; and
(F) upon completion of use of such returns or return information—
(i) in the case of an agency, body, or commission described in subsection (d), (i)(3)(B)(i),
or (l)(6), (7), (8), (9), or (16), or any other person described in subsection (l)(16), (17),
(19), or (20) return to the Secretary such returns or return information (along with any
copies made therefrom) or make such returns or return information undisclosable in any
manner and furnish a written report to the Secretary describing such manner,
(ii) in the case of an agency described in subsections [5] (h)(2), (h)(5), (i)(1), (2), (3), (5)
or (7), (j)(1), (2), or (5), (k)(8), (l)(1), (2), (3), (5), (10), (11), (12), (13), (14), (15), or (17),
or (o)(1),,[6] the General Accounting Office, or the Congressional Budget Office, either—
(I) return to the Secretary such returns or return information (along with any copies made
therefrom),
(II) otherwise make such returns or return information undisclosable, or
(III) to the extent not so returned or made undisclosable, ensure that the conditions of
subparagraphs (A), (B), (C), (D), and (E) of this paragraph continue to be met with
respect to such returns or return information, and
(iii) in the case of the Department of Health and Human Services for purposes of
subsection (m)(6), destroy all such return information upon completion of its use in
providing the notification for which the information was obtained, so as to make such
information undisclosable;
except that the conditions of subparagraphs (A), (B), (C), (D), and (E) shall cease to
apply with respect to any return or return information if, and to the extent that, such
return or return information is disclosed in the course of any judicial or administrative
proceeding and made a part of the public record thereof. If the Secretary determines that

February 2007

Page 45

Publication 1075

any such agency, body, or commission, including an agency or any other person
described in subsection (l)(16), (17), (19), or (20), or the General Accounting Office or
the Congressional Budget Office has failed to, or does not, meet the requirements of this
paragraph, he may, after any proceedings for review established under paragraph (7),
take such actions as are necessary to ensure such requirements are met, including
refusing to disclose returns or return information to such agency, body, or commission,
including an agency or any other person described in subsection (l)(16), (17), (19), or
(20), or the General Accounting Office or the Congressional Budget Office until he
determines that such requirements have been or will be met. In the case of any agency
which receives any mailing address under paragraph (2), (4), (6), or (7) of subsection
(m) and which discloses any such mailing address to any agent or which receives any
information under paragraph (6)(A), (12)(B), or (16) of subsection (l) and which discloses
any such information to any agent, or any person including an agent described in
subsection (l)(16), this paragraph shall apply to such agency and each such agent or
other person (except that, in the case of an agent, or any person including an agent
described in subsection (l)(16), any report to the Secretary or other action with respect to
the Secretary shall be made or taken through such agency). For purposes of applying
this paragraph in any case to which subsection (m)(6) applies, the term “return
information” includes related blood donor records (as defined in section 1141(h)(2) of the
Social Security Act).

February 2007

Page 46

Publication 1075

EXHIBIT 4

IRC SEC. 7431 CIVIL DAMAGES FOR UNAUTHORIZED
DISCLOSURE OF RETURNS AND RETURN INFORMATION.
(a) IN GENERAL.(1) INSPECTION OR DISCLOSURE BY EMPLOYEE OF UNITED STATES.-If
any officer or employee of the United States knowingly, or by reason of negligence,
inspects or discloses any return or return information with respect to a taxpayer in
violation of any provision of section 6103, such taxpayer may bring a civil action for
damages against the United States in a district court of the United States.
(2) INSPECTION OR DISCLOSURE BY A PERSON WHO IS NOT AN
EMPLOYEE OF UNITED STATES.-If any person who is not an officer or employee of
the United States knowingly, or by reason of negligence, inspects or discloses any return
or return information with respect to a taxpayer in violation of any provision of section
6103, such taxpayer may bring a civil action for damages against such person in a
district court of the United States.
(b) EXCEPTIONS.-No liability shall arise under this section with respect to any
inspection or disclosure (1) which results from good faith, but erroneous, interpretation of section
6103, or
(2) which is requested by the taxpayer.
(c) DAMAGES.-In any action brought under subsection (a), upon a finding of liability on
the part of the defendant, the defendant shall be liable to the plaintiff in an amount equal
to the sum of(1) the greater of(A) $1,000 for each act of unauthorized inspection or disclosure of a
return or return information with respect to which such defendant is found liable,
or
(B) the sum of(i) the actual damages sustained by the plaintiff as a result of such
unauthorized inspection or disclosure, plus
(ii) in the case of a willful inspection or disclosure or an inspection
or disclosure which is the result of gross negligence, punitive damages,
plus
(2) the cost of the action.

February 2007

Page 47

Publication 1075

(d) PERIOD FOR BRINGING ACTION.-Notwithstanding any other provision of law, an
action to enforce any liability created under this section may be brought, without regard
to the amount in controversy, at any time within 2 years after the date of discovery by the
plaintiff of the unauthorized inspection or disclosure.
(e) NOTIFICATION OF UNLAWFUL INSPECTION AND DISCLOSURE.-If any person is
criminally charged by indictment or information with inspection or disclosure of a
taxpayer's return or return information in violation of(1) paragraph (1) or (2) of section 7213(a),
(2) section 7213A(a), or
(3) subparagraph (B) of section 1030(a)(2) of title 18, United States Code, the
Secretary shall notify such taxpayer as soon as practicable of such inspection or
disclosure.
(f) DEFINITIONS.-For purposes of this section, the terms "inspect", "inspection”, “return"
and "return information" have the respective meanings given such terms by section
6103(b).
(g) EXTENSION TO INFORMATION OBTAINED UNDER SECTION 3406.-For purposes
of this section(1) any information obtained under section 3406 (including information with
respect to any payee certification failure under subsection (d) thereof) shall be treated as
return information, and
(2) any inspection or use of such information other than for purposes of meeting
any requirement under section 3406 or (subject to the safeguards set forth in 6103) for
purposes permitted under section 6103 shall be treated as a violation of section 6103.
For purposes of subsection (b), the reference to section 6103 shall be treated as
including a reference to section 3406.

February 2007

Page 48

Publication 1075

EXHIBIT 5

IRC SEC. 7213 and 7213A UNAUTHORIZED DISCLOSURE OF
INFORMATION.
(a) RETURNS AND RETURN INFORMATION.
(1) FEDERAL EMPLOYEES AND OTHER PERSONS.-It shall be unlawful for
any officer or employee of the United States or any person described in section 6103(n)
(or an officer or employee of any such person), or any former officer or employee,
willfully to disclose to any person, except as authorized in this title, any return or return
information [as defined in section 6103(b)]. Any violation of this paragraph shall be a
felony punishable upon conviction by a fine in any amount not exceeding $5,000, or
imprisonment of not more than 5 years, or both, together with the costs of prosecution,
and if such offense is committed by any officer or employee of the United States, he
shall, in addition to any other punishment, be dismissed from office or discharged from
employment upon conviction for such offense.
(2) STATE AND OTHER EMPLOYEES.-It shall be unlawful for any person [not
described in paragraph (1)] willfully to disclose to any person, except as authorized in
this title, any return or return information [as defined in section 6103(b)] acquired by him
or another person under subsection (d), (i)(3)(B)(i), (1)(6), (7), (8), (9), (10), (12), (15) or
(16) or (m)(2), (4), (5), (6), or (7) of section 6103. Any violation of this paragraph shall be
a felony punishable by a fine in any amount not exceeding $5,000, or imprisonment of
not more than 5 years, or both, together with the cost of prosecution.
(3) OTHER PERSONS.-It shall be unlawful for any person to whom any return or
return information [as defined in section 6103(b)] is disclosed in an manner unauthorized
by this title thereafter willfully to print or publish in any manner not provided by law any
such return or return information. Any violation of this paragraph shall be a felony
punishable by a fine in any amount not exceeding $5,000, or imprisonment of not more
than 5 years, or both, together with the cost of prosecution.
(4) SOLICITATION.-It shall be unlawful for any person willfully to offer any item of
material value in exchange for any return or return information [as defined in 6103(b)]
and to receive as a result of such solicitation any such return or return information. Any
violation of this paragraph shall be a felony punishable by a fine in any amount not
exceeding $5,000, or imprisonment of not more than 5 years, or both, together with the
cost of prosecution.
(5) SHAREHOLDERS.--It shall be unlawful for any person to whom return or
return information [as defined in 6103(b) ] is disclosed pursuant to the provisions of
6103(e)(1)(D)(iii) willfully to disclose such return or return information in any manner not
provided by law. Any violation of this paragraph shall be a felony punishable by a fine in
any amount not exceeding $5,000, or imprisonment of not more than 5 years, or both,
together with the cost of prosecution.
SEC. 7213A. UNAUTHORIZED INSPECTION OF RETURNS OR RETURN
INFORMATION

