Issued: 25 October 2022
Last modified: 3 November 2022
View the resources from our webinar Prevention is better than cure – assess your cyber risk!, held Tuesday 25 October 2022. With recent data breach incidents across Australia, we can see how vulnerable businesses can be to cyber-attacks! In this webinar learn how to assess any potential cyber risk to your business and what steps you can take to protect your practice and client information. Board member Debra Anderson and Jimmy Tzimopoulos, Assistant Commissioner from the Australian Taxation Office’s Cyber Governance & Operations share some valuable advice.
Resources
Webinar recording
Questions and answers
We have compiled some of the questions we received during the webinar.
Cyber security
Given that cybercrime is always going to be a threat how can you absolutely protect data?
Unfortunately, the only way to absolutely protect data and prevent all possibility of cyber-attacks is to have that data completely locked away and inaccessible to everyone, and that just wouldn’t be practical at all. Choosing the best balance between accessibility and security is an important challenge for all businesses today. However, you can put in place mitigation strategies according to your practice needs. You may also seek expert advice from cyber security professionals to find a solution that can help protect your practice and client information.
For some helpful information, refer to:
-
Top cyber security tips for businesses on the Australian Taxation Office (ATO) website
-
Security advice for tax professionals on the ATO website
-
Essential Eight Maturity Model on the Australian Cyber Security Centre (ACSC) website. ext
Do you recommend the use of any particular apps to store passwords. For example Dashlane, last password etc?
We do not endorse particular products or solutions, however we do support the use of tools that provide extra layers of cyber protection. You should read and understand the solution the desired tool or app provides, any additional features that aren’t installed by default, and current research on the products. Choose products and apps that come with positive feedback from respected sources.
We suggest you visit the ACSC website which provides some helpful tips on what you should look for when choosing a password manager.
Do you have a recommended list of insurance providers for cyber insurance?
We are unable to recommend insurance providers for cyber cover. If you are a member of a professional association, you may contact them to see if they have any recommendations.
Do you have any recommendations for messaging apps that can be used by tax practitioners?
Refer to the Security Tips for Social Media and Messaging Apps on the ACSC website for some helpful information.
What are signs that you have been impacted by a cyber-attack?
Refer to the Guidelines for cyber security incidents on the ACSC website which provide some ways you can detect cyber security incidents. Many password managers also have features that enable you to check if any of your credentials have been compromised and published on the dark web.
Could you give an example of a "secured" website?
A secure website is a website that uses encryption for all communications via your browser. This can be spotted by the ‘https’ at the front of a domain name within a site’s URL, and a lock symbol next to the URL in your browser. Common browsers only trust unexpired encryption keys provided by reputable firms who verify the identity of the website owner. Encryption offers a level of protection to communication between the website and user by making it less accessible to cyber criminals. This prevents hackers from reading or interfering with the information whilst it’s in transit.
Are the various shredding services provided by shredding agencies acceptable to dispose of documents safely?
Before using a shredding service for client information, you would need to seek your client’s permission to disclose their information to the shredding service (which is a third party). You should advise your client what information is being disposed of and the agency that is being used. The permission may be by way of a signed engagement letter, signed consent or other communication with the client.
Is it safe for clients to send their TFN and date of birth via email?
We would not recommend that you receive or send client’s sensitive personal information by email as this is not considered to be a secure method of transmission. You should advise your clients to send this information to you through secure ways, such as a secure website, secure online mailbox or secure messaging as discussed in our proof of identity guidelines.
Why is email not considered a secure method of transmission?
The Office of the Australian Information Commissioner (OAIC) provides guidance on email security on its website. It provides that email is not a secure form of communication and you should develop procedures to manage the transmission of personal information via email. Emails can be easily intercepted by third parties when sent over the internet.
You may refer to the Guide to securing personal information released by the OAIC on their website for information about email security. You may also refer to Email Security information available on the ACSC website.
If someone sends you a message that they have accessed data held by you, when in fact they don't, but still demands money, is this scenario still reportable?
The Notifiable Data Breaches (NDB) scheme requires ‘eligible’ data breaches to be reported. An eligible data breach occurs when 3 criteria are met:
-
there is unauthorised access to, or unauthorised disclosure of personal information, or a loss of personal information, that an entity holds
-
this is likely to result in serious harm to one or more individuals, and
-
the entity has not been able to prevent the likely risk of serious harm with remedial action.
Refer to the Notifiable Data Breaches scheme information on our website and Identifying eligible data breaches information on the OAIC website for further information. The ACSC website also has a handy factsheet to learn more about when you should report about a cybercrime.
