- 4.4.32 AIMS, ERCS, and IDRS Data Processing
- 184.108.40.206 Overview
- 220.127.116.11 Access
- 18.104.22.168 Summary of Audit Information Management System (AIMS)
- 22.214.171.124 Summary of ERCS
- 126.96.36.199 IRS Intranet Websites for AIMS/ERCS and IDRS
- 188.8.131.52 Summary of IDRS
- 184.108.40.206.1 Access to IDRS
- 220.127.116.11.2 Passwords
- 18.104.22.168.3 Employee Number
- 22.214.171.124.4 Security
- 126.96.36.199.4.1 Command Code Security Monitoring
- 188.8.131.52.4.2 Managers Responsibilities
- 184.108.40.206.4.3 IDRS UNAX/USR Analyst or Unit Security Representative (USR)
- 220.127.116.11 IDRS User
- 18.104.22.168.1 Command Code Profiles
- 22.214.171.124.2 Sensitive Command Codes
- 126.96.36.199.3 Clerical and Paraprofessionals
- 188.8.131.52.4 Group Managers, Revenue Agents, Tax Auditors, Tax Examiners, Audit Accounting Aides, and Tax Compliance Officers
- 184.108.40.206.4.1 Research Command Codes
- 220.127.116.11.4.2 Command Codes Most Frequently Used by Examination Personnel
- 18.104.22.168.4.3 IDRS Security Violations
- 22.214.171.124.4.4 IDRS Employee Self-Profile Locking Feature - CC LOKME
- 126.96.36.199.5 Unauthorized IDRS Browsing
- 188.8.131.52.5.1 Required Documentation
- 184.108.40.206.5.2 Performing IDRS Accesses for Other Employees
- 220.127.116.11.5.3 Form 11377 or Form 11377-E, Taxpayer Data Access
- 18.104.22.168.6 IUUD: IDRS Unit and USR Database
- 22.214.171.124 Employee User Portal (EUP) System
- 126.96.36.199.1 Modernized e-File (MeF) Return Request and Display (RRD)
- 188.8.131.52.2 Transcript Delivery System (TDS)
- 184.108.40.206 Document Sequence Number
- 220.127.116.11.1 Forms Requiring Document Sequence Number
- 18.104.22.168.2 Placement of Document Sequence Numbers on Forms
- 22.214.171.124 Preparation of Source Document Folders
- 126.96.36.199 Shipment of Source Document Folders
- Exhibit 4.4.32-1 Command Code Listing by Topic
Part 4. Examining Process
Chapter 4. AIMS Procedures and Processing Instructions
Section 32. AIMS, ERCS, and IDRS Data Processing
This chapter contains information regarding terminal input and/or research of the following systems:
Audit Information Management System (AIMS)
Examination Returns Control System (ERCS)
Integrated Data Retrieval System (IDRS)
AIMS, ERCS, and IDRS should be accessed only to accomplish official duties. Any unauthorized accesses or browsing of tax information to satisfy personal curiosity or for fraudulent reasons are prohibited by IRS and subject to disciplinary action. Willful unauthorized access or inspection of non-computerized taxpayer records, including hard copies of returns and computerized information, is a misdemeanor, punishable, upon conviction, by fines, prison terms, and termination of employment. IRM 10.5.5,IRS Unauthorized Access of Inspection of Taxpayer Records (UNAX) Program Policy, Guidance, and Requirements, provides uniform UNAX policies, procedures, and requirements.
Additionally, the UNAX Website contains general information regarding responsibilities for the UNAX Program and many other helpful features including links to UNAX forms.
