Except as otherwise provided for herein, this Software License Agreement supersedes all prior or contemporaneous oral or written communications, proposals, and representations with respect to the Software Program or any other subject matter covered by this Software License Agreement except to the extent such extraneous terms do not conflict with the terms of this Software License Agreement, any other written agreement signed by you and Licensor relating to your use of the Software Program.
To the extent any Licensor policies or programs for support services conflict with the terms of this Software License Agreement, the terms of this Software License Agreement shall control. This product may incorporate intellectual property owned by Microsoft Corporation. This product is based on Microsoft Print Schema technology.
In the event that the firmware update process fails or is interrupted for any reason, try to restart the printer and reattempt the firmware update process. If the firmware update process cannot be re-initiated or fails, please call Lexmark technical support for assistance.
All information is subject to change without notice. Lexmark is not liable for any errors or omissions. This site uses cookies for various purposes including enhancing your experience, analytics, and ads. By continuing to browse this site or by clicking "Accept and close", you agree to our use of cookies.
For more information, read our Cookies page. Accept and close. JavaScript is disabled. Our site requires JavaScript for basic functionality. Please enable JavaScript within your browser to maximize your experience. Home Products Printer. Part : 11C Our system is currently going through routine maintenance and will be available within 12 hours. We apologize for the inconvenience.
The system is experiencing technical problems. Please try again later. Reliability and performance. Flexible paper handling. Easy to use. Long lasting supplies. In the Box. General Specs. Weight lb. Packaged Size in. Packaged Weight lb. Resolution x dots per inch Maximum Print Line " What's the difference between our Return Program supplies?
Return Program supplies. Regular supplies. Other supplies. Browse Return Program supplies Best value. Browse other supplies. Browse regular supplies. Name Part Category Price Quantity. USB Cable 2-meter. Automatic Sheet Feed wide. Tractor 2 wide. Parallel Cable foot. Serial Interface Option. Cut Sheet Output Support Stand. Helpful Links. Need to manage multiple devices? How does it work? Licensor grants you the following rights provided you comply with all terms and conditions of this Software License Agreement: a.
Cancel Start Download. Release Notes:. Customer Service. Order help Send us an email Recycling information Order by phone Chat with a service representative. Issue an interim letter to the requestor notifying them the tax-related identity theft issue has not been resolved. Once the issue is resolved their request will be honored. Review the account for a TC AC and input when applicable. Create a new case for any IDT impacted tax years identified.
In the same case note include the reason why the case can not be resolved, advise that a request for a copy of a fraudulent return has been received and any additional information that may assist with the resolution must be included. Also, see IRM Use Required Letter Scenario Continue with printing and masking return for the requested tax year after all controls are closed that year.
Send the taxpayer an interim letter informing them their tax issue has not yet been resolved - use Required Letter Scenario 1, 9 or 12; See Exhibit Keep the IDT7 base open. Request the case be resolved and closed within 30 days. The masked TDS fraudulent tax return transcript does not require manual masking.
Issue C letter using Required Letter Scenario 7. Issue C letter using Required Letter Scenario Advise the taxpayer that this is an alternative transcript and displays differently than the typical tax return. All fraudulent return information and any related form or schedule must have the following information masked on the copy to the taxpayer or their representative. Use the chart below to determine what information from the fraudulent return s should be masked.
For manual masking follow the criteria in the chart below. If the name is four letters, then mask all except the first three letters of the business name. If the name is three letters, then mask all except the first two letter. If the name is two letters, mask one letter only keep the first letter. Be sure to apply the masking criteria to all information, forms, or schedules accompanying the tax return. Before mailing documents to the requestor who provides a different address on Form F Step 2 6 , insure you have authenticated the requestor and determined if eligible to receive masked copies of fraudulent tax return s transcripts.
