4.10.27 Identity Theft Case Processing for Field Examiners

Manual Transmittal

December 24, 2013

Purpose

(1) This transmits new IRM 4.10.27, Examination of Returns, Identity Theft Case Processing for Field Examiners.

Material Changes

(1) This is a new IRM section that provides additional guidance with respect to identity theft for Small Business and Self-Employed (SB/SE) Field Examination and Large Business and International (LB&I) employees.

Effect on Other Documents

This material incorporates Interim Guidance SBSE-04-1212-055, Interim Guidance on Processing Identity Theft Cases, dated December 20, 2012.

Audience

SB/SE Field Examination and LB&I employees.

Effective Date

(12-24-2013)

Bradley J. Bouton
Director, Exam Policy
Small Business/Self Employed Division

Introduction

  1. This section provides procedures and information concerning identity theft case processing for examiners.

  2. Identity theft is defined in IRM 10.5.3.1.1 (1), Definitions of Key Identity Protection Terms.

  3. Identity theft occurs when someone uses an individual’s personal information, such as name, social security number (SSN), or other identifying information without permission to commit fraud or other crimes. Taxpayers may notify the IRS when they believe they may have experienced an identity theft incident. In these instances, taxpayers must provide documentation to establish that they are identity theft victims. See IRM 10.5.3.2.6, Initial Allegation or Suspicion of Tax-Related Identity Theft–Identity Theft Indicators.

  4. All identity theft cases are considered priority workload.

  5. When an examiner is advised or otherwise becomes aware that a taxpayer may be a victim of identity theft, the examiner must take certain actions. See IRM 10.5.3, Identity Protection Program, for Servicewide guidance for identity theft cases. Visit http://mysbse.web.irs.gov/exam/tip/identitytheft/default.aspx, the SB/SE Examination Identity Theft website, for guidance specific to SB/SE and a listing of the area Planning and Special Programs (PSP) identity theft coordinators.

    Reminder:

    Identity theft is an emerging area resulting in frequent updates. Please ensure you check for any Servicewide Electronic Research Program (SERP) interim procedural updates (IPU) and interim guidance (IG) updates.

  6. For guidance specific to LB&I, please visit http://lmsb.irs.gov/international/dir_compliance/Identity%20Theft-Draft.asp, the Identity Theft Job Aide for LB&I examiners.

  7. Examiners and other group personnel will work closely with the designated identity theft adjustment (DITA) team. The DITA team provides account adjustment work and support to functions working identity theft claims. The DITA team's work generally includes inputting the account adjustments recommended by the functions to remove the identity thief’s return from the valid owner’s account for complete account resolution. See IRM 4.19.24, Compliance Identity Theft, for additional information regarding the DITA team.

  8. In this IRM the victim's and the identity thief's returns are referenced as follows:

    1. Identity thief return—The return filed in the name and SSN of the identity thief’s victim without the victim's authorization.

    2. Victim return—The true taxpayer's return.

Determining and Documenting Identity Theft

  1. Identity theft is an issue that must be fully developed and properly documented.

  2. Before making a determination that identity theft has occurred, the examiner must consider the facts and circumstances of the case and fully develop the issue through inquiry, observation, analysis of appropriate documents, oral testimony, and third party contacts when warranted.

  3. Research should be performed and documented prior to reaching a final determination of identity theft. Research using command codes (CC) ENMOD, IMFOL, RTVUE, NAMES, INOLE, DUPOL, CFINK, and IRPTR.

  4. Research the tax identification number (TIN) (valid and invalid) to determine if there was a mixed entity or scrambled case in prior years, and to locate any possible cross-reference TIN. See IRM 21.3.4.12.3, Scrambled SSN and Mixed Entity Procedures, for the definition of mixed and scrambled entities.

  5. Review all returns for the year(s) involved as a part of the research. Search returns, schedules, and forms for a different TIN. Research spouse and dependent information whenever available.

  6. Compare all documents and return information for following:

    • Name

    • Social security number

    • Address

    • Occupation

    • Exemptions

    • Signatures (except for e-filed returns when a signature is unavailable)

    • Similar tax data

    • Form W-2, Wage and Tax Statement, etc.

    • Marital status changes

    • Tax preparer

  7. Search returns and entity modules for indications of identity theft such as identity theft documentation attached to the return or a previously posted Transaction Code (TC) 971 with Action Code (AC) 501 or TC 971 with AC 522.

  8. The examiner must determine, based on available information and research, whether or not the taxpayer’s claim of identity theft is substantiated. The examiner must document in the case file the information reviewed and conclusions reached. If the examiner determines identity theft has not occurred, the examiner must proceed with the examination.

  9. Workpapers should support the examiner’s determination and document information requested, received, reviewed, and the conclusions reached regarding the identity theft determination. The workpapers should document the examination activities and support the final determination. See IRM 4.10.9.2.4, Supporting Workpapers, for information on file documentation and support.

Ways an Examiner May Encounter Identity Theft

  1. The examiner may become aware of identity theft in the following ways (this listing is not all inclusive):

    1. The taxpayer may inform the examiner that he or she did not file the tax return under examination.

    2. The Integrated Data Retrieval System (IDRS) command code (CC) ENMOD or IMFOL with definer "E" may reflect an identity theft indicator input as a TC 971 with an AC and a tax administration source code on the taxpayer's account. Refer to IRM 10.5.3.2.5, Identity Theft Tracking Indicators, and IRM 10.5.3.2.7.3, Marking Taxpayer Accounts When Accepting Identity Theft Supporting Documents, for additional information regarding identity theft tracking indicators.

    3. The examiner may receive a Form 14027-B, Identity Theft Case Referral, from the area PSP identity theft coordinator during an open audit or after an audit has closed. See IRM 4.10.27.4.

    4. The examiner may receive a Form 4442, Inquiry Referral.

    5. The examiner may receive a Form 14103, Identity Theft Assistance Request (ITAR), from the Identity Protection Specialized Unit (IPSU) or area PSP coordinator. IPSU works cases involving identity theft that meet TAS Criteria 5, 6, or 7. See IRM 13.1.7.2, TAS Case Criteria, for descriptions.

    6. The taxpayer may advise the examiner that his or her identity was compromised (e.g., a lost or stolen wallet or questionable credit card activity), but there is no known tax administration impact. See IRM 4.10.27.6.1.

    7. The examiner may discover multiple Forms W2 and 1099s posted to the taxpayer's account with different names and addresses as a result of identity theft.

  2. Within two business days of becoming aware that a taxpayer may be a victim of identity theft, the examiner must input identity theft tracking indicators [TC 971 AC 5XX, and Tax Administration Source Code]. See IRM 4.10.27.8.1 and IRM 4.10.27.9.

Referrals From the Identity Theft Protection Specialized Unit

  1. The IRS IPSU office handles identity theft inquiries and assists taxpayers who are victims of identity theft. If a taxpayer contacts IPSU and the identity theft inquiry involves an audit (open or closed), the IPSU will prepare a Form 14027-B or an e-mail and forward it to the area PSP identity theft coordinator for assignment.

Actions Required to Assign and Control an IPSU Referral—Open Audit

  1. When the PSP identity theft coordinator receives a Form 14027-B, he or she will complete Box 1 of Section V and then forward the Form 14027-B and any supporting documentation to the group with the open audit via Form 3210, Document Transmittal.

  2. The group's clerical staff will notify the manager when a Form 14027-B and other related identity theft information is received in the group and provide the information to the assigned examiner.

  3. The assigned examiner must acknowledge receipt of the Form 14027-B by filling out Section V on page 2 and faxing the form to the IPSU case worker within 10 business days.

  4. The fax number for the IPSU case worker is located in Section II line 4 of Form 14027-B.

  5. If the examiner receives Form 14027-B for an open audit and the documentation supporting the identity theft has not been submitted to the IRS, the examiner must secure the documentation to authenticate the taxpayer's identity and evidence of the identity theft following guidance in IRM 10.5.3.2.7, Overview—Identity Theft Supporting Documentation. See IRM 4.10.27.2.

  6. When the case is resolved and or account actions are completed, the examiner will complete Form 14027-B through Section VIII and return it to the IPSU.

Action Required to Assign and Control an IPSU Referral—Closed Audit

  1. When the PSP identity theft coordinator receives a Form 14027-B for a closed audit, he or she will first determine the status of the case on Audit Information Management System (AIMS).

  2. Cases on AIMS: If a tax period is in Status Code 90, the area PSP identity theft coordinator will re-establish the tax period on AIMS and secure the administrative file impacted by identity theft before assignment to the group.

  3. Cases not on AIMS: If a tax period is no longer on AIMS, the area PSP identity theft coordinator will generally request via secure e-mail that the Brookhaven Compliance Services-Correspondence Exam Reconsideration Team take the following actions:

    1. Obtain the administrative/report generating software (RGS) file.

    2. Secure the identity thief's return. See IRM 4.10.27.1 (8) for definition of return types.

    3. Establish the identity theft impacted tax periods on AIMS.

    4. Provide other documents needed. If the coordinator determines other documents are needed based on his or her analysis of the transcript, they should be requested in the secure e-mail; e.g., TC 150, TC 290, etc.

