TREASURY
INSPECTOR GENERAL FOR TAX ADMINISTRATION
The Monitoring of Privacy Over Taxpayer Data Is Improving, Although Enhancements Can Be Made to Ensure Compliance With Privacy Requirements
September 22, 2006
Reference Number: 2006-20-166
This
report has cleared the Treasury Inspector General for Tax Administration
disclosure review process and information determined to be restricted from
public release has been redacted from this document.
Phone Number |
202-927-7037
Email Address | Bonnie.Heald@tigta.treas.gov
Web Site |
http://www.tigta.gov
September 22, 2006
MEMORANDUM FOR CHIEF, MISSION ASSURANCE AND SECURITY SERVICES
FROM: Michael R. Phillips /s/ Michael R. Phillips
Deputy Inspector General for Audit
SUBJECT: Final Audit Report – The Monitoring of Privacy Over Taxpayer Data Is Improving, Although Enhancements Can Be Made to Ensure Compliance With Privacy Requirements (Audit # 200620002)
This report presents the results of our review to determine whether the Office of Privacy and
Information Protection has effective controls and procedures to ensure Internal
Revenue Service (IRS) computer systems and employees adhere to privacy
regulations. This review was included in the Treasury
Inspector General for Tax Administration’s Fiscal Year 2006 Annual Audit Plan
and was part of the Information Systems Programs statutory requirements to
annually review the adequacy and security of IRS technology.[1]
Impact on the Taxpayer
The IRS processes
and maintains sensitive taxpayer information in computer systems for over 130
million taxpayers. Privacy Impact Assessments
(PIA)[2] have not been conducted for all computer
systems, and compliance with privacy laws has not been adequately monitored. As a result, the risk is increased that taxpayers’
identities could be stolen and used for unlawful purposes.
Synopsis
The issue of privacy and security over personal information
has received much publicity. For
example, the Department of Veterans Affairs[3] recently reported that personally identifying data for as many as
26 million American veterans were stolen from an employee’s home. This incident received significant
attention because the loss of personally identifying data can represent the
first step to identity theft. In 2004, the
IRS received more than 130 million individual taxpayers’ income tax
returns. The personal information contained
in these returns is converted into electronic format and used in over 240 IRS computer
systems.
The IRS is not complying with privacy legislation. As a result, the IRS does not have assurance that privacy implications have been considered and evaluated on all of its computer systems.
Within the past 2 years, the Office of Privacy and Information Protection[4] has maintained and enhanced the IRS’ privacy program by chairing a working group reviewing privacy and disclosure issues and by creating an online privacy training segment on the Office of Privacy and Information Protection web site. Despite these efforts, the IRS is not complying with legislative privacy requirements. Specifically, the IRS can take further actions to ensure PIAs have been conducted for all systems and applications that collect personal information and enhance its processes to better monitor compliance with privacy policy and procedures.
The E-Government Act of 2002[5] and IRS guidelines require every computer system or project that collects personal information to have a current PIA on file with the Office of Privacy and Information Protection. As of August 2005, we were unable to locate PIAs for 130 (54 percent) of the 241 IRS computers systems that collect and process taxpayer or employee data. We attribute the missing PIAs to the lack of emphasis on privacy issues and the decision to not require that all systems be certified and accredited.[6]
Also,
the PIA review process was not always
consistently conducted, and review results were not always properly
documented. At the time the Office of
Privacy and Information Protection completed the PIAs, there were no PIA review
procedures and no core list of source information to verify system facts and
information. As a result, PIA reviews
were not consistently performed. The
analysts did not properly document actions pending or taken in a history log
and can review the answers provided in the PIA only for consistency.
In addition, the Office of Privacy and Information Protection did not conduct any compliance reviews on existing PIAs. IRS procedures provide for compliance reviews as a means to validate that information submitted in the PIA truly represents the data being collected in the computer system or project. These compliance reviews can provide opportunities to update and verify information stated in the PIAs and ensure business units are complying with privacy policies and procedures.
By
addressing these areas, the Office of Privacy and Information Protection would
better fulfill its responsibility to create and maintain privacy awareness and
monitor all uses of taxpayer data by IRS employees. This will provide the first steps to ensure
the security and protection over taxpayer data throughout the agency.