AIMS is a computer system used by Appeals, Examination (SB/SE, LB&I, and W&I), and TE/GE to control returns, input assessment/adjustments to Master File and provide management reports. The following IRMs provide detailed information regarding AIMS:
IRM 2.8.1, Audit Information Management Systems (AIMS)
IRM 4.4, AIMS Processing
The Examination Returns Control System (ERCS) is an automated inventory management system used by SB/SE and LB&I to requisition tax returns, assign returns to examiners, change codes - such as status and project codes, and charge time. ERCS can be used to control work that is not controlled on AIMS, such as preparer penalties. ERCS also provides real-time information in the form of screens and reports for management of SB/SE and LB&I Examination groups, Planning and Special Programs (PSP), Centralized Case Processing (CCP), Technical Services (TS), SB/SE Examination and LB&I Quality Measurement Staff, and National Quality Specialty Review. ERCS is uploaded, downloaded and otherwise extracted at all levels to be fed into other systems and rolled up into national tables and reports. The following IRMs provide detailed information regarding ERCS:
IRM 4.7.1, Overview
IRM 4.7.2., Security
IRM 4.7.3, Statute of Limitations
IRM 4.7.4, Planning and Special Programs (PSP)
IRM 4.7.5, Group
IRM 4.7.6, Reports
IRM 4.7.7, Technical Services Staff
IRM 4.7.8, Case Processing Support
IRM 4.7.9, Chief
IRM 4.7.10, ERCS Functional Coordinator
IRM 4.7.11, System Administrator
The AIMS/ERCS Website is a valuable tool and resource available to all IRS employees. Information contained in the website includes What's New, Contacts, Codes/Procedures, Troubleshoot Problems, AIMS IRM, ERCS IRM, ERCS Manuals, etc.
The IDRS Website is an additional valuable tool and resource. Information contained in the website includes Analyzing a DLN, Command Codes, Contacts, Interpreting a Transcript, etc.
IDRS is a system which enable employees to have instantaneous visual access to certain taxpayer accounts. IRM 10.8.34.1.2.1, Integrated Data Retrieval System (IDRS) Capabilities, describes IDRS system capabilities. Additionally, the following IRMs provide detailed information regarding IDRS:
IRM 2.3.1, IDRS Terminal Responses
IRM 4.7.2, IDRS Terminal Input
IDRS users MUST NOT access their own or spouse’s account, the account of a friend, relative, coworker, or any account in which they have a personal or financial interest. IRM 10.8.34.8.2.2.1, Access to Other Employee and Employee Spouse by Accessing Employee.
If an employee is assigned to work an account of an individual where there is a personal or financial interest, then the employee must notify his/her manager.
Users are prohibited from accessing the account of a celebrity or other public person unless specifically assigned to do so.
All accesses on IDRS must be made for an IRS business reason.
New users request access to IDRS via Online 5081. Based on geographic location, users request access via one of five Online 5081 sub-applications:
IDRS - BIRSC (IDRS) - Brookhaven Campus
IDRS - CIRSC (IDRS) - Cincinnati Campus
IDRS - MIRSC (IDRS) - Memphis Campus
IDRS - OIRSC (IDRS) - Ogden Campus
IDRS - PIRSC (IDRS) - Philadelphia Campus
Temporary passwords are delivered to the user via Online 5081.
After the employee reads and signs the Online 5081, the IDRS temporary password will appear on the screen.
The Online 5081 will hold the temporary password for 3 calendar days after the employee has signed the form.
Users are responsible for creating, changing, and safeguarding their IDRS password.
Temporary passwords expire upon IDRS sign-on and must be changed to a user-created password.
Passwords must be 8 to 12 alphanumeric characters in length, no special characters, in all capital letters, a single character may not be repeated more than three times in a row, and it must contain at least one letter and one number. Passwords expire every 90 days.
IDRS will lock the profiles of new users who have not signed on to IDRS within 17 days of being added to IDRS.
IDRS will delete the profiles of employees who have not signed on to IDRS within 60 days of being added to IDRS.
Users have the ability to create a new IDRS password if the user has forgotten or feels their password has been compromised. The capability consists of two parts: The Password Management Activation segment and the Password Management Use segment.
