Cetrom Support fixed all of my problems, their engineers are very professional, courteous, friendly and very efficient. If all customer service out there was like this, it would be a better world...
- Mid-sized
Blog
IT Best Practices Checklist to Follow IRS Guidelines When Offshoring Accounting Staff
Offshoring accounting staff can be a cost-effective and strategic way for US-based businesses to access global talent, improve efficiency, and expand their market reach. However, offshoring also comes with challenges and risks, especially regarding IT security and tax compliance. This document provides an overview of the IT best practices and IRS guidelines businesses should follow when offshoring accounting staff.
An Outline of IRS Guidelines for Offshoring Accounting Staff
Firms must consider tax compliance when offshoring accounting staff. The IRS has issued several guidelines and regulations that affect the tax implications of offshoring accounting activities. The following are the main takeaways from what a firm needs to uphold to maintain compliance with relevant parts of the IRS code.
Section 7216 of the Internal Revenue Code
Section 7216 prohibits the disclosure or use of tax return information by tax preparers without the taxpayer's consent. To comply with this regulation, businesses must:
- Obtain Consent: Secure the taxpayer's consent before sharing their information with an offshore service provider.
- Use of Information: Ensure that the offshore provider uses the taxpayer's information solely for the purposes authorized by the taxpayer.
Revenue Procedure 2013-14
Revenue Procedure 2013-14 outlines the requirements and procedures for obtaining taxpayer consent for the disclosure or use of tax return information by tax preparers. Key points include:
- Consent Form: Provide a consent form to taxpayers that clearly explains the types of information to be disclosed and the purpose of the disclosure.
- Retention: Retain a copy of the consent form for at least three years from the date of the taxpayer's consent.
No TIN List
Financial Institutions (FIs) are not required to obtain a foreign tax identification number (TIN) for an account held by a tax resident of a jurisdiction that appears on the IRS No TINs list.
Currently, the list of jurisdictions fits into one of two categories:
- Jurisdictions that do not issue foreign TINs
- Jurisdictions with laws that restrict the collection or disclosure of foreign TINs of their residents and that request the U.S. competent authority to be exempt from the foreign TIN requirement.
Publication 4557
Publication 4557 provides guidance and best practices for tax preparers regarding safeguarding taxpayer data. Businesses should:
- Data Protection: Implement measures to protect taxpayer data from unauthorized access, use, and disclosure.
- Breach Response: Establish a breach response plan to address and mitigate taxpayer information data breaches.
Best Practices for Offshore Staff
So, what could implementing these IRS stipulations look like? These are some of the most important policies and guidelines for ensuring that overseas operations and employees remain compliant with regulations, including IRS 5293 and Gramm-Leach-Bliley compliance.
Administrative and Legal Measures
The first critical step in remote access security planning is ensuring that your offshoring practices are legally sound and that all parties are aware of their responsibilities.
- Clauses in Engagements for Offshore Labor: When drafting engagement contracts, it is essential to include provisions that explicitly allow the use of offshore labor. These clauses should outline the scope of work, security expectations, and compliance requirements to ensure the firm's and its clients' transparency and legal protection.
- Employee Contracts with Confidentiality Clauses: All onshore or offshore employees must sign contracts that include strict confidentiality clauses. These clauses should detail how sensitive information is handled, prohibit unauthorized disclosures, and outline the legal consequences of breaches.
Use of Firm-Owned Equipment
Providing and controlling the hardware used by remote employees is crucial for maintaining data security.
- Supply of Computers, Tablets, and Phones: The firm should supply all necessary equipment, including computers, tablets, and phones, to remote employees. This ensures that security configurations and software updates can be managed centrally.
- Restricted Use of Equipment: The provided equipment should be used exclusively by remote employees for work-related purposes. No other users should have access to this equipment, minimizing the risk of unauthorized access or data breaches.
- Optional Home Network Segmentation: The firm may provide firewalls and switches to segment their home network for employees working from home. This setup helps protect firm data by creating a dedicated, secure network environment separate from personal internet usage.
Setup of Remote Access Environments
Creating a secure remote access environment is essential for protecting sensitive data when accessed from overseas locations.
- International Security Group: Establish an international security group within your remote access infrastructure. This group should have specific security policies and monitoring mechanisms tailored to the unique risks of international access.
