SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Fraud/Identity Theft
Legal Issues

Terrence P. Maher
tmaher@bairdholm.com

© 2012 Baird Holm LLP
Treasury IG for Tax Administration
• There Are Billions of Dollars in Undetected Tax Refund
Fraud Resulting From Identity Theft - Reference
Number: 2012-42-080 - July 19, 2012
• Processes for the Direct Deposit of Tax Refunds Need
Improvement to Increase Accuracy and Minimize Fraud Reference Number: 2012-40-118 - September 25, 2012
• Further Efforts Are Needed to Ensure the Internal
Revenue Service Prisoner File Is Accurate and
Complete - Reference Number: 2013-40-011- December
18, 2012

© 2012 Baird Holm LLP
Findings
• IG estimated that the IRS could issue $21 billion in
potentially fraudulent tax refunds resulting from identity
theft over the next five years
• In addition to returns flagged by the IRS, the IG identified
approximately 1.5 million additional undetected tax
returns with potentially fraudulent tax refunds totaling in
excess of $5.2 billion
• Of the approximately 1.5 million tax returns the IG
identified, 1.2 million (82 percent) used direct deposit to
obtain tax refunds totaling approximately $4.5 billion

© 2012 Baird Holm LLP
Findings
• IG found that the IRS was not in compliance with
direct deposit regulations that require tax
refunds to be deposited to an account only in the
name of the individual listed on the tax return
• Deposits to debit card accounts are being used
by identity thieves committing tax return filing
fraud
• Investigators working the Tampa scheme
identified that most of the fraudulent tax refunds
were direct deposited to a debit card account

© 2012 Baird Holm LLP
Findings
• The number of fraudulent tax returns filed by prisoners
and identified by the Internal Revenue Service has
increased from more than 18,000 tax returns in Calendar
Year 2004 to more than 91,000 tax returns in Calendar
Year 2010
• The refunds claimed on these tax returns increased from
$68 million to $757 million
• Although the IRS prevented the issuance of $722 million
in fraudulent tax refunds during Calendar Year 2010, it
released more than $35 million
• The prisoner file supplied to the IRS is incomplete and
inaccurate

© 2012 Baird Holm LLP
Recommendations
• IG recommendation #5 – the IRS should
coordinate with responsible Federal agencies
and banking institutions to develop a process to
ensure that tax refunds issued via direct deposit
to either a bank account or a debit card account
are made only to an account in the taxpayer‟s
name
• IG recommendation #6 - limit the number of tax
refunds issued via direct deposit to the same
bank account or debit card account in an attempt
to reduce the potential for fraud
© 2012 Baird Holm LLP
Recommendations
• “Secret” recommendation #7 – Develop processes to
identify and quantify direct deposits of tax refunds to
accounts associated with a debit card as well as the
ability to associate tax refunds deposited to a debit card
to a specific tax account
• Recommendation #8 - Work with the Department of the
Treasury to ensure financial institutions and debit card
administration companies authenticate the identity of
individuals purchasing a debit card. Furthermore,
prevent the direct deposit of tax refunds to debit cards
issued or administered by financial institutions and debit
card administration companies that do not take
reasonable steps to authenticate individuals‟ identities.
• Implementation Dates – October 15, 2013
© 2012 Baird Holm LLP
Social Security Administration
Office of the Inspector General
• Controls over the Enrollment Process with
the Direct Express® Debit Card Program
(Limited Distribution)(A-15-12-21273)
• Direct Deposit Changes Initiated Through
Financial Institutions and the Social
Security Administration‟s Internet and
Automated 800-Number Applications
(Limited Distribution) (A-14-12-21271)
© 2012 Baird Holm LLP
Social Security Administration
Office of the Inspector General
• Direct Express
– In May 2011, the IG began receiving multiple
allegations that Social Security benefits were being
improperly diverted to Direct Express
– Comerica subsequently alerted the IG to fraudulent
activity it detected regarding Social Security benefits
– The IG initiated five audits to evaluate controls in
place at various points in the direct deposit process
and identify vulnerabilities

© 2012 Baird Holm LLP
Social Security Administration
Office of the Inspector General
• Direct Express
– The IG review demonstrated that one or more individuals
successfully enrolled beneficiaries in the Direct Express program
and/or changed their direct deposit information without the
beneficiaries‟ knowledge
– As Treasury requires that beneficiaries receive their benefit
payments through direct deposit or Direct Express, it is likely that
the number of SSA beneficiaries whose payments are vulnerable
to fraud will increase
– To prevent fraudulent changes to a beneficiary‟s account in the
future, the IG recommend that SSA work with Treasury and
Comerica to enhance the authentication process between the
parties for the Direct Express card

© 2012 Baird Holm LLP
Social Security Administration
Office of the Inspector General
• Direct Deposit
– In October 2011, the IG began tracking allegations that indicated
individuals other than the beneficiaries or their representatives
had redirected benefit payments from the beneficiaries‟ bank
accounts to accounts the individuals controlled
– As of August 31, 2012, the IG had received over 19,000 reports
concerning direct deposit changes to an SSA beneficiary‟s
record
– These reports involved either an unauthorized change or a
suspected attempt to make an unauthorized change
– Based on these allegations, the IG initiated audits to evaluate
controls in the direct deposit process and identify vulnerabilities

© 2012 Baird Holm LLP
Social Security Administration
Office of the Inspector General
• Direct Deposit
– When the IG asked 29 beneficiaries who did not authorize the
direct deposit changes how someone might have gained access
to their private information to make a change, the results were as
follows:
• Thirteen beneficiaries reported they were told they had won a
lottery, but they needed to provide some private information before
they could receive their prize.
• Three beneficiaries said they provided their private information to
someone claiming to be an official from a Government agency or
someone they knew
• Two beneficiaries reported their wallets or credit cards had been
lost or stolen
• Eleven beneficiaries reported they were unsure how someone might
have acquired their private information.

