Frequently Asked Questions

The Ohio Department of Taxation has compiled a list of frequently asked questions covering many different categories.

To view the questions, click on the "Select Category" bar and then click on the category you are interested in.  A list of questions will appear pertaining to that category. Then click on the question you are inquiring about and the answer will appear.

How do thieves typically obtain access to personally identifiable information (PII)?

  1. Data breaches-Defined as an incident in which personally identifiable information has been viewed, stolen or used by an individual unauthorized to do so.
  2. Phishing scams-Defined as trying to obtain personally identifiable information by sending an email (usually with an attachment or link) that appears to be from a credible organization.  Often times, this email will send you to a fraudulent website that replicates the legitimate website.
  3. Buying information from a corrupt business insider. 
  4. Stolen mail.
  5. Theft by friends, neighbors or family. 
  6. Lost or stolen wallets.
  7. Obtaining personal information from the trash.
  8. From online databases and underground or dark web internet forums.
  9. Social media.

SearchIcon