IDRS users must activate their password management capability while signed onto IDRS. The user responds to four questions including identifying a significant year. For the Password Management use capability, the IDRS sign-on screens were modified to include a new data entry item named PWMGT. After entering the requested information and the user does not remember his/her IDRS password, the password management (PWMGT) field is used to enter the pre-recorded significant year. The user then selects the transmit key or the OK button. Additional information and instructions are contained in IRM 10.8.34.5.2.3, IDRS Password Management Capability.
All IDRS users receive a 10-digit IDRS employee number that will identify all transactions input and may be used to trace transactions on the audit trail to the individual who input them.
The employee number consists of the following:
The office identifier of the IRS campus or business operating division (BOD) (first and second digits),
The organization code assigned to the campus operation, BOD, area office, territory, section, or unit (third, fourth, and fifth digits), and
The employee’s individual unique number which remains the same as long as the employee is an IDRS user anywhere in the campus’ data base (sixth through tenth digits).
When an employee is transferred to another organization/division within the same office identifier (first two digits of the IDRS Employee Number) or within the same campus, the losing manager is responsible for locking the employee's profile and coordinating with the gaining manager/unit security representative (USR.)
The gaining manager/USR is responsible for unlocking the employee's profile and adding the employee profile to the appropriate IDRS unit.
The transfer also will cause the employee's command code profile from the old unit to be automatically deleted.
All employee accesses to IDRS are recorded on an audit trail file and matched against an employee SSN File. IRM 10.8.34 Integrated Data Retrieval System (IDRS) Security Handbook, provides detailed information regarding IDRS security.
The MITS Cybersecurity IDRS Security Program website is a valuable resource containing not only security policy and procedures, but also IDRS password information, security applications, job aides, etc.
Each IDRS USR/UNAX analyst and manager must develop procedures for assigning, monitoring, and reviewing sensitive command codes and sensitive command code combinations.
Communicate security standards to employees,
Establish methods to enforce them, and
Ensure IDRS Online Reports Services (IORS) application reports are reviewed in accordance with IRM 10.8.34.2.1.14, IORS Primary Recipient .
Managers are responsible for their employees who have IDRS access. Only employees who have a work-related need should be given access to IDRS. Generally, the group clerk or secretary performs needed IDRS support and research for the group.
In support of IORS, each IDRS unit must have a designated IORS primary recipient who is responsible for ensuring that the IDRS security reports for the IDRS unit are timely reviewed and the appropriate actions are taken when necessary. The primary recipient must complete the report certifications but may indicate in the certification that the certification is based on the documented review of others, such as the manager, IDRS UNAX/USR analyst, or USR.
IDRS users must be responsible for taking required precautions in providing security for documents, information, and property which they handle in performance of official duties.
Command code profiles will be limited to those required for an employee to perform assigned work.
The IDRS Automated Command Code Access Control application is designed to prevent IDRS users with certain roles from having specified command codes in their profiles. Group managers, revenue agents, tax auditors, tax compliance officers, and tax examiners and audit accounting aides with a case inventory, must be limited to RESEARCH ONLY command codes. The systemic restriction is input by each IDRS USR/UNAX analyst even if the employee does not have an active IDRS account. The IDRS security system will associate any restrictions with the employee’s SSN. This assures that if the non-IDRS user is given access to IDRS at a later date, the access control restriction associated with a role type will be in effect. IRM 10.8.34.6.6, Automated Command Code Access Control, describes the application in detail.
A command code is considered "sensitive" if it can be used to adjust account balances, change the status of a tax module or account, or affect the tax liability.
Following is a list of potentially sensitive command codes. These command codes become sensitive when combined with certain other command codes.
