What IRS §7216, AICPA Code, and FTC Expect When You Outsource
| Category | IRS 7216 | AICPA | FTC | ||
|---|---|---|---|---|---|
| 1040 | Non-1040 | IRS 7216 | IRS 7216 | ||
|
Disclosure & Consent |
|||||
|
Written Consent
|
|||||
|
Both the AICPA and the IRS mandate that written consent must be obtained from the client when outsourcing services. In addition to this core requirement, there are several specific and often overlooked rules regarding how the written consent must be presented and obtained. These include stipulations about formatting—such as minimum font size and paper size—to ensure the document is easily readable. The consent must be presented in a way that allows the client to review it thoroughly, page by page if it’s in print, or by scrolling if it’s provided electronically. Furthermore, when consent is obtained electronically, the client must manually type in their name; it cannot be pre-filled. They must also actively check a box to indicate their agreement. These technical compliance requirements, while seemingly trivial, are essential and must be studied and implemented carefully to avoid regulatory issues.
|
|||||
|
Purpose of the Consent
|
|||||
|
Both the AICPA and IRS require CPAs and accounting firms to obtain affirmative, explicit, and specific consent from clients when outsourcing any part of their services. This means that passive or implied consent—such as assuming agreement if the client does not respond within a certain period (e.g., “if we don’t hear from you in 15 days, we’ll assume your consent”)—is not acceptable. Instead, consent must be actively given by the client. The engagement letter must clearly disclose the purpose of the consent and explain how and why client information will be shared with a third-party service provider. This includes detailing:
In summary, consent must be informed and documented, with full transparency around the who, what, and why of third-party involvement, in accordance with both AICPA standards and IRS regulations. |
|||||
|
Prior Consent
|
|||||
|
Both the IRS and AICPA require CPAs and accounting firms to obtain prior written consent from clients before outsourcing any work to a third-party service provider. This means that client information cannot be shared with the outsourcing vendor until the client has been informed and has explicitly agreed to the arrangement. The consent must be secured in advance and should clearly outline what information will be shared, with whom, and for what purpose. This ensures transparency, protects client confidentiality, and aligns with both regulatory bodies’ ethical and legal standards.
|
|||||
|
Affirmative & Specific Consent
|
|||||
|
Both IRS regulations and AICPA standards stats that all consents must require the taxpayer’s affirmative consent to a tax return preparer’s disclosure or use of tax return information. A consent that requires the taxpayer to remove or deselect disclosures or uses that the taxpayer does not wish to be made (i.e., an “opt-out” consent) is not permitted.
|
|||||
|
Disclosure of the Name of Company Located Outside the U.S.
|
|||||
|
The IRS requires that the name of the third-party outsourcing service provider be explicitly identified in the written consent obtained from the client, typically as part of the engagement letter. This ensures that the client is fully informed about who will have access to their confidential tax information. In contrast, the AICPA does not mandate naming the specific third-party provider in the engagement letter. While the AICPA does require that the client be informed about the use of third-party service providers and that consent be obtained, it allows for more flexibility in how this information is disclosed.
|
|||||
|
Signature and Date
|
|||||
|
All client consents related to outsourcing must be signed by the firm, specifically requested by the client, and appropriately dated. This ensures a clear record of the client’s authorization and the firm’s acknowledgment, aligning with both IRS and AICPA requirements for maintaining compliance and documenting informed consent prior to sharing any confidential information with third-party service providers.
|
|||||
|
Form & Content as Prescribed (As per 7216)
|
|||||
|
The IRS requires that for 1040 clients, a separate engagement letter must be obtained specifically for outsourcing, and this letter must include content as specified under IRS Section 7216 regulations. However, for other types of engagements (such as business returns or advisory work), the required outsourcing language may be incorporated directly into the existing engagement letter, provided it fully complies with the consent and disclosure requirements set forth by the IRS and AICPA.
|
|||||
|
Separate Engagement Letter
|
|||||
|
In the case of outsourcing individual tax returns (Form 1040), a separate engagement letter is required to comply with IRS regulations. For other types of engagements, however, a separate engagement letter is not necessary. Instead, the consent requirements related to outsourcing can be incorporated directly within the primary engagement letter, ensuring that the client is informed and that proper consent is documented without the need for a separate document.
|
|||||
|
Validity of Consent
|
|||||
|
Under IRS regulations, practitioners are required to specify the duration of consent for outsourcing when obtaining client authorization. However, the IRS does not prescribe a specific duration. In the absence of a stated duration, the consent is assumed to be valid for one year. In contrast, the AICPA Code of Conduct does not mandate a specific validity period for engagement letters. Instead, it suggests that the engagement remains valid until it is replaced or terminated. Nevertheless, the AICPA recommends that practitioners review and update the engagement letter with clients on an annual basis to ensure continued relevance and clarity.