Recommendations
We recommended the Chief, Mission Assurance and Security
Services, request business owners to identify and report all systems or
projects that collect personal identifiable information. A PIA should be prepared and submitted to the
Office of Privacy and Information Protection for monitoring, oversight, and
evaluation. The Director, Office of Privacy and Information Protection, should
establish a centralized repository for all PIAs in a searchable, electronic
format and verify the accuracy of the PIA inventory quarterly; initiate a
program providing for the routine evaluation of employee training activities
relative to current privacy policy requirements and develop a system for the
tracking and monitoring of these activities; and reinforce the importance of PIA case documentation with
specific instructions and implement a compliance review process to assess
whether IRS business units are adhering to privacy regulations.
Response
The Chief, Mission Assurance and Security Services, agreed with our findings and recommendations. The Office of Privacy and Information Protection will annually cross-walk (reconcile) the PIA inventory to existing system inventories and provide information to business owners for systems requiring PIAs. The Office of Privacy and Information Protection will also develop and implement a process to verify the PIA inventory accuracy quarterly and is developing an electronic PIA inventory and an electronic document management system for archiving electronic PIA artifacts. In addition, the Office of Privacy and Information Protection is establishing privacy awareness training via the mandatory IRS Information Protection training and will initiate a job-specific training program for privacy. Training will be deployed via the IRS Enterprise Learning Management System to ensure accurate monitoring and tracking. Finally, the Office of Privacy and Information Protection will establish assessment standards for PIAs to ensure consistency and extent of coverage based on system complexity, along with case documentation and analysis requirements. Management’s complete response to the draft report is included as Appendix IV.
Copies of this
report are also being sent to the IRS managers affected by the report
recommendations. Please contact me at
(202) 622-6510 if you have questions or
Margaret E. Begg, Assistant
Inspector General for Audit (Information Systems Programs), at (202) 622-8510.
Monitoring of Privacy
Compliance Can Be Enhanced
Appendices
Appendix
I – Detailed Objective, Scope, and Methodology
Appendix
II – Major Contributors to This Report
Appendix
III – Report Distribution List
Appendix
IV – Management’s Response to the Draft Report
Abbreviations
FISMA |
Federal Information Security Management Act |
IRS |
Internal Revenue Service |
PIA |
Privacy Impact Assessment |
Within the Federal Government, privacy can be defined as a citizen’s expectation that personal information collected for official Government business will be protected from unauthorized use and access. The issue of privacy and security over personal information has received much publicity since 2005. For example, in February 2005, the Bank of America reported the loss of data tapes that contained personal information on 1.2 million Federal Government employees. More recently, in May 2006, the Department of Veterans Affairs[7] reported that personally identifying data for as many as 26 million American veterans were stolen from an employee’s home. These incidents received significant attention because the loss of personally identifying data can represent the first step to identity theft, which occurs when someone uses personal information, without permission, to commit fraud or other crimes, such as opening fraudulent credit card accounts and purchasing goods.
The
Federal Trade Commission[8]
has reported increased filings of identity theft complaints, and the Privacy Rights Clearinghouse[9] estimates that, during 2005, over
50 million people had been put at risk as a result of security breaches. The average
identity theft victim spends 175 hours and $800 resolving identity theft-related
issues, and it takes 2 years to 4 years for victims to resolve all the
resulting problems.
The mission of the IRS Office of Privacy and Information Protection is to ensure IRS policies and programs incorporate taxpayer and employee privacy requirements, and the personal information entrusted to the IRS remains protected, secure, and private.
Like the private sector, the Federal Government collects enormous amounts of personal information from private citizens. For example, in 2004 the Internal Revenue Service (IRS) received more than 130 million individual taxpayers’ income tax returns. Each of these tax returns includes the filer’s name, address, Social Security Number, and other personal financial data. This personal information is converted into electronic format and used in over 240 IRS computer systems, such as the Integrated Data Retrieval System.[10]
From a legislative perspective, the issue of privacy is governed by several laws. The Privacy Act of 1974[11] placed limitations on Federal Government agencies’ collection, disclosure, and use of personal information maintained in computer systems. More recently, the E-Government Act of 2002[12] provided additional protection for personal information by requiring agencies to conduct Privacy Impact Assessments (PIA). A PIA is required for every computer system or project that collects personal information and must be maintained by the bureaus and agencies. A PIA represents an analysis of how personal information is handled to ensure it conforms to applicable legal and regulatory requirements over privacy; determines the risks and effects of collecting, maintaining, and disseminating information in identifiable form; and examines and evaluates protections and alternative processes for handling information to reduce potential privacy risks. Systems must be reevaluated every 3 years or when major system modifications[13] occur.