Potentially Sensitive Command Codes ADJ54 CCPYT FRM34 NOREF TSIGN AMAXU CHK64 FRM49 PAYMT UPRES AMCLS CRMNL FRM77 REFAP URADD AMSOC DDBCK FRM7A RFUND URAPL AMSTU DELET IADFL SCFAJ URENT ASGNB DOALL IAORG SCFDL UROUT ASGNI DRT24 IAREV SCFRQ URREF BDADD DRT48 INCHG SCFRV XSADD BDAPL EOCHG IPSAD STATB XSAPL BDENT EPLAN IPSST STATI XSENT BDOUT ESAPL IPSUP STAUP XSOUT BNCHG FRINQ IRCHG STN90 XSREF BRCHG FRM14 LEVYD TDIAD ZDJ54
Following is a list of sensitive command code combinations
ADJ54 AMCLS BNCHG BNCHG DRT24 DRT24 DRT48 DRT48 ESAPL ESAPL FRM34 FRM34 INCHG INCHG PAYMT PAYMT SCFAJ SCFAJ URAPL URAPL
Examination group secretaries, clerks, tax examiners and audit accounting aides (without a case inventory), remote terminal operators; PSP Support, and Technical Services utilize IDRS to perform research, updates, closures, requisitions, and/or corrections, as appropriate.
Group managers, revenue agents, tax auditors, and tax compliance officers are limited to the use of RESEARCH ONLY command codes. Tax examiners and audit accounting aides, with a case inventory, are limited to the use of RESEARCH ONLY command codes.
Suggested research command codes for use by revenue agents, tax auditors, tax compliance officers, and tax examiners and audit accounting aides with a case inventory, are:
Suggested Research Command Codes for Examiners with Inventories ACTRA DUPOL* INOLE* NAMEE RTVUE* TSUMY AMDIS ENMOD IRPTR* NAMEI SUMRY TXMOD BMFOL* FINDE* MFTRA NAMES SUPOL* BRTVU* FINDS* MFTRD PATRA TRDBV CFINQ IMFOL* NAMEB PMFOL* TSINQ
Exhibit 4.4.32-1, Command Code List by Topic, is a listing containing frequently used research needs, broken down by subject, and the various command codes available to use to provide the needed data. The listing is not all inclusive; however, the command codes listed are those frequently utilized by Examination employees. Requests for additional command code must be justified by a business need and be appropriate for each position type.
The IDRS Command Code Job Aid is an excellent resource which provides examples of input screens, descriptions, and IRM references for command codes used Servicewide.
IDRS security violations are errors in any of the following input:
Name, password, or SSN mismatch during a sign-on attempt,
Attempt to sign-on when the profile is locked,
Attempt to use a command code that is not profiled in the employee's profile, and/or
Attempt to sign-on to an IDRS terminal that is too early or too late (based on terminal up/down time).
Three consecutive security violations by an IDRS user will result in the workstation being locked.
Employees are encouraged to lock their profiles if they do not expect to use IDRS between 3 through 45 days.
If the self-lock period is 15 days or more and the employee does not sign on within 3 days of unlocking, the system will re-lock the profile.
Employees who attempt to sign-on to IDRS when their profiles are locked will receive a security violation with a message "Your IDRS Profile is Locked. You Must Contact an IDRS Unit Security Representative or Terminal Security Administrator (TSA) to Get Your Profile Unlocked. Do Not Request a New IDRS Password."
Document 11320, Introducing Profile Locking Capability, is an excellent resource. An additional reference is IRM 10.8.34.6.23, Employee Self-Profile Locking.
There exists a great sensitivity in the Service to the appearance of unauthorized IDRS use by employees browsing tax accounts for no clear purpose.
To prevent the appearance of improprieties by our employees with a case inventory, examiners should document their case files as prescribed in IRM 188.8.131.52.4, Case File Documentation.
Employees should not perform any accesses for another employee or manager without having approved written documentation from the manager or employee authorizing the access.
If performing IDRS research and input for other employees in your group is part of your official duties, it is recommended that the request be documented/requested via Form 6882, IDRS/Master File Information Request, Form 10373, IDRS Research Request, or a similar, locally developed form.
Any accesses performed by an employee at the request of another employee that is not documented could subject the employee to disciplinary action.
Employees are encouraged to complete Form 11377 or Form 11377-E documenting questionable accesses. An electronic copy of the Form 11377, referred to as Form 11377-E, is available for users who want to document accesses to taxpayer data when the case is not assigned to him/her. With the electronic form, the user performs a one-time download of the form generator to his/her desktop. After the download, a new Form 11377-E is available whenever the user needs it.