© 2012 Baird Holm LLP
Social Security Administration
Office of the Inspector General
• Direct Deposit
– Of the 29 beneficiaries in the IG sample with misdirected benefit
payments, the suspicious direct deposit changes for 19
beneficiaries originated at FIs through the ENR process, for 9
beneficiaries the direct deposit change originated through SSA‟s
Direct Deposit automated 800-number application with
knowledge-based authentication, and for 1 beneficiary the direct
deposit change originated through the Agency‟s Direct Deposit
Internet application
– For the 19 beneficiaries with changes originating at FIs, the IG
determined that changes for 9 beneficiaries redirected benefits
to prepaid debit cards and changes for the remaining 10
beneficiaries redirected benefits to accounts it could not identify
as prepaid debit cards

© 2012 Baird Holm LLP
Social Security Administration
Office of the Inspector General
• Direct Deposit
– The IG determined that the controls over direct deposit changes
originating through FIs or the Agency‟s Direct Deposit Internet
and automated 800-number applications did not ensure all
changes were authorized
– Based on beneficiary interviews, data analysis, and the IG
review of systems documentation, the IG identified instances of
unauthorized account changes and weaknesses in SSA and FI‟s
authentication or identity verification processes
– The IG made 9 confidential recommendations, 8 of which the
SSA agreed with

© 2012 Baird Holm LLP
Financial Management Services
Regulations

© 2012 Baird Holm LLP
Deposit of Federal Benefits to Prepaid
Cards
• Treasury FMS issued an Interim Final Rule effective
January 21, 2011, to allow Federal payments to be
delivered to prepaid debit card or similar card accounts
meeting certain consumer protection requirements
• The NBPCA submitted comments on the IFR, but, to
date, no final rule has been issued
• FMS regulations have long provided that Federal
payments made by ACH had to be deposited into an
account „„in the name of the recipient‟‟ – the payment
recipient‟s name must appear in the account title
• With the use of pooled accounts in prepaid, it was not
clear that prepaid cards could meet this requirement

© 2012 Baird Holm LLP
Deposit of Federal Benefits to Prepaid
Cards
• Under the IFR, a Federal payment may be deposited to an account
accessed by the recipient through a prepaid card that meets the
following requirements:
– The account is held at an insured financial institution;
– The account is set up to meet the requirements for pass-through deposit
or share insurance such that the funds accessible through the card are
insured for the benefit of the recipient by the Federal Deposit Insurance
Corporation or the National Credit Union Share Insurance Fund in
accordance with applicable law (12 CFR part 330 or 12 CFR part 745);
– The account is not attached to a line of credit or loan agreement under
which repayment from the account is triggered upon delivery of the
Federal payments; and
– The issuer of the card complies with all of the requirements, and
provides the holder of the card with all of the consumer protections, that
apply to a payroll card account under the rules implementing the
Electronic Fund Transfer Act, as amended

© 2012 Baird Holm LLP
Deposit of Federal Benefits to Prepaid
Cards
• No person or entity may issue a prepaid
card that receives Federal payments in
violation of the IFR, and no financial
institution may maintain an account for or
on behalf of an issuer of a prepaid card
that receives Federal payments if the
issuer violates the IFR

© 2012 Baird Holm LLP
Erroneous/Unauthorized ENRs
• 31 C.F.R. Part 210 addresses the Federal Government's
participation in the ACH system
• 31 C.F.R. Sec. 210.4(a) provides:
– "(1) The agency or the RDFI that accepts the recipient‟s
authorization [for example, an ENR entry] shall verify the identity
of the recipient and, in the case of a written authorization
requiring the recipient‟s signature, the validity of the recipient‟s
signature.
– (2) Unless authorized in writing, or similarly authenticated, by an
agency, no person or entity shall initiate or transmit a debit entry
to that agency, other than a reversal of a credit entry previously
sent to the agency."

© 2012 Baird Holm LLP
Erroneous/Unauthorized ENRs
•
•

•

•

Under 31 C.F.R. Sec. 210.8(2), a financial institution that accepts an
authorization in violation of § 210.4(a) is liable to the Federal Government
for all credits or debits made in reliance on the authorization
A financial institution that transmits to an agency an authorization containing
an incorrect account number is liable to the Federal Government for any
resulting loss, up to the amount of the payment(s) made on the basis of the
incorrect number
If an agency determines, after appropriate investigation, that a loss has
occurred because the financial institution transmitted an authorization or
notification of change containing an incorrect account number, the benefits
paying agency may instruct the Financial Management Service to direct a
Federal Reserve Bank to debit the financial institution's account for the
amount of the payments made on the basis of the incorrect number
The agency must notify the financial institution of the results of its
investigation and provide the financial institution with a reasonable
opportunity to respond before initiating such a debit.

© 2012 Baird Holm LLP
Identity Theft and Tax Fraud Prevention
Act - S3432

© 2012 Baird Holm LLP
S 3432
• The bipartisan bill is intended to reduce the incidence of fraudulent
tax returns by protecting SSNs from disclosure and providing new
protections for identity theft victims
• Section 8 of the bill would require the U.S. Comptroller General to
conduct a study within one year that examines the role of prepaid
debit cards and commercial tax preparation software in facilitating
fraudulent tax returns through identity theft
– The report must be submitted to the Senate Finance and the House
Ways and Means committees, together with any recommendations
– The bill does not identify the specific concerns that the Senators have
with prepaid cards utilized with tax returns

• The bill also requires a study by the U.S. Treasury on information
sharing barriers to deterring tax fraud through identity theft

© 2012 Baird Holm LLP
FACTA ID Theft Red Flags Rule

© 2012 Baird Holm LLP
FACTA ID Theft Red Flags Rule
• The rule requires many businesses and organizations to
implement and adopt written identity theft prevention
programs to detect the warning signs - or "red flags"- of
identity theft in their day-to-day operations, take steps to
prevent the crime of identity theft, and mitigate the
damage identity theft inflicts
• The rule only applies to "financial institutions" and
"creditors."
– "Financial institutions" are banks, savings and loans, credit
unions, and other entities that maintain consumer transaction
accounts

© 2012 Baird Holm LLP
FACTA ID Theft Red Flags Rule
• A transaction account is a deposit or other
account from which the owner makes payments
or transfers
• Transaction accounts include checking
accounts, negotiable order of withdrawal
accounts, savings deposits subject to automatic
transfers, and share draft accounts
– Are GPR cards covered?

