Skip to main content

Currently Skimming:

4. Privacy
Pages 53-57

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 53...
... In fact, a previous IRS modernization attempt was thwarted, at least in part, because the IRS was considered not to have addressed privacy and related security issues adequately. Moreover, since privacy directly affects taxpayers, a perceived lack of privacy protection with regard to the IRS could cause a decrease in voluntary compliance by taxpayers.
From page 54...
... In spite of operating at less than full strength during the committee's review cycle, the office has functioned with commendable success in preparing a comprehensive and rational plan for introducing privacy constraints into the IRS information systems development plans and into the IRS's process of information management policy formulation. The PAO is clearly a key to the IRS taking a leadership rote in the protection of citizens' privacy, and it is encouraging that so much progress has been made in a relatively short time.
From page 55...
... Otherwise, the IRS runs the risk of exposing too much data to too many organizations in the long run. About a year ago the IRS did establish a task force, on which congressional staff members serve, for the purpose of reviewing and recommending third-party disclosure 2 Computer Science and Telecommunications Board, National Research Council.
From page 56...
... However, the committee is painfully aware that TSM projects continue to be designed with no detailed security specifications, much less privacy guidance. 4 Computer Science and Telecommunications Board, National Research Council.
From page 57...
... develop means of assessing the current level of security violation; (3) use those same measures, over time, to determine whether violations have increased or decreased; and (4} ensure that every project implements all privacy requirements satisfactorily before the project is allowed to achieve an operational state.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.