Form 11377 or Form 11377-E should be used for:
A referred inquiry (from manager, co-worker, walk-in/telephone contact, etc.) when no other documentation is received.
Incorrect input of a TIN.
Other accesses where the employee believes that the access or attempted access may be questioned. The employee must explain the specifics regarding the access.
The employee must complete and sign the form and give both copies to his/her manager for approval no later than the end of the day. Additional documentation, when available, must be given to the manager to support the employee's assertion of the reason for the access. The employee should not hold the form overnight. The manager is required to give the employee a signed receipt of the form.
IUUD allows IRS employees and managers who use IDRS and have Intranet access to get contact information about IDRS units, managers and security personnel. For each IDRS unit, the IUUD enables users to find the Unit Security Representative’s (USR) name and phone number, the manager’s name, address and phone number, a description of the unit and additional information.
Easy access to IUUD information helps employees and managers resolve questions and issues more quickly.
Employees may search this application by inputting the five-digit IDRS unit number or by using a drop down menu to select a business division or business segment. Users access the IUUD database via the IUUD: IDRS Unit and USR Database . Campus IDRS Security staffs update the IUUD database.
The EUP is a Web hosting infrastructure which supports an Intranet portal that allows IRS employees to access business applications and data; i.e., Modernized e-file (MeF) Return Request and Display (RRD), Transcript Delivery System (TDS), etc.
If access to EUP is needed, the following steps should be followed:
Register for EUP access at: https://eup.eps.irs.gov/eup_register/0,1042,,00.html
Users will receive a Registration Token via E-mail to complete the second step of the registration process
Upon receiving the token, log into the EUP with the password selected during registration. The user will be prompted to enter the token to complete registration. The following link should be used to get to the EUP login page: https//eup.eps.irs.gov/eup_login
MeF provides the Return Request & Display (RRD) application as the tool to view, research, and print returns. Employees use RRD to view/print individual and business returns filed through MeF. MeF RRD access require submission of an Online 5081 and managerial approval.
Refer to IRM 3.42, Electronic Tax Administration, for a complete explanation of the Modernized E-File System and a list of all forms and schedules currently available. Complete procedures for using MeF RRD are found in the Modernized e-File (MeF) Return Request and Display (RRD) User Guide.
Access to the MeF RRD is subject to UNAX rules. IRS policy only allows employees to access tax returns and return information when the information is needed to carry out their tax administration duties. Employees have the option of completing Form 11377 or Form 11377-E, Taxpayer Data Access , to document their reason for access to unassigned / related returns. The IDRS/UNAX analyst will perform reviews of accesses through MeF RRD to ensure returns are only accessed to carry out tax administration duties.
TDS is an efficient method of requesting account transcripts. TDS provides self-service for return and account information requests by external customers through EUP. TDS automates the validation, processing and delivery of taxpayer information to the authorized third party user. TDS transactions include self-service electronic communication, where the user can request and receive a transcript product interactively through EUP. TDS also supports walk-in and phone requests, through IRS employee users. The user will have the ability to specify an information delivery method - systematic responses (immediate - show on screen, or local print, which is available only to internal IRS users), automatic fax, e-Services secure object repository or postal mail, and the system will route the response accordingly. TDS access requires submission of an Online 5081 and managerial approval.
Refer to IRM 184.108.40.206.1, Transcript Delivery System (TDS), for complete explanation of TDS. A brief tutorial is available via e-Services Training, Transcript Delivery System Course.
Access to TDS is subject to UNAX rules. IRS policy only allows employees to access tax returns and return information when the information is needed to carry out their tax administration duties. Employees have the option of completing Form 11377 or Form 11377-E, Taxpayer Data Access, to document their reason for access to unassigned / related returns. The IDRS/UNAX analyst will perform reviews of accesses through TDS to ensure returns are only accessed to carry out tax administration duties.