February 2007

Page 49

Publication 1075

(a) PROHIBITIONS.(1) FEDERAL EMPLOYEES AND OTHER PERSONS.-It shall be unlawful for(A) any officer or employee of the United States, or
(B) any person described in section 6103(n) or an officer willfully to
inspect, except as authorized in this title, any return or return information.
(2) STATE AND OTHER EMPLOYEES.-It shall be unlawful for any person [not
described in paragraph (l)] willfully to inspect, except as authorized by this title, any
return information acquired by such person or another person under a provision of
section 6103 referred to in section 7213(a)(2).
(b) PENALTY.(1) IN GENERAL.-Any violation of subsection (a) shall be punishable upon
conviction by a fine in any amount not exceeding $1000, or imprisonment of not more
than 1 year, or both, together with the costs of prosecution.
(2) FEDERAL OFFICERS OR EMPLOYEES.-An officer or employee of the
United States who is convicted of any violation of subsection (a) shall, in addition to any
other punishment, be dismissed from office or discharged from employment.
(c) DEFINITIONS.-For purposes of this section, the terms "inspect", "return", and "return
information" have respective meanings given such terms by section 6103(b).

February 2007

Page 50

Publication 1075

EXHIBIT 6

CONTRACT LANGUAGE FOR GENERAL SERVICES
I. PERFORMANCE
In performance of this contract, the contractor agrees to comply with and assume
responsibility for compliance by his or her employees with the following requirements:
(1) All work will be done under the supervision of the contractor or the contractor's
employees.
(2) Any return or return information made available in any format shall be used only for
the purpose of carrying out the provisions of this contract. Information contained in such
material will be treated as confidential and will not be divulged or made known in any
manner to any person except as may be necessary in the performance of this contract.
Disclosure to anyone other than an officer or employee of the contractor will be
prohibited.
(3) All returns and return information will be accounted for upon receipt and properly
stored before, during, and after processing. In addition, all related output will be given
the same level of protection as required for the source material.
(4) The contractor certifies that the data processed during the performance of this
contract will be completely purged from all data storage components of his or her
computer facility, and no output will be retained by the contractor at the time the work is
completed. If immediate purging of all data storage components is not possible, the
contractor certifies that any IRS data remaining in any storage component will be
safeguarded to prevent unauthorized disclosures.
(5) Any spoilage or any intermediate hard copy printout that may result during the
processing of IRS data will be given to the agency or his or her designee. When this is
not possible, the contractor will be responsible for the destruction of the spoilage or any
intermediate hard copy printouts, and will provide the agency or his or her designee with
a statement containing the date of destruction, description of material destroyed, and the
method used.
(6) All computer systems processing, storing, or transmitting Federal tax information
must meet the requirements defined in NIST SP 800-53. To meet functional and
assurance requirements, the security features of the environment must provide for the
managerial, operational, and technical controls. All security features must be available
and activated to protect against unauthorized use of and access to Federal tax
information.
(7) No work involving Federal tax information furnished under this contract will be
subcontracted without prior written approval of the IRS.
(8) The contractor will maintain a list of employees authorized access. Such list will be
provided to the agency and, upon request, to the IRS reviewing office.

February 2007

Page 51

Publication 1075

(9) The agency will have the right to void the contract if the contractor fails to provide the
safeguards described above.
(10) (Include any additional safeguards that may be appropriate.)
II. CRIMINAL/CIVIL SANCTIONS:
(1) Each officer or employee of any person to whom returns or return information is or
may be disclosed will be notified in writing by such person that returns or return
information disclosed to such officer or employee can be used only for a purpose and to
the extent authorized herein, and that further disclosure of any such returns or return
information for a purpose or to an extent unauthorized herein constitutes a felony
punishable upon conviction by a fine of as much as $5,000 or imprisonment for as long
as 5 years, or both, together with the costs of prosecution. Such person shall also notify
each such officer and employee that any such unauthorized further disclosure of returns
or return information may also result in an award of civil damages against the officer or
employee in an amount not less than $1,000 with respect to each instance of
unauthorized disclosure. These penalties are prescribed by IRC sections 7213 and 7431
and set forth at 26 CFR 301.6103(n)-1.
(2) Each officer or employee of any person to whom returns or return information is or
may be disclosed shall be notified in writing by such person that any return or return
information made available in any format shall be used only for the purpose of carrying
out the provisions of this contract. Information contained in such material shall be treated
as confidential and shall not be divulged or made known in any manner to any person
except as may be necessary in the performance of the contract. Inspection by or
disclosure to anyone without an official need to know constitutes a criminal
misdemeanor punishable upon conviction by a fine of as much as $1,000 or
imprisonment for as long as 1 year, or both, together with the costs of prosecution. Such
person shall also notify each such officer and employee that any such unauthorized
inspection or disclosure of returns or return information may also result in an award of
civil damages against the officer or employee [United States for Federal employees] in
an amount equal to the sum of the greater of $1,000 for each act of unauthorized
inspection or disclosure with respect to which such defendant is found liable or the sum
of the actual damages sustained by the plaintiff as a result of such unauthorized
inspection or disclosure plus in the case of a willful inspection or disclosure which is the
result of gross negligence, punitive damages, plus the costs of the action. These
penalties are prescribed by IRC section 7213A and 7431.
(3) Additionally, it is incumbent upon the contractor to inform its officers and employees
of the penalties for improper disclosure imposed by the Privacy Act of 1974, 5 U.S.C.
552a. Specifically, 5 U.S.C. 552a(i)(1), which is made applicable to contractors by 5
U.S.C. 552a(m)(1), provides that any officer or employee of a contractor, who by virtue
of his/her employment or official position, has possession of or access to agency records
which contain individually identifiable information, the disclosure of which is prohibited by
the Privacy Act or regulations established thereunder, and who knowing that disclosure
of the specific material is prohibited, willfully discloses the material in any manner
to any person or agency not entitled to receive it, shall be guilty of a misdemeanor and
fined not more than $5,000.

February 2007

Page 52

Publication 1075

III. INSPECTION:
The IRS and the Agency shall have the right to send its officers and employees into the offices
and plants of the contractor for inspection of the facilities and operations provided for the
performance of any work under this contract. On the basis of such inspection, specific measures
may be required in cases where the contractor is found to be noncompliant with contract
safeguards.

February 2007

Page 53

Publication 1075

EXHIBIT 7

DATA WAREHOUSE CONCEPTS & SECURITY REQUIREMENTS
Purpose
The purpose of this document is to provide an overview of Data Warehousing and data
storage concepts and to define the security requirements necessary to protect these
environments. While some security controls may appear redundant to those contained in
the Publication 1075, this is necessary to allow Exhibit 7 to be used as a stand-alone
document. As a rule, all requirements contained within the main text of Publication 1075
will also apply to any Data Warehousing environments that are being used by Federal,
state, or local agencies and these environments incorporate FTI. This will apply to
authorized third parties or contractors who accept Federal Tax Information (FTI).
This document is intended to describe the controls that are specific to Data
Warehousing-type environments. As the term Data Warehousing is used, the concepts
will be applied to all complex data environments, including Data Warehousing, data
mining, and data marts.
Audience
This document is intended for Federal, State, and local agencies, as well as contractor
personnel and third party personnel who use FTI. The document is to be used as a
planning document and is intended to support the development and deployment of Data
Warehousing architectures and/or architectures of a similar environment, such as Data
Marts.
Background
The IRS often uses specialized taxpayer data resources for the purpose of research,
trend analysis, and specialized studies which enhance the agency’s ability to
recommend changes and improvements to the tax code, and for other purposes. These
resources may take the form of Data Warehouses (DW) and Data Marts (DM) solutions.
Similarly, Federal, State, and local agencies may use the data warehousing
opportunities to improve tax code compliance or to conduct similar research, trend
analysis, and specialized studies.
A Data Warehouse is a structure that is designed to distribute data from multiple arenas
to the primary enterprise system. A DW collects, extracts, transforms, transports, and
loads data for a distribution to various DM. A Data Mart is a structure designed for
access, which is used to facilitate client user support.
In the context of FTI within agencies, the DW stores sets of historical data, which
contains specific taxpayer information, as well as summary information and historical
data.
A DW concept is different from a traditional networked enterprise in four ways: 1) a DW
is subject oriented instead of application oriented; 2) has its data summarized instead of
detailed, 3) is analysis driven instead of transaction driven, and 4) has general allinclusive data structures rather than narrow, restricted data structures.