    Contact information for the Brookhaven Compliance Services-Correspondence Exam Reconsideration Team is found in the contacts section of the MySBSE Identity Theft website at http://mysbse.web.irs.gov/exam/tip/identitytheft/contacts/29291.aspx.

  4. If the administrative file is not received within 30 calendar days, the PSP identity theft coordinator should send a follow-up e-mail.

  5. Upon receiving the administrative file, the PSP coordinator will place the referral (i.e. Form 14027-B), substantiation documentation (if received by IRS), and any other documents that were included with the referral, into the administrative case file and forward it to the group via Form 3210.

  6. The group's clerical staff will notify the manager when the case file and other information related to the identity theft case is received in the group. The manager will determine case assignment.

  7. The assigned examiner must acknowledge receipt of the Form 14027-B by filling out Section V on page 2 and faxing the form to the IPSU case worker within 10 business days.

  8. The fax number for the IPSU case worker is located in Section II line 4 of Form 14027-B.

  9. If the substantiation documentation supporting the identity theft has not been submitted to the IRS, the examiner must secure documentation following the guidance in IRM 10.5.3.2.7.

  10. When the case is resolved, the examiner will complete Form 14027-B through Section VIII and return it to the IPSU.

Identity Theft Assistance Request (ITAR)

  1. An identity theft assistance request (ITAR) may be sent from the IPSU to the area PSP identity theft coordinator.

  2. IPSU uses Form 14103, Identity Theft Assistance Request (ITAR), for cases involving identity theft that meet ITAR Criteria 5, 6, or 7. See IRM 13.1.7.2, TAS Case Criteria, for descriptions.

  3. The PSP identity theft coordinator will take the following actions upon receipt of an ITAR from the IPSU:

    1. Acknowledge receipt of Form 14103 by completing Section V Boxes 1,2, and 3 within 5 business days via secured e-mail (preferable) to the IPSU employee in Section II Box 1 or the fax number provided Section II, Box 3 of Form 14103. The e-mail or fax cover sheet should indicate briefly that the case has been received and will be assigned to group XXXX [also indicate employee XXX if known].

    2. Contact the IPSU employee shown in Section II of Form 14103 if there are questions regarding the recommended action.

    3. Follow the procedures in IRM 4.10.27.5.1 for open audits and IRM 4.10.27.5.2 for closed audits to assign and establish case controls.

  4. The group will acknowledge receipt of Form 14103within 3 business days via secure e-mail to the PSP identity theft coordinator. If there are concerns regarding Form 14103 that need to be discussed with the PSP identity theft coordinator, they should be discussed when acknowledging receipt of the case.

    Note:

    The group will address the substantive case issues and recommended actions and reach agreement with IPSU on the requested and negotiated completion dates. This information might not be known until the examiner assigned the referral has had an opportunity to review and evaluate the referral. See IRM 4.10.27.5 (4).

Actions Required to Assign and Control an ITAR Referral—Open Audit

  1. When the PSP identity theft coordinator receives a Form 14103 for an open audit, he or she will follow the steps in IRM 4.10.27.5 (3) and forward the Form 14103 to the assigned group via Form 3210.

  2. The group's clerical staff will notify the manager when a Form 14103 and other related identity theft information is received in the group and provide the information to the assigned examiner.

  3. If the examiner receives Form 14103 for an open audit and the documentation supporting the identity theft has not been submitted to the IRS, the examiner must secure the documentation to authenticate the taxpayer's identity and evidence of the identity theft following guidance in IRM 10.5.3.2.7, Overview—Identity Theft Supporting Documentation.

  4. When the case is resolved, return Form 14103 to the IPSU case worker via the fax number shown in Section II, Box 3 of the form. The examiner should complete Section VI, Box 1a, 1b on all cases, and Boxes 2a, 2b, and 2c when applicable.

Actions Required to Assign and Control an ITAR Referral—Closed Audit

  1. When the PSP identity theft coordinator receives a Form 14103 for a closed audit, he or she will first verify the status of the case is in fact closed on AIMS and secure the closed administrative file.

  2. Follow the steps in IRM 4.10.27.4.2 (2), through (4), with respect to securing the closed administrative case file.

  3. Upon receiving the administrative file, the PSP coordinator will place the referral (i.e. Form 14013), substantiation documentation (if received by IRS), and any other documents that were included with the referral, into the administrative case file and forward it to the group via Form 3210.

  4. The group's clerical staff will notify the manager when the case file or other information or both related to the identity theft case is received in the group. The manager will determine case assignment.

  5. If the examiner receives Form 14103 for a closed audit and the documentation supporting the identity theft has not been submitted to the IRS, the examiner must secure the documentation to authenticate the taxpayer's identity and evidence of the identity theft following guidance in IRM 10.5.3.2.7, Overview—Identity Theft Supporting Documentation.

  6. When the case is resolved, return Form 14103 to the IPSU case worker via the fax number shown in Section II, Box 3 of this form. The examiner should complete Section VI, Box 1a, 1b on all cases, and Boxes 2a, 2b, and 2c when applicable.

Identity Theft—Tax Related Impact

  1. If an identity thief has used a taxpayer’s SSN for filing purposes, tax administration is affected. Identity theft can affect tax administration in two primary ways:

    • Employment or Income Related—This occurs when the identity thief uses the victim’s SSN to obtain employment, resulting in what may appear as unreported income under the victim's account.

    • Refund Related—This occurs when the identity thief uses the victim’s SSN to file a false federal income tax return to obtain funds. If the thief files before the victim, the victim may not receive his or her refund within a reasonable time frame.

    See IRM 10.5.3.2, Identity Protection Program Servicewide Identity Theft Guidance.

  2. When tax administration is affected, the examiner must determine if the tax year(s) impacted have identity theft tracking indicator(s). If tracking indicators already exist on a tax year, do not input the "same" code(s) for the "same" tax year. See IRM 10.5.3.2.5, Identity Theft Tracking Indicators.

  3. The taxpayer should provide a Form 14039, Identity Theft Affidavit, or a police report in support of an allegation of identity theft. Form 14039 is used to report both tax-related and non-tax related identity theft issues.

    Reminder:

    A taxpayer is required to provide substantiation documentation to the IRS only once per incident. Any business unit that requires substantiation documentation for an identity theft incident should use this documentation.

  4. For guidance on when to request documentation, see IRM 10.5.3.2.7.1, When to Request Identity Theft Supporting Documents. Also see IRM 10.5.3.2.6, Initial Allegation or Suspicion of Tax—Related identity Theft—Identity Theft Indicators, and IRM 10.5.3.2.7, Overview—Identity Theft Supporting Documentation.

  5. The examiner should review Form 14039 Section A and Section B, to determine if multiple years were affected by the identity theft. If more than one year is involved and indicators are not on one of the years, follow the guidance in IRM 10.5.3.2.7, Overview—Identity Theft Supporting Documentation, to determine if additional documentation is needed or if the multiple year can be updated based on documentation previously submitted.

  6. Within 30 days of receipt of taxpayer identity theft documentation, the examiner must make contact with the taxpayer. See IRM 10.5.3.2.7.2, Complete and Legible Documents, for guidance. Document action taken on Form 9984, Examining Officer's Activity Record.

No Known Tax Administration Impact

  1. If the taxpayer advises the examiner that his or her identity has been compromised (for example, a lost or stolen wallet or questionable credit card activity) but there is no known tax administration impact, the examiner should take the following actions:

    1. Provide the ISPU toll free number, 1 800-908-4490.

    2. Advise the taxpayer of the "Taxpayer Guide to Identity Theft" page on www.irs.gov.

    3. Advise the taxpayer that additional information is available in Pub 4535, Identity Theft Prevention and Victim Assistance.

    4. See IRM 21.3.4.31.4, Non-Tax Related Identity Theft Issues.

  2. See IRM 10.5.3.2.7 (2), Overview—Identity Theft Supporting Documentation, and IRM 10.5.3.2.19, Taxpayer—Identified Identity Theft Not Affecting Tax Administration—TC 971 AC 504, for additional guidance.

  3. The examiner should forward the identity theft substantiation to the IPSU unit, per IRM 21.3.4.30.4, Non-Tax Related Identity Theft Issues.

  4. If the Service has no evidence of a tax administration impact, the examiner should continue with the case as if there is no identity theft and not input identity theft tracking indicators.

Contact With the True Taxpayer

  1. Sometimes tax returns not filed by the true owner of a SSN are selected for audit. Unless a taxpayer’s account reflects that he or she has been subject to identity theft or the taxpayer received correspondence regarding the return filed, the taxpayer probably has no knowledge of the return filed by someone else. You may tell a taxpayer that he or she may be a victim of identity theft, but you may not disclose information that identifies the person who filed the tax return. To authenticate the true taxpayer, see IRM 10.5.3.2.7, Identity Theft Supporting Documentation.