The document sequence number is the number the Centralized Case Processing (CCP) employee notates on the source document after successful input to AIMS/IDRS.
Each day, start with document sequence number 001 and continue throughout the remainder of the day. Each document must have its own number and duplicate sequence numbers are not permitted.
CCP employees should refer to IRM 3.5.61, Accounts Services, Files Management and Services, for additional guidance regarding document sequence numbers, source document folders, document transmittals, and shipment.
The following forms require the document sequence number:
Form 3870, Request for Adjustment, Adjustments -- Doc Code 54, 77
Form 5344, Examination Examined Closing Record, AIMS - AMCLS -- Doc Code 47
Form 5351, Examination Non-Examined Closings, AIMS - AMSOC -- Doc Code 47
Form 8278, Computation and Assessment of Miscellaneous Penalties, Adjustments -- Doc Code 54
After closing each case through AIMS (CC AMSOC), note the side of Form 5351 with the IDRS employee number, date, and document sequence number.
Annotate, where there is room, the IDRS employee number, date, and document sequence number on the front of Form 3870 and Form 8278.
Source documents are placed in brown folders based on the size of the source documents. Following are the various brown folders:
Document 6981, IMF Tax Forms File Folder (1-inch)
Document 6982, IMF File Folders - 2 Inch
Document 6983, IMF/BMF File Folders (4 Inch)
At a minimum, a separate folder will be needed for CC AMCLS actions.
Complete and adhere Form 6502, Employee Source Document , yellow label, to the outside of each folder. Form 6502 should be completed as follows:
Employee Number IDRS employee number of individual inputting directly to AIMS/IDRS or IDRS employee number of individual uploading to AIMS/IDRS from ERCS
Category Doc Code AIMS - AMCLS (example for Form 5344)
Input Date Date input to AIMS/IDRS or date uploaded from ERCS to AIMS/IDRS
Sequence Number Sequence number of the source documents in each folder. If a sequence number is skipped, it must be noted; i.e., 001 - 013, 015-020. Place a piece of paper with the sequence number in the appropriate folder in sequential order
Quality Review Release Date Completed with the date by the individual performing the review
Folders MUST be shipped daily to the File Functions. As the functions must associate Computer Form (CF) 5147, IDRS Transaction Record , with the source documents within three (3) workdays after input, they should be notified immediately of any shipment delays. Computer Form (CF) 5147 is generated at the campus each time a master file action occurs. It contains the refile Document Locator Number (DLN) and related information regarding the action. IRM 3.5, Accounts Services.
Form 3210 should be utilized to transmit the source document folders. Place the source document folders in box along with Part 1 - Recipient's copy. If more than one box is being shipped, put Part 2 - For Facilities Management use, in box 2, Part 3 - Acknowledgement Copy, in box 3. If needed, copy additional copies of Form 3210 for additional boxes. Form 3210 must be in each box. Part 4 - To be retained by originator, is retained in your file. Part 3 will be returned by the campus. If volume does not necessitate a box, ensure envelope is doubled and durable for shipment.
Close and tape box. Place mailing label on top. With marker, write on the side of each box 1 of 1, 2 of 2, etc.