In addition, the Consolidated Appropriations Act of 2005, Section 522,[14] required each agency to have a Chief Privacy Officer to assume the responsibility for privacy and data protection policy. These legislative requirements provide the need for a strong privacy program within Federal Government bureaus and agencies.
The administration
of the IRS privacy program is the responsibility of the Director, Office of
Privacy and Information Protection, who reports directly to the Chief, Mission
Assurance and Security Services. The
mission of the Office of Privacy and Information Protection is to ensure IRS
policies and programs incorporate taxpayer and employee privacy requirements
and the personal information entrusted to the IRS remains protected, secure,
and private.
This review was
performed at the IRS National Headquarters in Washington, D.C., in the Office
of Privacy and Information Protection during the period September 2005 through March
2006. The audit was conducted in
accordance with Government Auditing
Standards. Detailed information on our
audit objective, scope, and methodology is presented in Appendix I. Major contributors to the report are listed
in Appendix II.
Because of the large amount of personal information it
receives and concern over privacy implications of maintaining that information,
the IRS established the Privacy Advocate position in 1993, becoming the first
Federal Government agency to assign privacy to an executive official. Within the past 2 years, the Office of Privacy and Information
Protection has maintained and enhanced the IRS’ privacy program by:
The IRS can take further actions to ensure PIAs have been conducted for all systems that collect personal information and enhance its processes to better monitor compliance with privacy policy procedures.
Despite the Office of Privacy and Information Protection’s efforts to increase privacy awareness and manage its program, the IRS is not complying with legislative privacy requirements and, thus, is not ensuring the privacy of taxpayer data is being tracked and monitored adequately. Specifically, the IRS can take further actions to ensure PIAs have been conducted for all systems and applications that collect personal information and enhance its processes to better monitor compliance with privacy policy and procedures. These improvements will allow the IRS to better identify and monitor all uses of taxpayer data and will provide the first steps to ensure the security and protection over taxpayer data throughout the agency.
Computer systems that collect personal information did not have PIAs
The E-Government Act of 2002 and IRS guidelines require every computer system or project that collects personal information to have a current PIA on file with the Office of Privacy and Information Protection. The existence of the PIA provides reasonable assurance that privacy implications have been considered and evaluated in the collection of the data. Systems must be reevaluated every 3 years.
As of August 2005, the IRS maintained 281 computer systems to assist in tax administration. Of these, 241 collected and processed personal information, consisting of either taxpayer or employee data. Based on privacy requirements, each of these 241 systems should have a PIA completed by system owners and maintained by the Office of Privacy and Information Protection. However, we were unable to locate PIAs for 130 (54 percent) of the 241 computer systems.
The IRS classifies its computer systems into three categories: general support systems, major applications, and nonmajor applications.[17] Table 1 presents the number of computer systems in each classification that did not have a PIA.
Table 1: Number of Computer Systems Without PIAs
That Collect Taxpayer or Employee Data
System Classification |
Total Number of Computer Systems |
Number of Computer Systems That Process or Collect
Personally Identifiable Data |
Number of Computer Systems Without a Required PIA
Statement |
General Support Systems |
29 |
29 |
21 (72%) |
Major Applications |
53 |
53 |
5 (9%) |
Nonmajor Applications |
199 |
159 |
104 (65%) |
Totals |
281 |
241 |
130 (54%) |
Source: The Office of Privacy and Information Protection’s inventory lists and our report entitled Treasury Inspector General for Tax Administration - Federal Information Security Management Act Report for Fiscal Year 2005 (Reference Number 2006-20-071, dated October 2005).
We attribute the missing PIAs to the lack of emphasis on privacy issues and the decision to not require that all systems be certified and accredited,[18] which included the submission of PIAs as part of the certification process.
The Office of Privacy and Information Protection, as part of its own poststudy review of the Federal Information Security Management Act (FISMA)[21] reporting process, found that “mapping the Office of Privacy and Information Protection inventory to the Fiscal Year 2005 FISMA inventory was difficult due to the inability to clearly identify the subcomponents of the general support systems and major applications.” The Office of Privacy and Information Protection has acknowledged the lack of PIAs as a weakness and has taken proactive steps to increase privacy awareness, such as conducting awareness presentations to IRS business unit executives and in the IRS’ annual Security Awareness week in the National Headquarters Office on the risks and requirements of privacy for computer systems maintaining personal identifiable information.