  2. Any information relating to the Service’s determination of the victim’s tax liability for the year can be disclosed to the victim as his return information. This would include any information relating to the victim's original balance due or refund that was based on the amounts reported on the fictitious Form 1040, U.S. Individual Income Tax Return, or the erroneous Form W-2, Wage and Tax Statement, and the underpayment or overpayment as later adjusted. The cause of the events on the taxpayer’s account—suspected identity theft and use of the SSN on another return—would also be disclosable to the victim as the taxpayer’s return information. See IRM 11.3.2.4.1.1, Identity Theft and Access to Information Returns, for additional guidance.

  3. Any other information about the Service’s investigation into the civil or criminal tax liability of the person who misused the SSN should not be disclosed to the victim. This includes the fictitious return (e.g., Form 1040), related information reporting documents (e.g., Form W-2 or Form 1099-MISC, Miscellaneous Income,) or the identity and investigation of the perpetrator. See IRM 11.3.2.4.1.1, Identity Theft and Access to Information Returns.

  4. If you have disclosure or Privacy Act related questions take the following actions:

    1. Call the Disclosure Help Desk, found on the Governmental Liaison and Disclosure Area and Local Disclosure Office Contacts website at http://discl.web.irs.gov/contact.asp.

    2. See IRM 11.3.2, Disclosure to Persons With a Material Interest.

    3. With managerial approval, request assistance from Disclosure.

Tracking and Monitoring Identity Theft Inventory

  1. Identity theft cases are tracked and monitored both Servicewide and at the business unit level. Examiners must ensure cases have proper tracking and monitoring codes, and that time is appropriately charged for the identity theft aspects of a case.

    1. Identity theft tracking indicators are used to facilitate Servicewide tracking and reporting of identity theft incidents. These indicators must be used for both tax related and non-tax related identity theft incidents. See IRM 4.10.27.8.1 for actions that must be taken.

    2. Aging Reason Codes (ARC) 14 and 95 are used to monitor identity theft cases. See IRM 4.10.27.8.2 for actions that must be taken.

    3. Activity Code 557 is used to track time spent working on the identity theft aspects of a case. See IRM 4.10.27.8.3 for actions that must be taken.

Identity Theft Tracking Indicators

  1. Identity theft tracking indicator codes are used to facilitate Servicewide tracking and reporting of both tax-related and non-tax related identity theft incidents.

  2. Each indicator is input as a TC 971 with an AC and tax administration source code, and is displayed on IDRS via command codes ENMOD or IMFOL with definer "E" of the affected taxpayer’s account. The AC and tax administration source code are dependent upon the facts and circumstances of the case.

    1. The AC is a three digit code. While some ACs are used to track the progression of inventory (AC 522) others provide taxpayer protections (AC 501 and AC 506). See IRM 21.9.2.1, Accounts Management Identity Theft, and IRM 10.5.3, Identity Protection Program, for additional information regarding all of the identity theft related action codes.

    2. The tax administration source code flags accounts at different stages of processing, from initial identity theft allegation to closure, dependent upon case specifics. Additional information for the tax administration source codes per business operating division and AC is in IRM Exhibit 10.5.3-12, TC 971 AC 522 Tax-Related Identity Theft, Case Status (Initial Claim/Suspicion and Supporting Documents).

  3. Prior to marking an account, the examiner should research ENMOD/IMFOL with definer "E" to ensure the account has not already been marked for the same tax year/incident. If the marking already exists, do not input the same code for the same tax year/incident. See IRM 10.5.3.2.7.1, When to Request Identity Theft Supporting Documents.

  4. For assistance with interpreting and using the identity theft tracking indicators see the following:

    1. IRM 10.5.3.2.5, Identity Theft Tracking Indicators.

    2. IRM 10.5.3.2.6, Initial Allegation or Suspicion of Tax—Related identity Theft—Identity Theft Indicators.

    3. IRM 10.5.3.2.7.3 (2), Marking Taxpayer Accounts When Accepting Identity Theft Supporting Documents, for a description of each component of the codes.

Identity Theft Tracking Indicator—IRS Initiated Suspicion
  1. In situations where the IRS suspects identity theft may have occurred, examiners will complete Form 4844, Request for Terminal Action, to request input of a TC 971, AC 522, and tax administration source code IRSID, for the tax year(s) impacted by the identity theft incident. The following sources provide additional guidance regarding the input of proper identity theft tracking codes for IRS initiated suspicion of identity theft:

    1. IRM 10.5.3.2.6.2, IRS Initiated Suspicion of Identity Theft–TC 971 AC 522 IRSID, and Exhibit 10.5.3-12 (provides a description of tax administration source code IRSID).

    2. IRM 4.10.27.9, Examiner Input of Identity Theft Tracking Indicators.

Identity Theft Tracking Indicator—Taxpayer Initiated Allegation
  1. In situations where the taxpayer or the taxpayer’s authorized representative makes an allegation of identity theft, examiners will complete Form 4844 to request input of TC 971, AC 522, and tax administration source code PNDCLM for the tax year(s) impacted by the identity theft incident. The following sources provide additional guidance regarding the input of proper identity theft tracking codes for taxpayer initiated suspicion of identity theft:

    1. IRM 10.5.3.2.6.1, Taxpayer Initiated Allegations of Identity Theft—Pending Claim Identity Theft TC 971 AC 522 PNDCLM, and IRM Exhibit 10.5.3-12 (provides a description of tax administration source code PNDCLM).

    2. IRM 4.10.27.9, Examiner Input of Identity Theft Tracking Indicators.

Input of Aging Reason Codes 14 and 95

  1. SB/SE Examination and LB&I monitor identity theft cases open on AIMS/Exam Return Control System (ERCS) using ARC 14, Identity Theft. See IRM Exhibit 4.4.1-4, Aging Reason Codes.

  2. Examiners must update AIMS/ERCS with ARC 14 for each impacted open tax year when the taxpayer claims he or she is a victim of identity theft or provides documentation to substantiate identity theft for his or her identity as required by IRM 10.5.3.2.7, Overview—Identity Theft Supporting Documentation.

  3. The ARC 14 remains on the AIMS/ERCS record regardless of the taxpayer submitting the substantiation documentation or of the identity theft determination.

  4. ARC 14 has priority and will overlay all other ARCs.

  5. ARC 95 is input for open AIMS/ERCS cases when the victim’s return will be examined. The ARC 14 will only be overlaid with ARC 95 after the DITA team has completed the account corrections.

  6. In addition to the input of ARC 14 and 95 on AIMS/ERCS, examiners must ensure that the appropriate identity theft tracking indicators are on the victim's account as discussed in IRM 10.5.3.2.5, Identity Theft Tracking Indicators.

Charging Time to Identity Theft Issues

  1. Activity Code 557 is used to charge time spent working identity theft issues whether or not the case is on AIMS/ERCS. See the following examples:

    1. Activity Code 557 is used to charge time spent on the identity theft aspects of a case when there is an open examination on AIMS/ERCS for the identity theft tax period(s). See IRM 4.10.27.8.3.1.

    2. Activity Code 557 is used to charge time spent on the identity theft aspects of a case when there is no open examination on AIMS/ERCS, such as a closed examination where Examination receives a referral from the IPSU pertaining to a taxpayer who has claimed identity theft. See IRM 4.10.27.8.3.2.

Time Charges—Open Examination Impacted by Identity Theft
  1. If the examination of an open return involves identity theft issues, a separate ERCS control(s) must be established to charge the time spent on the identity theft aspects of the examination for each tax period being examined.

  2. The separate ERCS control(s) will be established by submitting Form 5345-D, Examination Request-ERCS Users, using the taxpayer’s TIN, tax period(s) which is impacted by identity theft, MFT "AD," and Activity Code 557. The second segment of the activity code will be set by ERCS to "000." Refer to Chapter 3 of the ERCS Group Handbook, Control of Non-AIMS DET Item, for establishing the ERCS identity theft control record.

  3. When the examined return is closed, the time entry on the Form 5344, Examination Closing Record, will be a total of the time charged to both the AIMS/ERCS controlled return examination and the time charged to the separate ERCS control established for the identity theft aspects of the examination. The separate identity theft ERCS control will be closed by the examining group to Status Code 90 on ERCS when the case is closed.

Time Charges—No Open Examination Impacted by Identity Theft
  1. If there is no open examination that is impacted by identity theft, yet there is identity theft work to be performed, generally, a separate identity theft ERCS control will NOT be established. For example, there is no open examination, but identity theft work is warranted on a referral of an identity theft claim received from IPSU for a return year closed to Status Code 90. In this situation, the time spent performing the identity theft work related to the closed examination and responding to the IPSU referral will be charged to Activity Code 557 (without creating a MFT "AD" ERCS control).

