Information Security: IRS Needs to Address Pervasive Weaknesses
Author:
Publisher: DIANE Publishing
Published: 2007
Total Pages: 30
ISBN-13: 9781422396445
DOWNLOAD EBOOKRead and Download eBook Full
Author:
Publisher: DIANE Publishing
Published: 2007
Total Pages: 30
ISBN-13: 9781422396445
DOWNLOAD EBOOKAuthor:
Publisher: DIANE Publishing
Published:
Total Pages: 30
ISBN-13: 1428931333
DOWNLOAD EBOOKAuthor: Nancy R. Kingsbury
Publisher:
Published: 2014-05-16
Total Pages: 29
ISBN-13: 9781457854491
DOWNLOAD EBOOKThe Internal Revenue Service (IRS) has a demanding responsibility in collecting taxes, processing tax returns, and enforcing the nation's tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect the financial and sensitive taxpayer information that resides on those systems. As part of an audit of IRS's fiscal years 2013 and 2012 financial statements, this report assessed whether controls over key financial and tax processing systems are effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information. This is a print on demand report.
Author: Government Accountability Office
Publisher:
Published: 2017-07-28
Total Pages: 30
ISBN-13: 9781973973966
DOWNLOAD EBOOK"The IRS has a demanding responsibility in collecting taxes, processing tax returns, and enforcing the nation's tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect the financial and sensitive taxpayer information that resides on those systems.As part of its audit of IRS's fiscal years 2013 and 2012 financial statements, GAO assessed whether controls over key financial and tax processing systems are effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information. To do this, GAO examined IRS information security policies, plans, and procedures; tested controls over key financial applications; and interviewed key agency officials at six sites."
Author: Nancy R. Kingsbury
Publisher: DIANE Publishing
Published: 2011-05
Total Pages: 32
ISBN-13: 1437983111
DOWNLOAD EBOOKThe Internal Revenue Service (IRS) relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect financial and sensitive taxpayer information that resides on those systems. As part of an audit of IRS's FY 2010 and 2009 financial statements, the auditor assessed whether controls over key financial and tax processing systems are effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information. To do this, the auditor examined IRS information security policies, plans, and procedures; tested controls over key financial applications; and interviewed key agency officials at four sites. This is a print on demand report.
Author: United States. Internal Revenue Service
Publisher:
Published: 1978
Total Pages: 4
ISBN-13:
DOWNLOAD EBOOKAuthor: United States Government Accountability Office
Publisher: Createspace Independent Publishing Platform
Published: 2017-12-19
Total Pages: 30
ISBN-13: 9781981786527
DOWNLOAD EBOOKInformation Security: IRS Needs to Address Control Weaknesses that Place Financial and Tax payer Data at Risk
Author:
Publisher:
Published: 2014
Total Pages: 25
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher: DIANE Publishing
Published:
Total Pages: 40
ISBN-13: 1428941819
DOWNLOAD EBOOKAuthor: Robert F. Dacey
Publisher: DIANE Publishing
Published: 2008-05
Total Pages: 36
ISBN-13: 1428941800
DOWNLOAD EBOOKThe Dept. of the Treasury relies heavily on information systems -- & on the public¿s trust in its work. Information security is therefore critical to Treasury operations. In support of its annual audit of the govt.¿s financial statements, the author assessed the effectiveness of: (1) Treasury¿s information security controls in protecting the confidentiality, integrity, & availability of the department¿s systems & data; & (2) Treasury¿s implementation of its departmentwide information security program. In assessing the adequacy of Treasury¿s information security program, the author focused on the effectiveness of its departmentwide policies & processes, rather than on bureau-specific directives & guidance. Includes recommendations. Charts & tables.