Ensure the letter is addressed to the requestor. This will bypass the generation of a POA copy of the letter, this is extremely important to prevent possible notification of the fraudulent return filed. See Exhibit 2. If the request is complete, IDTVA employees will continue with processing the request and attempt to contact the taxpayer to authenticate. An initial acknowledgment letter is not required if your first attempt to contact the taxpayer is successful. Refer to paragraph 10 below.
All actions taken are required to be notated on CIS Case notes. This includes all contact via letter or telephone. CIS must be documented with a Case Note to substantiate the reassignment. Only after your initial attempted telephone contact is unsuccessful and you issued the C acknowledgement letter would you suspend the case for 21 calendar days. This will allow time for the taxpayer to receive the acknowledgement letter.
If the address on the Form does not match to the address of record on Master File MF , issue the Letter C to the mailing address as noted on the Form Review letter for misspelled words, errors in capitalization and punctuation, IRS jargon and fill-in errors prior to sending.
Do not update the address or telephone number on master file to match the address on the Form when rejecting. A request includes the Form having the following boxes completed:. If any of the boxes are blank or missing information, use the IAT tools such as aMend or Name Search to try an obtain the missing information. If you located enough information using the available tools to contact the taxpayer, you can obtain the additional information needed during your authentication process.
Verify the address provided on Form matches the address of record on MasterFile. If you can verify the change of address using oral statement, update the address and leave a CIS case note. Confirm the name, address, and telephone number of the facility listed on the Form If you are not skilled determine if simple adjustment criteria can be used to resolve the case; See IRM If a referral is required, you will follow the chart below to monitor and suspend the assigned IDTX case through resolution and closing including subsequent posting of adjustment action of the related identity theft case control s.
Provide any recommendation for resolution in your communications. Request notification of tax-related case resolution. Provide the taxpayer with a status update using the Letter C every 40 days. Status updates, requesting additional information, or notification of authentication attempts are considered part of this requirement. If yes, follow steps in paragraph 6 above to reject the case. If no, continue processing Form following procedures in paragraph 10 below. Utilize the create case option in CIS to create a new case.
Check the case for potential statute issues. If you determine the Form is complete see paragraph 8 above , you must call the phone number provided on the form to authenticate the requestor within 30 days from the date of assignment. If the first attempt to contact the taxpayer is unsuccessful could not reach or taxpayer is hesitant to provide information , then an initial acknowledgement letter is required.
Two contact attempts, three weeks apart 15 business days , must be made to reach requestor to complete the required authentication. Conduct all outbound calls between the hours of 8 a. If you receive a Form from an incarcerated taxpayer, attempt to contact them at the telephone number provided.
CIS must be documented with each call attempt; see paragraph 3 above. The date and time of the attempt, as well as the phone number you called and if a voice message was left. If the taxpayer answers, follow the guidance in paragraph 11 below for authenticating the taxpayer.
If the taxpayer you would like to speak with is unavailable, follow the guidance in paragraph 14 below when leaving a message. If your first attempt to reach the taxpayer is unsuccessful, send the initial acknowledgement letter.
Make a second attempt three weeks apart 15 business days after your initial call. Detailed CIS Case Notes must be entered with each attempt documenting the call, who you spoke with and the date and time of the attempt.
Confirm they submitted the Form for themselves or as the parent or legal guardian of a minor dependent and ask if they submitted any additional request using the Form Refer to Publication 17, Your Federal Income Tax For Individuals , Part One, Chapter Three, Dependents, for a situation were a taxpayer may be eligible to authenticate on behalf of their dependent qualifying child or relative regardless of age.
If the taxpayer states they filed applications for other dependents, ask for the TIN of the other dependent s. Reassign the cases in CIS to your profile number and link all cases. Explain to the taxpayer authentication is required and you will be authenticating them to ensure they are the correct person to whom the information belongs. Then request the taxpayer verify the first five digits.