February 2007

Page 54

Publication 1075

A DW is structured to separate analysis work from transaction work and allows large
amount of data to be consolidated from several sources. The security controls remain
constant with operational enterprises and will be applicable to a DW.
In a DW the scope of security changes for the different dimensions of data management.
Information enters a DW through a staging area where it goes through a process of
extraction, transformation, and loading. This is referred to as Extract/Transform/Load
(ETL). Additionally, a DW is operated by query or search engine tool. The use of endto-end security, the Data Warehouse ensures the confidentiality, privacy and integrity of
FTI. The security of the Data Warehouse should include all aspects of the warehouse,
including hardware, software, data transport, and data storage.
Data Warehousing Implications
FTI placed in a Data Warehouse environment may only be used for "tax administration"
purpose or for other authorized purposed defined within Publication 1075. As part of the
Data Warehouse, FTI data must retain its identity as FTI (i.e., it must be obvious that the
IRS is the source of the data). Whenever calculations or data manipulations are being
performed that could commingle FTI with any other data, the access to the FTI must be
restricted to agency staff with a need-to-know and their contractors/agents as authorized
by law. This is defined in the primary publication but is being reinforced for clarification.
Security
Security controls for Data Warehousing concepts are derived from NIST SP 800-53,
Recommended Security Controls for Federal Information Systems. These controls
address the areas of management, operational, and technical controls.
When all controls are implemented and managed, these controls provide effective
safeguards for the confidentiality, integrity reliability, and availability of the data. For this
document, the defined controls have been mapped to the classes and families of the
NIST SP 800-53 to allow technical personnel to easily review NIST controls and
understand how these apply to security environments.
The next sections will define specific controls related to Data Warehousing
environments. If no additional controls are required, the section will identify this fact.
These controls provide unique controls for Data Warehousing environments. Otherwise,
the requirements in Publication 1075 will apply.
Management Controls
The following section identifies high-level management controls that shall be used within
a data warehousing environment.
Risk Assessment:
1. The agency shall have a Risk Management Program in place to ensure each
program is assessed for risk. Risks of the data warehousing environments shall
be assessed. Any risk documents shall identify and document all vulnerabilities,
associated with the Data Warehousing environment.

February 2007

Page 55

Publication 1075

Planning:
2. Planning is crucial to the development of a new environment. A Security Plan
shall be in place to address organizational policies, security testing, rules of
behavior, contingency plans, architecture/network diagrams, and requirements
for security reviews. While the plan will provide planning guidelines, this will not
replace requirements documents, which contain specific details and procedures
for security operations.
3. Policies and procedures are required to define how activities and day-to-day
procedures will occur. This will contain the specific policies, relevant for all of the
security disciplines covered in this document. As this relates to data
warehousing, any Data Warehousing documents can be integrated into overall
security procedures. A section shall be dedicated to data warehouses to define
the controls specific to that environment.
4. Develop policies and procedures to document all existing business processes.
Ensure that roles are identified for the organization, regarding the specific roles
being created and the responsibilities for these roles.
5. Within the security planning and policies, the purpose or function of the
warehouse shall be defined. The business process shall include a detailed
definition of configurations and the functions of the hardware and software
involved. In general, the planning shall define any unique issues related to data
warehousing.
6. Define how “legacy system data” will be brought into the data warehouse and
how the legacy data that is FTI will be cleansed for the ETL transformation
process.
7. The policy shall ensure that FTI will not be subject to Public Disclosure. Only
clients or end users can query FTI data with a concrete “need to know”.
System and Services Acquisition:
8. Acquisition security needs to be explored. As FTI is used within data
warehousing environments, it will be important that the services and acquisitions
have adequate security in place, including blocking information to contractors,
where these contractors are not authorized to access FTI.
Certification, Accreditation, and Security Assessments:
9. Certification, accreditation, and security and risk assessments are accepted best
practices used to ensure that appropriate levels of control exist, are being
managed and are compliant with all Federal and State laws or statutes.
State and local agencies shall develop a process or policy to ensure that data
warehousing security meets the baseline security requirements defined in NIST
SP 800-53, February 2005. The process or policy must contain the methodology
being used by the State or local agency to inform management, define
accountability and address known security vulnerabilities.
Risk assessments should follow the guidelines provided in NIST Publication 80030 Risk Management Guide for Information Technology Systems, July 2002.

February 2007

Page 56

Publication 1075

Operational Controls
The following section identifies high-level operational controls that shall be used within a
Data Warehousing environment:
Personnel Security
10. Personnel clearances may vary from agency to agency. As a rule, personnel with
access to FTI shall have a completed background investigation. In addition, when
a staff member has administrator access to access the entire set of FTI records,
additional background checks may be determined necessary. All staff interacting
with DW and DM resources are subject to background investigations in order to
ensure their trustworthiness, suitability, and work role need-to-know. Access to
these resources must be authorized by operational supervisors, granted by the
resource owners, and audited by internal security auditors.
Physical Security and Environmental Protection
11. There are no special physical security controls for a Data Warehousing
environment.
Contingency Planning
12. On line data resources shall be provided adequate tools for the back-up, storage,
restoration, and validation of data. By using new technologies, agencies will
ensure the data being provided is reliable. As necessary, based upon risk and
cost, these tools shall be implemented.
13. Both incremental and special purpose data back-up procedures are affected,
accompanied by off-site storage protections and regular test-status restoration to
validate disaster recovery and business process continuity. Standards and
guidelines for these processes are bound by agency policy, and are tested and
verified. Though already addressed in the Publication 1075, this needs to be
evaluated to ensure that all data resources are synchronized and restored to
allow recreation of the data to take place.
Configuration Management
14. The agency shall have a process and documentation to identify and analyze how
existing FTI is used and how FTI is queried or targeted by end users. FTI parts
of the system shall be mapped to follow the flow of the query from a client
through the authentication server to the release of the query from the database
server. During the life cycle of the DW, on-line and architectural adjustments and
changes will occur. The agency shall document these changes and assure that
FTI is always secured from unauthorized access or disclosure.
Maintenance
15. There are no unique maintenance requirements for Data Warehousing
environments.
System and Information Integrity
16. There are no unique system and information integrity requirements for Data
Warehousing environments.

February 2007

Page 57

Publication 1075

Media Protection
17. The agency shall have policy and procedures in place describing the Cleansing
Process at the staging area and how the ETL process cleanses the FTI when it is
extracted, transformed and loaded. Additionally, describe the process of object
re-use once FTI is replaced from data sets. IRS requires all FTI is removed by a
random overwrite software program.
Incident Response
18. Intrusion detection software shall be installed and maintained to monitor
networks for any unauthorized attempt to access tax data.
Awareness & Training
19. The agency shall have a “training program” in place that will include how FTI
security requirements will be communicated for end users. Training shall be user
specific to ensure all personnel receive appropriate training for a particular job,
such as training required for administrators or auditors.
Technical Controls
The following section identifies high-level technical controls that shall be used within a
data warehousing environment.
Identification & Authentication
20. The agency shall configure the web services to be authenticated before access is
granted to users via an authentication server.
21. Business roles and rules shall be imbedded at either the authentication level or
application level. In either case, roles must be in place to ensure only authorized
personnel have access to FTI information.
22. Authentication shall be required both at the operating system level and at the
application level, when accessing the data warehousing environment.
Access Control
23. Access to systems shall be granted based upon the need to perform job
functions.
24. Agencies shall identify which application programs use FTI and how access to
FTI is controlled. The access control to application programs relates to how file
shares and directories apply file permissions to ensure only authorized personnel
have access to the areas containing FTI.
25. The agency shall have security controls in place that include preventative
measures to keep an attack from being a success. These security controls shall
also include detective measures in place to let the IT staff know there is an attack
occurring. If an interruption of service occurs, the agency shall have additional
security controls in place that include recovery measures to restore operations.
26. Within the DW, the agency shall protect FTI as sensitive data and be granted
access to FTI for the aspects of their job responsibility. The agency shall enforce
effective access controls so that end users have access to programs with the