|
|||||
|
Due Diligence |
|||||
|
Written Contract with Outsourcing Company
|
|||||
|
AICPA, IRS, and FTC all mandate that accounting firms must have a written agreement in place with any outsourcing service provider they engage. This agreement must explicitly confirm that the outsourcing provider will comply with all applicable data privacy, confidentiality, and security requirements outlined under each regulatory body’s framework. Specifically:
These agreements should clearly outline the scope of work, responsibilities, data handling procedures, security measures, and breach notification protocols, and should be reviewed and updated periodically to ensure continued compliance. |
|||||
|
Adequately Supervise/Oversee Oursourcing Company
|
|||||
|
The AICPA, IRS, and FTC require that CPA and accounting firms adequately supervise and oversee any outsourcing company and the work performed by them. This obligation is not limited to just having a written agreement in place, but extends to active and ongoing monitoring of the outsourced activities to ensure that:
Specifically:
In essence, outsourcing does not relieve the CPA firm of its professional responsibilities—the firm remains ultimately accountable for the quality, compliance, and security of all outsourced work. |
|||||
|
Periodic Assessment of Safegaurds
|
|||||
|
The AICPA, IRS, and FTC all require periodic reassessment of both the competency of the outsourcing service providers and the safeguards they have in place to protect client data and ensure compliance.
In summary, CPA and accounting firms are not only responsible for initial due diligence before engaging an outsourcing vendor but are also required to periodically reassess the provider’s qualifications and security posture to ensure ongoing compliance with AICPA, IRS, and FTC standards. |
|||||
|
Qualification and Competency Check
|
|||||
|
The AICPA, IRS, and FTC all require that CPA firms and accounting professionals ensure that their outsourcing service providers are competent and qualified to perform the services they are engaged for. While they do not mandate that these providers undergo periodic testing, firms are expected to periodically assess and verify the ongoing competency and qualifications of these providers. This means firms must:
So, while periodic testing is not a mandatory requirement, periodic competency evaluations through supervision, documentation, and performance reviews are a regulatory expectation under AICPA, IRS, and FTC standards. |
|||||
|
Reference Check
|
|||||
|
As part of due diligence, the AICPA recommends that firms request client references from the outsourcing vendor—ideally from firms of similar size and structure. Firms should also review case studies or past project examples that demonstrate the vendor’s capabilities, and directly contact those references to evaluate the vendor’s performance, reliability, and adherence to professional standards.
|
|||||
|
General Information
|
|||||
|
The AICPA requires that firms maintain proper documentation when engaging third-party service providers. This includes noting the name of the offshore outsourcing vendor, their location, years of operation, and the contact person with relevant contact details to ensure transparency, accountability, and ease of reference
|
|||||
|
Legal and Regulatory Compliance
|
|||||
|
The AICPA advises that legal and regulatory compliance should be reviewed in consultation with your CPA firm’s attorney. This includes verifying whether the outsourcing vendor is registered and compliant with local laws, checking for any past or ongoing legal or regulatory issues—especially those involving CPA firms—and confirming if the vendor holds any relevant certifications or accreditations related to the services offered.
|
|||||
|
Financial Stability
|
|||||
|
The AICPA recommends assessing the financial stability of your outsourcing vendor by requesting audited financial statements for the past three years—including the balance sheet, income statement, and cash flow statement. This helps determine whether the vendor is financially sound and capable of meeting obligations, and whether there are any signs of financial distress or irregularities that could pose a risk to your firm.
|
|||||
|
Infrastructure and Technology
|
|||||
|
AICPA suggests evaluating the infrastructure and technology capabilities of your outsourcing vendor, including their hardware, software, data security protocols, encryption standards, and disaster recovery systems. Ensure the vendor is technologically compatible with your systems and adheres to data privacy and consumer protection laws relevant to your firm.
|
|||||
|
Workforce and Expertise
|
|||||
|
AICPA recommends assessing the qualifications and expertise of the outsourcing vendor’s staff, including their education, professional certifications, and domain experience in accounting, tax, or audit. You should also review staff turnover rates, retention policies, and procedures for terminating access for former employees to ensure continuity and data security.
|
|||||
|
Quality Assurance and Processes
|
|||||
|
AICPA advises requesting details on the outsourcing vendor’s quality control processes, including how they ensure accuracy, completeness, and timeliness of deliverables. It’s also important to ask whether the vendor follows any recognized industry certifications or quality assurance frameworks to maintain service standards.
|
|||||
|
Client References and Case Studies
|
|||||
|
AICPA recommends requesting client references from similar-sized firms, reviewing case studies of past projects to assess the vendor’s capabilities, and directly contacting references to understand their experience and satisfaction with the outsourcing vendor.