We believe it is critical that the IRS complete PIAs for all computer systems or projects in which personal information is collected, processed, used, and/or stored. When PIAs are not prepared and properly maintained, the IRS is unaware of all instances in which the collection of data is occurring, and the IRS could be violating privacy regulations and unnecessarily exposing sensitive data to theft or misuse. As such, public trust could be lost when privacy risks are not identified and privacy protections are not adhered to.
An effective management information system to track PIAs does not
exist
The Office of Privacy and Information Protection recognizes that sound business practice requires a functional and useful centralized management information system to track and monitor its PIAs. The Office of Privacy and Information Protection is currently using a system developed by the Office of Disclosure.[22] This system contains pre-set data fields and cannot be customized to add more useful information, so it is mainly used to assign and generate PIA control numbers. Because of this limitation, the Office of Privacy and Information Protection created two additional inventory systems to capture specific information for different uses. One system is used to calculate the number of days the PIA is open and when a recertification is due, and the second system is a working file for the analysts. Inefficiencies exist when the staff need to query two inventory lists to obtain basic information, such as the system name and associated PIA control number. Also, maintaining multiple inventory lists creates data inaccuracies, such as determining when a recertification of a system’s PIA is due. For example, we identified the following discrepancies among the several PIA lists:
The Office of Privacy and
Information Protection has also identified its management information system as
a weakness in its poststudy review of the FISMA reporting process. As a result, the Office
of Privacy and Information Protection is developing an electronic, menu-driven,
and more user-friendly version of the PIA and has plans to incorporate and
implement the new PIA in a new management information system scheduled to be
completed by the end of Fiscal Year 2006.
Recommendations
Recommendation 1: The Chief, Mission Assurance and Security Services, should request IRS business owners to identify and report all systems or projects that collect personal identifiable information. A PIA should be prepared and submitted to the Office of Privacy and Information Protection for monitoring, oversight, and evaluation.
Management’s Response: IRS management agreed with this recommendation. The Office of Privacy and Information Protection will annually cross-walk (reconcile) the PIA inventory to existing system inventories and provide information to business owners for systems requiring PIAs. The Office of Privacy and Information Protection will also conduct a study to identify PIA process improvements to ensure limited resources are focused on systems that collect personal identifiable information and will establish policy, based on the study, for systems that require a PIA.
Recommendation 2:
The Director, Office of Privacy
and Information Protection, should establish a centralized repository for all PIAs
in a searchable, electronic format. The process
should be developed to verify the accuracy of the PIA inventory quarterly. The Office of Privacy and Information
Protection should also develop an electronic document management system for
archiving electronic PIA artifacts.
Management’s Response: IRS management agreed with this recommendation. The Office of Privacy and Information Protection will develop and implement a process to verify the PIA inventory accuracy quarterly. The Office of Privacy and Information Protection is also developing an electronic PIA inventory and an electronic document management system for archiving electronic PIA artifacts.
Monitoring of Privacy Compliance Can Be Enhanced
The Office of
Privacy and Information Protection’s role in the organization is to ensure the
IRS is complying with privacy requirements.
The E-Government Act established that the primary control over privacy
compliance for the Federal Government is the use of PIAs. While the main goal should be to have
complete and accurate PIAs for all instances in which the IRS is collecting and
using sensitive data (i.e., taxpayer or employee data), equally important are
the processes to ensure PIAs are being properly and accurately completed. Compliance with privacy requirements can be
segmented into three key activities:
1. Providing
awareness training to IRS employees on the privacy of taxpayer data
requirements and on the completion of PIAs for all instances in which sensitive
data are being collected.
2. Conducting
initial reviews of submitted PIAs for completeness, accuracy, and consistency
with IRS requirements.
3. Conducting
compliance reviews of existing PIAs to validate adherences to information
submitted in the PIAs.
We assessed
the Office of Privacy and Information Protection’s efforts in these three areas
and determined it did not have a formal privacy training program, initial
reviews of PIAs could be enhanced and better documented, and compliance reviews
of PIAs were not conducted. By
addressing these areas, the Office of Privacy and Information Protection would
better fulfill its responsibility to create and maintain privacy awareness
among IRS employees and monitor compliance with privacy requirements for the
IRS as a whole.