© 2012 Baird Holm LLP
FACTA ID Theft Red Flags Rule
• The rule requires that the written program
include four basic elements
– The program must include reasonable policies and
procedures to identify "red flags" of identity theft
– The program must be designed to detect the red flags
you‟ve identified
– The program must spell out appropriate actions you
will take when you detect red flags
– Because identity theft is an ever-changing threat, you
must address how you will re-evaluate the program
periodically to reflect new risks from ID theft

© 2012 Baird Holm LLP
FACTA ID Theft Red Flags Rule
• Although there are no criminal penalties for failing to
comply with the rule, financial institutions and creditors
may be liable for civil monetary penalties
– What will the CFPB do?

• Under the FAQs, there is no private right of action for a
violation of FACTA
• Other than in Alabama, courts have generally refused to
impose liability on an FI to a victim of ID theft where the
FI established accounts in the name of the victim
through the actions of a fraudster

© 2012 Baird Holm LLP
FinCEN CIP Rule

© 2012 Baird Holm LLP
FinCEN
• 31 CFR 103.121 sets forth the rule regarding
customer identification programs for FIs
• The regulation defines an account as “a formal
banking relationship established to provide or
engage in services, dealings, or other financial
transactions including a deposit account, a
transaction or asset account, a credit account, or
other extension of credit”

© 2012 Baird Holm LLP
FinCEN
• The CIP must include risk-based
procedures for verifying the identity of
each customer to the extent reasonable
and practicable
• The procedures must enable the bank to
form a reasonable belief that it knows the
true identity of each customer

© 2012 Baird Holm LLP
FinCEN
• These procedures must be based on the bank's assessment of the
relevant risks, including those presented by the various types of
accounts maintained by the bank, the various methods of opening
accounts provided by the bank, the various types of identifying
information available, and the bank's size, location, and customer
base
• The CIP must contain procedures for verifying the identity of the
customer, using information obtained, within a reasonable time after
the account is opened
• At what point does establishing prepaid card accounts for fraudsters
indicate that the FIs CIP is inadequate? Will regulators take action?
• Courts have held that there is no private right of action for BSA
violations

© 2012 Baird Holm LLP
Questions?

© 2012 Baird Holm LLP

Contenu connexe

Tendances

Asia Counsel Insights June 2017
Asia Counsel Insights June 2017Asia Counsel Insights June 2017
Asia Counsel Insights June 2017Minh Duong
 
Asia Counsel Insights 1 December 2015
Asia Counsel Insights 1 December 2015Asia Counsel Insights 1 December 2015
Asia Counsel Insights 1 December 2015Minh Duong
 
Budget 2022 - No Retrospective Amendments Please!
Budget 2022 - No Retrospective Amendments Please!Budget 2022 - No Retrospective Amendments Please!
Budget 2022 - No Retrospective Amendments Please!Economic Laws Practice
 
Spring session 2015 new laws of mongolia (by lex loci)
Spring session 2015   new laws of mongolia (by lex loci)Spring session 2015   new laws of mongolia (by lex loci)
Spring session 2015 new laws of mongolia (by lex loci)Serod Ichinkhorloo
 
08.2015 legislative update 2015, spring session of the parliament of mongolia
08.2015 legislative update 2015, spring session of the parliament of mongolia08.2015 legislative update 2015, spring session of the parliament of mongolia
08.2015 legislative update 2015, spring session of the parliament of mongoliaThe Business Council of Mongolia
 
Financial services
Financial servicesFinancial services
Financial servicesdwivavi
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisIT-oLogy
 
Hong Kong holding companies - what to do
Hong Kong holding companies - what to doHong Kong holding companies - what to do
Hong Kong holding companies - what to doTanya Vasilyeva
 
Asia Counsel Insights October 2021
Asia Counsel Insights October 2021Asia Counsel Insights October 2021
Asia Counsel Insights October 2021Minh Duong
 
PPP Loan Forgiveness Presentation
PPP Loan Forgiveness PresentationPPP Loan Forgiveness Presentation
PPP Loan Forgiveness PresentationGeorgiaPinner
 
2015 CalCPA/FTB Q&A
2015 CalCPA/FTB Q&A2015 CalCPA/FTB Q&A
2015 CalCPA/FTB Q&Amaragoni
 
Asia counsel insights august 2019
Asia counsel insights august 2019Asia counsel insights august 2019
Asia counsel insights august 2019Minh Duong
 
Financial and PR impact of the new CIT regulations 24.04.18 final
Financial and PR impact of the new CIT regulations 24.04.18 finalFinancial and PR impact of the new CIT regulations 24.04.18 final
Financial and PR impact of the new CIT regulations 24.04.18 finalPwC Polska
 
Asia Counsel Insights August 2021
Asia Counsel Insights August 2021Asia Counsel Insights August 2021
Asia Counsel Insights August 2021Minh Duong
 
Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
 	 Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b... 	 Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...taxman taxman
 

Tendances (18)

Asia Counsel Insights June 2017
Asia Counsel Insights June 2017Asia Counsel Insights June 2017
Asia Counsel Insights June 2017
 
Visa (V) Bench
Visa (V) BenchVisa (V) Bench
Visa (V) Bench
 
EFT Guide
EFT GuideEFT Guide
EFT Guide
 
Asia Counsel Insights 1 December 2015
Asia Counsel Insights 1 December 2015Asia Counsel Insights 1 December 2015
Asia Counsel Insights 1 December 2015
 
ELP Tax Newsletter December 2021
ELP Tax Newsletter December 2021ELP Tax Newsletter December 2021
ELP Tax Newsletter December 2021
 
Budget 2022 - No Retrospective Amendments Please!
Budget 2022 - No Retrospective Amendments Please!Budget 2022 - No Retrospective Amendments Please!
Budget 2022 - No Retrospective Amendments Please!
 