If the taxpayer feels uncertain or questions your identity as an IRS employee advise the taxpayer, they may contact the IRS Identity Theft toll-free number at An IRS assistor will provide confirmation their Form was received and provide the telephone number and extension, using the IDTVA Employee Lookup tool, where they can reach you back to begin the authentication process.
Advise the taxpayer they will also receive a C letter confirming their Form was received and you will be contacting them within days to authenticate their identity. Update CIS case notes accordingly. If the Form was completed for a dependent child or qualifying relative over the age of 18, you must disclose the individual whose name and TIN appears on the form unless they meet the exception above.
If the taxpayer passes the initial authentication questions, then proceed with the IP PIN authentication process using the Accurint database. Use January 1st of the current year for the Secondary Date to signify the processing year. See IRM Exhibit A Form signed by a parent or legal guardian, as confirmed through internal research, on behalf of their minor dependent never requires documentary evidence such as court order or legal documentation.
If no, establish entity and suspend the case for 14 days and monitor for account posting. Once authentication is completed successfully and all criteria has been met, verbally advise the taxpayer of the following information:. Explain an indicator will be placed on their account and they will receive a letter indicating they were approved for an IP PIN. Once the indicator is placed, they will receive a Notice CP01A the following year to use when filing their tax return.
Advise the taxpayer they will be sent a new IP PIN every year prior to the start of the next tax season indefinitely. If they change their address prior to the next filing season, they must complete Form , Change of Address which is available by visiting www. Explain that if the IP PIN is input incorrectly or not at all, the electronic tax return will be rejected, and the taxpayer will be required to file their tax return by paper. Explain to the taxpayer if they opt to file a paper tax return, they will need to enter their IP PIN on the front page of their tax return.
Remind the taxpayer that if they fail to include their IP PIN on the paper tax return, it will be subject to additional review and will delay the processing of their return including any refund that may be due them. Advise that after they receive the IP PIN it will be valid for all returns filed in that calendar year; even prior year returns being filed that year.
Advise the taxpayer they will receive a closing letter reinforcing all the information just verbally provided within 30 days from this call. If while speaking to the taxpayer or the taxpayer calls in reference to an acknowledgment letter that was sent and they state they did not submit the Form , explained we received an Application for an Identity Protection Personal Identification Number IP PIN.
Advise the taxpayer we will place an identity theft indicator on their account. If we become aware of any fraudulent activity related to their tax account, we will contact them to advise of any actions that may be required by them. If the taxpayer meets the criteria for Form and would like to receive an IP PIN every year, explain to the taxpayer they will need to submit their own Form Input required case notes and enter the Required Letter Scenario number used for the C letter.
Close the case. The name of the person who should return your call If contacting an incarcerated taxpayer also provide their prisoner identification number if provided on form. If you are leaving a message for a taxpayer on a correctional facility voice mail provide your name, your IDTVA toll-free callback number with your extension, and the best time to reach you during your tour of duty.
If your second telephone attempt to authenticate the taxpayer is unsuccessful, correspond with the taxpayer using the Letter C to request that they contact you within 30 days of the date of the notice and suspend the case for 40 days. Do not update the address or telephone number on master file to match the address on the Form Hours of operation — the employee that is issuing the letter will input their TOD as the hours of operation.
If the taxpayer requests an appointment at the TAC, provide the taxpayer with the toll-free number Advise the taxpayer if they chose this option, a valid, unexpired, government issued photo identification ID such as a U. In addition, they must present two forms of identification to authenticate their identity to receive an IP PIN. If no response is received from the taxpayer at the end of the 40 days suspense period, the case will be closed.
The letter must include the following:. If the IDTVA employee receives a response from the taxpayer within 12 months of the issuance of the C closing letter either as a correspondence or a Form , you will research the account to determine if the taxpayer meets the requirements for filing Form If you determine you have all the necessary information to contact the taxpayer to authenticate, continue processing the claim following the steps in paragraph 2 above.
If an IDTVA employee receives a call back from the taxpayer within 12 months of the issuance of the C closing letter, follow the basic required authentication procedures using the IAT Disclosure tool.