The Office of Privacy and Information
Protection does not have a formal training program
In an effort to help identify systems collecting personal information and increase awareness and compliance with privacy requirements, the Office of Privacy and Information Protection conducts ad hoc training and awareness presentations whenever the opportunity arises. For example, the Director, Office of Privacy and Information Protection, and senior staff are members of task forces, committees, and professional organizations and have provided privacy expertise and privacy-related presentations at various meetings. This includes proactively giving awareness presentations to IRS business unit executives on the risks and requirements of privacy for computer systems maintaining personal identifiable information and collaborating with other IRS business units and the Department of the Treasury on proposed revisions to tax laws and implementation of a Department-wide PIA initiative. The Office of Privacy and Information Protection also developed an online, self-study privacy awareness segment that is available to all IRS employees. However, the Office of Privacy and Information Protection does not have a regular awareness training schedule or specific role-based privacy training, nor does it mandate the completion of its online, self-study privacy awareness training by all employees.
In addition, the Office of Privacy and Information
Protection does not have a formal management information system to track
training delivered to IRS employees. The
Office of Privacy and Information Protection was unable to provide such basic
information as the number of IRS employees and contractors who attended
privacy-related training courses and
awareness presentations, training costs expended, or staff
days applied toward training. Due to our
review, the Office of Privacy and Information Protection recently requested IRS
employees who have completed the online, self-study privacy awareness training
on the Office of Privacy and Information Protection’s web site to send copies
of their certificates of completion for tracking and documentation
purposes. The Office of Privacy and
Information Protection stated that, due to limited resources and staffing, a
management information system to track privacy will be a long-range goal. The Director, Office of Privacy and
Information Protection, is also working to develop a computer-based module to
be included as part of the mandatory computer security and Unauthorized
Access training.[24]
Without
a formal training program and an effective tracking system, the Office of
Privacy and Information Protection cannot be assured it is meeting its mission
to inform, educate, and make all IRS employees aware of important privacy
issues, policies, and requirements.
The PIA review
process needs to be improved, and review documentation requirements need to be
strengthened
Our analysis of a sample of 20 PIAs determined
the PIA review process was not always consistently conducted and review results
were not always properly documented. The
20 PIAs were conducted from November 2002 to September 2005. Specifically:
·
Nine of
the 20 PIAs were cursory and the information provided was taken at face value,
especially for current production environment systems[25] for which supporting information may not be
available or does not exist.
·
Eleven
of the 20 PIAs were lacking case history information and supporting
documentation for statements made in the PIA, which, at a minimum, should be
included in the case file. Most case
files had comments or concerns made on the initial version of the PIA, but
there were no indications as to the response or resolution of the comments or
concerns. Generally, there was no case
history information, which, if available, could be used by the Office of
Privacy and Information Protection to better manage the privacy program through
internal reviews and to determine whether further actions are needed or reasons
for delays.
·
Six of
the 20 PIAs were to recertify an existing system. A simple, one-page form was used to recertify
a PIA, but there was no supporting documentation or history log to indicate
whether an indepth analysis was conducted to support the recertification or to verify
the system had no “significant changes” subsequent to when the original PIA was
prepared.
At the time the Office of Privacy and
Information Protection completed the PIAs, there were no PIA review procedures,
nor was there an available core list of source information to verify system
facts and information. As a result, PIA
reviews were not consistently performed.
The analysts did not properly document actions pending or taken in a
history log and can review the answers provided in the PIA only for
consistency.
This issue was also reported by the Government
Accountability Office.[26] The report
cited the lack of a comprehensive assessment over an IRS system selected for
review by not analyzing how the agency reached its decision in its response to
a PIA question. The report stated that
the IRS did not fully address these steps because it used a prior version of
the guidance issued by the Office of Management and Budget.
Continued implementation of PIA review
procedures would allow the Office of Privacy and Information Protection to (1)
maintain a consistent quality of work and protect the IRS from violations of
privacy regulations and statutes by identifying risks in the system and (2) limit
information collection.
The Office of Privacy and Information Protection did not conduct compliance
reviews
Based on discussions with Office of Privacy and Information Protection personnel, we determined the Office of Privacy and Information Protection did not conduct any compliance reviews on existing PIAs. IRS procedures provide for compliance reviews as a means to validate that information submitted in a PIA truly represents the data being collected in the computer system or project. These compliance reviews can provide opportunities to update and verify information stated in the PIAs and ensure business units are complying with privacy policies and procedures. Compliance reviews also allow the Office of Privacy and Information Protection to have visibility within the IRS and to spread the importance of privacy throughout the agency.