|Address||INOLE S, IMFOL E, BMFOL E, ENMOD, FINDS, FINDE, RTVUE, BRTVU, IRPTR O, AMDIS, TPIIP, TRPRT, TRDBV|
|Adjustments||TXMOD A, IMFOL T, IMFOL A, BMFOL T, BMFOL A|
|Adjusted Gross Income (AGI)||TXMOD A, IMFOL R, RTVUE,TRPRT, TRDBV|
|Amended Return Information||BRTVU, IMFOL T, BMFOL T, TXMOD A, TRDBV|
|Appeals Codes/Status||TXMOD A, AMDIS|
|Assessment Statute Expiration Date (ASED)||TXMOD A, AMDIS, IMFOL T, BMFOL T, TRDBV|
|Current Audits||AMDIS, IMFOL I, BMFOL I, TXMOD A, ENMOD|
|Prior Audits||IMFOL Z, BMFOL Z, IMFOL A, BMFOL A, TXMOD A, IMFOL T, BMFOL T|
|Last Return Audited||IMFOL Z, BMFOL Z|
|Backup Withholding||IMFOL I, IMFOL E, IMFOL T, BMFOL R (Form 941, 945), PMFOL S, PMFOL B|
|Bankruptcy||ENMOD, SUMRY, IMFOL I, IMFOL E,|
|IMFOL T, BMFOL I, BMFOL E, BMFOL T|
|Base Period Code||BMFOL K, BMFOL E|
|Capitol Gains & Losses||RTVUE, BRTVU, IMFOL R, TRPRT, TRDBV|
|Combined Annual Wage Reporting (CAWR)||TXMOD A, BMFOL T, BMFOL U|
|Child Care Payments||RTVUE, TRPRT, TRDBV|
|Civil Penalty||SUMRY, TXMOD A, IMFOL I, IMFOL T, PMFOL|
|ES Payments||IMFOL P, IMFOL I, IMFOL T, BMFOL I, BMFOL T, SUMRY, TXMOD A, TRPRT, TRDBV|
|FTD||BMFOL P, BMFOL K, BMFOL I, BMFOL T, SUMRY, TXMOD A|
|Returns Filed||IMFOL I, ENMOD, SUMRY, BMFOL I, RTVUE, BRTVU, TRPRT, TRDBV|
|Copies for Taxpayer||RTFTP|
|Criminal Investigation Indicator||SUMRY, ENMOD, TXMOD A, IMFOL I, IMFOL T, BMFOL I, BMFOL T|
|Collection Statute Expiration Date (CSED)||TXMOD A, IMFOL T, BMFOL T, MFTRA, TRDBV, IMFOL R|
|Date of Birth||IMFOL I, INOLE S, INOLE X, RTVUE, TRDBV|
|Date of Death||INOLE S, INOLE T, INOLE X, IRPTR L, RTVUE|
|Debts to Government Agencies||INOLE T, ENMOD|
|Deductions||RTVUE, TRPRT, TRDBV, BRTVU|
|Dependents / Exemptions||RTVUE, IMFOL R, IMFOL T, TXMOD A, DUPOL, TRPRT, TRDBV|
|Document Locator Number (DLN)||SUMRY, TXMOD A, IMFOL T, IMFOL E, BRTVU, RTVUE, BMFOL T, TRPRT, TRDBV|
|Employer Identification Number||NAMEB, INOLE S, INOLE T, INOLE X, ENMOD, RTVUE, IMFOL T, TXMOD A, BMFOL U, NAMEE|
|Entity Information||ENMOD, INOLE, IMFOL E, BMFOL E, RTVUE|
|Estimated Tax (ES) Payments||IMFOL P, IMFOL I, IMFOL T, BMFOL I, BMFOL T, SUMRY, TXMOD A|
|Federal Tax Deposit (FTD) Payments||BMFOL P, BMFOL I, BMFOL T, SUMRY, TXMOD A|
|Federal Tax Deposit (FTD) Requirement Codes||BMFOL K, BMFOL E|
|Filing Information||IMFOL I, BMFOL I, ENMOD, SUMRY|
|Fraud (See Criminal Investigation Indicator)|
|Freeze Codes||SUMRY, TXMOD A, IMFOL I, IMFOL T, BMFOL I, BMFOL T, ENMOD|
|Hardship||TXMOD A, IMFOL T, BMFOL T|
|Help Screens||IMFOL H, BMFOL H, MESSG, IRPTR H, PMFOL H|
|Household Help||IMFOL R, BMFOL R, RTVUE, BRTVU|
|IDRS Access/Information||MESSG, SFDISP, SINON|
