Mandatory Compliance Checks for CPA Firms Using Offshore or Outsourced Tax Services

Mandatory Compliance Checks for CPA Firms Using Offshore or Outsourced Tax Services

Outsourcing tax work is no longer unusual. What is unusual is how few CPA firms can clearly explain their compliance posture when asked.

Most firms focus on cost savings, capacity relief, and faster turnaround times. Those are real benefits, but they are not what regulators, insurers, or clients care about first. What they care about is whether the firm understands its responsibilities when tax data leaves direct internal control.

That gap is where risk shows up. In the 2025 filing season, as per Tigta the IRS identified about 6,000 tax returns as identity theft, stopping payment of $54 million in fraudulent refunds. The IRS also issued 6.3 million Identity Protection PINs as a preventive measure by March 1, 2025

This blog walks through the non-negotiable compliance checks CPA firms must have in place when using offshore or outsourced tax services. Not in theory. In practice.

Table of Contents

First, Define Your Outsourcing Model Clearly

Before you talk about compliance, you need clarity.

“Outsourcing” is not a single thing. It is a catch-all word that hides important differences. Different outsourcing models trigger different ethical, disclosure, and security obligations. Start by documenting your current operating model. Not what you intend to do. What is actually happening today?

Ask four basic questions and write the answers down.

What Tasks Are Outsourced

Be specific.

Vague descriptions such as “back office support” or “tax assistance” are red flags in an audit or inquiry. They suggest that the firm has not assessed risk at the task level.

Common outsourced tax tasks include:

  • Data entry from source documents
  • Organizer cleanup and completeness checks
  • Workpaper preparation
  • Draft return preparation
  • Notices and correspondence drafting
  • Tax research memos

Each of these tasks carries a different risk profile.

Outsourcing data entry is not the same as outsourcing tax planning support. Outsourcing research is not the same as outsourcing client communication. Regulators and insurers look at what is outsourced, not just that outsourcing exists.

If you cannot articulate exactly which tasks are handled externally, you cannot defend your controls.

Where the Work Is Done

Firms must document:

  • The country where work is performed
  • Whether staff work from a controlled office environment or remotely
  • Whether subcontractors are involved

Location matters for disclosure, privacy expectations, and security design.

A controlled office environment with managed devices is fundamentally different from a remote, bring-your-own-device setup. If you treat those as equivalent, you are underestimating risk. This information should be documented internally. Also, when getting 7216 signed, you need to share this info with your client too.

Who Touches Client Data

Many firms know the vendor name but cannot name the roles that actually access client data. That is a problem.

You should be able to list categories of individuals who touch data, such as:

  • Offshore preparer
  • Offshore checker or reviewer
  • Vendor team lead
  • Vendor IT or security support
  • Your internal reviewer or manager

This is not about naming individuals. It is about understanding access paths.

If you cannot name the types of people who access data, you do not have meaningful control. At Credfino, we share the name of the person responsible for their set of duties. If your offshore provider is not doing this, you need to reconsider.

Become part of a growing community of accounting/tax firm owners who stay ahead of the curve with our newsletter!

Get weekly actionable insights and practical templates, updates on latest growth strategies, and efficiency-boosting tips for your accounting/tax firm.

    We won't send you spam. Unsubscribe at any time.

    What Systems Do They Access

    Next, inventory every system that outsourced staff can access.

    Common systems include:

    • Tax preparation software
    • Client portals
    • Document management systems
    • Practice management or workflow tools
    • Email or internal messaging platforms

    This inventory becomes the foundation for access control, monitoring, and audit readiness. If a system is accessed by an external party, it must be included in your security and compliance scope.

    Mandatory Client Consent and Disclosure

    This is where many firms get exposed. The core rule of Internal Revenue Code (IRC) Section 7216 is that a tax return preparer cannot knowingly or recklessly disclose or use taxpayer information for any purpose other than preparing the tax return, unless the taxpayer gives explicit, written consent or a specific regulatory exception applies.

    Consent exists to protect the client and the firm. When handled poorly, it feels like an afterthought. When handled well, it builds transparency and trust.

    When and How Consent Is Obtained

    Consent must be obtained before tax return information is disclosed to a third party.

    Best practice includes:

    • Engagement letter language that discloses third-party assistance
    • A standalone consent option for offshore disclosure
    • Renewal of consent when the scope materially changes

    Firms that bury consent language in dense engagement letters often create client trust issues later. Clients feel surprised when they discover offshore involvement after the fact.

    Engagement Letter Language

    Your engagement letter should clearly state:

    • That third-party service providers may assist with tax preparation
    • Whether work may be performed outside the United States
    • That the firm retains responsibility for the work

    Avoid euphemisms and vague phrasing. Plain language protects you.

    Download 7216 Templates here 

    Standalone Offshore Disclosure Option

    Many firms now offer two consent paths:

    • Standard consent
    • Enhanced consent with masked or limited data sharing

    This approach gives clients agency. It demonstrates that the firm is not hiding its model and is willing to adapt controls based on client comfort level.

    Proof of Consent Storage

    Consent is meaningless if you cannot produce it.

    Document:

    • Where consent is stored
    • How long it is retained
    • Who has access to it

    During an inquiry, being able to retrieve consent quickly matters. Scrambling for documentation signals weak controls.

    Confidentiality and Ethics Controls

    Outsourcing does not dilute ethical responsibility.

    Your firm remains accountable for confidentiality and professional conduct, regardless of who performs the work.