February 2007

Page 58

Publication 1075

least privilege needed to complete the job. The agency shall set up access
controls in their DW based on personnel clearances. Access controls in a data
warehouse are generally classified as 1) General Users; 2) Limited Access
Users; and 3) Unlimited Access Users. FTI shall always fall into the Limited
Access Users category.
27. All FTI shall have an owner assigned so that there is responsibility and
accountability in protecting FTI. Typically, this role will be assigned to a
management official such as an accrediting authority.
28. The agency shall configure control files and datasets to enable the data owner to
analyze and review both authorized and unauthorized accesses.
29. The database servers that control FTI applications will copy the query request
and load it to the remote database to run the application and transform its output
to the client. Therefore, access controls must be done at the authentication
server.
30. Web-enabled application software shall:
a) Prohibit generic meta-characters from being present in input data
b) Have all database queries constructed with parameterized stored procedures
to prevent SQL injection
c) Protect any variable used in scripts to prevent direct OS commands attacks
d) Have all comments removed for any code passed to the browser
e) Not allow users to see any debugging information on the client, and
f)

Be checked before production deployment to ensure all sample, test and
unused files have been removed from the production system.

Audit & Accountability
31. The agency shall ensure that audit reports are created and reviewed for datawarehousing-related access attempts.
32. A data warehouse must capture all changes made to data, including: additions,
modifications, or deletions. If a query is submitted, the audit log must identify the
actual query being performed, the originator of the query, and relevant
time/stamp information. For example, if a query is made to determine the number
of people making over $50,000, by John Doe, the audit log would store the fact
that John Doe made a query to determine the people who made over $50,000.
The results of the query are not as significant as the types of query being
performed.
System & Communication Protection
33. Whenever FTI is located on both production and test environments, these
environments will be segregated. This is especially important in the development
stages of the data warehouse.

February 2007

Page 59

Publication 1075

34. All Internet transmissions will be encrypted using HTTPS protocol utilizing
Secure Sockets Layer (SSL) encryption based on a certificate containing a key
no less than 128 bits in length, or FIPS 140-2 compliant, whichever is stronger.
This will allow information to be protected between the server and the
workstation. During the Extract, Transform and Load stages of data entering a
warehouse, data is at its highest risk. Encryption shall occur as soon as
possible. All sessions shall be encrypted and provide end-to-end encryption, i.e.,
from workstation to point of data.
35. Web server(s) that receive online transactions shall be configured in a
“Demilitarized Zone” (DMZ) in order to receive external transmissions but still
have some measure of protection against unauthorized intrusion.
36. Application server(s) and database server(s) shall be configured behind the
firewalls for optimal security against unauthorized intrusion. Only authenticated
applications and users shall be allowed access to these servers.
37. Transaction data shall be “swept” from the web server(s) at frequent intervals
consistent with good system performance, and removed to a secured server
behind the firewalls, to minimize the risk that these transactions could be
destroyed or altered by intrusion.
38. Anti-virus software shall be installed and maintained with current updates on all
servers and clients that contain tax data.
39. For critical online resources, redundant systems shall be employed with
automatic failover capability.

February 2007

Page 60

Publication 1075

Exhibit 8

SECURITY CONTROLS CATALOG
MANAGEMENT SECURITY CONTROLS
FAMILY: RISK ASSESSMENT
(1) RISK ASSESSMENT POLICY AND PROCEDURES: Agencies must develop,
document, disseminate and update risk assessment policy and procedures to facilitate
implementation of risk assessment controls. The risk assessment policy must be
included as part of the agency security policy, or developed specifically for information
systems used to process, store or transmit Federal tax information. The risk assessment
policy must include purpose, scope, security controls (existing and planned), roles and
responsibilities.
(2) RISK ASSESSMENT: Agencies must conduct risk assessments to determine the
potential magnitude of harm resulting from the unauthorized access, use or disclosure of
Federal tax information and information systems providing logical access to such
information. The risk assessment must include or take into consideration vulnerabilities,
threat sources, and security controls (existing and planned) to determine the resulting
level of residual risk posed to Federal tax information based on operation of the
information system.
(3) RISK ASSESSMENT UPDATE: Agencies must update the risk assessment every
two years or when significant changes to the information system, facilities hosting the
system, or other conditions affect the security posture of the information system.
FAMILY: SECURITY PLANNING
(1) SECURITY PLANNING POLICY AND PROCEDURES: Agencies must develop,
document, disseminate and update security planning policy and procedures to facilitate
implementation of security planning controls. The security planning policy must be
included as part of the agency security policy, or developed specifically for information
systems used to process, store or transmit Federal tax information. The security
planning policy must include purpose, scope, security controls (existing and planned),
roles and responsibilities. [The Safeguard Procedures Report qualifies as the security
planning document used by agencies to describe management, operational and
technical security controls (existing and planned) protecting information systems and
Federal tax information - - within the context of the Safeguard program.]
(2) RULES OF BEHAVIOR: Agencies must establish a set of information system usage
rules for all information system users. The rules must be readily available to all users,
and describe user responsibilities and expected behavior when using the information
system. Signed acknowledgements must be received from users: i) indicating they have
read, understand, and agree to comply with the rules of behavior; and ii) before
authorizing access to the information system and Federal tax information. Electronic
signatures are acceptable for use in acknowledging rules of behavior.

February 2007

Page 61

Publication 1075

FAMILY: SYSTEM AND SERVICES ACQUISITION
(1) SYSTEM AND SERVICES ACQUISITION POLICY AND PROCEDURES: Agencies
must develop, document, disseminate and update system and services acquisition policy
and procedures to facilitate implementation of system and services acquisition controls.
The system and services acquisition policy must be included as part of the agency
security policy, or developed specifically for information systems used to process, store
or transmit Federal tax information. The system and services acquisition policy must
include purpose, scope, security controls (existing and planned), roles and
responsibilities.
(2) INFORMATION SYSTEM DOCUMENTATION: Agencies must maintain
documentation for the information system and its key components. Information system
documentation must be readily available, protected when required and distributed to
authorized personnel. Examples of acceptable system documentation include guides or
manuals for privileged users (e.g., administrators, programmers, production control) and
end-users on configuring, installing and operating the information system; and optimizing
the system’s security features.
(3) OUTSOURCED INFORMATION SYSTEM SERVICES: Agencies must require thirdparty providers of Federal tax information system services to employ adequate security
controls in accordance with established service level agreements, applicable Federal
laws, policies, regulations, standards and guidance. Third-party providers must abide by
the same security control specifications and documentation requirements applicable to
agencies. Agencies must monitor security control compliance.
FAMILY: SECURITY ASSESSMENT
(1) SECURITY ASSESSMENT POLICY AND PROCEDURES: Agencies must develop,
document, disseminate and update security assessment policy and procedures to
facilitate implementation of security assessment controls. The security assessment
policy must be included as part of the agency security policy, or developed specifically
for information systems used to process, store or transmit Federal tax information. The
security assessment policy must include purpose, scope, security controls (existing and
planned), roles and responsibilities.
(2) SECURITY ASSESSMENTS: Agencies must conduct security control assessments
for the information system to determine the extent to which controls are implemented
correctly, operating as intended, and achieve the security requirements established for
the system.
(3) PLAN OF ACTION AND MILESTONES: Agencies must develop and update
quarterly a plan of action and milestones for the information system. The plan must
include documentation of the agency’s planned, implemented and evaluated remedial
actions to eliminate or mitigate findings from security control assessments, security
impact analyses, or continuous monitoring activities.
(4) CONTINUOUS MONITORING: Agencies routinely monitor the security controls in
the information system. Agencies must establish the selection criteria for control
monitoring and selects the associated security controls employed within the information
system to facilitate continuous monitoring. Continuous monitoring activities include

