Protecting Tax Information - Cyber - Security for the Tax Professional

The start date for this course has passed. Registration is no longer available.

This course is 4.00 credits
Field of Study
Course Level
Kaplan CPA Education

Registration Fees

MSCPA Member
AICPA Member
Return to Course List

Monday, Sep 28, 2020
8:45am – 12:15pm

Due to the ongoing COVID-19 (coronavirus) pandemic, the MSCPA has made the difficult decision to make our scheduled live seminars in 2020 virtual-only events. The topics, dates, times and CPE credits will remain the same, and you will learn from the same top-level speakers that you expected to see at our live programs.

The primary weakness in any information system arises from the people working in 
the system. An effective information security system for an organization handling tax information has to include training for every person in the firm that has access to electronic information—and, yes, that includes the managing partner.
This course will concentrate on the information that non-IT professionals are required to know in order to interact with electronic information systems, as well as steps your firm needs to take to educate all members of the firm to prevent what could be an information breach that puts the firm’s very existence at risk.

Designed For

Accounting and financial professionals who are not information technology specialists who use computers, smart phones, and tablets in tax practice.

Course Objectives

Participants will be able to: 

 List risks to exposure that exists in tax practices through the use of electronic systems
 Explain the importance of encryption
 Implement encryption systems available for computers, smart phones, and tablets
 Understand why reuse of passwords poses an unacceptable security risk to client information
 Prepare firm procedures to improve the security of taxpayer data

Major Subjects

• How client data has moved from paper files in our office to laptops, phones, tablets, USB keys, and the cloud
• Accidental loss of client data vectors and how to implement controls over such loss
• Methods used by those seeking unauthorized access to tax information and how to recognize them
• Social engineering to get information from firms that bypasses IT based protections


Working with tax information on electronic systems

The start date for this course has passed. Registration is no longer available.