Spring session 2015 new laws of mongolia (by lex loci)
Spring session 2015   new laws of mongolia (by lex loci)Spring session 2015   new laws of mongolia (by lex loci)
Spring session 2015 new laws of mongolia (by lex loci)
 
08.2015 legislative update 2015, spring session of the parliament of mongolia
08.2015 legislative update 2015, spring session of the parliament of mongolia08.2015 legislative update 2015, spring session of the parliament of mongolia
08.2015 legislative update 2015, spring session of the parliament of mongolia
 
Financial services
Financial servicesFinancial services
Financial services
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Hong Kong holding companies - what to do
Hong Kong holding companies - what to doHong Kong holding companies - what to do
Hong Kong holding companies - what to do
 
Asia Counsel Insights October 2021
Asia Counsel Insights October 2021Asia Counsel Insights October 2021
Asia Counsel Insights October 2021
 
PPP Loan Forgiveness Presentation
PPP Loan Forgiveness PresentationPPP Loan Forgiveness Presentation
PPP Loan Forgiveness Presentation
 
2015 CalCPA/FTB Q&A
2015 CalCPA/FTB Q&A2015 CalCPA/FTB Q&A
2015 CalCPA/FTB Q&A
 
Asia counsel insights august 2019
Asia counsel insights august 2019Asia counsel insights august 2019
Asia counsel insights august 2019
 
Financial and PR impact of the new CIT regulations 24.04.18 final
Financial and PR impact of the new CIT regulations 24.04.18 finalFinancial and PR impact of the new CIT regulations 24.04.18 final
Financial and PR impact of the new CIT regulations 24.04.18 final
 
Asia Counsel Insights August 2021
Asia Counsel Insights August 2021Asia Counsel Insights August 2021
Asia Counsel Insights August 2021
 
Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
 	 Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b... 	 Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
Electronic Funds Transfer ACH Credit Registration (Note: The DP-175 must b...
 

Similaire à Prepaid Card Compliance - Conference Materials

DHG Tax Advisory presentation
DHG Tax Advisory presentationDHG Tax Advisory presentation
DHG Tax Advisory presentationJenny Cavnar
 
Information on the Borrower’s Rights and Lender’s Responsibilities in the U.S.
Information on the Borrower’s Rights and Lender’s Responsibilities in the U.S.Information on the Borrower’s Rights and Lender’s Responsibilities in the U.S.
Information on the Borrower’s Rights and Lender’s Responsibilities in the U.S.johnbailey322
 
Power Up Your Business: NC Department of Revenue
Power Up Your Business: NC Department of RevenuePower Up Your Business: NC Department of Revenue
Power Up Your Business: NC Department of RevenueLady Bizness
 
Chapter 12 power point
Chapter 12 power pointChapter 12 power point
Chapter 12 power pointdphil002
 
Understanding Credit Reports and Credit Scoring (Webinar Slides)
Understanding Credit Reports and Credit Scoring (Webinar Slides)Understanding Credit Reports and Credit Scoring (Webinar Slides)
Understanding Credit Reports and Credit Scoring (Webinar Slides)NAFCU Services Corporation
 
Simpe Strategies to Save on Your 2014 Taxes
Simpe Strategies to Save on Your 2014 TaxesSimpe Strategies to Save on Your 2014 Taxes
Simpe Strategies to Save on Your 2014 TaxesSkoda Minotti
 
Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14ACFCS
 
AUDITING Accounts PayableDiscussion TopicIm Done Top .docx
AUDITING  Accounts PayableDiscussion TopicIm Done Top .docxAUDITING  Accounts PayableDiscussion TopicIm Done Top .docx
AUDITING Accounts PayableDiscussion TopicIm Done Top .docxrock73
 
Tax Myths and Facts-July 2016
Tax Myths and Facts-July 2016Tax Myths and Facts-July 2016
Tax Myths and Facts-July 2016Andrew Schwartz
 
Demystifying Credit Repair
Demystifying Credit RepairDemystifying Credit Repair
Demystifying Credit RepairRob Aubrey
 
Eye on Washington: Quarterly Business Tax Update
Eye on Washington: Quarterly Business Tax UpdateEye on Washington: Quarterly Business Tax Update
Eye on Washington: Quarterly Business Tax UpdateCBIZ, Inc.
 
Understanding Your Credit Report and Score
Understanding Your Credit Report and ScoreUnderstanding Your Credit Report and Score
Understanding Your Credit Report and ScoreSpringboard
 
Introduction to consumer lending
Introduction to consumer lendingIntroduction to consumer lending
Introduction to consumer lendingSaleem Sawalha
 

Similaire à Prepaid Card Compliance - Conference Materials (20)

DHG Tax Advisory presentation
DHG Tax Advisory presentationDHG Tax Advisory presentation
DHG Tax Advisory presentation
 
N 2 Focus (English)
N 2 Focus (English)N 2 Focus (English)
N 2 Focus (English)
 
Information on the Borrower’s Rights and Lender’s Responsibilities in the U.S.
Information on the Borrower’s Rights and Lender’s Responsibilities in the U.S.Information on the Borrower’s Rights and Lender’s Responsibilities in the U.S.
Information on the Borrower’s Rights and Lender’s Responsibilities in the U.S.
 
Power Up Your Business: NC Department of Revenue
Power Up Your Business: NC Department of RevenuePower Up Your Business: NC Department of Revenue
Power Up Your Business: NC Department of Revenue
 
Chapter 12 power point
Chapter 12 power pointChapter 12 power point
Chapter 12 power point
 
Understanding Credit Reports and Credit Scoring (Webinar Slides)
Understanding Credit Reports and Credit Scoring (Webinar Slides)Understanding Credit Reports and Credit Scoring (Webinar Slides)
Understanding Credit Reports and Credit Scoring (Webinar Slides)
 
Simpe Strategies to Save on Your 2014 Taxes
Simpe Strategies to Save on Your 2014 TaxesSimpe Strategies to Save on Your 2014 Taxes
Simpe Strategies to Save on Your 2014 Taxes
 
Business Taxes | OTR | Doing Business 2.0
Business Taxes | OTR | Doing Business 2.0Business Taxes | OTR | Doing Business 2.0
Business Taxes | OTR | Doing Business 2.0
 
Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14Tax evasion, fci, fraud, compliance 2 28-14
Tax evasion, fci, fraud, compliance 2 28-14
 
AUDITING Accounts PayableDiscussion TopicIm Done Top .docx
AUDITING  Accounts PayableDiscussion TopicIm Done Top .docxAUDITING  Accounts PayableDiscussion TopicIm Done Top .docx
AUDITING Accounts PayableDiscussion TopicIm Done Top .docx
 
Tax Myths and Facts-July 2016
Tax Myths and Facts-July 2016Tax Myths and Facts-July 2016
Tax Myths and Facts-July 2016
 