This will allow the employee to perform additional high-risk authenticate and prevent unauthorized disclosure of taxpayer information, refer to IRM After authenticating the taxpayer, research the account to determine if they meet the requirements for filing Form and provided all the required documentation.
If you determine through research you can process the request, then continue with the IP PIN authentication process in 11 above using Accurint database.
If you determine the taxpayer was ineligible, apologize to the taxpayer and explain why you are unable to process their request.
If an IDTVA employee receives a call back from the taxpayer as a result of receiving a C acknowledgment letter and states they did not file the Form , authenticate the taxpayer using high risk disclosure procedures, then follow the instructions in 13 above.
Once access is approved, you will be assigned an Accurint user name and password. Accurint will be used to complete required additional authentication on taxpayers that have applied for an IP PIN using the Form When logging into Accurint, you will need to go through some preliminary checks to ensure you are authorized to obtain access.
Click on the following statements as they appear:. A Comprehensive report will be needed to obtain the specific data points that will be used for the additional authentication. Please click here for the text description of the image. There is no need to save this report. Once the required checkboxes have been checked. Refer to IRM 2. A dependent is either a qualifying child or a qualifying relative.
For the chart below a minor is defined as an individual under the age of If the taxpayer answers, once authentication is complete, inquire if they are able to provide proof they can act on behalf of the dependent custodial parent. If they are able to provide a copy of legal documentation, request the documentation be faxed to you.
Once received continue processing the application using procedures in IRM If when attempting to make contact the taxpayer filing on behalf of the dependent claims they have legal authority to act on behalf of the dependent, inquire if they are able to provide proof they can act on behalf of the dependent.
If they are unable to provide or do not have the documentation that they can act on behalf of the dependent, Reject the Form application - Follow guidance in IRM Use the chart below to identify the required letter scenario for use with the Letter C, Request for Copy of Fraudulent Returns:. Only use selective paragraph "5" if there are no other appropriate selective paragraphs available. If you must use selective paragraph "5" , enter the reason why selected paragraph was used for the C on the CIS case as a case note.
When using selective paragraph "e" include your name and your assigned six-digit extension and your tour of duty as the hours of operation. Use selective paragraph "c" if a detailed explanation of the rejection to the taxpayer is needed. When using selective paragraph "N" or "Y" include your name and your assigned six-digit extension and your tour of duty as the hours of operation.
Y signifies the year digit Refer to IRM Use the following for selective paragraphs "K" and "V" when using Required Letter Scenarios 17 or 18 above. Use the following for selective paragraphs "K" and "V" when using Required Letter Scenarios 19 or 20 above. Home IRM Part25 Part Special Topics Chapter Identity Protection and Victim Assistance Section 3.
Program Scope and Objectives. Note: The IRS does not tolerate discriminatory treatment of taxpayers by its employees in any programs or activities supported by the Service. Refer to the table below for a list of acronyms used throughout this IRM.
Resources specific to IDTVA are: Note: The list of resources provided in the table below is not all inclusive as new resources are created and become available frequently. Resource Description 1.
Note: IRM Identity Theft Paper Overview. Exception: 1. Note: On a single Form listing both primary and secondary TINs from a joint entity, the acknowledgment letter can be addressed to both the primary and secondary names under the primary TIN. Caution: If leaving a voice message, follow IRM Date of call, Telephone number called, With whom the employee spoke, Summary of the discussion, or Summary of the voice message provided including the date and time of when a voice message was left returning the call.
Simple Adjustments. Example: Releasing certain freeze conditions or transferring a credit to a correct tax year or account is an example of a "simple adjustment.
This list is not all inclusive. Reminder: Before any freeze is released, research must be completed following appropriate IRM guidance. Freeze Release IRM Adjustment guidelines IRM Credit Transfers IRM Note: If the TP is reporting a stolen or lost refund check including Economic Impact Payments ex: stolen from a mailbox, mailed to an old or incorrect address, stolen from wallet or house etc.