    Exception:

    When a closed return is reopened and time charged relates to identity theft aspects, a separate ERCS control using the taxpayer’s TIN, tax period(s) which is impacted by identity theft, MFT "AD" and Activity Code 557 will be established. See IRM 4.10.27.8.3.1.

Examiner Input of Identity Theft Tracking Indicators

  1. Identity theft indicators are input by completing and submitting Form 4844 to the DITA team.

  2. Within 2 business days of becoming aware of potential identity theft, examiners should complete Form 4844 and send it to the DITA team for input of the tracking indicator if it does not already exist on the account.

  3. The DITA team will input the request for terminal action within 2 business days of receipt. See directions in IRM 4.10.27.9.1 and IRM 4.10.27.9.2 for completion and submission of Form 4844.

Completion of Form 4844, Request for Terminal Action, on Identity Theft Cases

  1. Form 4844 should reflect the following when marking a taxpayer's account for identity theft:

    1. Notate across the top of Form 4844"Expedite Identity Theft."

    2. Complete the SSN, name control, MFT code, periods, name of taxpayer, and the victim's correct address.

    3. In the box titled "Remarks," enter [Input TC 971 AC 522 under ENMOD].

    4. In the box titled "Identity Theft Action Code," enter [TC 971, AC 522].

    5. In the box titled "Miscellaneous Field Input," enter [SBSE FLDEXAM or LBI (depending on your business unit) plus the appropriate tax administration source code; e.g., PNDCLM, IRSID, INCOME, etc.]. Refer to IRM 10.5.3.2.7.3, Marking Taxpayer Accounts When Accepting Identity Theft Supporting Documents, for a listing of the tax administration source codes that apply when marking accounts. Also, visit the Job Aids tab on the MySBSE Identity Theft website at http://mysbse.web.irs.gov/exam/tip/identitytheft/guidance/25652.aspx for a sample of a completed Form 4844.

  2. If more than 10 accounts need tracking indicators input, the DITA team will accept an Excel© spreadsheet in lieu of Form 4844, as long as it contains all of the information required.

  3. Fax or e-mail the completed Form 4844 or Excel spreadsheet to the DITA team using a Form 3210. The fax and e-mail address for the DITA team are found within the contacts section of the MySBSE Identity Theft website.

Marking Taxpayer Accounts After Receipt of Complete and Legible Identity Theft Supporting Documentation

  1. Upon receipt of complete and legible identity theft substantiation documentation, examiners must update the tax administration source code based on the facts and circumstances of the case by completing and submitting Form 4844 to the DITA team. See IRM 10.5.3.2.7.3, Marking Taxpayer Accounts When Accepting Identity Theft Supporting Documents, for a listing of the tax administration source codes

    1. Enter the information per IRM 4.10.27.9.1 (1) items (a) through (d).

    2. In the "Miscellaneous Field Input" box indicate [either SBSE FLDEXAM or LBI plus the appropriate code; e.g., MULTFL, INCOME, OTHER, etc.]. Refer to IRM 10.5.3.2.7.3, Marking Taxpayer Accounts When Accepting Identity Theft Supporting Documents, for a listing of the tax administration source codes that apply when marking accounts to reflect receipt of acceptable documents. Also, visit the Job Aids tab on the MySBSE Identity Theft website for a sample of a completed Form 4844.

  2. Fax or e-mail the completed Form 4844 or Excel spreadsheet to the DITA team using a Form 3210. The fax and e-mail address for the DITA team are found within the contacts section of the MySBSE Identity Theft website at http://mysbse.web.irs.gov/exam/tip/identitytheft/contacts/29292.aspx.

  3. The following sources provide additional guidance:

    1. IRM 4.10.27.9, Examiner Input of Identity Theft Tracking Indicators, for steps on inputting identity theft tracking indicators.

    2. IRM 10.5.3.2.7, Overview—Identity Theft Supporting Documentation, provides the definition of substantiation documentation.

Victim Account Corrections—Processing Steps

  1. This section and the sections that follow provide instructions on the use of ID theft account correction forms and processing steps taken by the examiner:

    1. Verify the taxpayer is a victim of identity theft by securing the supporting documentation required to substantiate identity theft. This includes reviewing the account to determine if identity theft tracking indicators already exist on the account and to prevent duplicative requests of documentation. If indicators are already on the taxpayer's account confirming he or she is a victim of identity theft, no additional documentation is needed. See IRM 10.5.3.2.7 for guidance regarding victim's documentation.

      Reminder:

      If a TC 971 with AC 522 and tax administration source code IRSID is on the account and the examiner is able to make a determination that the taxpayer is a victim of identity theft using internal research, they should not request supporting documentation.

    2. Ensure the appropriate tracking indicators are reflected on the account. See IRM 4.10.27.9, Examiner Input of Identity Theft Tracking Indicators, for instructions on how to input identity theft tracking indicators.

    3. Ensure that all collection activity is suspended until the identity theft issue is resolved. See IRM 4.10.27.11, Suspension of Collection Activity for Identity Theft Cases.

    4. After confirming the person (the SSN true owner) you are dealing with is a victim of identity theft, the examiner must ensure the victim’s address is correct on ENMOD. If the address is incorrect, update the victim’s address on ENMOD before submitting the Form 4442 package to the DITA team for account corrections. Correct the victim's address by submitting Form 2363, Master File Entity Change. See IRM 4.4.11.2, Name, Address, and Marital Status Changes.

    5. Determine if the return is a nullity return and if nullity treatment applies. See IRM 4.10.27.12.

    6. Complete the victim's account correction by submitting a Form 4442 package to the DITA team requesting account reversals and posting of applicable closing codes. Instructions on the preparation and submission of the Form 4442 package are found at IRM 4.10.27.21.

    7. Perform case analysis to ensure all identity theft related issues are being addressed and resolved. This includes but is not limited to a review of prior (a minimum of 3 prior years) and subsequent years for apparent evidence of unresolved identity theft issues. See IRM 10.5.3.2.9, Closing Identity Theft Issues.

Suspension of Collection Activity for Identity Theft Cases

  1. It is critical that no collection action is taken with respect to a taxpayer once it has been determined that he or she is a victim of ID theft. To protect the taxpayer (victim), the examiner will take actions to suspend collection activity when the balance due is the result of identity theft.

    Note:

    The examiner will not suspend collection activity if the balance due is not the result of identity theft. It is possible that the victim has a balance due not attributable to the identity theft occurrence; either a portion of the assessment on the same tax period or other balance due tax periods.

  2. The examiner will take the following steps:

    1. Follow the steps outlined in IRM 4.10.27.11.1 to determine if the taxpayer account has collection activity that requires suspension.

    2. If collection suspension is required, follow the steps in IRM 4.10.27.11.2 to suspend.

    3. If the taxpayer is involved in bankruptcy, contact the Centralized Insolvency Operation (CIO). Contact information can be found on the Centralized Insolvency Operation Research Portal at http://serp.enterprise.irs.gov/databases/portals.dr/compliance.dr/crc.dr/cio/cio_default.htm. If the CIO responder cannot assist during the call, he or she will provide the name and telephone number of the field insolvency caseworker. The examiner will need to coordinate actions on the case with the insolvency case worker.

Identifying Collection Activity on an Identity Theft Victim's Account

  1. The examiner should secure a current TXMOD and determine if any tax period(s) impacted by identity theft are in collection Status Codes 22, 24, or 26.

    1. If yes, collection suspension should be made before the request for victim account corrections are submitted to the DITA team. The examiner will follow the directions per IRM 4.10.27.11.2 depending on the collection status code.

    2. If no, the examiner will notate the case activity record or the workpapers to reflect that the TXMOD analysis reflected no collection activity.

Suspending Collection Activity on an Identity Theft Victim's Account

  1. Once the examiner has determined a tax period impacted by identity theft is in collection Status Codes 22, 24, or 26, collection suspension will be made before the request for victim account corrections are submitted to the DITA team. See IRM 4.10.27.11.1

  2. The examiner will take the following action if at least one of the identity theft tax years is in collection Status Code 26:

    1. Complete Form 14394, Identity Theft Collection Alert, and notate whether a balance due will remain on the identity theft tax period after the adjustment.

    2. Fax the completed Form 14394 to the applicable Collection function using Form 3210. Form 14394 provides instructions to help the examiner locate the assigned revenue officer and fax number.

  3. The examiner will take the following action if the identity theft tax year(s) is in Status Code 22 or Status Code 24 and no other years are in Status Code 26:

    1. Complete Form 14394 and notate whether a balance due will remain on the identity theft tax period after the adjustment.

    2. Fax the completed Form 14394 to the Automated Collection System (ACS) Support IDT ITAR liaison using Form 3210.

      Note:

      Fax numbers can be found on the "Who/Where" tab on SERP.