- Separate Virtual Machines (VMs) for International Use: Separate VMs are used for international employees. This segregation helps protect sensitive information by isolating international access from the rest of your network, reducing the risk of cross-contamination.
Application Setup – Flags and Restrictions
Configuring applications to recognize and enforce security policies for international users is key to maintaining compliance and security.
- Document Management System Segmentation: Implement flags within your document management system to segment access based on user location and role. This ensures that sensitive documents are only accessible to authorized users.
- Password Protection for Tax Systems: Require robust password protection for access to tax systems. This measure helps prevent unauthorized access to sensitive financial information.
- Filtering in Practice Management System: Use flags to filter access within your practice management system. This ensures that international users only access the data they can view and work with.
- International Licensing as Needed: Ensure that all software and applications used by international staff are appropriately licensed for use in their respective countries. This helps avoid legal issues and ensures compliance with local regulations.
IT Security Items
Implementing robust IT security measures is fundamental to protecting your firm's data from cyber threats.
- Firewalls: Deploy firewalls to protect your network from unauthorized access and cyber attacks. Ensure firewalls are configured to monitor and control incoming and outgoing network traffic based on predetermined security rules.
- Anti-Virus Software: Install anti-virus software on all firm-owned devices to detect and remove malicious software. Update the software regularly to protect against the latest threats.
- Anti-Malware Protection: Use anti-malware tools to identify and prevent malware infections. This additional layer of security helps safeguard against sophisticated cyber threats.
- Endpoint Protection: Implement endpoint protection solutions to secure all devices connected to your network. This comprehensive approach includes anti-virus, anti-malware, and firewall protections, ensuring that all endpoints are secure.
Access Controls
Strong access controls are essential to ensure that only authorized users can access sensitive data.
- Multifactor Authentication (MFA): Use MFA solutions such as DUO or Microsoft Authenticator to verify the identity of users accessing your systems. MFA adds an extra layer of security by requiring users to provide multiple forms of identification.
- Password Management: Implement password management solutions like Bitwarden, Keeper Password Manager, or LastPass Enterprise/Teams. These tools help users create and store strong, unique passwords for all their accounts, reducing the risk of password-related breaches.
- Data Loss Prevention (DLP): Adopt comprehensive DLP policies to prevent unauthorized access to and sharing of sensitive data. Enable DLP features in Microsoft 365 or other platforms to monitor and control data flows, preventing accidental or malicious data leaks.
Remote access security planning is a multifaceted process that requires careful attention to legal, physical, and technical aspects. By following this comprehensive checklist, CPA firms can effectively manage their IT and data security compliance while offshoring staff.
To ensure compliance when offshoring, Cetrom has tools like Cetrom Connect for unified security across all your networks, with EDR & MDR capabilities to protect locally managed devices for a complete security solution. Whether your team works in the office, at home office, or remotely overseas, our secure and compliant IT hosting solution drives accurate business continuity and peace of mind to help them sleep at night.
We can also help facilitate the requirements outlined in this checklist, whether that be separating databases, securing file and SQL servers, or other measures. If your firm is looking for offshore tax preparers or already does and you need assistance with these remote access security actions, please contact Cetrom to discuss your offshore security needs.
Why CPA Firms Need Secure IT Support for AI Tools
One of the things we appreciate wholeheartedly about working with Cetrom is how great the people in the service area are and the high-level of responsiveness we have received. I’ve been very pleased..
- Mid-sized
Cetrom’s services and support really stood out against the other cloud vendors. We thought their Citrix delivery platform would have a higher level of adoption because our employees would have the..
- Mid-sized
Our accounting services users working in the field have greatly benefited from our migration to the cloud. They’re now able to be much more efficient while working in a client’s office because they..
- Mid-sized
The decision to migrate to the cloud was one of the best business decisions Rub & Brillhart has made. It required an investment, but we have determined that our year two IT costs will be reduced by..
- Midwest
Our migration process with Cetrom was very smooth and we had an excellent experience with their support during the demo process. We have 24/7 monitoring on our onsite equipment and they have the..
- Small
We are extremely happy with the service and support we receive from Cetrom. Our staff is more efficient overall in our day-to-day activities and we don’t have any downtime. It’s a good feeling..
- Mid-sized
Cetrom is an extremely cost-effective option for IT services. Not only do we receive significantly improved customer service, but we were also able to add a new VoIP system, better internet service,..