Reminder: Input required case and history notes including if you met one of the Exceptions in IRM If research reveals Then 1. Continue processing Form using the procedures in 6 below.
Acknowledge receipt of Form Note: See IRM Note: If you identify contact information for the taxpayer on Form and only if the address on the Form matches the address of record, add or update the phone number s on IDRS. This issue has no impact on your tax account at this time. If Then 1. Exception: If other issues need to be addressed per IRM Caution: Do not update the address or telephone on master file to match the address on Form Note: Use the mailing address as noted on Form Selective Paragraph Fill-in Number Narrative for Open Paragraph B 01 "We received your claim of identity theft and placed an identity theft indicator on your account to record the incident.
CP 01, Identity Theft Claim Acknowledgement Used to acknowledge receipt of Form substantiating a claim of identity theft and to notify taxpayers of the action taken by the Service with regard to their tax records.
The taxpayer's issue cannot be resolved using Tax-related skills or Simple Adjustments, the case should be routed to another function to resolve the tax-related issue , Note: Transferring the case to the appropriate function as expeditiously as possible will help to alleviate delays in the resolution of the tax-related identity theft issue.
Refer the case to the appropriate function. Note: Ensure any additional information received with the IDT5 is attached to the referral. Note: When the taxpayer provides additional information a case note must be left to communicate with the CSR assigned the ITAR to ensure they are made aware of this additional information. Global Review - Research Process. Global Review - Action Required. Perform preliminary research and take appropriate action using the chart below: If Then 1.
Any related balance due modules are in status 60, The taxpayer has entered into an agreement of the balance due, and is working to pay off the balance. Follow steps in "Then" box above. Exception: If the only issue identified during the global review is a simple adjustment, see IRM Exception: Cases in Background "B" status may remain. Note: If the function s did NOT address all issues previously identified, contact the function for an explanation as to why the issue was not addressed.
Systemic Burden 5 The taxpayer has experienced a delay of more than 30 days to resolve a tax account problem. Example: days is the normal processing time for a loose Form , Identity Theft Affidavit , when the taxpayer is claiming to be a victim of identity theft. Example: The taxpayer was promised a contact within 30 days and taxpayer was never contacted. If the referral on Form Then 1. Exception: If the taxpayer is experiencing an economic hardship, forward to TAS on an e immediately. Reminder: Follow the established guidelines in IRM Adopt a conversational businesslike tone.
Structure your e-mail so that it includes a greeting, a purpose, and expectations. Check your spelling. Review and revise your file before sending it to the IDT Liaison.
Include a definitive Subject line. Note: Do not include PII on the subject line of the e-mail, as the subject line is not encrypted.
Each suspense period. If the tax-related issue has an open control Then 1. Close the ITAR case. Do not forward the Form to TAS. Continue with monitoring process below. Identify the function that would normally work to resolve the tax-related issue. Convert the Form to an Adobe file. If the tax-related issue does not have an open control Then 1. Convert the Form to an adobe file.
Use the activity codes provided in the chart below to reflect the following: The reason for suspending the case The suspense period - MMDD the date the case would come out of suspense , when applicable.
Note: If the taxpayer is requesting a copy of their state return, refer to the State Income Tax Contact Information for the appropriate state agency number. If a Form F, a written request or telephone request for copy of fraudulent tax return is received by Then 1. Preliminary Review - Overview.
There are five 5 steps to conduct preliminary review: Step Action 1 Verify request is for fraudulent return s 2 Check for completeness 3 Acknowledge receipt 4 Determine if the IRS can disclose the fraudulent return s 5 Authenticate the Requestor.
Verify the request is for a copy of a fraudulent return s of an individual. Close the RFRR once all actions are complete. Note: Authentication, including additional authentication, using the IAT Disclosure Tool is required on all phone calls.