Demystifying Credit Repair
Demystifying Credit RepairDemystifying Credit Repair
Demystifying Credit Repair
 
Eye on Washington: Quarterly Business Tax Update
Eye on Washington: Quarterly Business Tax UpdateEye on Washington: Quarterly Business Tax Update
Eye on Washington: Quarterly Business Tax Update
 
MyFICO
MyFICOMyFICO
MyFICO
 
2015 CalCPA/FTB Q&A
2015 CalCPA/FTB Q&A2015 CalCPA/FTB Q&A
2015 CalCPA/FTB Q&A
 
Reg E training preview
Reg E training previewReg E training preview
Reg E training preview
 
Understanding Your Credit Report and Score
Understanding Your Credit Report and ScoreUnderstanding Your Credit Report and Score
Understanding Your Credit Report and Score
 
Audit for Detection of Fraud
Audit for  Detection of FraudAudit for  Detection of Fraud
Audit for Detection of Fraud
 
TRID - Powerpoint
TRID - PowerpointTRID - Powerpoint
TRID - Powerpoint
 
Introduction to consumer lending
Introduction to consumer lendingIntroduction to consumer lending
Introduction to consumer lending
 

Plus de Rachel Hamilton

The Relationship Between Insurance Companies and Outside Counsel
The Relationship Between Insurance Companies and Outside Counsel The Relationship Between Insurance Companies and Outside Counsel
The Relationship Between Insurance Companies and Outside Counsel Rachel Hamilton
 
Mortgage Servicing Transfers: Meeting the Operational and Regulatory Demands
Mortgage Servicing Transfers: Meeting the Operational and Regulatory DemandsMortgage Servicing Transfers: Meeting the Operational and Regulatory Demands
Mortgage Servicing Transfers: Meeting the Operational and Regulatory DemandsRachel Hamilton
 
Latest Developments in Market Manipulation
Latest Developments in Market ManipulationLatest Developments in Market Manipulation
Latest Developments in Market ManipulationRachel Hamilton
 
The International Digital and Virtual Currency Landscape
The International Digital and Virtual Currency LandscapeThe International Digital and Virtual Currency Landscape
The International Digital and Virtual Currency LandscapeRachel Hamilton
 
Procedural Issues in Bad Faith Litigation
Procedural Issues in Bad Faith LitigationProcedural Issues in Bad Faith Litigation
Procedural Issues in Bad Faith LitigationRachel Hamilton
 
Deploying Gamification to Sweetstakes and Promotions to Engage Consumers and ...
Deploying Gamification to Sweetstakes and Promotions to Engage Consumers and ...Deploying Gamification to Sweetstakes and Promotions to Engage Consumers and ...
Deploying Gamification to Sweetstakes and Promotions to Engage Consumers and ...Rachel Hamilton
 
Current Good Manufacturing Practices: Drug and Biologics
Current Good Manufacturing Practices: Drug and Biologics Current Good Manufacturing Practices: Drug and Biologics
Current Good Manufacturing Practices: Drug and Biologics Rachel Hamilton
 
Ethical Considerations for Paragraph IV Matters Before the PTO and District C...
Ethical Considerations for Paragraph IV Matters Before the PTO and District C...Ethical Considerations for Paragraph IV Matters Before the PTO and District C...
Ethical Considerations for Paragraph IV Matters Before the PTO and District C...Rachel Hamilton
 
The Devil is in the Details: Best Practices for Handling the Gray Areas in Re...
The Devil is in the Details: Best Practices for Handling the Gray Areas in Re...The Devil is in the Details: Best Practices for Handling the Gray Areas in Re...
The Devil is in the Details: Best Practices for Handling the Gray Areas in Re...Rachel Hamilton
 
NEW CLAIMS TRENDS RELATED TO THE U.S. PAIN CRISIS
NEW CLAIMS TRENDS RELATED TO THE U.S. PAIN CRISISNEW CLAIMS TRENDS RELATED TO THE U.S. PAIN CRISIS
NEW CLAIMS TRENDS RELATED TO THE U.S. PAIN CRISISRachel Hamilton
 
Recent Rulings and Trends in Decision Making Impacting Allocation
Recent Rulings and Trends in Decision Making Impacting AllocationRecent Rulings and Trends in Decision Making Impacting Allocation
Recent Rulings and Trends in Decision Making Impacting AllocationRachel Hamilton
 
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance ProgramRevisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance ProgramRachel Hamilton
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityRachel Hamilton
 
Exempt Employee Determinations and Misclassification of Workers
Exempt Employee Determinations and Misclassification of WorkersExempt Employee Determinations and Misclassification of Workers
Exempt Employee Determinations and Misclassification of WorkersRachel Hamilton
 
Class Actions Trends - An Overview of Recent Trends Involving Class Actions
Class Actions Trends - An Overview of Recent Trends Involving Class Actions Class Actions Trends - An Overview of Recent Trends Involving Class Actions
Class Actions Trends - An Overview of Recent Trends Involving Class Actions Rachel Hamilton
 
Remittance Transfer Rule: Depository Institution Exemption
Remittance Transfer Rule: Depository Institution Exemption Remittance Transfer Rule: Depository Institution Exemption
Remittance Transfer Rule: Depository Institution Exemption Rachel Hamilton
 
The Fiduciary Exception to Attorney-Client Privilege and Ethical Issue that A...
The Fiduciary Exception to Attorney-Client Privilege and Ethical Issue that A...The Fiduciary Exception to Attorney-Client Privilege and Ethical Issue that A...
The Fiduciary Exception to Attorney-Client Privilege and Ethical Issue that A...Rachel Hamilton
 
Patent Strategies in the OTC Space
Patent Strategies in the OTC Space Patent Strategies in the OTC Space
Patent Strategies in the OTC Space Rachel Hamilton
 
Meet Joyce Edelman, a Speaker at ACI’s 19th Annual Drug and Medical Device Li...
Meet Joyce Edelman, a Speaker at ACI’s 19th Annual Drug and Medical Device Li...Meet Joyce Edelman, a Speaker at ACI’s 19th Annual Drug and Medical Device Li...
Meet Joyce Edelman, a Speaker at ACI’s 19th Annual Drug and Medical Device Li...Rachel Hamilton
 