  4. Document the actions taken on the case activity record or the workpapers.

Determination and Processing Instructions for a Nullity Return

  1. A Form 4442 package is submitted to the DITA team to request taxpayer account corrections. In order to prepare this package, the examiner must first determine if a return not filed by the true owner of the SSN is considered a "nullity return." See IRM 4.10.27.12.1, Definition of Nullity Return.

  2. See IRM 4.10.27.12.1 (2) for steps to use to determine if a return is a nullity.

  3. Once the examiner determines whether the return is a nullity, the examiner will enter applicable language from below in Part III Section B of Form 4442:

    1. Nullity Treatment Criteria Met: The examiner will write "Nullity treatment applies. The return can be treated as a nullity." and cite the applicable criteria used. See IRM 4.10.27.12.1 (2) for the criteria.

    2. Nullity Treatment Criteria Not Met: The examiner will write "Nullity treatment does not apply. Move the return to an IRSN."

    Note:

    A return treated as a nullity will not be moved to an internal revenue service number (IRSN).

Definition, Criteria, and Evaluation of Nullity Return

  1. Most returns filed by someone other than the true owner of the SSN are not valid returns. A return that is not valid is a nullity. However, a return filed under someone else’s SSN may be a valid return if the return was filed with a good-faith effort to comply with the internal revenue laws. It is a valid return even if it is in some way purposefully false or fraudulent. See IRM 3.28.4.9, Nullity Returns.

    Example:

    A taxpayer submits a tax return but enters the wrong SSN. It is a valid return and is not a nullity.

    Example:

    A return that should be filed under an individual taxpayer identification number (ITIN) that is instead filed under the SSN used by the filer for employment is a valid return if it reports wages and withholding earned by the filer. It is not a nullity and must be moved to an IRSN.

  2. Nullity Criteria and Evaluation—A return filed by someone other than the true owner of the SSN will be treated as a nullity if either set of criteria listed below is met:

    1. The return meets the criteria defined in IRM 4.19.24.1.3.6.1, Refund Scheme Listing. If these criteria are met, the return will be treated as nullity.

    2. The return meets the criteria defined in IRM 4.19.24.1.3.6.2, IDRS/IRPTR Data Decision Tree. If these criteria are met, the return will be treated as a nullity.

  3. A nullity return can be reversed from within the account and does not have to be moved to an IRSN.

Identity Theft Post Function Account Adjustment Referrals

  1. Examiners must prepare an identity theft post function account adjustment referral, hereinafter referenced as the Form 4442 package, to correct an identity theft victim’s account. Generally, to correct the victim’s account, the examiner must reverse the identity thief’s return, including audit adjustments posted to the victim's account due to the audit of the identity thief's return, and correctly process and post the victim’s return. To input the reversals, the examiner must submit a Form 4442 package to the DITA team as described in IRM 4.10.27.21.

Correcting Identity Theft Victim’s Account

  1. Once the examiner has determined the taxpayer was a victim of identity theft and if required, the victim has provided the substantiation documentation required per IRM 10.5.3.2.7, Overview—Identity Theft Supporting Documentation, the examiner should continue with the instructions below:

    • Complete Form 4442 using the directions in IRM 4.10.27.12 and IRM 4.10.27.15.

    • Process delinquent returns secured from the victim per IRM 4.10.27.15.1.2, IRM 4.10.27.15.1.3, IRM 4.10.27.15.2.2, or IRM 4.10.27.15.2.3, whichever is applicable.

    • When necessary, generate an RGS report following the procedures in IRM 4.10.27.16.

    • If the identity theft victim has no filing requirement or a TC 976 return that does not warrant examination, assemble the administrative file as described in IRM 4.10.27.19.

      Reminder:

      If a TC 971 with AC 522 and tax administration source code IRSID is on the account and the examiner is able to make a determination that the taxpayer is a victim of identity theft using internal research, they should not request supporting documentation.

Form 4442 Inquiry Referral Instructions

  1. Account correction instructions to the DITA team on Form 4442 will vary depending on whether or not a TC 300 has posted to the victim’s account. The examiner must follow either Table 1 Form 4442 Instructions—No TC 300 Posted to Identity Thief's Return on Master File (MF) or Table 2 Form 4442 Instructions—TC 300 Posted to Identity Thief's Return on Master File (MF) to determine the appropriate actions required to correct the taxpayer's account.

    Table 1 Form 4442 Instructions—No TC 300 Posted to Identity Thief's Return on Master File (MF)

    IF the victim … AND … THEN follow …
    Does not have a filing requirement A TC 150 is on the victim's account due to the identity thief's return IRM 4.10.27.15.1.1.
    Has a filing requirement and the victim's secured delinquent return will be accepted as filed (examination not warranted) A TC 150 is on the victim’s account due to the identity thief's return IRM 4.10.27.15.1.2.
    Has a filing requirement and the victim's secured delinquent return will not be accepted as filed (examination warranted) A TC 150 is on the victim’s account due to the identity thief's return IRM 4.10.27.15.1.3.
    Has a duplicate return posted on his or her account and the victim's filed return does not warrant examination The following two conditions are met:
    1. A TC 150 is on the victim’s account due to the identity thief's return

    2. A TC 976 (duplicate return indicator) is on the account for the victim’s return, that posted after the identity thief's return

    IRM 4.10.27.15.1.4.
    Has a duplicate return posted on his or her account and the victim's filed return warrants examination The following two conditions are met:
    1. A TC 150 is on the victim’s module due to the identity thief's return

    2. A TC 976 (duplicate return indicator) is on the account for the victim’s return, that posted after the identity thief's return

    IRM 4.10.27.15.1.5.


    Table 2 Form 4442 Instructions—TC 300 Posted to Identity Thief's Return on Master File (MF)

    IF the victim … AND… THEN follow …
    Does not have a filing requirement The following two conditions are met:
    1. A TC 150 is on the victim’s module due to the identity thief's return

    2. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.)

    IRM 4.10.27.15.2.1.
    Has a filing requirement and the victim's secured delinquent return will be accepted as filed (examination not warranted) The following two conditions are met:
    1. TC 150 is on the victim’s account due to the identity thief's return

    2. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.)

    IRM 4.10.27.15.2.2.
    Has a filing requirement and the victim's secured delinquent return will not be accepted as filed (examination warranted) The following two conditions are met:
    1. A TC 150 is on the victim's account due to the identity thief's return

    2. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.)

    IRM 4.10.27.15.2.3.
    Has a duplicate return posted on his or her account and the victim’s filed return does not warrant examination The following three conditions are met:
    1. A TC 150 is on the victim’s account due to the identity thief's return

    2. A TC 976 (duplicate return indicator) is on the account for the victim’s return, that posted after the identity thief's return

    3. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.)

    IRM 4.10.27.15.2.4.
    Has a duplicate return posted on his or her account and the victim's filed return warrants examination The following three conditions are met:
    1. A TC 150 is on the victim’s account due to the identity thief's return

    2. A TC 976 (duplicate return indicator) is on the account for the victim’s return, that posted after the identity thief's return

    3. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.)

    IRM 4.10.27.15.2.5.


No TC 300 Posted to Master File (MF) Cases

  1. IRM 4.10.27.15.1.1 through IRM 4.10.27.15.1.5 provide specific instructions for the examiner to take when processing cases where no TC 300 posted to Master File based on the five scenarios outlined in Table 1 at IRM 4.10.27.15.

Victim Has No Filing Requirement
  1. When the victim does not have a filing requirement and a TC 150 is on the victim’s module due to the identity thief's return, follow the steps below.

  2. Step 1: Insert the language below in Part III Section B of Form 4442:

    1. Victim does not have a filing requirement.

    2. Reverse the TC 150–return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    3. Address any payments or credits on the account that belong to the true SSN owner (victim).

    4. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

    Note:

    Disposition of the administrative file depends on whether or not the case contains a reopened tax year. See paragraph (5) below.

    Reopened tax year is defined as an examination record that was closed and still on AIMS in Status Code 90. See IRM 4.4.23.8.2, Reopening.

  4. Step 3: Follow RGS instructions in IRM 4.10.27.16 (2).

  5. Step 4: Delete the AIMS/ERCS record (the steps used to delete the AIMS/ERCS record and close each return in the case from the group will depend on whether the return was reopened).

    1. For returns that have not been reopened, follow the steps outlined in IRM 4.10.27.19.

    2. For returns that have been reopened, follow the steps in IRM 4.10.27.20.

    Reminder:

    If an examiner has a case with both reopened and non-reopened returns, the examiner will split the case into two separate administrative files and follow the procedures applicable for each return type.

Victim Has a Filing Requirement—Victim's Secured Delinquent Return Accepted as Filed
  1. If the victim has a filing requirement and the secured delinquent return will be accepted as filed (examination not warranted) and a TC 150 is on the victim’s account due to the identity thief's return, follow the steps below.

  2. Step 1: Insert the language below in Part III Section B of Form 4442:

    1. Exam will accept the victim’s secured delinquent return as filed and assess it using Form 4549, Income Tax Examination Changes.