If the taxpayer whose name and social security number was used to file a fraudulent tax return is making the request, the Form F, Request for Copy of Fraudulent Tax Return , or letter must contain the following information: 1.
If the person is making a request for information of someone else, the Form F, Request for Copy of Fraudulent Tax Return , or letter must contain the following information: 1. The requestor can provide a CAF number instead of a taxpayer identification number. If Form is attached with a CAF number, or CAF number is provided in written request, consider the requirement that requestor provide a taxpayer identification number met.
Reminder: While reviewing Form F to check for completeness, you identify contact information for the claimant is provided and it is determined to be the valid TIN owner, add or update the phone number s on IDRS. If the request is Then 1. Incomplete Identify the missing required items. Close the RFRR case. Note: The IRS will acknowledge requests within 30 days of receipt and within 90 days the IRS must mail the requestor either the copy of the fraudulent return or follow-up correspondence explaining the delay with an additional day time frame.
Note: A person whose name and SSN is used only as a dependent on a fraudulent filed return is not entitled to a copy of that return. If the requestor is Then 1. The research conducted will include the following: Compare addresses on the tax returns filed to what the requestor provides Compare name s on the tax returns filed and on IDRS to what the requestor provides Compare return information to what the requestor provides CAF System. If the Requestor Then 1.
Authenticated Continue with research for identifying the fraudulent return s. Did not authenticate Reject the request. Research - Overview. Utilize the following systems for research purposes. The taxpayer has no filing requirement, The taxpayer has not yet filed their return for the tax year in question, or The taxpayer may be listed as the secondary filer on a married, filing joint return and the fraudulent return lists the taxpayer as the primary filer meaning the fraudulent return only shows on the secondary filer account Note: This list is not all inclusive.
Compare income on return to IRP data. Note: The preferred method of providing a masked fraudulent return s is from TDS when available. The request was received directly from the taxpayer Conduct the following research to identify the DLN of the fraudulent returns: CC TRDBV - Used to view fraudulent return year requested Check tax year for return - most times there will be two returns filed for that tax year.
Check for MFT 32 tax year, fraudulent return may have been moved to MFT 32 - Caution - not every return on MFT 32 may be fraudulent, sometimes a good return is moved there in error MFT 32 - print fraudulent return TC MFT 30 - print fraudulent return Check for TC on MFT 30 tax year - this would be an indicator that two returns posted to the tax account - generally the first return is the fraudulent return but not always TC Check for any TC 29Xs as this may be an indicator that the account was adjusted due to a fraudulent return Always check AMS history and documents, often you can identify the fraudulent return from history notes and many times the good return will be in documents.
Note: An unresolved issue can be a missing identity theft indicator, identity theft closing letter or credit elect not addressed, etc.
Note: If the request involves more than one tax year, the CSR will provide copies of masked returns for tax years that do not involve an open or unresolved tax-related identity theft issue to the requestor with a letter. Reminder: Be sure to link any open and closed CIS cases, and double-check to ensure all requested fraudulent returns are included. IDTVA will be monitoring the account through resolution.
If a fraudulent return is Then 1. Then follow procedures in IRM Paper return was filed and TDS is not available. Note: Advise the taxpayer that this is an alternative transcript and displays differently than the typical tax return. Manual Masking. Note: If Adobe software is not available, then a manual sanitized redaction is required. Return Information Masking Criteria 1.
Note: If the name is four letters, then mask all except the first three letters of the business name. XXX-XX Follow the steps provided by the installation wizard. If you get a message that the device does not answer for set IP, please make sure that the PC running IPSU is on the same subnet as the wireless device. Buy or Renew. Find A Community. Cisco Community. Thank you for your support!
We're happy to announce that we met our goal for the Community Helping Community campaign! Turn on suggestions. Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. Showing results for. Search instead for. Did you mean:. All Community This category This board.
How to install IP Setup Utility.
0コメント