South Carolina Department of Revenue

Last updated

The Department of Revenue is a department of the South Carolina state government responsible for the administration of 32 different state taxes in South Carolina. [1]

Contents

The Department is responsible for licensing and taxing all manufacturers, wholesalers and retailers of alcoholic liquors. The Department is also responsible for enforcing the Bingo Act of 1996 which affects manufacturers, distributors, organizations and promoters. Coin-operated device tax is collected from all manufactures, distributors or owners of such devices or machines. Owners of such machines must also be licensed. [2]

Tax records theft

On August 13, 2012, an unidentified remote attacker compromised systems at the Department of Revenue. The attacker initially penetrated the system using phishing emails to employees. The attacker then installed a backdoor. Over the next two months, the attacker remotely compiled and downloaded data such as employee password hashes and the tax records dating from 1998 to 2011. On October 10, the United States Secret Service notified the SC Department of Revenue of a possible breach. [3] The attacker ceased activities on October 17, having compromised a total of 44 systems. [4]

As of early 2013, this is the largest ever cyberattack on a US state government, with 3.8 million unencrypted Social Security numbers (equivalent to over 78% of South Carolina's population) stolen along with private and business-related financial information. [5] South Carolina contracted with private credit-reporting agency Experian to provide South Carolina residents and other affected individuals with a year of free credit monitoring and identity theft protection. [6]

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cyber security, digital security or information technology security is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Slot machine</span> Casino gambling machine

A slot machine, fruit machine, poker machine or pokies is a gambling machine that creates a game of chance for its customers. Slot machines are also known pejoratively as one-armed bandits, alluding to the large mechanical levers affixed to the sides of early mechanical machines, and to the games' ability to empty players' pockets and wallets as thieves would.

Business is the practice of making one's living or making money by producing or buying and selling products. It is also "any activity or enterprise entered into for profit."

<span class="mw-page-title-main">Identity theft</span> Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been statutorily defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's disadvantages or loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

<span class="mw-page-title-main">Department of motor vehicles</span> Government agency

A department of motor vehicles (DMV) is a government agency that administers motor vehicle registration and driver licensing. In countries with federal states such as in North America, these agencies are generally administered by subnational governments, while in unitary states such as many of those in Europe, DMVs are organized nationally by the central government.

Laptop theft is a significant threat to users of laptop and netbook computers. Many methods to protect the data and to prevent theft have been developed, including alarms, laptop locks, and visual deterrents such as stickers or labels. Victims of laptop theft can lose hardware, software, and essential data that has not been backed up. Thieves also may have access to sensitive data and personal information. Some systems authorize access based on credentials stored on the laptop including MAC addresses, web cookies, cryptographic keys and stored passwords.

<span class="mw-page-title-main">Sole proprietorship</span> Business legally synonymous with its owner

A sole proprietorship, also known as a sole tradership, individual entrepreneurship or proprietorship, is a type of enterprise owned and run by one person and in which there is no legal distinction between the owner and the business entity. A sole trader does not necessarily work alone and may employ other people.

A video lottery terminal (VLT), also sometimes known as a video gaming terminal (VGT), video slots, or the video lottery, is a type of electronic gambling machine. They are typically operated by a region's lottery, and situated at licensed establishments such as bars and restaurants.

The Pennsylvania Liquor Control Board (PLCB) is an independent government agency that manages the beverage alcohol industry in Pennsylvania by administering the Pennsylvania Liquor Code. It is responsible for licensing the possession, sale, storage, transportation, importation and manufacture of wine, spirits and malt or brewed beverages in the commonwealth, as well as operating a system of liquor distribution (retailing) and providing education about the harmful effects of underage and dangerous drinking.

Alcoholic beverage control states, generally called control states, less often ABC states, are 17 states in the United States that have state monopoly over the wholesaling or retailing of some or all categories of alcoholic beverages, such as beer, wine, and distilled spirits.