February 2007

Page 62

Publication 1075

configuration management, impact analysis of system changes, routine security control
assessments and status reporting.
OPERATIONAL SECURITY CONTROLS
FAMILY: PERSONNEL SECURITY
(1) PERSONNEL SECURITY POLICY AND PROCEDURES: Agencies must develop,
document, disseminate and update personnel security policy and procedures to facilitate
implementation of personnel security controls. The personnel security policy must be
included as part of the agency security policy, or developed specifically for information
systems used to process, store or transmit Federal tax information. The personnel
security policy must include purpose, scope, security controls (existing and planned),
roles and responsibilities.
(2) POSITION CATEGORIZATION: Agencies must assign a risk designation to
positions requiring access to Federal tax information and establish screening criteria for
individuals filling those positions. Agencies must review and revise position risk
designations periodically.
(3) PERSONNEL SCREENING: Agencies must screen individuals requiring access to
Federal tax information and information systems before authorizing access.
(4) PERSONNEL TERMINATION: When employment is terminated, agencies must
terminate Federal tax information access, information system access; ensure the return
of all agency information system-related property (e.g., keys, identification cards,
building passes), and ensure appropriate personnel have access to official records
created for the terminated employee.
(5) PERSONNEL TRANSFER: Agencies must review information systems/facilities
access authorizations when individuals are reassigned or transferred to other positions
within the organization and initiates appropriate actions such as reissuing keys,
identification cards, building passes; closing old accounts and establishing new
accounts; and changing system access authorizations.
(6) ACCESS AGREEMENTS: Agencies must complete appropriate access agreements
(e.g., nondisclosure agreements, acceptable use agreements, rules of behavior, conflictof-interest agreements) for individuals before authorizing access to Federal tax
information and information systems providing access to such information.
FAMILY: CONTINGENCY PLANNING
(1) CONTINGENCY PLANNING POLICY AND PROCEDURES: Agencies must develop,
document, disseminate and update contingency planning policy and procedures to
facilitate implementation of contingency planning controls. The contingency planning
policy must be included as part of the agency security policy, or developed specifically
for information systems used to process, store or transmit Federal tax information. The
contingency planning policy must include purpose, scope, security controls (existing and
planned), roles and responsibilities.

February 2007

Page 63

Publication 1075

(2) ALTERNATE STORAGE SITES: Agencies must identify an alternate storage site
and initiate necessary agreements to facilitate secure storage of backups for Federal tax
information and the information system.
(3) TELECOMMUNICATIONS SERVICES: Agencies must identify primary and alternate
telecommunications services to support the information system and initiate necessary
agreements to facilitate the resumption of system operations when the primary
telecommunications capabilities are unavailable. Agencies must ensure the primary and
alternate telecommunications services employs acceptable, cost-effective information
protection techniques, please refer to section 5.7 Transmitting Federal Tax Information.
(4) INFORMATION SYSTEM BACKUP: Agencies must conduct backups of user-level
and system-level information (including system State information) contained in the
information system and store backup information at an appropriately secured location.
FAMILY: CONFIGURATION MANAGEMENT
(1) CONFIGURATION MANAGEMENT POLICY AND PROCEDURES: Agencies must
develop, document, disseminate and update configuration management policy and
procedures to facilitate implementation of configuration management controls. The
configuration management policy must be included as part of the agency security policy,
or developed specifically for information systems used to process, store or transmit
Federal tax information. The configuration management policy must include purpose,
scope, security controls (existing and planned), roles and responsibilities.
(2) ACCESS RESTRICTIONS FOR CHANGE: Agencies must enforce access
restrictions associated with changes to the information system.
(3) CONFIGURATION SETTINGS: Agencies must configure the security settings of
information technology products to the most restrictive mode consistent with information
system operational requirements.
(4) LEAST FUNCTIONALITY: Agencies must configure the information system to
provide only essential capabilities and specifically prohibits and/or restricts the use of
unnecessary functions, ports, protocols, or services.
FAMILY: SYSTEM MAINTENANCE
(1) SYSTEM MAINTENANCE POLICY AND PROCEDURES: Agencies must develop,
document, disseminate and update system maintenance policy and procedures to
facilitate implementation of system maintenance controls. The system maintenance
policy must be included as part of the agency security policy, or developed specifically
for information systems used to process, store or transmit Federal tax information. The
system maintenance policy must include purpose, scope, security controls (existing and
planned), roles and responsibilities.
(2) MAINTENANCE TOOLS: Agencies must approve, control and monitor the use of
information system maintenance tools.
(3) REMOTE MAINTENANCE: Agencies must approve, control and monitor remotely
executed maintenance and diagnostic activities.

February 2007

Page 64

Publication 1075

FAMILY: SYSTEM AND INFORMATION INTEGRITY
(1) SYSTEM AND INFORMATION INTEGRITY POLICY AND PROCEDURES:
Agencies must develop, document, disseminate and update system and information
integrity policy and procedures to facilitate implementation of system and information
integrity controls. The system and information integrity policy must be included as part
of the agency security policy, or developed specifically for information systems used to
process, store or transmit Federal tax information. The system and information integrity
policy must include purpose, scope, security controls (existing and planned), roles and
responsibilities.
(2) FLAW REMEDIATION: Agencies must identify, report, and correct information
system flaws. Agencies must promptly install newly released security patches, service
packs, and hot fixes; and test security patches, service packs and hot fixes for
effectiveness and potential adverse effects before installation on the information system.
(3) MALICIOUS CODE PROTECTION: Agencies must employ virus protection
mechanisms at essential information system entry and exit points (e.g., firewalls, routers,
remote-access servers) and at workstations or servers on the network. Agencies must
update virus protection mechanisms (including the latest virus definitions) when new
releases are available.
(4) INTRUSION DETECTION TOOLS AND TECHNIQUES: Agencies must employ tools
and techniques (e.g., intrusion detection systems, virus protection software, log
monitoring software) to monitor events on the information system, detect attacks and
identify unauthorized use of the system.
(5) INFORMATION INPUT RESTRICTIONS: Agencies must restrict Federal tax
information input to the information system to authorized personnel only.
(6) INFORMATION OUTPUT HANDLING AND RETENTION: Agencies must handle
and retain Federal tax information output from the information in accordance with the
agency’s need and use policy.
FAMILY: INCIDENT RESPONSE
(1) INCIDENT RESPONSE POLICY AND PROCEDURES: Agencies must develop,
document, disseminate and update incident response policy and procedures to facilitate
implementation of incident response controls. The incident response policy must be
included as part of the agency security policy, or developed specifically for information
systems used to process, store or transmit Federal tax information. The incident
response policy must include purpose, scope, security controls (existing and planned),
roles and responsibilities.
(2) INCIDENT RESPONSE TRAINING: Agencies must train personnel in their incident
response roles and responsibilities with respect to the information system and Federal
tax information; and provide refresher training on an annual basis.
(3) INCIDENT MONITORING: Agencies must track and document information system
security incidents.
FAMILY: SECURITY AWARENESS AND TRAINING

February 2007

Page 65

Publication 1075

FAMILY: SECURITY AWARENESS AND TRAINING
(1) SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES:
Agencies must develop, document, disseminate and update security awareness and
training policy and procedures to facilitate implementation of security awareness and
training controls. The security awareness and training policy must be included as part of
the agency security policy, or developed specifically for information systems used to
process, store or transmit Federal tax information. The security awareness and training
policy must include purpose, scope, security controls (existing and planned), roles and
responsibilities.
(2) SECURITY AWARENESS: Agencies must educate all users (including managers
and senior executives) on the basic information system and Federal tax information
security awareness materials before authorizing access to the system and at least
annually thereafter.
(3) SECURITY TRAINING: Agencies must identify personnel with significant information
system security roles and responsibilities, document those roles and responsibilities, and
provide appropriate information system security training before authorizing access to the
system and annually thereafter.
TECHNICAL SECURITY CONTROLS
FAMILY: IDENTIFICATION AND AUTHENTICATION
(1) IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES:
Agencies must develop, document, disseminate and update identification and
authentication policy and procedures to facilitate implementation of identification and
authentication controls. The identification and authentication policy must be included as
part of the agency security policy, or developed specifically for information systems used
to process, store or transmit Federal tax information. The identification and
authentication policy must include purpose, scope, security controls (existing and
planned), roles and responsibilities.
(2) USER IDENTIFICATION AND AUTHENTICATION: Agencies must ensure the
information system has the capability to uniquely identify and authenticate users or
processes acting on behalf of users.
(3) IDENTIFIER MANAGEMENT: Agencies must manage user identifiers by uniquely
identifying each user, verifying the identity of each user, receiving authorization to issue
a user identifier from an appropriate agency official, disabling user identifiers after 90
days of inactivity and archiving user identifiers.
FAMILY: ACCESS CONTROL
(1) ACCESS CONTROL POLICY AND PROCEDURES: Agencies must develop,
document, disseminate and update access control policy and procedures to facilitate
implementation of access controls. The access control policy must be included as part
of the agency security policy, or developed specifically for information systems used to
process, store or transmit Federal tax information. The access control policy must
include purpose, scope, security controls (existing and planned), roles and
responsibilities.