Plus de Rachel Hamilton (20)

The Relationship Between Insurance Companies and Outside Counsel
The Relationship Between Insurance Companies and Outside Counsel The Relationship Between Insurance Companies and Outside Counsel
The Relationship Between Insurance Companies and Outside Counsel
 
Mortgage Servicing Transfers: Meeting the Operational and Regulatory Demands
Mortgage Servicing Transfers: Meeting the Operational and Regulatory DemandsMortgage Servicing Transfers: Meeting the Operational and Regulatory Demands
Mortgage Servicing Transfers: Meeting the Operational and Regulatory Demands
 
Latest Developments in Market Manipulation
Latest Developments in Market ManipulationLatest Developments in Market Manipulation
Latest Developments in Market Manipulation
 
The International Digital and Virtual Currency Landscape
The International Digital and Virtual Currency LandscapeThe International Digital and Virtual Currency Landscape
The International Digital and Virtual Currency Landscape
 
Procedural Issues in Bad Faith Litigation
Procedural Issues in Bad Faith LitigationProcedural Issues in Bad Faith Litigation
Procedural Issues in Bad Faith Litigation
 
Deploying Gamification to Sweetstakes and Promotions to Engage Consumers and ...
Deploying Gamification to Sweetstakes and Promotions to Engage Consumers and ...Deploying Gamification to Sweetstakes and Promotions to Engage Consumers and ...
Deploying Gamification to Sweetstakes and Promotions to Engage Consumers and ...
 
Current Good Manufacturing Practices: Drug and Biologics
Current Good Manufacturing Practices: Drug and Biologics Current Good Manufacturing Practices: Drug and Biologics
Current Good Manufacturing Practices: Drug and Biologics
 
Ethical Considerations for Paragraph IV Matters Before the PTO and District C...
Ethical Considerations for Paragraph IV Matters Before the PTO and District C...Ethical Considerations for Paragraph IV Matters Before the PTO and District C...
Ethical Considerations for Paragraph IV Matters Before the PTO and District C...
 
The Devil is in the Details: Best Practices for Handling the Gray Areas in Re...
The Devil is in the Details: Best Practices for Handling the Gray Areas in Re...The Devil is in the Details: Best Practices for Handling the Gray Areas in Re...
The Devil is in the Details: Best Practices for Handling the Gray Areas in Re...
 
NEW CLAIMS TRENDS RELATED TO THE U.S. PAIN CRISIS
NEW CLAIMS TRENDS RELATED TO THE U.S. PAIN CRISISNEW CLAIMS TRENDS RELATED TO THE U.S. PAIN CRISIS
NEW CLAIMS TRENDS RELATED TO THE U.S. PAIN CRISIS
 
Recent Rulings and Trends in Decision Making Impacting Allocation
Recent Rulings and Trends in Decision Making Impacting AllocationRecent Rulings and Trends in Decision Making Impacting Allocation
Recent Rulings and Trends in Decision Making Impacting Allocation
 
Fail Lending Panel
Fail Lending PanelFail Lending Panel
Fail Lending Panel
 
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance ProgramRevisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
 
Exempt Employee Determinations and Misclassification of Workers
Exempt Employee Determinations and Misclassification of WorkersExempt Employee Determinations and Misclassification of Workers
Exempt Employee Determinations and Misclassification of Workers
 
Class Actions Trends - An Overview of Recent Trends Involving Class Actions
Class Actions Trends - An Overview of Recent Trends Involving Class Actions Class Actions Trends - An Overview of Recent Trends Involving Class Actions
Class Actions Trends - An Overview of Recent Trends Involving Class Actions
 
Remittance Transfer Rule: Depository Institution Exemption
Remittance Transfer Rule: Depository Institution Exemption Remittance Transfer Rule: Depository Institution Exemption
Remittance Transfer Rule: Depository Institution Exemption
 
The Fiduciary Exception to Attorney-Client Privilege and Ethical Issue that A...
The Fiduciary Exception to Attorney-Client Privilege and Ethical Issue that A...The Fiduciary Exception to Attorney-Client Privilege and Ethical Issue that A...
The Fiduciary Exception to Attorney-Client Privilege and Ethical Issue that A...
 
Patent Strategies in the OTC Space
Patent Strategies in the OTC Space Patent Strategies in the OTC Space
Patent Strategies in the OTC Space
 
Meet Joyce Edelman, a Speaker at ACI’s 19th Annual Drug and Medical Device Li...
Meet Joyce Edelman, a Speaker at ACI’s 19th Annual Drug and Medical Device Li...Meet Joyce Edelman, a Speaker at ACI’s 19th Annual Drug and Medical Device Li...
Meet Joyce Edelman, a Speaker at ACI’s 19th Annual Drug and Medical Device Li...
 

Dernier

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Dernier (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