    2. Reverse TC 150—return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    3. Address any payments or credits on the account that belong to the true SSN owner (victim).

    4. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

    Reminder:

    Do not forward the victim’s secured delinquent return or the administrative file to the DITA team.

  4. Step 3: Follow the secured delinquent return (victim)—accepted as filed case procedures in IRM 4.10.27.17.

  5. Step 4: See IRM 4.10.27.16 (3) for RGS instructions.

  6. Step 5: After receiving e-mail confirmation from the DITA team that the identity thief's return data has been reversed, close the case to Centralized Case Processing (CCP).

Victim Has a Filing Requirement—Victim's Secured Delinquent Return NOT Accepted as Filed
  1. If the victim has a filing requirement and the secured delinquent return will not be accepted as filed (examination warranted) and a TC 150 is on the victim’s account due to the identity thief's return, follow the steps outlined below.

  2. Step 1: Insert the language below in Part III Section B of Form 4442:

    1. Exam will proceed with the audit of the victim’s secured delinquent return.

    2. Reverse TC 150—return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    3. Address any payments or credits on the account that belong to the true SSN owner (victim).

    4. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

    Reminder:

    Do not forward the victim’s secured delinquent return or the administrative file to the DITA team.

  4. Step 3: While the reversals for the identity thief's return data are being processed by the DITA team, the examiner should continue with the examination of the victim’s return.

  5. Step 4: See IRM 4.10.27.16 (4) for RGS instructions.

  6. Step 5: Follow the instructions in IRM 4.10.27.18.

Victim's Return Posted as a Duplicate Return—Victim's Return Does Not Warrant Examination
  1. If the following conditions are met:

    1. A TC 150 is on the victim’s module due to the identity thief's return,

    2. A TC 976 (duplicate return indicator) is on the account for the victim’s return that posted after the identity thief's return, and

    3. The victim's return does NOT warrant examination,

    follow the steps outlined below.

  2. Step 1: Insert the language below in Part III Section B of Form 4442:

    1. Exam will not be proceeding with an audit of the victim’s return.

    2. Reverse TC 150—return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    3. Address any payments or credits on the account that belong to the true SSN owner (victim).

    4. Post the victim’s TC 976 return as the original return.

    5. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

  4. Step 3: Delete the AIMS/ERCS record (the steps used to delete the AIMS/ERCS record and close each return in the case from the group will depend on whether the return was re-opened).

    1. For returns that have not been reopened, follow the steps outlined in IRM 4.10.27.19.

    2. For returns that have been reopened, follow the steps outlined in IRM 4.10.27.20.

      Reminder:

      If an examiner has a case with both reopened and non-reopened returns, the examiner will split the case into two separate administrative files and follow the procedures applicable for each return type.

  5. Step 4: See IRM 4.10.27.16 (2) for RGS instructions.

Duplicate Return Posted—Victim's Return Warrants Examination
  1. If the following conditions are met:

    1. A TC 150 is on the victim’s account due to the identity thief's return, and

    2. A TC 976 (duplicate return indicator) is on the account for the victim’s return that posted after the identity thief's return,

    follow the steps outlined below.

  2. Step 1: Insert the language below in Part III Section B of Form 4442:

    1. Exam will proceed with the audit of the victim’s return. The DITA team should not post and process the victim’s TC 976 return when making the reversals.

    2. Reverse TC 150—return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    3. Address any payments or credits on the account that belong to the true SSN owner (victim).

    4. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

    Reminder:

    Do not send the administrative file to the DITA team.

  4. Step 3: While the reversals for the identity thief's return data are being made, the examiner should take the following actions:

    1. Continue with the examination of the victim’s return.

    2. Follow IRM 4.10.27.18.

    3. Use a TRDBV print or request a CIS print from your AIMS/ERCS analyst (using Form 4844) to obtain the figures for the victim’s TC 976 return.

  5. Step 4: See IRM 4.10.27.16 (4) for RGS instructions.

TC 300 Posted to Master File (MF) Cases

  1. IRM 4.10.27.15.2.1, Victim Has No Filing Requirement, through IRM 4.10.27.15.2.5, Duplicate Return Posted—Victim Return Examination Warranted, provides specific instructions for the examiner to take when processing cases where a TC 300 posted to Master File based on the five scenarios outlined in Table 2 in IRM 4.10.27.15.

Victim Has No Filing Requirement
  1. When the victim does not have a filing requirement and the following two conditions are met:

    1. A TC 150 is on the victim’s module due to the identity thief's return and

    2. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.),

    follow the steps outlined below.

  2. Step 1: Insert the language below in Part III Section B of Form 4442:

    1. Victim does not have a filing requirement.

    2. Reverse the TC 150—return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    3. Reverse the TC 300 assessed amount from the audit of the identity thief's return, including interest and penalties.

    4. Address any payments or credits on the account that belong to the true SSN owner (victim).

    5. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

    Note:

    Disposition of the administrative file depends on whether or not the case contains a reopened tax year.

  4. Step 3: Follow RGS instructions in IRM 4.10.27.16 (2).

  5. Step 4: Delete the AIMS/ERCS record and close each return in the case from the group (the steps used to delete the AIMS/ERCS record and close each return in the case from the group will depend on whether the return was reopened.

    1. For returns that have not been reopened, follow the steps outlined in IRM 4.10.27.19.

    2. For returns that have been reopened, follow the steps outlined in IRM 4.10.27.20.

      Reminder:

      If an examiner has a case with both reopened and non-reopened returns, the examiner will split the case into two separate administrative files and follow the procedures applicable for each return type.

Victim Has a Filing Requirement—Victim's Secured Delinquent Return Accepted as Filed
  1. If the victim has a filing requirement and the secured delinquent return will be accepted as filed (examination not warranted) and the following conditions are met:

    1. TC 150 is on the victim’s account due to the identity thief's return, and

    2. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.),

    follow the steps outlined below.

  2. Step 1: Use the language below in Part III Section B of Form 4442:

    1. Exam will accept the victim’s secured delinquent return as filed and assess it using Form 4549, Income Tax Examination Changes.

    2. Reverse TC 150—return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    3. Reverse the TC 300 assessed amount from the audit of the identity thief's return, including interest and penalties.

    4. Address any payments or credits on the account that belong to the true SSN owner (victim).

    5. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

    Reminder:

    Do not forward the victim’s secured delinquent return or the administrative file to the DITA team.

  4. Step 3: Follow the secured delinquent return (victim)—accepted as filed case procedures in IRM 4.10.27.17.

  5. Step 4: See IRM 4.10.27.16 (3) for RGS instructions.

  6. Step 5: After receiving e-mail confirmation from the DITA team that the identity thief's return data has been reversed, close the case to CCP.

Victim Has a Filing Requirement—Victim Secured Delinquent Return NOT Accepted as Filed
  1. If the victim has a filing requirement and the secured delinquent return will not be accepted as filed (examination warranted) and the following conditions are met:

    1. TC 150 is on the victim’s module due to the identity thief's return, and

    2. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.),

    follow the steps outlined below.

  2. Step 1: Insert the language below in Part III Section B of Form 4442:

    1. Exam will proceed with the audit of the victim’s secured delinquent return.

    2. Reverse TC 150—return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    3. Reverse the TC 300 assessed amount from the audit of the identity thief's return, including interest and penalties.

    4. Address any payments or credits on the account belong to the true SSN owner (victim).

    5. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

    Reminder:

    Do not forward the victim’s secured delinquent return or the administrative file to the DITA team.

  4. Step 3: While the reversals for the identity thief's return data are being processed by the DITA team, the examiner should continue with the examination of the victim’s return.

  5. Step 4: See IRM 4.10.27.16 (4) for RGS instructions.

  6. Step 5: Follow the instructions in IRM 4.10.27.18.

Victim's Return Posted as a Duplicate Return—Victim's Return Does NOT Warrant Examination
  1. If the following conditions are met:

    1. A TC 150 is on the victim’s account due to the identity thief's return,

    2. A TC 976 (duplicate return indicator) is on the account for the victim’s return that posted after the identity thief's return,

    3. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.), and

    4. The victim's return does NOT warrant examination.

    follow the steps outlined below.

  2. Step 1: Insert the language below in Part III, Section B of Form 4442:

    1. Reverse TC 150—return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    2. Reverse the TC 300 assessed amount from the identity thief's return audit, including interest and penalties.

    3. Address any payments or credits on the account that belong to the true SSN owner (victim).

    4. Post the victim’s TC 976 return as the original return.

    5. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

  4. Step 3: Delete the AIMS/ERCS record and close each return in the case from the group (the steps used to delete the AIMS/ERCS record and close each return in the case from the group will depend on whether the return was reopened).

    1. For returns that have not been reopened, follow the steps outlined in IRM 4.10.27.19.

    2. For returns that have been reopened, follow the steps outlined in IRM 4.10.27.20.

      Note:

      If an examiner has a case with both reopened and non-reopened returns, the examiner will split the case into two separate administrative files and follow the procedures applicable for each return type.