|
|||||
|
Service Level Agreements (SLAs) and Contractual Terms
|
|||||
|
AICPA recommends reviewing the outsourcing vendor’s SLAs and contract terms carefully—ensuring clarity on scope, deliverables, performance metrics, and dispute resolution. Legal counsel should review jurisdiction, termination clauses, and IP rights, especially for foreign operations.
|
|||||
|
Insurance Coverage
|
|||||
|
AICPA advises confirming that the outsourcing vendor has valid professional liability, cyber, and relevant insurance coverage. Request proof of insurance, verify coverage limits and validity, and ensure your CPA firm’s liability insurer is informed of the outsourcing arrangement.
|
|||||
|
Data Security |
|||||
|
Information Security Program
|
|||||
|
Develop a written, firm-wide information security program that addresses how client and firm data is protected. This should cover physical, administrative, and technical safeguards. The program must be tailored to the size, complexity, and nature of the firm’s operations.
|
|||||
|
Security Assessments and Audits
|
|||||
|
Schedule regular internal and external security audits to evaluate the effectiveness of controls and identify vulnerabilities. Document and act on audit findings to strengthen the security posture.
|
|||||
|
Data Encryption
|
|||||
|
Encrypt sensitive client data during storage and transmission using industry-standard encryption protocols. This helps prevent unauthorized access in the event of a data breach or system compromise.
|
|||||
|
Background Verification of Employees by Outsourcing Company
|
|||||
|
Ensure all offshore or outsourced employees undergo thorough background checks before being assigned to client data or systems. This includes identity verification, employment history, and criminal record screening.
|
|||||
|
Awareness Training
|
|||||
|
Establish a training program that educates employees on security policies, threat awareness, and safe data handling practices. Training should be refreshed regularly and tailored to different roles within the firm.
|
|||||
|
Administrative, Technical, and Physical Safeguards
|
|||||
|
Implement layered safeguards across administrative policies, technical systems, and physical infrastructure. This holistic approach ensures comprehensive protection of sensitive client and firm data.
|
|||||
|
Notification in Case of Breach
|
|||||
|
Establish a formal procedure to notify affected clients and regulators in case of a data breach. Timely notification is critical to maintain trust and meet legal requirements, including IRS and FTC obligations.
|
|||||
|
Risk Assessments & Audit Implementation
|
|||||
|
After risk assessments, promptly implement the recommended security measures. This may include updating firewalls, patching systems, or training employees based on identified gaps.
|
|||||
|
Risk Assessments & Audit Monitoring
|
|||||
|
Continuously monitor the controls and safeguards implemented through regular audits and periodic reviews. This ensures that risk mitigation strategies remain effective and aligned with changing threats.
|
|||||
|
Periodic VAPT
|
|||||
|
Conduct regular VAPT exercises to proactively identify and address vulnerabilities in your IT infrastructure, networks, and applications. These assessments simulate real-world attacks and help uncover gaps before malicious actors can exploit them. Reports should be reviewed by IT/security leads, and remediation plans should be documented and executed promptly. VAPT is a critical component of ongoing risk management and regulatory compliance.
|
|||||
|
Written Incident Response Plan
|
|||||
|
Maintain a comprehensive incident response plan that outlines the firm’s strategy for detecting, reporting, and mitigating security incidents. It should clearly define roles, escalation processes, and communication protocols.
|
|||||
|
Designate a Qualified Individual
|
|||||
|
Appoint a qualified individual responsible for implementing and overseeing the firm’s security program. This person ensures alignment with FTC and IRS requirements and is accountable for compliance, monitoring, and continual improvement of the program.
|
|||||
|
Reporting by Designated Individuals
|
|||||
|
Designate specific individuals responsible for reporting security events internally and externally. This ensures a clear line of responsibility and timely escalation in the event of a breach or incident.
|
|||||
|
Implement Safeguards
|
|||||
|
Based on the risk assessment, implement specific administrative, technical, and physical safeguards. These may include access restrictions, firewalls, secure file transfer protocols, antivirus tools, and employee access controls.
|
|||||
|
Monitor and Test Safeguards
|
|||||
|
Develop procedures to regularly test and monitor the effectiveness of implemented safeguards. This can include system audits, penetration testing, vulnerability scans, and regular security reviews to ensure ongoing protection.
|
|||||
|
Evaluation and Adjustment
|
|||||
|
Update the firm’s security program as business operations, risks, and technologies evolve. Periodic evaluations should be conducted to adjust policies, improve controls, and stay current with industry standards and regulatory updates.
|
|||||
|
Audit Controls
|
|||||
|
Enable system logging and conduct regular audits to detect unauthorized activities or potential breaches. Audit trails help ensure accountability and allow for forensic investigations if incidents occur.
|
|||||
|
Data Disposal Procedures
|
|||||
|
Establish secure data disposal procedures for both electronic and physical records. Ensure that sensitive client information is rendered unreadable or irretrievable when no longer needed for business or legal purposes.
|
|||||
Compliance Required
Compliance Not Required