Home

Congressional Agenda and IRS Agenda 2017


Our Spring Quarterly Conference is just around the corner, and NCCPAP will again go to Washington DC to represent you.  Over the last few months, the Tax Committee prepared agenda items that present significant issues that need to be addressed. 

On May 11, 2017, we will discuss these agenda items with various Congressional representatives and members of the Internal Revenue Service.

Please read the Congressional and IRS Agendas and we will report back to you on our return.


and




FYI: Effective December 31, 2016, the following minimum wage will be in effect in New York State:

https://labor.ny.gov/workerprotection/laborstandards/workprot/minwage.shtm

 

Announcements

FYI:  NCCPAP Bethesda Spring Conference
May 10, 11, & 12, 2017
Hyatt Regency Bethesda
One Bethesda Metro Center, Bethesda, MD  20814
NCCPAP rates:  $237.00 (king and queen/queen)
Use following online dedicated link
Hyatt Regency Bethesda
Reserve room before April 9, 2017

FYI:  NCCPAP Summer Conference
August 9, 10, &11, 2017
DoubleTree Hotel
455 South Broadway, Tarrytown, NY  10591
NCCPAP rates: $161.00 (king and double/double)
Reservations: (914) 524-6418 or
Hilton Hotel Tarrytown
Online group code: CPA
Reserve room before July 9, 2017
Complimentary self-parking lot

Latest Discussions

  • Posted in: ncCPAp on the GO!

    I've done IRS Collections work for decades, primarily Offers in Compromise. New client has ...

  • Profile Picture

    RE: HVAC

    Posted in: ncCPAp on the GO!
  • Profile Picture

    HVAC

    Posted in: ncCPAp on the GO!

    I have a client installing a new HVAC unit in a commercial building he owns. The sec.179 i think precludes ...

  • Posted in: ncCPAp on the GO!

    Abby, This is, sadly, correct. The subcontractor and your client are technically Joint employers ...

    1 person recommends this.
  • Posted in: ncCPAp on the GO!

    Gentlemen: a fellow practitioner was telling me his client is under audit from NYS UMEMPLOYMENT and paid ...


At the Westchester/Rockland Chapter Dinner to Show Our Appreciation to Al Heffes & Sandy Zinman


Dinner_with_Al_Ron_Sandy_Mark.jpg

Al, Ron Tvert, Sandy, and Mark Stewart

Had a great time at our Chapter meeting and dinner to honor Al Heffes, our past Treasurer, and Sandy Zinman, our past President. Thanks to everyone who attended and made the evening just perfect!



NCCPAP's Letter to NYS Executive Deputy Commissioner of Taxation & Finance Regarding Driver's License Requirement for 2016 Tax Filing  NYSDriversLicenseLtrManion.pdf 

and

Response by Executive Deputy Commissioner, NYS Department of Taxation & Finance ManionReplyNYSdriversLicense.pdf

     
          National Newsletters




DOWNLOAD THE GO.NCCPAP APP

Download the free
Go.NCCPAP App
from the App Store or
Google Play Store.


A Few Security Recommendations

High-profile instances of cyber-crime make headlines every day, and large organizations such as Sony Pictures, Anthem and Home Depot are not the only targets of hackers. Smaller organizations that receive and maintain sensitive personal information, including accounting firms, also are the targets of cyber attacks, and there is no guarantee that any computer network is secure. In the case of Sony Pictures, the FBI stated that the level of sophistication of the attack was so high it would have gotten past 90 percent of private industry and government cyber defenses. However, there are some simple steps you’ll want to take to mitigate your risk, as the financial and reputation consequences of losing sensitive client information can be significant. 

Secure All Hardware 

Sophisticated cyber attacks are not the only way sensitive client information can be compromised. Laptops, hard drives and personal devices such as smart phones often contain sensitive information that can be compromised if those devices are lost or stolen. At a minimum, devices should be password protected, and in the case of smart phones and tablets, configured to be erased remotely. Encryption of the data on such devices can help to prevent the loss of sensitive personal information, even if the devices are lost. The more sophisticated the encryption, the more comfort you will have that the information is secure. An IT professional can help you implement proper encryption protocols. 

Educate All Users 

Threats posed by phishing email attacks and malware can be mitigated if users are trained to recognize them. Being able to identify suspicious email communications and attachments and knowing to hit the delete key without opening them can greatly reduce the risk of malware infecting a device. In addition, passwords are a crucial defense for work and personal email accounts. Systems
should require complex passwords consisting of a combination of upper and lower case letters, numbers and special characters to reduce risk posed by cyber threats.

 Select the Right Security Software 

You should, and probably already do, invest in Internet security, including virus and malware protection and firewalls. However, security software is constantly updated to address existing and new threats as they emerge, so you need to ensure that you have the most current versions. At the outset, be sure the software you choose is regularly and reliably updated. If you need assistance selecting software, you should engage your information technology provider to help you make a sound choice.

 Understand the Cloud 

If you decide to take advantage of the benefits that cloud computing has to o#er, you should ensure that the vendor you engage maintains security over its servers and can provide you with representations that it has undergone a third-party review of controls and safeguards, including encryption for sensitive data. You should know where the information is being stored, how it is protected and who has access to it. Keep in

mind that the cheapest option may not be the best. You want to be sure that you select a reputable vendor that will be in business for years to come. 

Put the Law on Your Side 

Even before you encounter a situation where sensitive client data may have been compromised, you should contact an attorney with expertise in data security incident response to help you proactively formulate a response plan. An attorney can help you recognize your risks and select the key personnel who should be involved if an event occurs. Most important, an attorney will be a reliable guide through the complex series of laws and regulations involved in responding to an incident.

Summary 

As a normal part of business, accountants receive and maintain sensitive client information, including social security numbers and credit card information. While collecting and maintaining this data is necessary, doing so in a computer network or system that is connected to the Internet raises concerns about the possible theft or exposure of that information. Although it is virtually impossible to guarantee security, there are risk management measures that can and should be taken by accountants to mitigate their exposure.

 Bullet Points 

• Require passwords and encrypt your data on all devices.
• Educate your partners and employees about cyber threats.
• Regularly update your security software and firewall configuration.
• Select a reputable cloud provider that has had its security tested.
• Contact an experienced attorney to evaluate your privacy risks and establish an incident response plan.

Thank you to: Thomas R. Manisero, Esq. & Gregory J. Bautista, Esq.
Wilson Elser Moskowitz Edelman & Dicker, LLP
CPA Protector Plan ®

Recent Blogs

Log in to see this information

Either the content you're seeking doesn't exist or it requires proper authentication before viewing.

FIND US ON

Follow Us on Twitter   Find Us on Facebook   Find Us on Flickr   Join Us on LinkedIn   Find Us on YouTube   Follow Us on Instagram

Most Active Members