  5. Step 4: See IRM 4.10.27.16 (2) for RGS instructions.

Duplicate Return Posted—Victim's Return Warrants Examination
  1. If the following conditions are met:

    1. A TC 150 is on the victim’s account due to the identity thief's return,

    2. A TC 976 (duplicate return indicator) is on the account for the victim’s return that posted after the identity thief's return,

    3. Audit codes are posted on the victim’s account due to the audit of the identity thief's return (TC 420, TC 300, etc.), and

    4. The victim's return warrants examination,

    follow the steps outlined below.

  2. Step 1: Insert the language below in Part III Section B of Form 4442:

    1. Exam will proceed with the audit of the victim’s return. The DITA team should not process or post the victim’s TC 976 return when making the reversals.

    2. Reverse TC 150—return information, wages, withholding, credits, tax, and refunds for the identity thief's return, including any interest and penalties.

    3. Reverse the TC 300 assessed amount from the audit of identity thief's return, including interest and penalties.

    4. Address any payments or credits on the account that belong to the true SSN owner (victim).

    5. Inform the examiner by secure e-mail at [insert examiner’s full e-mail address, e.g., Mary.Doe@irs.gov] when the account corrections are complete.

  3. Step 2: Send the completed Form 4442 package to the DITA team for processing using Form 3210. Follow the procedures in IRM 4.10.27.21.

    Reminder:

    Do not send the administrative file to the DITA team.

  4. Step 3: While the reversals for the identity thief's return data are being made, the examiner should take the following actions:

    1. Continue with the examination of the victim’s return.

    2. Follow IRM 4.10.27.18.

    3. Use a TRDBV print to obtain the figures for the victim’s TC 976 return.

  5. Step 4: See IRM 4.10.27.16 (4) for RGS instructions.

Report Generation Software (RGS) Procedures

  1. After completing Form 4442, Inquiry Referral, the examiner will follow the applicable RGS procedures based on the facts and circumstances for each return. See tables in IRM 4.10.27.15, Form 4442 Inquiry Referral Instructions, for reference to the appropriate IRM section. For the ID Theft RGS Chart, which provides a summary of RGS procedures, visit the MySB/SE RGS website at http://mysbse.web.irs.gov/exam/rgs/resources/29258.aspx.

  2. When a victim has no filing requirement or the victim's return posted as duplicate return (TC 976), is accepted as filed, follow the steps (a) through (c) below unless the tax period being closed was a reopened return (examination record that was closed and still on AIMS in Status Code 90), then follow RGS procedures in IRM 4.10.27.20.

    1. Secure the RGS electronic case if it is not in the examiner’s possession. If the identity thief's return was previously audited and closed (TC 300/421), retrieve the case from Archives.

    2. Notate in the case activity record that this is an identity theft case and save the Form 4442 into "Case File Documents."

    3. Manager or clerical staff archives the case.

  3. When a victim’s return (secured by examiner) is accepted as filed, follow the steps below:

    1. Secure the RGS electronic case if it is not in the examiner’s possession. If the identity thief's return was previously audited and closed (TC 300/421), retrieve the case from "Archives" and preserve the original workpapers by following IRM 4.10.15.1.2, RGS Inventory/Case Management.

    2. Correct RGS case information to victim’s information.

    3. Remove all identity theft entries in "Return Setup" (check all tabs and any detail buttons). Run a variance to ensure there are no remaining entries.

    4. Submit the return for a partial assessment, if required. See IRM 4.10.27.18 (2). Enter the victim’s return in "Return Setup." Run a variance. Ensure that the return matches the current transcript after the assessment. Create at least one issue that is no changed. Per return and per exam must be equal and agree to the victim’s return as previously assessed.

    5. Do not submit the return for a partial assessment if the tax per return is zero (before withholding credits or refundable credits or both). Create adjustments for each item on the victim’s return. Per return is zero. Per exam is the amount from the victim’s return.

    6. Use Reason Code 53 for each issue.

    7. Complete case using normal procedures.

  4. When a victim’s return secured by examiner or victim's return posted as duplicate return (TC 976) warrants examination, follow the steps below:

    1. Secure the RGS electronic case if it is not in the examiner’s possession. If the identity thief's return was previously audited and closed (TC 300/421), retrieve the case from "Archives" and preserve the original workpapers by following IRM 4.10.15.1.2.

    2. Correct RGS case information to victim’s information.

    3. Remove all identity theft entries in "Return Setup" (check all tabs and any detail buttons). Run a variance to ensure no remaining entries.

    4. Submit the return for a partial assessment, if required. See IRM 4.10.27.18 (2). Enter the victim’s return in "Return Setup." Run a variance. Ensure that the return matches the current transcript after the assessment. If a partial assessment is required, create adjustments as necessary. Per return must equal the victim’s return as previously assessed. Enter the per exam amount based on the examination results.

    5. Do not submit the return for a partial assessment if the tax per return is zero (before withholding credits or refundable credits or both). Create adjustments for each item on the victim’s return. Per return is zero. Per exam is the amount from the victim’s return or as adjusted.

    6. Complete case using normal procedures.

Secured Delinquent Return (Victim) Accepted as Filed Case Procedures

  1. Once an examiner secures a delinquent return that will be accepted as filed, the examiner must take the actions outlined in this section.

  2. Request the input of a TC 971 AC 282 using the return received date used for computing the ASED* on Form 3177, Notice of Action for Entry on Master File. This updates Master File to show that Examination secured a delinquent return. This step should be done by the group as soon as the return is secured.

    Note:

    *The date used to compute the ASED may not be the date the examiner received the tax return if the taxpayer had filed a perfected, valid return at an earlier time and the return was solely rejected because the taxpayer was a victim of identity theft. See IRM 25.6.1.6.15, When a Document Is Treated as Filed Under the IRC, and Treas. Reg. 301.7502–1(d).

  3. Prepare Form 3177 as follows:

    1. Enter an "X" in the box titled "Other" at the bottom of the form and enter "TC 971 AC 282 Return Received Date (MM/DD/YYYY)."

    2. Fax the Form 3177 to the FORT Unit in Centralized Case Processing (CCP). The fax number can be found in the contact listing posted to the AIMS/ERCS web site.

      Note:

      Posting of a TC 971 AC 282 at Master File updates IMF and BMF to show that Examination secured a delinquent return; and for IMF, it causes Master File to set the ASED based on the IRS received date.

  4. Establish ASED on AIMS/ERCS by inputting Form 5348, AIMS/ERCS Update (Examination Update), to request the statute date be updated on AIMS and ERCS. Managerial approval is required for statute updates.

  5. Update the activity code on AIMS/ERCS to reflect the income on the delinquent return as soon as possible. At the latest, the activity code must be updated by the time the case leaves the group. See IRM 4.4.9.7.2.4, Activity Code.

  6. After the DITA team has corrected the account, incorporate the amounts on the secured delinquent return received from the victim into a report (Form 4549 or any other type of examination report) and assess as a TC 300/301. Do not forward the delinquent return to submissions processing for posting of a TC 150.

  7. The processing and closing of the victim’s secured delinquent return after the DITA team has corrected the account is the same as the processing and closing of a delinquent return secured after the posting of a substitute for return (SFR). Follow IRM 4.4.9.7.3, Delinquent Return Secured by Examination After SFR TC 150 Posted—Accepted as Filed Procedures, and IRM 4.4.9.7.3.1, Prepare RAR and Form 5344, Examination Closing Record.

Secured Delinquent Return (Victim) or TC 976 Victim Duplicate Return Warrants Examination Case Procedures

  1. The examiner must take the actions outlined in this section when a secured delinquent return or TC 976 duplicate return warrants examination.

  2. After the DITA team has corrected the account, the secured return or TC 976 duplicate return must be processed as a partial assessment. Prepare RAR starting with zero per return to reflect tax, credits, etc. per return. Refer to IRM 4.4.9.7.4.1, Prepare RAR and Form 5344, Examination Closing Record, and IRM 4.4.9.7.4.2, Fax to Centralized Case Processing (CCP), for partial assessment processing instructions.

    Note:

    If tax per return is zero (before withholding credits or refundable credits or both), do not request a partial assessment. Prepare final RAR starting with per return figures of zero.

  3. If the audit of the victim’s return does not result in adjustments, refer to IRM 4.4.9.7.5.1, No Additional Adjustments Required/Prepare RAR and Form 5344, Examination Closing Record, for RAR and closing procedures.

  4. If the audit of the victim’s return results in additional adjustments, refer to IRM 4.4.9.7.5.2, Additional Adjustments Required/Prepare RAR and Form 5344, Examination Closing Record, for RAR and closing procedures.

  5. When the identity theft aspect is resolved and the DITA team has corrected the account, the examiner will update the impacted tax year(s) to ARC 95. See IRM Exhibit 4.4.1-4, Aging Reason Codes.

