IRS Report: Goals Misused

amaxwell@govexec.com

IRS executives in districts from Florida to the Pacific Northwest have focused so intently on enforcement goals that they have put taxpayer rights at risk in the collection process, according to a report released this week by the agency.

The report concluded that IRS officials in 12 districts violated the law when they issued guidance that encouraged sharing enforcement quotas and results at the group level.

"As a result, the environment at the front-line level is heavily focused on management's priority of achieving enforcement goals ... and this has placed taxpayers at risk of abridgment of their rights," the report said.

IRS Commissioner Charles Rossotti, who took over at the troubled agency two months ago, said he was "especially troubled by the possibility that this situation has resulted in violation of taxpayer rights."

"This report demonstrates that the agency has failed to strike the proper balance between providing customer service and fair enforcement of the tax law," Rossotti said. "It shows that the IRS has put too much emphasis on revenue and other statistical goals."

Last month, the IRS released a similar report on the Arkansas-Oklahoma district. Auditors found that IRS managers there placed too much emphasis on statistical goals. The Taxpayer Bill of Rights prohibits managers from evaluating employees based on the numbers of seizures and levies they make.

However, Tuesday's report found that 25 percent of revenue officers and 23 percent of group managers said they felt pressure to achieve goals and take enforcement actions.

Also, a review of files from the 12 IRS districts revealed 900 documents containing specific references to enforcement goals, statistics and accomplishments.

References to enforcement statistics were contained in 129 of 339 general manager evaluations, while other documents detailed the number of seizures performed by employees in each district.

In response to the findings, Rossotti announced that the IRS will ask officials from other agencies to serve on a panel to determine disciplinary measures against employees found to have misused enforcement goals.

"We owe it to the American public to take every step possible to ensure that impartial and fair treatment of taxpayers is never compromised," he said.

The agency will release a third report covering collection practices across the country in March.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.