Client verification checks
How do we prove we have undertaken proof of identity (POI) on clients if we do not keep a copy of the verified documents?
We do not require or recommend that you retain copies or originals of identification documents used as evidence to establish the identity of a client or their individual representative. This is because we recognise these documents may be at risk of being stolen through cyber-attacks or even physical break-ins at your business premises.
What we require you to do is maintain a contemporaneous record, such as a checklist, as soon as you complete any proof of identity checks. This record should include information such as:
-
the date and time when the proof of identity checks were undertaken
-
the name and position of the person that performed these checks
-
the types of documents that were sighted and whether these were original or certified copies – please note here that we do not recommend that you record the identity document numbers.
-
how you sighted these documents - whether in person or electronically
-
whether the documents were clear and legible and there was no reason to question the authenticity of the identity documents.
We’ll accept this record as evidence that you have completed POI checks on your clients. You should keep this record for at least 5 years after your client engagement has ceased.
Do we need to meet the client face-to-face to verify their identity or can we meet the client online – for example, via Zoom or MS Teams?
No, you do not have to meet clients face-to-face to verify their identity. If you are engaging a client and/or their individual representative remotely you may choose to use videoconferencing facilities. In this situation, our requirements remain the same as for registered tax practitioners who engage with clients face-to-face. If you sight original or certified identification documents through videoconferencing or with the use of a webcam, you should record details of identity checks undertaken as soon as you complete them. Refer to our guidelines for further information.
Where can we access the handy factsheet for our clients about undertaking proof of identity?
The factsheet that summarises our proof of identity requirements is available on our website.
I ask clients to send their identity documents through secure means, but if they choose to send by email, what do we do?
If you have a secure online mailbox, website or messaging arrangements for your practice, you should encourage your clients to send sensitive information and documents through these means.
If your client chooses to send information via email, ensure you make a note on your records and destroy these documents as soon as POI checks are completed.
We receive requests from clients to complete their director identification and they have provided their identity documents. How do we protect those documents?
As soon as you complete the director identification process for your clients, you should return any original documents back to clients and destroy any copies of documents securely that need not be returned to clients.
How many documents do you recommend we use to identify a new client? Should we just record that we have sited the ID documents and note part of the ID number, for example xxxxxx543?
We have provided guidance of what identity details and types of documents you need to verify for your clients in our POI guidelines available on our website.
It is sufficient to record details of checks undertaken as explained in an earlier question above.
If clients live remotely and are able to send their tax file number and identity documents only by email, how do we protect the information?
You should ask the client to send any sensitive information to you:
-
via a secure website, secure online mailbox or secure messaging
-
as an encrypted or password protected attachment to an email.
This should help minimise any risk of interception of sensitive information during email transmission.
Alternatively, refer to the ATO’s guidelines which provide information on how to undertake client verification checks using ATO or Document Verification Service (or DVS) sources.
Who do we verify for a not-for-profit organisation?
For a not-for-profit organisation, you should undertake similar checks as you would for a non-individual client. Refer to our POI guidelines regarding our requirements for undertaking proof of identity on a non-individual client.
Do you have to get the client to sign in order to confirm that you have sighted their proof of identification?
No, it is enough if you make a contemporaneous record of the identity checks you have undertaken on your client as soon as you complete them.
I have to keep passport information of clients to conduct 3-monthly immigration checks. How do I go about doing this if I should not be keeping a record of client’s passport details?
Where you must store sensitive client data, you must secure your business premises and systems. The ATO provides security guidance for tax professionals. You may also seek expert advice from cyber security professionals to find a solution that can help protect your practice and client information.
For some helpful information refer to:
-
Top cyber security tips for businesses on the ATO website
-
Security advice for tax professionals on the ATO website
-
Protect your practice from cyber-attacks on the TPB website.
In regard to checking identification through video conferencing facilities such as zoom, it is possible that the new client may be showing a fake id with their photo, shouldn’t we physically sight the id and have it signed by the client?
You should use your professional judgement in situations where you have reasons to believe that the evidence provided by client is not genuine. You may need to ask additional questions or evidence, or use ATO or DVS sources to verify their identity.
If you are dealing with some clients regularly, do you still have to identify them?
When dealing with your existing clients, it may not be appropriate or necessary to undertake POI on them as you may consider their identity is well-established. Ultimately, we expect that you exercise your professional judgement in these situations. Refer to ‘Well-established clients’ section in our POI guidelines for further information.