Administrative File Assembly and Routing for Disposal Code (DC) 33 Error Accounts

  1. When an identity theft victim has no filing requirement or the victim has a TC 976 return that does NOT warrant examination, the examiner must take the actions below to delete the account:

    1. Submit the Form 4442 package to the DITA team, include a TRDBV print of the victim’s return if a TC 976 is on the account, and the administrative file (see paragraph 2 below). Transmit using a Form 3210 with the following notation in the remarks section, "Expedite—Identity Theft Case: Form 4442 Referral Package Enclosed."

    2. Hold the AIMS record at the group (suspend activity regarding record deletion pending the DITA team account correction).

  2. Administrative File—The examiner will prepare an administrative file that will generally include but is not limited to the following:

    1. Identity thief's return (or RTVUE of identity thief's return)

    2. Form 9984, Examining Officer's Activity Record

    3. Charge-out documents for the identity thief's return

    4. Audit reports, workpapers, 30/90 day letters, and other pertinent audit documents if the identity thief's return was previously audited

    5. Form 14039, Identity Theft Affidavit

    6. Form 14027-B, Identity Theft Case Referral

    7. Police report, if applicable

    8. Documentation secured from victim

    9. Any other significant documentation secured while assisting the victim

  3. Do not delete the AIMS record until the secure e-mail confirmation is received from the DITA team, acknowledging the reversal of the identity thief's return information. Check IDRS to ensure the reversal of the identity thief's return was completed properly. Examiners should also periodically check transcripts to see if the reversals are posted on the account even if a confirmation e-mail has not been received. Examiner should follow-up if no contact from the DITA team in 12 to 15 weeks.

  4. Delete AIMS/ERCS Record—Once the group confirms that the identity thief's reversals are complete, the examiner and or clerical staff (as directed by the group manager) should take the following actions:

    1. Prepare a Form 10904, Request for Record Deletion from AIMS, to close the account off AIMS/ERCS.

    2. The examiner or clerical staff will send Form 10904 requesting Disposal Code (DC) 33 to his or her local AIMS/ERCS unit to process per the examiner’s instructions.

    3. The examiner or clerical staff will monitor the taxpayer's account for the TC 421 posted to Master File (verify with IMFOLT) and Status Code 90 on AIMS.

RGS Procedures for an Identity Theft Reopened Return When Victim Does Not Have a Filing Requirement or Victim’s Posted Duplicate Return (TC 976) Does Not Warrant Examination

  1. The group cannot delete an AIMS/ERCS record using Disposal Code (DC) 33 procedures if the record is a reopened return (examination record that was closed and still on AIMS in Status Code 90). In this instance, the examiner must take the following actions:

    1. Follow the RGS procedures in paragraph 2 below. For the ID Theft RGS Chart, which provides a summary of RGS procedures, visit the MySB/SE RGS website at http://mysbse.web.irs.gov/exam/rgs/resources/29258.aspx.

    2. Complete a Form 5344, Examination Closing Record, and close the administrative file through CCP. The examiner should use DC 12 (an examined closure to CCP) with $1 in Item 35 on the Form 5344. See IRM 4.4.26.6.3.2, Item 13: Disposal Code.

    Note:

    If an examiner has a case with both reopened and non-reopened returns, the examiner will split the case into two separate administrative files and follow the procedures applicable for each return type.

  2. Secure the RGS electronic case if it is not in the examiner’s possession by retrieving the case from "Archives."

    1. Preserve the original workpapers by following IRM 4.10.15.1.2.

    2. Correct RGS case information to victim’s information.

    3. Remove all identity theft entries in "Return Setup" (check all tabs and any detail buttons) if victim has no filing requirement. Otherwise revise "Return Setup" to match the victim's posted return. Run variance.

    4. Declassify and remove the adjustment records for classified issues. Delete examiner added issues.

  3. Assemble the administrative case file as described in IRM Exhibit 4.4.1-8, Case Assembly, and complete Form 3198, Special Handling Notice for Examination Case Processing, as follows:

    1. Place an "X" in the "Other" box under special feature instructions and indicate "Identity Theft Case—Actions Completed by DITA. Case ready for closure."

    2. Place an "X" in the "Forward to CCP–Update to Status 51" box.

  4. Close the case to CCP as a regular closure.

DITA Team Referral Package (Form 4442 Package) Content, Assembly, and Submission

  1. The examiner will prepare the DITA Team Referral Package (Form 4442 package) containing the following:

    1. Form 4442, Inquiry Referral.

    2. Copy of Form 14039, Identity Theft Affidavit, if required. See IRM 4.10.27.21 (2).

    3. Copy of identity thief's return (electronic or paper).

    4. Copy of the taxpayer’s (victim) identity theft substantiation documentation (as defined in IRM 10.5.3.2.7, Overview—Identity Theft and Substantiation Documentation).

    5. MFTRA U print if secured (do not attach any other IDRS prints because the DITA team will secure if needed).

    6. Any correspondence to or from the victim.

  2. Form 4442 must be prepared and submitted to the DITA team for each tax year that reversals need to be made on a victim’s account. Supporting documentation does not need to be duplicated and attached to each year. The supporting documentation, if the same for all years involved, only has to be attached to the most recent year Form 4442, (e.g., 2009, 2010, and 2011, then attach supporting documentation to Form 4442 for 2011).

    Reminder:

    If a TC 971 with AC 522 and tax administration source code IRSID is on the account and the examiner is able to make a determination that the taxpayer is a victim of identity theft using internal research, they should not request supporting documentation.

  3. When preparing Form 4442:

    1. Write "EXPEDITE–IDENTITY THEFT" across the top of each Form 4442 submitted to the DITA team.

    2. Input the phrase, "SB/SE Field Exam" in Part 1, Box 4–Location.

    3. Form 4442 must include specific instructions (in Part III Section B) on actions needed to correct the account. See IRM sections referenced in Table 1 or Table 2 in IRM 4.10.27.15 for specific language to be used in Part III Section B. Attach a continuation sheet to Form 4442 if additional space is needed to provide instructions to the DITA team.

    4. In Part III Section B, request the DITA team to input the appropriate TC 971 with an AC 501 or AC 506 upon completing the account corrections. See IRM 10.5.3.2.10, Closing Taxpayer Initiated Identity Theft Affecting Tax Administration—TC 971 AC 501, Documentation Provided, and IRM 10.5.3.2.12, IRS-Identified Identity Theft Affecting Tax Administration—TC 971 AC 506, for guidance on indicators to be used when closing identity theft issues.

    Note:

    The original identity theft substantiation documentation should remain in the examiner’s administrative case file. The DITA team should also receive copies to associate with the 29X adjustment when the reversals are made by the DITA team. If IRS identified the identity theft, the taxpayer should not be asked to submit substantiation documentation, and the Form 4442 should be noted, "IRS identified, substantiation documentation not required."

  4. Incomplete referrals will be rejected back to the originating group.

  5. Mail, fax, or e-mail the Form 4442 package, along with Form 3210 to the DITA team depending on its contents as follows:

    IF … THEN …
    There is an original return in the package Mail the Form 4442 package.
    No original return is in the package Fax the Form 4442 package.
    The entire Form 4442 package is completely comprised of electronic documents (Microsoft © Word, PDF, or scanned documents), and the documents requiring signature have a digital signature E-mail the Form 4442 package using secure e-mail.


    The DITA team's mailing address, fax number, and e-mail address can be found on the MySBSE Identity Theft website under the contacts section.

Statute of Limitations and Statute Control for Identity Theft Cases

  1. Once the taxpayer provides the substantiation documentation required per IRM 10.5.3.2.7, Overview Identity Theft Supporting Documentation, and the examiner determines the taxpayer was a victim of identity theft, the victim's statute must be controlled and protected. The examiner is responsible for controlling statutes on his or her assigned cases. See IRM 25.6.23.5 (3), Responsibilities of Managers and Employees.

  2. If the victim has previously filed a return (TC 976 on the module) or the victim files a return with the examiner, the filed return will control the statute. The group must follow the guidance set forth in IRM 25.6.23, Examination Process—Assessment Statute of Limitations Controls.

  3. If the victim has not filed, the statute will be updated to alpha code EE, No Return Filed—section 6501(c)(3), per directions provided in IRM 25.6.23.6.1.1 (2), Time for Initiating Controls. Also see IRM 25.6.1.6.14, Criteria for Establishing a Statute of Limitations Period, for additional guidance on identity theft related returns.

  4. When a late filed return is received from a taxpayer, the examiner will replace the EE statute designation with a true statute expiration date based on the date the return was received by the IRS. See IRM Exhibit 25.6.23-3, Instructions for Updating the Statute on AIMS.

  5. A list of Technical Services statute coordinators is available on MySB/SE Statutes (Barred, Consents)—Exam Technical Services at http://mysbse.web.irs.gov/exam/tip/statutes/11894.aspx.