Prepaid Card Compliance - Conference Materials

  • 1. Fraud/Identity Theft Legal Issues Terrence P. Maher tmaher@bairdholm.com © 2012 Baird Holm LLP
  • 2. Treasury IG for Tax Administration • There Are Billions of Dollars in Undetected Tax Refund Fraud Resulting From Identity Theft - Reference Number: 2012-42-080 - July 19, 2012 • Processes for the Direct Deposit of Tax Refunds Need Improvement to Increase Accuracy and Minimize Fraud Reference Number: 2012-40-118 - September 25, 2012 • Further Efforts Are Needed to Ensure the Internal Revenue Service Prisoner File Is Accurate and Complete - Reference Number: 2013-40-011- December 18, 2012 © 2012 Baird Holm LLP
  • 3. Findings • IG estimated that the IRS could issue $21 billion in potentially fraudulent tax refunds resulting from identity theft over the next five years • In addition to returns flagged by the IRS, the IG identified approximately 1.5 million additional undetected tax returns with potentially fraudulent tax refunds totaling in excess of $5.2 billion • Of the approximately 1.5 million tax returns the IG identified, 1.2 million (82 percent) used direct deposit to obtain tax refunds totaling approximately $4.5 billion © 2012 Baird Holm LLP
  • 4. Findings • IG found that the IRS was not in compliance with direct deposit regulations that require tax refunds to be deposited to an account only in the name of the individual listed on the tax return • Deposits to debit card accounts are being used by identity thieves committing tax return filing fraud • Investigators working the Tampa scheme identified that most of the fraudulent tax refunds were direct deposited to a debit card account © 2012 Baird Holm LLP
  • 5. Findings • The number of fraudulent tax returns filed by prisoners and identified by the Internal Revenue Service has increased from more than 18,000 tax returns in Calendar Year 2004 to more than 91,000 tax returns in Calendar Year 2010 • The refunds claimed on these tax returns increased from $68 million to $757 million • Although the IRS prevented the issuance of $722 million in fraudulent tax refunds during Calendar Year 2010, it released more than $35 million • The prisoner file supplied to the IRS is incomplete and inaccurate © 2012 Baird Holm LLP
  • 6. Recommendations • IG recommendation #5 – the IRS should coordinate with responsible Federal agencies and banking institutions to develop a process to ensure that tax refunds issued via direct deposit to either a bank account or a debit card account are made only to an account in the taxpayer‟s name • IG recommendation #6 - limit the number of tax refunds issued via direct deposit to the same bank account or debit card account in an attempt to reduce the potential for fraud © 2012 Baird Holm LLP
  • 7. Recommendations • “Secret” recommendation #7 – Develop processes to identify and quantify direct deposits of tax refunds to accounts associated with a debit card as well as the ability to associate tax refunds deposited to a debit card to a specific tax account • Recommendation #8 - Work with the Department of the Treasury to ensure financial institutions and debit card administration companies authenticate the identity of individuals purchasing a debit card. Furthermore, prevent the direct deposit of tax refunds to debit cards issued or administered by financial institutions and debit card administration companies that do not take reasonable steps to authenticate individuals‟ identities. • Implementation Dates – October 15, 2013 © 2012 Baird Holm LLP
  • 8. Social Security Administration Office of the Inspector General • Controls over the Enrollment Process with the Direct Express® Debit Card Program (Limited Distribution)(A-15-12-21273) • Direct Deposit Changes Initiated Through Financial Institutions and the Social Security Administration‟s Internet and Automated 800-Number Applications (Limited Distribution) (A-14-12-21271) © 2012 Baird Holm LLP
  • 9. Social Security Administration Office of the Inspector General • Direct Express – In May 2011, the IG began receiving multiple allegations that Social Security benefits were being improperly diverted to Direct Express – Comerica subsequently alerted the IG to fraudulent activity it detected regarding Social Security benefits – The IG initiated five audits to evaluate controls in place at various points in the direct deposit process and identify vulnerabilities © 2012 Baird Holm LLP
  • 10. Social Security Administration Office of the Inspector General • Direct Express – The IG review demonstrated that one or more individuals successfully enrolled beneficiaries in the Direct Express program and/or changed their direct deposit information without the beneficiaries‟ knowledge – As Treasury requires that beneficiaries receive their benefit payments through direct deposit or Direct Express, it is likely that the number of SSA beneficiaries whose payments are vulnerable to fraud will increase – To prevent fraudulent changes to a beneficiary‟s account in the future, the IG recommend that SSA work with Treasury and Comerica to enhance the authentication process between the parties for the Direct Express card © 2012 Baird Holm LLP
  • 11. Social Security Administration Office of the Inspector General • Direct Deposit – In October 2011, the IG began tracking allegations that indicated individuals other than the beneficiaries or their representatives had redirected benefit payments from the beneficiaries‟ bank accounts to accounts the individuals controlled – As of August 31, 2012, the IG had received over 19,000 reports concerning direct deposit changes to an SSA beneficiary‟s record – These reports involved either an unauthorized change or a suspected attempt to make an unauthorized change – Based on these allegations, the IG initiated audits to evaluate controls in the direct deposit process and identify vulnerabilities © 2012 Baird Holm LLP
  • 12. Social Security Administration Office of the Inspector General • Direct Deposit – When the IG asked 29 beneficiaries who did not authorize the direct deposit changes how someone might have gained access to their private information to make a change, the results were as follows: • Thirteen beneficiaries reported they were told they had won a lottery, but they needed to provide some private information before they could receive their prize. • Three beneficiaries said they provided their private information to someone claiming to be an official from a Government agency or someone they knew • Two beneficiaries reported their wallets or credit cards had been lost or stolen • Eleven beneficiaries reported they were unsure how someone might have acquired their private information. © 2012 Baird Holm LLP
  • 13. Social Security Administration Office of the Inspector General • Direct Deposit – Of the 29 beneficiaries in the IG sample with misdirected benefit payments, the suspicious direct deposit changes for 19 beneficiaries originated at FIs through the ENR process, for 9 beneficiaries the direct deposit change originated through SSA‟s Direct Deposit automated 800-number application with knowledge-based authentication, and for 1 beneficiary the direct deposit change originated through the Agency‟s Direct Deposit Internet application – For the 19 beneficiaries with changes originating at FIs, the IG determined that changes for 9 beneficiaries redirected benefits to prepaid debit cards and changes for the remaining 10 beneficiaries redirected benefits to accounts it could not identify as prepaid debit cards © 2012 Baird Holm LLP
  • 14. Social Security Administration Office of the Inspector General • Direct Deposit – The IG determined that the controls over direct deposit changes originating through FIs or the Agency‟s Direct Deposit Internet and automated 800-number applications did not ensure all changes were authorized – Based on beneficiary interviews, data analysis, and the IG review of systems documentation, the IG identified instances of unauthorized account changes and weaknesses in SSA and FI‟s authentication or identity verification processes – The IG made 9 confidential recommendations, 8 of which the SSA agreed with © 2012 Baird Holm LLP