The Office of Privacy and Information Protection recognizes
the lack of compliance reviews as a deficiency, and the Director hopes to
redirect limited resources and staffing in the Fiscal Year 2006 Business Plan
to address and implement this plan of action.
As mentioned above, implementation
of these procedures would allow the Office of Privacy and Information
Protection to maintain a consistent quality of work and better manage the
privacy program.
Recommendations
Recommendation 3: To monitor employee privacy awareness
training, the Director, Office of
Privacy and Information Protection, should initiate a program providing for the
routine evaluation of employee training activities relative to current privacy
policy requirements and develop a system for the tracking and monitoring of
these activities.
Management’s Response: IRS management agreed with this recommendation. The Office of Privacy and Information Protection is establishing privacy awareness training via the mandatory IRS Information Protection training. Also, the Office of Privacy and Information Protection will conduct an assessment of roles for which training must be given and initiate a job-specific training program for privacy. In addition, training modules on IRS privacy products, such as the PIA, will be developed. Training will be deployed via the IRS Enterprise Learning Management System to ensure accurate monitoring and tracking. To supplement the training, the Office of Privacy and Information Protection will develop and deploy an assessment methodology to survey IRS employees annually of their knowledge of privacy policy requirements, which will provide feedback on employee awareness and training needs.
Recommendation 4: The Director, Office of Privacy and Information Protection, should reinforce the importance of PIA case documentation with specific instructions or case models and implement a compliance review process to assess whether IRS business units are adhering to privacy regulations, given the limited resources and staff knowledge in conducting these reviews.
Management’s Response: IRS management agreed with this recommendation. The Office of Privacy and Information Protection will establish assessment standards for PIAs to ensure consistency and extent of coverage based on system complexity, along with case documentation and analysis requirements. For the short term, the Office of Privacy and Information Protection will investigate tools, conduct a pilot of selected tools, assess results, and implement interim measures to establish and implement compliance review guidelines and a process to ensure adherence to privacy regulations. For the long term, the Office of Privacy and Information Protection will build on knowledge obtained in the short term and implement comprehensive measures to establish and implement compliance review guidelines and processes.
Appendix I
Detailed Objective, Scope, and Methodology
The
overall objective of this review was to determine
whether the Office of Privacy and Information Protection[27] has effective controls and procedures to ensure
IRS computer systems and employees adhere to privacy regulations. To accomplish this objective, we:
I.
Determined
whether Office of Privacy and Information Protection controls and procedures were
in place to ensure adherence to privacy regulations.
A. Determined whether a management information
system was in place to track PIAs,[28] evaluated the type of data captured by the
system, and obtained a list of all PIAs conducted to determine whether all
systems in the IRS had a description of the information being maintained from a
privacy perspective.
B. Selected and reviewed a representative
judgmental sample of 20 of the 241 IRS systems that collect and process either
taxpayer or employee personal information.
We validated selected information from the PIAs to determine whether
responses were accurate and adequately supported by documentation. We used a judgmental sample because we did
not plan to project our results to the population and had received agreement to
our conclusions after we completed our review of the 20 PIAs.
C. Obtained a list of privacy training classes
and awareness presentations conducted since October 2003, determined whether a management
information system was in place to track training sessions, and evaluated the
type of data captured.
D. Evaluated the Fiscal Year 2005 and 2006
Business Plans for the Office of Privacy and Information Protection to
determine whether plans and goals were included to promote employee and
contractor privacy responsibilities, promote the mission and activities of the Office
of Privacy and Information Protection, and make all employees and contractors
aware of relevant privacy laws and policies.
E.
Ascertained
whether the Office of Privacy and Information Protection conducts compliance or
“safeguard” reviews.
F.
For the PIAs sampled in Step I.B, interviewed
the business owner, program manager, and system administrator of the computer
system to determine whether they had attended a privacy training class or
awareness presentation within the past 2 calendar years; completed the online
privacy training session available on the Office of Privacy and Information
Protection web site; and coordinated adequately with the Office of Privacy and
Information Protection, Office of Disclosure, and Office of Security.
