Enable scripting to view the full contents of the page
Skip navigation.
TIGTA Print Friendly

Printed on  

Phone scam alert icon Latest IRS Impersonation Scam Update: WARNING! Do not use Google Play Gift Cards to pay your taxes... learn more.
► If you believe you have been a victim of an IRS Impersonation Scam, contact us.
► View this Public Service Announcement video.
► Downloadable IRS Scam Files: Warning Flyer, 5X8 Poster & 11X17 Poster.
► TIGTA partners with the Department of Justice’s Elder Justice Initiative, view webinar.
► If you lost money to IRS scammers via Western Union, you may be able to file a claim to recover funds.
Visit the Federal Trade Commission’s website to learn more and get started.



Major Information Systems

TIGTA Enterprise Systems (TES)
TIGTA’s top tier, overall organizational General Support System, as defined based on FISMA requirements. The TES system itself does not contain any equipment, but rather functions as the high-level logical system where enterprise-wide security controls are managed and propagated to subsystems. TES is a parent system of TIGTA's three subsystems:
TIGTA Server Infrastructure Subsystem (TSIS):
TSIS supports many minor applications for TIGTA's business operations. The TSIS authorization boundary includes server operations and consists of server devices. The applications include, but are not limited to, the following:
  • Criminal Results Management System (CRIMES)
    Business reporting and decision support system

  • PARIS Property Module (PPM)
    Property and seized fund management system

  • TeamMate
    Audit management software

  • Heat
    Helpdesk software

  • SharePoint Services
    Collaboration and document sharing system

  • Web Services
    TIGTA intranet hosting operations and documentation

  • FOIAXpress
    Freedom of Information Act processing system

  • Data Center Warehouse (DCW)
    Data research and analysis system

  • TIGTA Messaging Services (TMS)
    Corporate messaging system

TIGTA Workstations Management Subsystem (TWM):
TWM encompasses all TIGTA workstations, to include desktop and laptop computers, assigned to TIGTA employees. The TWM authorization boundary includes client and end user operations and consists of Windows based client devices.
TIGTA Communication Data Network (TCDN):
TCDN is the TIGTA network and includes all telecommunications infrastructure devices such as switches. TCDN provides network services throughout TIGTA that are not supplied by the Treasury Network.
The TIGTA Cybercrime Investigation System (CIS):
CIS is used exclusively for Law Enforcement activities. The system is used to process investigative cases and to perform research and analysis.

Privacy Threshold Analysis and Privacy Impact Assessment

TIGTA conducted Privacy Threshold Analyses (PTAs) and Privacy Impact Assessments (PIAs) on information systems collecting personally identifiable information as required by the E-Government Act of 2002. The purpose of a PTA and PIA is to ensure that:
  • the public is aware of the information we collect about them;
  • any impact these systems have on personal privacy is adequately addressed; and,
  • only the personally identifiable information needed to administer our programs is collected.
TES Privacy Threshold Analysis (PDF)

TES Privacy Impact Assessment (PDF)

CIS Privacy Impact Assessment (PDF)

Important Notices Spotlight

IRS Impersonation Scam Reporting button

Report Fraud, Waste, and Abuse button

Whistleblower Retaliation Reporting button

Contractor Fraud Reporting button

FOIA button

Search Site

Readers and Viewers
Adobe Acrobat Reader

Links to other sites
Treasury Supports Veterans logo

Last Updated: December 15, 2017
IRS Treasury eGov USAGov: U.S. Government Web Portal Regulations