  • 16. Deposit of Federal Benefits to Prepaid Cards • Treasury FMS issued an Interim Final Rule effective January 21, 2011, to allow Federal payments to be delivered to prepaid debit card or similar card accounts meeting certain consumer protection requirements • The NBPCA submitted comments on the IFR, but, to date, no final rule has been issued • FMS regulations have long provided that Federal payments made by ACH had to be deposited into an account „„in the name of the recipient‟‟ – the payment recipient‟s name must appear in the account title • With the use of pooled accounts in prepaid, it was not clear that prepaid cards could meet this requirement © 2012 Baird Holm LLP
  • 17. Deposit of Federal Benefits to Prepaid Cards • Under the IFR, a Federal payment may be deposited to an account accessed by the recipient through a prepaid card that meets the following requirements: – The account is held at an insured financial institution; – The account is set up to meet the requirements for pass-through deposit or share insurance such that the funds accessible through the card are insured for the benefit of the recipient by the Federal Deposit Insurance Corporation or the National Credit Union Share Insurance Fund in accordance with applicable law (12 CFR part 330 or 12 CFR part 745); – The account is not attached to a line of credit or loan agreement under which repayment from the account is triggered upon delivery of the Federal payments; and – The issuer of the card complies with all of the requirements, and provides the holder of the card with all of the consumer protections, that apply to a payroll card account under the rules implementing the Electronic Fund Transfer Act, as amended © 2012 Baird Holm LLP
  • 18. Deposit of Federal Benefits to Prepaid Cards • No person or entity may issue a prepaid card that receives Federal payments in violation of the IFR, and no financial institution may maintain an account for or on behalf of an issuer of a prepaid card that receives Federal payments if the issuer violates the IFR © 2012 Baird Holm LLP
  • 19. Erroneous/Unauthorized ENRs • 31 C.F.R. Part 210 addresses the Federal Government's participation in the ACH system • 31 C.F.R. Sec. 210.4(a) provides: – "(1) The agency or the RDFI that accepts the recipient‟s authorization [for example, an ENR entry] shall verify the identity of the recipient and, in the case of a written authorization requiring the recipient‟s signature, the validity of the recipient‟s signature. – (2) Unless authorized in writing, or similarly authenticated, by an agency, no person or entity shall initiate or transmit a debit entry to that agency, other than a reversal of a credit entry previously sent to the agency." © 2012 Baird Holm LLP
  • 20. Erroneous/Unauthorized ENRs • • • • Under 31 C.F.R. Sec. 210.8(2), a financial institution that accepts an authorization in violation of § 210.4(a) is liable to the Federal Government for all credits or debits made in reliance on the authorization A financial institution that transmits to an agency an authorization containing an incorrect account number is liable to the Federal Government for any resulting loss, up to the amount of the payment(s) made on the basis of the incorrect number If an agency determines, after appropriate investigation, that a loss has occurred because the financial institution transmitted an authorization or notification of change containing an incorrect account number, the benefits paying agency may instruct the Financial Management Service to direct a Federal Reserve Bank to debit the financial institution's account for the amount of the payments made on the basis of the incorrect number The agency must notify the financial institution of the results of its investigation and provide the financial institution with a reasonable opportunity to respond before initiating such a debit. © 2012 Baird Holm LLP
  • 21. Identity Theft and Tax Fraud Prevention Act - S3432 © 2012 Baird Holm LLP
  • 22. S 3432 • The bipartisan bill is intended to reduce the incidence of fraudulent tax returns by protecting SSNs from disclosure and providing new protections for identity theft victims • Section 8 of the bill would require the U.S. Comptroller General to conduct a study within one year that examines the role of prepaid debit cards and commercial tax preparation software in facilitating fraudulent tax returns through identity theft – The report must be submitted to the Senate Finance and the House Ways and Means committees, together with any recommendations – The bill does not identify the specific concerns that the Senators have with prepaid cards utilized with tax returns • The bill also requires a study by the U.S. Treasury on information sharing barriers to deterring tax fraud through identity theft © 2012 Baird Holm LLP
  • 23. FACTA ID Theft Red Flags Rule © 2012 Baird Holm LLP
  • 24. FACTA ID Theft Red Flags Rule • The rule requires many businesses and organizations to implement and adopt written identity theft prevention programs to detect the warning signs - or "red flags"- of identity theft in their day-to-day operations, take steps to prevent the crime of identity theft, and mitigate the damage identity theft inflicts • The rule only applies to "financial institutions" and "creditors." – "Financial institutions" are banks, savings and loans, credit unions, and other entities that maintain consumer transaction accounts © 2012 Baird Holm LLP
  • 25. FACTA ID Theft Red Flags Rule • A transaction account is a deposit or other account from which the owner makes payments or transfers • Transaction accounts include checking accounts, negotiable order of withdrawal accounts, savings deposits subject to automatic transfers, and share draft accounts – Are GPR cards covered? © 2012 Baird Holm LLP
  • 26. FACTA ID Theft Red Flags Rule • The rule requires that the written program include four basic elements – The program must include reasonable policies and procedures to identify "red flags" of identity theft – The program must be designed to detect the red flags you‟ve identified – The program must spell out appropriate actions you will take when you detect red flags – Because identity theft is an ever-changing threat, you must address how you will re-evaluate the program periodically to reflect new risks from ID theft © 2012 Baird Holm LLP
  • 27. FACTA ID Theft Red Flags Rule • Although there are no criminal penalties for failing to comply with the rule, financial institutions and creditors may be liable for civil monetary penalties – What will the CFPB do? • Under the FAQs, there is no private right of action for a violation of FACTA • Other than in Alabama, courts have generally refused to impose liability on an FI to a victim of ID theft where the FI established accounts in the name of the victim through the actions of a fraudster © 2012 Baird Holm LLP
  • 28. FinCEN CIP Rule © 2012 Baird Holm LLP
  • 29. FinCEN • 31 CFR 103.121 sets forth the rule regarding customer identification programs for FIs • The regulation defines an account as “a formal banking relationship established to provide or engage in services, dealings, or other financial transactions including a deposit account, a transaction or asset account, a credit account, or other extension of credit” © 2012 Baird Holm LLP
  • 30. FinCEN • The CIP must include risk-based procedures for verifying the identity of each customer to the extent reasonable and practicable • The procedures must enable the bank to form a reasonable belief that it knows the true identity of each customer © 2012 Baird Holm LLP
  • 31. FinCEN • These procedures must be based on the bank's assessment of the relevant risks, including those presented by the various types of accounts maintained by the bank, the various methods of opening accounts provided by the bank, the various types of identifying information available, and the bank's size, location, and customer base • The CIP must contain procedures for verifying the identity of the customer, using information obtained, within a reasonable time after the account is opened • At what point does establishing prepaid card accounts for fraudsters indicate that the FIs CIP is inadequate? Will regulators take action? • Courts have held that there is no private right of action for BSA violations © 2012 Baird Holm LLP