February 2007

Page 66

Publication 1075

(2) ACCOUNT MANAGEMENT: Agencies must manage information system accounts,
including establishing, activating, modifying, reviewing, disabling and removing
accounts. Agencies must review information system accounts routinely.
(3) ACCESS ENFORCEMENT: Agencies must ensure the information system enforces
assigned authorizations for controlling access to the information system and Federal tax
information. Access control policies and associated access enforcement mechanisms
are employed by agencies to control access between users (or processes acting on
behalf of users) and objects (e.g., devices, files, records, processes, programs,
domains) in the information system. Access enforcement mechanisms are employed at
the application level, when necessary, to provide increased information security for
agencies.
(4) INFORMATION FLOW ENFORCEMENT: Agencies must ensure the information
system enforces assigned authorizations for controlling the flow of information within the
system and between interconnected systems. Examples of flow control enforcement
include firewall and router devices that employ rule sets or establish configuration
settings to restrict information system services or provide packet filtering capabilities.
(5) SEPARATION OF DUTIES: Agencies must ensure the information system enforces
separation of duties through assigned access authorizations. Agencies must establish
appropriate divisions of responsibility and separate duties as needed to eliminate
conflicts of interest in the responsibilities of individuals.
(6) LEAST PRIVILEGE: Agencies must ensure the information system enforces the
most restrictive set of rights/privileges or accesses needed by users (or processes acting
on behalf of users).
(7) UNSUCCESSFUL LOGIN ATTEMPTS: Agencies must ensure the information
system enforces a limit of 3 consecutive invalid access attempts by a user... The
information system automatically locks the account/node until the help desk unlocks the
account/node when the maximum number of unsuccessful attempts is exceeded.
(8) SYSTEM NOTIFICATION USE: Agencies must ensure the information system
displays an approved notification message before granting system access informing
users that: i) the user is accessing a U.S. Government information system; (ii) system
usage may be monitored, recorded and subject to audit; (iii) unauthorized use of the
system is prohibited and subject to criminal and civil penalties; and (iv) the system usage
notification message provides appropriate privacy and security notices (based on
associated privacy and security policies or summaries), and remains on the screen until
the user takes explicit actions to logon to the information system.
(9) SESSION LOCK: Agencies must ensure the information system prevents further
access to the system by initiating a session lock that remains in effect until the user
reestablishes access using appropriate identification and authentication procedures.
Users can directly initiate session locking mechanisms. The information system also
activates session locking mechanisms automatically after 15 minutes of inactivity.
(10) SESSION TERMINATION: Agencies must ensure the information system
automatically terminates a session after [predetermined time period] of inactivity.

February 2007

Page 67

Publication 1075

(11) REMOTE ACCESS: Agencies must document, monitor, and control all methods of
remote access (e.g., dial-up, Internet) to the information system including remote access
for privileged functions. Appropriate agency officials must authorize each remote access
method for the information system and authorize only the necessary users for each
access method.
FAMILY: AUDIT AND ACCOUNTABILITY
(1) AUDIT AND ACCOUNTABILITY POLICY AND PROCEDURES: Agencies must
develop, document, disseminate and update audit and accountability policy and
procedures to facilitate implementation of audit and accountability controls. The audit
and accountability policy must be included as part of the agency security policy, or
developed specifically for information systems used to process, store or transmit Federal
tax information. The audit and accountability policy must include purpose, scope,
security controls (existing and planned), roles and responsibilities.
(2) AUDITABLE EVENTS: Agencies must ensure the information system generates
audit records for the security-relevant events. Please refer to Exhibit 10.
(3) CONTENT OF AUDIT RECORDS: Agencies must ensure the information system
captures sufficient information in audit records to establish what events occurred, the
sources of the events, and the outcomes of the events. Audit record content typically
includes: date and time of event, type of event, subject identity, the outcome (success or
failure of the event), and the component of the information system where the event
occurred.
(4) AUDIT STORAGE CAPACITY: Agencies must allocate sufficient audit record
storage capacity and configure auditing to prevent such capacity from being exceeded.
(5) AUDIT PROCESSING: In the event of an audit failure or audit storage capacity
being reached, Agencies must ensure the information system alerts appropriate agency
officials and takes the appropriate additional actions (e.g., shutdown the system or notify
the system administrator).
(6) AUDIT MONITORING, ANALYSIS, AND REPORTING: Agencies must regularly
review/analyze audit records for indications of inappropriate or unusual activity,
investigate suspicious activity or suspected violations, report findings to appropriate
officials, and take necessary actions.
(7) TIME STAMPS: Agencies must ensure the information system provides time stamps
for use in audit record generation.
(8) PROTECTION OF AUDIT INFORMATION: Agencies must ensure the information
system protects audit information and audit tools from unauthorized access,
modification, and deletion.
(9) AUDIT RETENTION: Agencies must retain audit logs for 6 years to support afterthe-fact investigations of security incidents and to meet information retention
requirements.

February 2007

Page 68

Publication 1075

FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
(1) SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURES:
Agencies must develop, document, disseminate and update system and
communications protection policy and procedures to facilitate implementation of system
and communications protection controls. The system and communications protection
policy must be included as part of the agency security policy, or developed specifically
for information systems used to process, store or transmit Federal tax information. The
system and communications protection policy must include purpose, scope, security
controls (existing and planned), roles and responsibilities.
(2) INFORMATION REMNANTS: Agencies must ensure the information system
prevents unauthorized and unintended information transfer via shared system resources.
Control of information remnants, also referred to as object reuse, prevents information
produced by previous users (or processes acting on behalf of a previous user) from
being reused by current users or processes after that resource is released or reallocated
back to the information system.
(3) TRANSMISSION CONFIDENTIALITY: Agencies must ensure the information
system protects the confidentiality of transmitted information.
(4) USE OF VALIDATED CRYPTOGRAPHY: When cryptography is employed in the
information system, agencies must ensure the information system executes all
cryptographic operations using FIPS 140-2 validated cryptographic modules with
approved modes of operation. Please refer to section 5.7 Transmitting Federal Tax
Information for acceptable, cost-effective telecommunications protection techniques.

February 2007

Page 69

Publication 1075

Exhibit 9

PASSWORD MANAGEMENT GUIDELINES
Control Password Management Guidance
No.
01
Passwords shall be a minimum length of 6-8 characters in a combination of alpha and
numeric or special characters.
02

Passwords shall be changed every 90 days, at a minimum, for standard user accounts
to reduce the risk of compromise through guessing, password cracking or other attack
& penetration methods.

03

Passwords shall be changed every 60 days, at a minimum, for privileged user
accounts to reduce the risk of compromise through guessing, password cracking or
other attack and penetration methods.

04

Password changes for standard and privileged users shall be systematically enforced
where possible.

05

Passwords shall be systematically disabled after 90 days of inactivity to reduce the
risk of compromise through guessing, password cracking or other attack and
penetration methods.

06

Users shall be prohibited from using their last six passwords to deter reuse of the
same password.

07

Users shall be prohibited from changing their passwords for at least 15 days after a
recent change. Meaning, the minimum password age limit shall be 15 days after a
recent password change.

08

Privileged users shall be able to override the minimum password age limit for users
when necessary to perform required job functions.

09

The information system shall routinely prompt users to change their passwords within
5-14 days before such password expires.