|Individual||NAMEI, ENMOD , INOLE S, INOLE X, NAMES|
|Business||NAMEB, NAMEE, INOLE S, INOLE T, INOLE X, ENMOD, RTVUE, IMFOL T, TXMOD A, BMFOL U TSUMY|
|Cross-reference to Other EINs||INOLE S, INOLE X, BMFOL E, BMFOL U, ENMOD, TSUMY|
|Cross-reference to Spouse (current)||INOLE S, IMFOL E, IMFOL T, RTVUE, ENMOD, TRDBV, FINDS|
|Cross-reference to Spouse (former)||INOLE S, INOLE X, IMFOL E, IMFOL T, ENMOD, FINDS, TRDBV|
|Income Verification||RTVUE, IMFOL R, IRPTR E, IRPTR O, IRPTR L, BMFOL R, BRTVU, TRPRT, TRDBV|
|Information Returns / Wage Information (1099s, W-2s)||PMFOL S, PMFOL B, IRPTR R, IRPTR E, IRPTR O, IRPTR L, TRPRT, TRDBV|
|Interest Expense||RTVUE, IRPTR O, IRPTR L, TRPRT, TRDBV|
|Interest Income||RTVUE, IMFOL R, IRPTR E, TRPRT, TRDBV|
|IRS Employee Identification||FIEMP|
|Levy Source Information||TRDBV, IRPTR E, IRPTR O, ENMOD, TRPRT|
|Liens||IMFOL I, IMFOL T, BMFOL I, BMFOL T, SUMRY, TXMOD A|
|Lock your profile||LOKME|
|Lookback Period||BMFOL K|
|Members of Religious Orders||IMFOL E|
|Minister Self Employment Status||IMFOL E|
|Module Information||TXMOD A, SUMRY, IMFOL I, BMFOL T, BMFOL I, BMFOL T, AMDIS|
|North American Industry Classification System (NAICS) Code||BMFOL E, ENMOD, TRDBV|
|Offer In Compromise||SUMRY, TXMOD A, IMFOL I, IMFOL T, BMFOL I, BMFOL T, BRTVU, RTVUE, AMDIS, TRPRT, TRDBV|
|Partnership Identification Number||TSUMY, NAMEB, NAMEE|
|Password Management (reset your password)||PWACT, PWMGT|
|Payments (Posting, Tracing)||IMFOL P, BMFOL P, TXMOD A, IMFOL T, BMFOL T, ENMOD, AMDIS A, UPTIN|
|Potentially Dangerous Taxpayer||ENMOD, SUMRY, TXMOD A, AMDIS, IMFOL (all), BMFOL(all)|
|Power of Attorney||CFINK|
|Real Estate Information||RTVUE, IRPTR O, IRPTR L, BRTVU, TRPRT, TRDBV|
|Refund Information||TXMOD A, IMFOL T, TRPRT, TRDBV|
|Retention Register||IMFOL V, BMFOL V|
|Recovery from Retention Register||IMFOL B, BMFOL B|
|Return Information||RTVUE, BRTVU, IMFOL R, BMFOL R, TRPRT, TRDBV|
|Return Preparer||RTVUE, TRDBV|
|Return Request (Hard Copy)||ESTAB|
|Return Information for Taxpayer||RTFTP|
|Statement of Account for Taxpayer||RTFTP|
|Social Security Number||NAMEI, NAMES, INOLE S, INOLE X, ENMOD, RTVUE, IMFOL E, IMFOL T, TRDBV, FINDS, TPIIP|
|Substitute for Return||IMFOL I, IMFOL T, TXMOD A, AMDIS, BMFOL I, BMFOL T|
|Tax Adjustments||TXMOD A, RTVUE, BRTVU, IMFOL T, IMFOL A, BMFOL T, BMFOL A|
|TDA Location Codes||ENMOD, IMFOL E, IMFOL I, BMFOL E, BMFOL I, TXMOD A|
|Telephone Number||ENMOD, TRDBV|
|Unable to Contact/Locate||IMFOL E, BMFOL E, ENMOD, RTVUE, BRTVU, INOLE T, INOLE X,|
|INOLE G, IRPTR E, AMDIS, TRDBV|
|Unpostable Research||UPTIN, TXMOD A, ENMOD, SUMRY|