- Mid-sized
Because we use specialized software for CPAs, we were concerned about the migration process. Cetrom’s CEO reassured us that there’s no concern because they understand how the software operates in the..
- Mid-sized
We use two programs that often posed a challenge for our previous IT providers. Cetrom handled the situation professionally, coordinated with the software vendors, did all the backend testing, and..
- Mid-sized
After interviewing and reviewing the proposals from various IT providers, it was really a night and day comparison about price, service, and performance—Cetrom was just outshining the others on every..
- Mid-sized
I just want to drop you a line and let you know how pleased we are with our move to Cetrom. Your people knocked it out of the park for us and are doing a great job getting us up and working. On our..
- Small-sized
Because we use specialized software for CPAs, we were concerned about the migration process. Cetrom’s CEO reassured us that there’s no concern because they understand how the software operates in the..
- 97%
Cetrom’s Cloud Computing offers a high-quality, reliable and secure alternative to traditional IT management and provides immediate access to all my IT resources whether I’m in the office, at home or..
- High-quality,
blog Archives
- April 2019 (12)
- May 2012 (6)
- October 2012 (6)
- March 2012 (5)
- August 2012 (5)
- November 2012 (5)
- May 2013 (5)
- August 2013 (5)
- October 2013 (5)
- February 2020 (5)
- February 2012 (4)
- April 2012 (4)
- June 2012 (4)
- January 2013 (4)
- February 2013 (4)
- March 2013 (4)
- June 2013 (4)
- July 2013 (4)
- September 2013 (4)
- September 2022 (4)
- August 2023 (4)
- March 2024 (4)
- July 2012 (3)
- September 2012 (3)
- December 2012 (3)
- April 2013 (3)
- November 2013 (3)
- December 2013 (3)
- October 2017 (3)
- January 2018 (3)
- July 2018 (3)
- March 2020 (3)
- May 2020 (3)
- June 2020 (3)
- July 2020 (3)
- February 2021 (3)
- June 2021 (3)
- December 2022 (3)
- July 2024 (3)
- April 2025 (3)
- November 2011 (2)
- January 2012 (2)
- January 2014 (2)
- March 2015 (2)
- September 2016 (2)
- October 2016 (2)
- November 2016 (2)
- January 2017 (2)
- March 2017 (2)
- April 2017 (2)
- June 2017 (2)
- August 2017 (2)
- September 2017 (2)
- February 2018 (2)
- May 2018 (2)
- October 2018 (2)
- September 2019 (2)
- October 2019 (2)
- September 2020 (2)
- November 2020 (2)
- December 2020 (2)
- March 2021 (2)
- April 2021 (2)
- August 2021 (2)
- September 2021 (2)
- October 2021 (2)
- November 2021 (2)
- December 2021 (2)
- January 2022 (2)
- February 2022 (2)
- March 2022 (2)
- April 2022 (2)
- June 2022 (2)
- October 2022 (2)
- January 2023 (2)
- February 2023 (2)
- March 2023 (2)
- April 2023 (2)
- June 2023 (2)
- October 2023 (2)
- November 2023 (2)
- December 2023 (2)
- February 2024 (2)
- November 2024 (2)
- December 2024 (2)
- March 2025 (2)
- August 2025 (2)
- September 2011 (1)
- October 2011 (1)
- December 2011 (1)
- March 2014 (1)
- April 2014 (1)
- May 2014 (1)
- June 2014 (1)
- July 2014 (1)
- September 2014 (1)
- November 2014 (1)
- May 2015 (1)
- June 2015 (1)
- July 2015 (1)
- August 2015 (1)
- September 2015 (1)
- November 2015 (1)
- December 2015 (1)
- March 2016 (1)
- April 2016 (1)
- May 2016 (1)
- June 2016 (1)
- July 2016 (1)
- August 2016 (1)
- December 2016 (1)
- February 2017 (1)
- May 2017 (1)
- November 2017 (1)
- December 2017 (1)
- March 2018 (1)
- April 2018 (1)
- August 2018 (1)
- December 2018 (1)
- March 2019 (1)
- July 2019 (1)
- August 2019 (1)
- November 2019 (1)
- December 2019 (1)
- January 2020 (1)
- April 2020 (1)
- August 2020 (1)
- October 2020 (1)
- January 2021 (1)
- May 2021 (1)
- July 2021 (1)
- May 2022 (1)
- August 2022 (1)
- November 2022 (1)
- May 2023 (1)
- July 2023 (1)
- September 2023 (1)
- January 2024 (1)
- April 2024 (1)
- May 2024 (1)
- June 2024 (1)
- August 2024 (1)
- September 2024 (1)
- October 2024 (1)
- January 2025 (1)
- February 2025 (1)
- May 2025 (1)
- July 2025 (1)
- September 2025 (1)
Why CPA Firms Need Secure IT Support for AI Tools
Cetrom Support fixed all of my problems, their engineers are very professional, courteous, friendly and very efficient. If all customer service out there was like...