G. Obtained from the Treasury Inspector General
for Tax Administration Office of Investigations and the IRS Office of
Disclosure a list of all instances of unauthorized and inadvertent disclosure
of sensitive information. We evaluated
whether a management information system was in place to track unauthorized disclosures
and the type of data captured by the system.
II.
Determined
whether all programs (systems and research projects) collecting personally
identifiable data had PIAs.
A.
Met with Office
of Privacy and Information Protection staff to determine their interpretation
of the Consolidated Appropriation Act,[29] as it applies to “programs collecting
personally identifiable data.”
B.
Obtained and
reviewed the IRS inventory of computer systems included in our report entitled Treasury Inspector General for Tax
Administration - Federal Information Security Management Act Report for Fiscal
Year 2005 (Reference Number 2006-20-071, dated October 2005) to identify systems that meet the
definition of a “program collecting personally identifiable data” but did not
have PIAs.
C. Obtained the Office of Privacy and
Information Protection documentation supporting its responses to Section D
(Reporting Template for Senior Agency Officials for Privacy) of the FISMA
Reporting for Fiscal Year 2005 and reviewed the documentation to validate the
accuracy of its “cross-walk” (reconciliation) of PIAs to the IRS inventory of
computer systems.
D.
Met with Office of Privacy and Information
Protection personnel to discuss whether research projects meet the definition
of “programs collecting personally identifiable data” that would require a PIA,
particularly those conducted by the Office of Research or the Office of Statistics
of Income.
Appendix II
Major Contributors to This Report
Margaret
E. Begg, Assistant Inspector General for Audit (Information Systems Programs)
Kent
Sagara, Acting Director
Joseph
Cooney, Acting Audit Manager
Louis
Lee, Senior Auditor
Abraham
Millado, Senior Auditor
Jackie
Nguyen, Senior Auditor
Appendix III
Commissioner C
Office of the
Commissioner – Attn: Chief of Staff C
Deputy Commissioner for Operations Support OS
Deputy Commissioner for Services and Enforcement SE
Commissioner, Small Business/Self-Employed Division SE:S
Acting Chief Information Officer OS:CIO
Director, Communications, Liaison, and Disclosure, Small Business/Self-Employed Division SE:S:CLD
Director, Office of Privacy and Information Protection OS:MA:OPIP
Director, Governmental Liaison and Disclosure, Small Business/Self-Employed Division SE:S:CLD:GLD
Chief Counsel CC
National Taxpayer Advocate TA
Director, Office of Legislative Affairs CL:LA
Director, Office of
Program Evaluation and Risk Analysis
RAS:O
Office of Internal
Control OS:CFO:CPIC:IC
Audit Liaisons:
Commissioner,
Small Business/Self-Employed Division
SE:S
Acting Chief Information Officer: OS:CIO
Chief,
Appendix IV
Management’s Response to the
Draft Report
The response was removed due to its
size. To see the response, please go to
the Adobe PDF version of the report on the TIGTA Public Web Page.
[1]
IRS Restructuring and Reform Act of 1998 (RRA
98), Pub. L. No. 105-206, 112 Stat. 685 (codified as amended in scattered
sections of 2 U.S.C., 5 U.S.C. app., 16 U.S.C., 19 U.S.C., 22 U.S.C., 23
U.S.C., 26 U.S.C., 31 U.S.C., 38 U.S.C., and 49 U.S.C.).
[2] A PIA is an analysis of how personal information is collected, stored, shared, and managed in a Federal Government system. Specifically, a PIA (1) ensures handling conforms to applicable legal, regulatory, and policy requirements on privacy; (2) determines the risks and effect of collecting, maintaining, and disseminating personal information; and (3) examines and evaluates protection and alternative processes for handling personal data to reduce potential privacy risks.
[3] The Department of Veterans Affairs provides patient care, veterans’ benefits, and customer satisfaction for our nation’s veterans and their families.
[4] The administration of the IRS’ privacy program is the responsibility of the Director, Office of Privacy and Information Protection, who reports to the Chief, Mission Assurance and Security Services. The mission of the Office of Privacy and Information Protection is to ensure IRS policies and programs incorporate taxpayer and employee privacy requirements and the personal information entrusted to the IRS remains protected, secure, and private.
[5] Pub. L. No. 107-347 (2002), sec. 208.
[6] Certification and accreditation, as defined and required by the Office of Management and Budget for all Federal Government automated information systems, is a process to provide assurance that adequate security controls are in place over computer systems.
