PWX30: Keeping Taxpayer Data Secure Study Guide

Keeping Taxpayer Data Secure Study Guide

The study guide is provided to guide you through the course material in a step by step format.

Reading assignments are for “Keeping Taxpayer Data Secure.”

1) Introduction to Cybercrime

Reading Assignment: Chapter 1 <<>> Review Questions: # 1-3

The learning objectives for this lesson are to gain an understanding of:

  • Identify the source of the most frequent type of malicious access to a firm’s taxpayer information;
  • List the most common types of cyber attack;
  • Describe how a denial-of-service attack operates to impede business operations; and
  • Recognize the dangers of Trojan horses.

2) Laws & Regulations Safeguarding Taxpayer Data

Reading Assignment: Chapter 2 <<>> Review Questions: # 1-2

The learning objectives for this lesson are to gain an understanding of:

  • List the principal federal laws and regulations governing the security of taxpayer information;
  • Understand the objectives and requirements of the Safeguards Rule;
  • Identify the notification requirements imposed by the Financial Privacy Rule; and
  • Distinguish between a customer and a consumer under FTC regulations.

3)  The Costs of a Data Breach

Reading Assignment: Chapter 3  <<>> Review Question: # 1-2

The learning objectives for this lesson are to gain an understanding of:

  • List the principal causes of a data breach involving customer records;
  • Identify the investigation and remediation activities normally undertaken by an organization following a data breach involving customer information;
  • Recognize the average costs of a data breach in the United States; and
  • Understand the probability of a business experiencing a data breach within the next 24 months.

4)  The Information Security Plan

Reading Assignment: Chapter IV <<>> Review Questions: # 1-2

The learning objectives for this lesson are to gain an understanding of:

  • Recognize the function of a firm’s Information Security Plan;
  • List the principal sections of an Information Security Plan;
  • Identify the role of an Information Security Plan’s physical security procedures; and
  • Describe the elements comprising a firm’s information and computer system.

5)  Best Practices for Securing Data

Reading Assignment: Chapter 5 <<>> Review Questions: # 1-2

The learning objectives for this lesson are to gain an understanding of restrictions concerning accepting assistance from:

  • List the data use and retention areas generally vulnerable to unauthorized access of taxpayer information; and
  • Identify best practices for securing taxpayer information.

6)  When a Data Breach Occurs

Reading Assignment: Chapter 6 <<>> Review Questions: 1-2

The learning objectives for this lesson are to gain an understanding of:

  • Identify the steps that should be taken by a business to stop or limit additional data loss if a data breach has occurred involving its clients;
  • Recognize the need for a comprehensive communications plan;
  •  List the entities that should be notified in the event of a data breach; and
  •  Identify the additional protections that may be recommended if a data breach involves the compromise of clients’ Social Security numbers.