10

User account lockout feature shall disable the user account after 3 unsuccessful login
attempts.

11

Account lockout duration shall be permanent until an authorized system administrator
reinstates the user account.

12

Default vendor passwords shall be changed upon successful installation of the
information system product.

13

System initialization (boot) settings shall be password-protected.

February 2007

Page 70

Publication 1075

Control Password Management Guidance
No.
14
Clear-text representation of passwords shall be suppressed (blotted out) when entered
at the login screen.
15
Passwords shall not be automated through function keys, scripts or other methods
where passwords may be stored on the system.
16
17

18

Null passwords shall be prohibited to reduce the risk of compromise through rogue
enticement techniques or other attack and penetration methods.
Use of dictionary words, popular phrases, or obvious combinations of letters and
numbers in passwords shall be prohibited when possible. Obvious combinations of
letters and numbers include first names, last names, initials, pet names, user accounts
spelled backwards, repeating characters, consecutive numbers, consecutive letters,
and other predictable combinations and permutations.
Users shall commit passwords to memory, avoid writing passwords down and never
disclose passwords to others (e.g., with a co-worker in order to share files).

February 2007

Page 71

Publication 1075

Exhibit 10

SYSTEM AUDIT MANAGEMENT GUIDELINES
Event
No.
01

System Auditing Guidance
The audit trail shall capture all successful login and logoff attempts.

02

The audit trail shall capture all unsuccessful login and authorization attempts.

03

The audit trail shall capture all identification and authentication attempts.

04

The audit trail shall capture all actions, connections and requests performed by
privileged users (a user who, by virtue of function, and/or seniority, has been allocated
powers within the computer system, which are significantly greater than those available
to the majority of users. Such persons will include, for example, the system
administrator(s) and network administrator(s) who are responsible for keeping the
system available and may need powers to create new user profiles as well as add to or
amend the powers and access rights of existing users).

05

The audit trail shall capture all actions, connections and requests performed by
privileged functions.

06

The audit trail shall capture all changes to logical access control authorities (e.g., rights,
permissions).

07

The audit trail shall capture all system changes with the potential to compromise the
integrity of audit policy configurations, security policy configurations and audit record
generation services.

08

The audit trail shall capture the creation, modification and deletion of objects including
files, directories and user accounts.

09

The audit trail shall capture the creation, modification and deletion of user accounts and
group accounts.

10

The audit trail shall capture the creation, modification and deletion of user account and
group account privileges.

11

The audit trail shall capture: i) the date of the system event; ii) the time of the system
event; iii) the type of system event initiated; and iv) the user account, system account,
service or process responsible for initiating the system event.

12

The audit trail shall capture system startup and shutdown functions.

13

The audit trail shall capture modifications to administrator account(s) and administrator
group account(s) including: i) escalation of user account privileges commensurate with
administrator-equivalent account(s); and ii) adding or deleting users from the
administrator group account(s).

February 2007

Page 72

Publication 1075

Event
No.

System Auditing Guidance

14

The audit trail shall capture the enabling or disabling of audit report generation services.

15

The audit trail shall capture command line changes, batch file changes and queries
made to the system (e.g., operating system, application, database).
The audit trail shall be protected from unauthorized access, use, deletion or
modification.

16
17

The audit trail shall be restricted to personnel routinely responsible for performing
security audit functions.

February 2007

Page 73

Publication 1075

Exhibit 11

ENCRYPTION STANDARDS
A.

Federal Security Standards

The Digital Encryption Standard (FIPS 46-3)
Computer Data Authentication (FIPS 113)
Security Requirements for Cryptographic Modules (FIPS 140-2)
Key Management Using ANSI X9.17 (FIPS 171)
The Digital Hash Standard (FIPS 180-1)
Secure Hash Standard (FIPS 180-2)
Escrowed Encryption Standard (FIPS 185)
The Digital Signature Standard (FIPS 186-2)
Public Key Cryptographic Entity Authentication Mechanism (FIPS 196)
Advanced Encryption Standard (FIPS 197)
B.

Industry Security Standards

Digital Certificate (ANSI X5.09)
Public Key Cryptography Using Irreversible Algorithms (ANSI X9.30)
Symmetric Algorithm Keys Using Diffie-Hellman (ANSI X9.42)
Extension to Public Key Certificates and Certificate Renovation List (ANSI X9.55)
Message Confidentiality (ANSI X9.23)
Message Authentication Codes (ANSI X9.9)
Management Controls (ANSI X9.45)
Financial Institution Key Management (ANSI X9.17)
KEY MANAGEMENT STANDARDS
Key Management Using ANSI X9.17 (FIPS 171)
Financial Institution Key Management (ANSI X9.17)
Note: The Federal Security Standards above are based on the Federal Information
Security Management Act of 2002 (FISMA) P.L. 107-347 Title III, OMB A-130.
FIPS publications are sold by the National Technical Information Services, U.S.
Department of Commerce, 5285 Port Royal Road, Springfield, VA 22161 and are
available on-line at http://csrc.nist.gov.

February 2007

Page 74

Publication 1075

Exhibit 12

GLOSSARY - KEY TERMS AND DEFINITIONS
A
ACCOUNTABILITY: A process of holding users responsible for actions performed on an
information system.
ADEQUATE SECURITY: Security commensurate with the risk and magnitude of harm
resulting from the loss, misuse, unauthorized access to, or modification of information.
ASSURANCE: A measure of confidence that management, operational and technical
controls are operating as intended and achieving the security requirements for the
system.
ASSURANCE TESTING: A process used to determine if security features of a system
are implemented as designed, and are adequate for the proposed operating
environment. This process may include hands-on functional testing, penetration testing,
and/or verification.
AUDIT: An independent examination of security controls associated with a
representative subset of organizational information systems to determine the operating
effectiveness of system controls; ensure compliance with established policy and
operational procedures; and recommend changes in controls, policy, or procedures
where needed.
AUDIT TRAIL: A chronological record of system activities sufficient to enable the
reconstruction, reviewing and examination of security events related to an operation,
procedure or event in a transaction, from its inception to final results.
AUTHENTICATION: Verifying the identity of a user, process, or device, often as a
prerequisite to allowing access to resources in an information system. See
IDENTIFICATION.
AUTHORIZATION: Access privileges granted to a user, program or process.
AVAILABILITY: Timely, reliable access to information and information services for
authorized users.
B
BANNER: Display of an information system outlining the parameters for system or
information use.
BASELINE SECURITY REQUIREMENTS: A description of the minimum security
requirements necessary for an information system to enforce the security policy and
maintain an acceptable risk level.

February 2007

Page 75

Publication 1075

C
CLASSIFIED INFORMATION: National security information classified pursuant to
Executive Order 12958.
COMPROMISE: The disclosure of sensitive information to persons not authorized to
receive such information.
CONFIDENTIALITY: Preserving authorized restrictions on information access and
disclosure.
CONFIGURATION MANAGEMENT: A structured process of managing and controlling
changes to hardware, software, firmware, communications and documentation
throughout the system development life cycle.
COUNTERMEASURES: Actions, devices, procedures, mechanisms, techniques, or
other measures that reduce the vulnerability of an information system.
CRYPTOGRAPHY: The process of rendering plain text information unreadable and
restoring such unreadable information to a readable form.
D
DATA: A representation of facts, concepts, information or instruction suitable for
communication, processing or interpretation by people or information systems.
DECRYPTION: The process of converting encrypted information into a readable form.
Also called deciphering.
DIGITAL SUBSCRIBER LINE: A public telecommunications technology delivering high
bandwidth over conventional copper wire covering limited distances.
DISCRETIONARY ACCESS CONTROL: A method of restricting logical access to
information system objects (e.g., files, directories, devices, permissions, rules) based on
the identity and need-to-know of users, groups or processes.
E
ENCRYPTION: See CRYPTOGRAPHY.
ENCRYPTION ALGORITHM: A formula used to convert information into an unreadable
format.
ENTERPRISE LIFE CYCLE: A robust methodology used to implement business change
and information technology modernization.
EXTERNAL NETWORK: Any network residing outside the security perimeter
established by the telecommunications system.
EXTRANET: A private data network using the public telephone network to establish a
secure communications medium among authorized users (e.g., organization, vendors,