The Saskatchewan Liquor and Gaming Authority is a Treasury Board crown corporation responsible for the distribution, control and regulation of alcoholic beverages, cannabis and most gambling in the Canadian province of Saskatchewan. Its head office is located in Regina.

The Illinois Department of Revenue (IDOR) is the code department of the Illinois state government that collects state taxes, operates the state lottery, oversees the state's casino industry, oversees the state's thoroughbred and harness horse racing industries, and regulates the distribution of alcoholic beverages throughout Illinois, including beer, wine, and liquor. It is headquartered at the Willard Ice Building, 101 West Jefferson in Springfield, Illinois.

<span class="mw-page-title-main">Data breach</span> Intentional or unintentional release of secure information

A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen, altered or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice, organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media. Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a "leak".

Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The Payment Card Industry Data Security Standard is the data security standard created to help financial institutions process card payments securely and reduce card fraud.

<span class="mw-page-title-main">Wisconsin Department of Revenue</span> Wisconsin State Agency charged with administering state tax laws.

The Wisconsin Department of Revenue (DOR) is an agency of the Wisconsin state government responsible for the administration of all tax laws, as well as valuing property and overseeing the wholesale distribution of alcoholic beverages and enforcement of liquor laws. The Department also administers the state's unclaimed property program and the state lottery.

The Department of Liquor Control is a South Dakota state government agency which is responsible for licensing certain operations and for collecting certain state taxes. These taxes include cigarette excise, estate, bank franchise, ore, energy mineral severance, coin-operated laundromat license fees, beer, wine and distilled spirits, gaming excise, beer and liquor license fees, and alcohol beverage brand registration fees. It is also responsible for the sales and property tax refund program for the elderly and disabled.

<span class="mw-page-title-main">Internal Revenue Service</span> Revenue service of the United States federal government

The Internal Revenue Service (IRS) is the revenue service for the United States federal government, which is responsible for collecting U.S. federal taxes and administering the Internal Revenue Code, the main body of the federal statutory tax law. It is an agency of the Department of the Treasury and led by the Commissioner of Internal Revenue, who is appointed to a five-year term by the President of the United States. The duties of the IRS include providing tax assistance to taxpayers; pursuing and resolving instances of erroneous or fraudulent tax filings; and overseeing various benefits programs, including the Affordable Care Act.

The South Carolina Law Enforcement Division (SLED) is a statewide investigative law enforcement agency in South Carolina. SLED provides manpower and technical assistance to other law enforcement agencies and conducts investigations on behalf of the state as directed by the Governor and Attorney General. SLED Headquarters is located in the state capital, Columbia, with offices in the Midlands, Piedmont, Pee Dee, and Low Country regions.

Legal forms of gambling in the U.S. state of North Carolina include the North Carolina Education Lottery, three Indian casinos, charitable bingo and raffles, and low-stakes "beach bingo". North Carolina has long resisted expansion of gambling, owing to its conservative Bible Belt culture.

Identity theft involves obtaining somebody else's identifying information and using it for a criminal purpose. Most often that purpose is to commit financial fraud, such as by obtaining loans or credits in the name of the person whose identity has been stolen. Stolen identifying information might also be used for other reasons, such as to obtain identification cards or for purposes of employment by somebody not legally authorized to work in the United States.

References

  1. "Tax Index". South Carolina Department of Revenue. Archived from the original on June 30, 2018. Retrieved September 25, 2018.
  2. "Beer, Wine, Liquor/Bingo/Coin Operated Device Tax". Tax Information. South Carolina Department of Revenue. Archived from the original on 2008-01-26. Retrieved 2008-03-16.
  3. S.C. agencies yet to fully implement cyber protections
  4. Public Incident Response Report Archived 2014-08-23 at the Wayback Machine
  5. South Carolina raises number of hacked tax records to 3.8 million
  6. "South Carolina Offers Details of Data Theft and Warns It Could Happen Elsewhere (Published 2012)". The New York Times . Archived from the original on 2023-02-12.

Official website