    Individual NDAs

    Every individual with access to tax data should be bound by:

    • A confidentiality agreement
    • Data protection obligations
    • Clear consequences for violations

    A vendor-level NDA is not sufficient. Ethical responsibility follows individuals, not contracts alone.

    Subcontractor Restrictions

    Your agreements should clearly state:

    • Whether subcontracting is allowed
    • Approval requirements
    • Disclosure obligations

    Silent subcontracting is one of the fastest ways firms lose control. If you do not know who is touching data, your compliance posture is already compromised.

    Need-to-Know Access

    Access should be role-based, not convenience-based.

    If someone does not need a system to perform their task, they should not have access.

    Excess access is one of the most common root causes of breaches.

    Written Information Security Program (WISP)

    Written Information Security Program (WISP)

    CPA firms are required to maintain a written information security program that covers both internal operations and vendors.

    A WISP is not a generic policy document. It is an operating document.

    What Your WISP Should Cover

    Your WISP should address:

    • Administrative safeguards
    • Technical safeguards
    • Physical safeguards

    It should reflect how your firm actually operates, not how you wish it operated.

    Security Training

    Training is part of compliance.

    Your program should document:

    • Initial security training
    • Ongoing refresher training
    • Phishing and social engineering awareness

    Vendors and offshore teams should be explicitly included in scope.

    Incident Response Plan

    If something goes wrong, who does what?

    Your plan should define:

    • Detection and reporting
    • Internal escalation
    • Client notification
    • Regulatory notification
    • Documentation and post-incident review

    A plan written after an incident is too late.

    Access and Identity Controls

    This is where most breaches actually occur. Policies fail when access controls are weak.

    Role-Based Access

    Access must align with job function.

    No shared logins.
    No generic credentials.
    No exceptions “just for busy season.”

    Temporary access is still access.

    Multi-Factor Authentication

    MFA should be mandatory on:

    • Tax software
    • Client portals
    • Email systems
    • Cloud storage

    If a system cannot support MFA, reassess whether it should be used for sensitive data.

    Joiner, Mover, Leaver Process

    You need a documented process for:

    • Granting access
    • Changing access when roles change
    • Immediate access removal when someone leaves

    Delays here create silent exposure.

    Data Handling Rules

    Policies only work if they are enforceable.

    Approved Systems Only

    Define where data is allowed to live.

    Best practice includes:

    • Secure portal or DMS only
    • No email attachments
    • No personal cloud storage

    Convenience is not a justification for risk.

    Local Downloads

    If local downloads are allowed at all, controls must exist:

    • Encryption
    • Device restrictions
    • Monitoring

    Many firms now prohibit local storage entirely to reduce exposure.

    Encryption

    Data should be encrypted:

    • In transit
    • At rest

    This applies to both firm systems and vendor systems.

    Backup and Recovery

    Your agreements should define:

    • Backup frequency
    • Storage location
    • Recovery expectations

    You do not want to discover backup gaps during a ransomware incident.

    Secure Deletion

    At contract end, data must be:

    • Returned
    • Securely deleted
    • Confirmed in writing

    Ambiguity here creates long-term risk.

    Vendor Due Diligence Checklist

    Before onboarding any vendor, document your review.

    This is not about mistrust. It is about accountability.

    Security Questionnaire

    Ask for evidence, not promises.

    Examples include:

    • MFA enforcement
    • Device management standards
    • Encryption practices
    • Access logging and monitoring

    Background Checks

    For roles handling sensitive data, background checks should be considered and documented, subject to local laws.

    Device Policy

    Confirm:

    • Company-managed devices
    • VPN requirements
    • Prohibition of personal devices

    Physical Security

    If work is office-based, assess:

    • Access controls
    • Surveillance
    • Visitor management

    Breach History

    Ask directly:

    • Prior incidents
    • Response process
    • Notification timelines

    How a vendor answers this question often matters more than the answer itself.

    Why This Matters More in 2026 Than Ever Before

    Regulators are not becoming more lenient. Clients are becoming more informed. Cyber insurers are asking harder questions.

    Firms that cannot clearly articulate their outsourcing controls will feel pressure from multiple directions at once.

    Outsourcing done well is a competitive advantage. Outsourcing done casually becomes a liability.

    Final Thoughts

    If your firm is using offshore or outsourced tax services, compliance is not something you “get to later.” This might seem like a lot which is why we are here.

    7216 & Beyond: Offshore Data Security Compliance for Tax Firms

    Offshoring tax prep often sparks the same worries: Is client data really safe? How do we explain sending SSNs overseas? This playbook shows how tax firms can stay 100% compliant with IRC Section 7216 and GLBA, while building client trust through transparency and stronger safeguards than most onshore-only firms use.

    Enter your email to download 7216 & Beyond: Offshore Data Security Framework for Tax Firms


      We respect your privacy. Unsubscribe at any time.

      7216 & Beyond: Offshore Data Security Compliance for Tax Firms

      Offshoring tax prep often sparks the same worries: Is client data really safe? How do we explain sending SSNs overseas? This playbook shows how tax firms can stay 100% compliant with IRC Section 7216 and GLBA, while building client trust through transparency and stronger safeguards than most onshore-only firms use.

      Enter your email to download 7216 & Beyond: Offshore Data Security Framework for Tax Firms.

      Drop your email address here to get a free copy now.

        We respect your privacy. Unsubscribe at any time.

        You may also like