February 2007

Page 76

Publication 1075

business partners). An Extranet extends a private network (often referred to as an
Intranet) to external parties in cases where both parties may be benefit from exchanging
information quickly and privately.
F
FILE PERMISSIONS: A method of implementing discretionary access control by
establishing and enforcing rules to restrict logical access of information system
resources to authorized users and processes.
FILE SERVER: A local area network computer dedicated to providing files and data
storage to other network stations.
FIREWALL: Telecommunication device used to regulate logical access authorities
between network systems.
FIRMWARE: Microcode programming instructions permanently embedded into the
Read Only Memory (ROM) control block of a computer system. Firmware is a machine
component of computer system, similar to a computer circuit component.
G
GATEWAY: Interface providing compatibility between heterogeneous networks by
converting transmission speeds, protocols, codes or security rules. This is sometimes
referred to as a protocol converter.
H
HOST: A computer dedicated to providing services to many users. Examples of such
systems include mainframes, minicomputers or servers providing Dynamic Host
Configuration Protocol (DHCP) services.
HUMAN THREAT AGENT: A person or an organization with the capability or intent to
harm an organization’s mission.
I
IDENTIFICATION: A mechanism used to request access to system resources by
providing a recognizable unique form of identification such as a loginid, userid or token.
See AUTHENTICATION.
INFORMATION: See DATA.
INFORMATION SYSTEM: A collection of computer hardware, software, firmware,
applications, information, communications and personnel organized to accomplish a
specific function or set of functions under direct management control.
INFORMATION SYSTEM SECURITY: The protection of information systems and
information against unauthorized access, use modification or disclosure -- ensuring
confidentiality, integrity and availability of information systems and information.

February 2007

Page 77

Publication 1075

INTEGRATED SERVICES DIGITAL NETWORK: An international telecommunications
standard for transmitting voice, video and data over digital lines running at 64Kbps.
INTEGRITY: Protection of information systems and information from unauthorized
modification; ensuring quality, accuracy, completeness, non-repudiation and authenticity
of information.
INTERNET: Two or more networks connected by a router; the world’s largest network
using TCP/IP to connect government, university and commercial institutions.
INTRANET: A private network using TCP/IP, the Internet and world-wide-web
technologies to share information quickly and privately between authorized user
communities including organizations, vendors and business partners.
K
KEY: Information used to establish and periodically change the operations performed in
cryptographic devices for the purpose of encrypting and decrypting information.
L
LEAST PRIVILEGE: A security principle stating users or processes are assigned the
most restrictive set of privileges necessary to perform routine job responsibilities.
M
MANAGEMENT CONTROLS: Security controls focused on managing organizational
risk and information system security, and devising sufficient countermeasures or
safeguards for mitigating risk to acceptable levels. Management control families include
risk assessment, security planning, system and services acquisition, and security
assessment.
MALICIOUS CODE: Rogue computer programs designed to inflict a magnitude of harm
by diminishing the confidentiality, integrity and availability of information systems and
information.
N
NETWORK: A communications infrastructure and all components attached thereto
whose primary objective is to transfer information among a collection of interconnected
systems. Examples of networks include local area networks, wide area networks,
metropolitan area networks and wireless area networks.
NODE: A device or object connected to a network.
NON-REPUDIATION: The use of audit trails or secure messaging techniques to ensure
the origin and validity of source and destination targets. That is, senders and recipients
of information can not deny their actions.
O

February 2007

Page 78

Publication 1075

O
OBJECT REUSE: The reassignment of storage medium, containing residual
information, to potentially unauthorized users or processes.
OPERATIONAL CONTROLS: Security controls focused on mechanisms primarily
implemented by people as opposed to systems. These controls are established to
improve the security of a group, a specific system or group of systems. Operational
controls require technical or specialized expertise and often rely on management and
technical controls. Operational control families include personnel security, contingency
planning, configuration management, maintenance, system and information integrity,
incident response, and awareness and training.
ORGANIZATION: An agency or, as appropriate, any of its operational elements.
P
PACKET: A unit of information traversing a network.
PASSWORD: A private, protected, alphanumeric string used to authenticate users or
processes to information system resources.
PENETRATION TESTING: A testing method where security evaluators attempt to
circumvent the technical security features of the information system in efforts to identify
security vulnerabilities.
PLAN OF ACTION AND MILESTONES (POA&M): A management tool used to assist
organizations in identifying, assessing, prioritizing, and monitoring the progress of
corrective actions for security weaknesses found in programs and systems. (Defined in
OMB Memorandum 02-01)
POTENTIAL IMPACT: The loss of confidentiality, integrity, or availability could be
expected to have a limited adverse effect, a serious adverse effect, or a catastrophic
adverse effect on organizational operations, organizational assets, or individuals.
PROTOCOL: A set of rules and standards governing the communication process
between two or more network entities.
R
REMNANTS: Residual information remaining on storage media after reallocation or
reassignment of such storage media to different organizations, organizational elements,
users or processes. See OBJECT REUSE.
RESIDUAL RISK: Portions of risk remaining after security controls or countermeasures
are applied.
RISK: The potential adverse impact to the operation of information systems affected by
threat occurrences on organizational operations, assets and people.
RISK ASSESSMENT: The process of analyzing threats to and vulnerabilities of an
information system to determining the potential magnitude of harm, and identify costeffective countermeasures to mitigate the impact of such threats and vulnerabilities.

February 2007

Page 79

Publication 1075

RISK MANAGEMENT: The routine process of identifying, analyzing, isolating,
controlling, and minimizing security risk to achieve and maintain an acceptable risk level.
A risk assessment is an instrumental component of the risk management life cycle.
S
SAFEGUARDS: Protective measures prescribed to enforce the security requirements
specified for an information system. This is synonymous with security controls and
countermeasures.
SECURITY POLICY: The set of laws, rules, directives and practices governing how
organizations protect information systems and information.
SECURITY REQUIREMENT: The description of a specification necessary to enforce
the security policy. See BASELINE SECURITY REQUIREMENTS.
SENSITIVE BUT UNCLASSIFIED (SBU) INFORMATION: Any information, the loss,
misuse, or unauthorized access to or modification of which could adversely affect the
national interest or the conduct of Federal programs, or the privacy to which individuals
are entitled under section 552a of title 5, United States Code (USC) (the Privacy Act of
1974), but which has not been specifically authorized under criteria established by an
Executive Order (E.O.) or Congress to be kept secret in the interest or national defense
for foreign policy.
SYSTEM: See INFORMATION SYSTEM.
SYSTEM SECURITY PLAN: An official document that provides an overview of the
security requirements for an information system and describes the security controls in
place or planned for meeting those requirements. (NIST SP 800-18)
T
TECHNICAL CONTROLS: Security controls executed by the computer system through
mechanisms contained in the hardware, software and firmware components of the
system. Technical security control families include identification and authentication,
access control, audit and accountability, and system and communications protection.
THREAT: An activity, event or circumstance with the potential for causing harm to
information system resources.
TRUSTED COMPUTING SYSTEM: A system employing hardware and software
integrity measures to permit its use for concurrent processing of sensitive or classified
information.
U
USER: A person or process authorized to access an information system.
USER IDENTIFIER: A unique string of characters used by an information system to
identify a user or process for authentication.

February 2007

Page 80

Publication 1075

V
VIRUS: A self-replicating, malicious program that attaches itself to executable
programs.
VULNERABILITY: A known deficiency in an information system that threat agents can
exploit to gain unauthorized access to sensitive or classified information.
VULNERABILITY ASSESSMENT: Systematic examination of an information system to
determine its’ security posture, identify control deficiencies, propose countermeasures,
and validate the operating effectiveness of such security countermeasures after
implementation.

February 2007

Page 81

Publication 1075

This page left intentionally blank.

February 2007

Page 82

Publication 1075

IRS

Department of the Treasury
Internal Revenue Service
www.irs.gov

Publication 1075 (Rev. 2-2007)

Catalog Number 46937O


File Typeapplication/pdf
File TitlePublication 1075 (Rev. 2007-02)
SubjectTAX INFORMATION SECURITY GUIDELINES FOR FEDERAL, STATE AND LOCAL AGENCIES AND ENTITIES
AuthorOS:MA:CTEA:S
File Modified2007-02-28
File Created2007-02-16

© 2024 OMB.report | Privacy Policy