[7] The Department of Veterans Affairs provides patient care, veterans’ benefits, and customer satisfaction for our nation’s veterans and their families.
[8] The Federal Trade Commission was created in 1914 to prevent unfair methods of competition in commerce and to police anticompetitive practices.
[9] The Privacy Rights Clearinghouse is a nonprofit consumer organization established to raise consumer awareness of how technology affects personal privacy, empower consumers to take action to control their own personal information by providing practical tips on privacy protection, and respond to and document specific privacy-related complaints from consumers.
[10] This is an IRS computer system capable of retrieving or updating stored information; it works in conjunction with a taxpayer’s account records.
[11] 5 U.S.C. § 552a (a)(5).
[12] Pub. L. No. 107-347 (2002),
sec. 208.
[13] A major modification is any programming or equipment change that affects how the system interfaces with users, processes data, or generates reports. In addition, these changes may affect the security of the system.
[14] Pub. L. No. 108-447, 188 Stat. 2268, 5 U.S.C. 522a note.
[15] The Volunteer Income Tax Assistance Program offers free tax help for low- to moderate-income (approximately $38,000) people who cannot prepare their own tax returns. Volunteers, sponsored by various organizations, receive training to help prepare basic tax returns in communities across the country. Volunteer Income Tax Assistance sites are generally located at community and neighborhood centers, libraries, schools, shopping malls, and other convenient locations. Some locations also offer free electronic filing.
[17] A general support system is an interconnected set of information resources under the same direct management control that shares common functionality. A major application is a computer system that requires special management oversight because of the information it contains, processes, or transmits or because of its criticality to the organization’s mission. A nonmajor application is a computer system that does not require special management oversight because the information it contains, processes, or transmits is less critical to the organization’s mission.
[18] Certification is the comprehensive evaluation of the technical and nontechnical security controls and the identification of any weaknesses with those controls or lack thereof. Accreditation is an authorization granted by a management official to operate the system based on the evaluation of the security controls. It is a statement that the management official (i.e., the accrediting official) is aware of, understands, and accepts responsibility for the risks associated with placing the system into operation. Certification and accreditation, as defined and required by the Office of Management and Budget for all Federal Government automated information systems, is a process to provide assurance that adequate security controls are in place over computer systems.
[19] A Full-Time Equivalent is a measure of labor hours in which 1 Full-Time Equivalent is equal to 8 hours multiplied by the number of compensable days in a particular fiscal year.
[20] The IRS has recently changed this requirement and decided to require certification and accreditation for all systems, regardless of classification, for Fiscal Year 2006.
[21] The FISMA is part of the E Government Act of 2002, Pub. L. No. 107-347, Title III, Section 301 (2002). The FISMA includes protecting information and information systems from unauthorized access, use, disclosure, or modification, including controls for disclosure and confidentiality to protect personal privacy.
[22] The Office of Disclosure reports to the Director, Communications, Liaison, and Disclosure, within the Small Business/Self-Employed Division. The Office of Privacy and Information Protection reported to the Office of Disclosure from 2000 until 2003.
[23] Retired and dead computer systems are those no longer in use and no longer processing data for tax administration.
[24] Unauthorized Access training is an annual requirement for all IRS employees as a result of the Taxpayer Browsing Act of 1997, 26 U.S.C.A. §§ 7213, 7213A, 7431 (West Supp. 2003).
[25] These are computer systems currently in use and processing data for tax administration.
[26] Data Mining, Agencies Have Taken Key Steps to Protect Privacy in Selected Efforts, but Significant Compliance Issues Remain (GAO 05-866, dated August 2005).
[27] The administration of the IRS’ privacy program is the responsibility of the Director, Office of Privacy and Information Protection, who reports to the Chief, Mission Assurance and Security Services. The mission of the Office of Privacy and Information Protection is to ensure IRS policies and programs incorporate taxpayer and employee privacy requirements and the personal information entrusted to the IRS remains protected, secure, and private.
[28] A PIA is an analysis of how personal information is collected, stored, shared, and managed in a Federal Government system. Specifically, a PIA (1) ensures handling conforms to applicable legal, regulatory, and policy requirements on privacy; (2) determines the risks and effect of collecting, maintaining, and disseminating personal information; and (3) examines and evaluates protection and alternative processes for handling personal data to reduce potential privacy risks.
[29] Pub. L. No. 108-447, 188 Stat. 2268, 5 U.S.C. 522a note.