- Mid-sized
Blog Archives
- April 2019 (12)
- May 2012 (6)
- October 2012 (6)
- March 2012 (5)
- August 2012 (5)
- November 2012 (5)
- May 2013 (5)
- August 2013 (5)
- October 2013 (5)
- February 2020 (5)
- February 2012 (4)
- April 2012 (4)
- June 2012 (4)
- January 2013 (4)
- February 2013 (4)
- March 2013 (4)
- June 2013 (4)
- July 2013 (4)
- September 2013 (4)
- September 2022 (4)
- August 2023 (4)
- March 2024 (4)
- July 2012 (3)
- September 2012 (3)
- December 2012 (3)
- April 2013 (3)
- November 2013 (3)
- December 2013 (3)
- October 2017 (3)
- January 2018 (3)
- July 2018 (3)
- March 2020 (3)
- May 2020 (3)
- June 2020 (3)
- July 2020 (3)
- February 2021 (3)
- June 2021 (3)
- December 2022 (3)
- July 2024 (3)
- April 2025 (3)
- November 2011 (2)
- January 2012 (2)
- January 2014 (2)
- March 2015 (2)
- September 2016 (2)
- October 2016 (2)
- November 2016 (2)
- January 2017 (2)
- March 2017 (2)
- April 2017 (2)
- June 2017 (2)
- August 2017 (2)
- September 2017 (2)
- February 2018 (2)
- May 2018 (2)
- October 2018 (2)
- September 2019 (2)
- October 2019 (2)
- September 2020 (2)
- November 2020 (2)
- December 2020 (2)
- March 2021 (2)
- April 2021 (2)
- August 2021 (2)
- September 2021 (2)
- October 2021 (2)
- November 2021 (2)
- December 2021 (2)
- January 2022 (2)
- February 2022 (2)
- March 2022 (2)
- April 2022 (2)
- June 2022 (2)
- October 2022 (2)
- January 2023 (2)
- February 2023 (2)
- March 2023 (2)
- April 2023 (2)
- June 2023 (2)
- October 2023 (2)
- November 2023 (2)
- December 2023 (2)
- February 2024 (2)
- November 2024 (2)
- December 2024 (2)
- March 2025 (2)
- August 2025 (2)
- September 2011 (1)
- October 2011 (1)
- December 2011 (1)
- March 2014 (1)
- April 2014 (1)
- May 2014 (1)
- June 2014 (1)
- July 2014 (1)
- September 2014 (1)
- November 2014 (1)
- May 2015 (1)
- June 2015 (1)
- July 2015 (1)
- August 2015 (1)
- September 2015 (1)
- November 2015 (1)
- December 2015 (1)
- March 2016 (1)
- April 2016 (1)
- May 2016 (1)
- June 2016 (1)
- July 2016 (1)
- August 2016 (1)
- December 2016 (1)
- February 2017 (1)
- May 2017 (1)
- November 2017 (1)
- December 2017 (1)
- March 2018 (1)
- April 2018 (1)
- August 2018 (1)
- December 2018 (1)
- March 2019 (1)
- July 2019 (1)
- August 2019 (1)
- November 2019 (1)
- December 2019 (1)
- January 2020 (1)
- April 2020 (1)
- August 2020 (1)
- October 2020 (1)
- January 2021 (1)
- May 2021 (1)
- July 2021 (1)
- May 2022 (1)
- August 2022 (1)
- November 2022 (1)
- May 2023 (1)
- July 2023 (1)
- September 2023 (1)
- January 2024 (1)
- April 2024 (1)
- May 2024 (1)
- June 2024 (1)
- August 2024 (1)
- September 2024 (1)
- October 2024 (1)
- January 2025 (1)
- February 2025 (1)
- May 2025 (1)
- July 2025 (1)
- September 2025 (1)
