Accessibility Skip to Top Navigation Skip to Main Content Home  |  Change Text Size  |  Contact IRS  |  About IRS  |  Site Map  |  Español  |  Help  
magnifying glass
Advanced Search   Search Tips

K-1 Data Link

 

Privacy Impact Assessment – K-1 Data Link

K-1 Data Link System Overview

Provide security certification and accrediation for a workload identification  system which quickly identifies new cases of abusive schemes by applying rules associated to known schemes. The system will also categorize investment structures by similarities and identify potential cases, thus quickening the Service's time to respond to new schemes. 

System of Record Number(s)

Treasury/IRS  42.021—Compliance Programs and Project Files

Data in the System

1. Describe the information (data elements and fields) available in thesystem in the following categories:

A. Taxpayer
B. Employee
C. Audit Trail Information (including employee log-in info)
D. Other (Describe)


A. Taxpayer
Currently available:
Schedule K-1 Extract from the Tax Year 2000 and 2001 Information Returns Master File

Processing Year 2001 and 2002 BRTF
(Business Return Transaction File) 

Processing Year 2001 and 2002 Form 1040
IRTF (Individual Return Transaction File) or MACS (Midwest Automated Compliance System) for returns with TPI XXXXXX

EP/EO (now TE/GE) information and files on charitable organizations or tax exempt entities

Derived Lists of Corporate Affiliations

Possible Additions:
NonFiler lists from SB/SE

OVCI (Offshore Voluntary Compliance Initiative) and LCCI (Last Chance Compliance Initiative) and other Offshore data sources

Forms 5471 and 5472

Tax Shelter Registration Database (Form 8264) and OTSA (Office of Tax Shelter Analysis) Database

Other extracts (e.g. DIV, 1099) from the Tax Year 2000 and 2001 Information Returns Master File

C. Audit Trail
Employee log-in to XXXXX database

2. Describe/identify which data elements are obtained from files, databases, individuals, or any other sources.

A. IRS
B. Taxpayer
C. Employee
D. Other Federal Agencies (List agency)
E. State and Local Agencies (List agency)
F. Other third party sources (Describe)

IRS and Taxpayer Data elements.  All data described in 1.A. above is internal IRS data. No other sources are applicable. There are several thousand fields in the above datasets.

3.  Is each data item required for the business purpose of the system?  Explain.

All items are required for the business purpose of the system. The system is designed to visualize the links between entities represented in the data listed above.

4. How will each data item be verified for accuracy, timeliness, and completeness?

Each data item is derived from recent first party filings and are deemed to be accurate and complete.  All data items are deemed to be timely by their existence in the data sets listed above. Completeness and accuracy are verified by data preparation before receipt into this system and by additional data cleansing techniques which are part of the data loading process.

5. Is there another source for the data?  Explain how that source is or is not used.

There are no other sources for this data.

6. Generally, how will data be retrieved by the user? 

The data will be retrieved via a customized interface to an XXXXX database in which the data resides. The user will enter one or more TINs and will be presented with a link diagram and/or a text listing of related entities.

7. Is the data retrievable by a personal identifier such as name, SSN, or other unique identifier? 

Yes, data will be retrieved by SSNs and EINs as described in 6, above.

Access to the Data

8. Who will have access to the data in the system (Users, Managers, System Administrators, Developers, Others)?

Users, System Administrators and Developers will have access to the data.

9. How is access to the data by a user determined and by whom? 

During prototype, access will be limited to select members of the IRS research community and individuals assisting in development feedback as determined by the IBS (Intelligent Business Solutions) group in IRS/HQ Research.  Operational access and control will be addressed after management determines appropriate extent of system use.

10. Do other IRS systems provide, receive, or share data in the system?  If YES, list the system(s) and describe which data is shared.  If NO, continue to Question 12.  No.

11. Have the IRS systems described in Item 10 received an approved Security Certification and Privacy Impact Assessment?  N/A

12.  Will other agencies provide, receive, or share data in any form with this system?

No other agencies will provide, receive or share data in any form with this system.

Administrative Controls of Data

13.  What are the procedures for eliminating the data at the end of the retention period?

Three tax years of data will eventually be available on the system. As the old data becomes obsolete, it will be purged from the database, per statutory record retention requirements for tax returns.

14.  Will this system use technology in a new way?  If "YES" describe.  If "NO" go to Question 15. 

Yes, this system will allow users to visualize the connections between various entities through link analysis diagrams. This ability to see a graphical representation of these interrelationships has not been previously available.

15.  Will this system be used to identify or locate individuals or groups?  If so, describe the business purpose for this capability.

As describe above, this system will provide the ability to identify affiliations that might have been previously unknown or hard to discover. This capability is the primary purpose of the system.  By providing compliance personnel with new tools to visualize and analyze Investment Structures which are common in Abusive Tax Schemes, the K1 Link Database will directly benefit a number of SB/SE IRS Strategies including:

Strategy 1: Increase Compliance Among Small Business and Self-Employed Taxpayers by Enhancing Compliance Techniques and Targeting Education Efforts.

Strategy 2: Combat the Formation, Use and Impact of Abusive Tax Non-Compliance.

Strategy 4: Improve Business Results by Revamping Our Operational Practices and Processes.

Strategy 5: Promote Employee Satisfaction by Improving Practices that Maintain a Quality Workforce

The K-1 Link Database will also directly benefit LMSB's Strategic objectives of Reducing Compliance Risk and Abusive Tax Avoidance Transactions.

16. Will this system provide the capability to monitor individuals or groups? If yes, describe the business purpose for this capability and the controls established to prevent unauthorized monitoring.

Yes.  The system will allow individuals involved in particular Abusive Tax Avoidance Transactions to be targeted for enforcement action.   Authorization and control will be through existing  SB/SE Compliance Initiative Project (CIP) Procedures (IRM 4.19.1.1.4.5).

17. Can use of the system allow IRS to treat taxpayers, employees, or others, differently?  Explain.

Yes.  This system will allow compliance enforcement personnel to more accurately identify tax returns which warrant investigation as well as providing sufficient explanation on other returns such that no investigation/audit is necessary.

18.  Does the system ensure "due process" by allowing affected parties to respond to any negative determination, prior to final action?

Yes.  Any workload identified through this application will be subjected to traditional due process measures already in place for enforcement actions.

19.  If the system is web-based, does it use persistent cookies or other tracking devices to identify web visitors?  N/A

 


Page Last Reviewed or Updated: November 10, 2004