Draft Taxation Determination

TD 2001/D4

Income tax: what are the obligations under the Income Tax Assessment Act 1936 where a business chooses to keep some of its records as encrypted information?

  • Please note that the PDF version is the authorised version of this draft ruling.
    This document has been finalised by TD 2002/16.

FOI status:

Draft only - for comment

Preamble
Draft Taxation Determinations (DTDs) present the preliminary, though considered, views of the Australian Taxation Office. DTDs should not be relied on; only final Taxation Determinations represent authoritative statements by the Australian Taxation Office.

1. When a person carrying on a business chooses to process and keep records in an electronic form, the records must be in a form which the ATO can access and understand in order to ascertain that person's taxation liability. This includes encrypted records.

2. Cryptography is the art and science of secret writing and communication. It has a long history extending from ancient times right up to present day.

The CSIRO has stated that :

'Classical cryptography is used to protect the contents of a message from being viewed by unauthorised parties. It is the art of transforming the contents of a message from its original form to one that cannot be decoded by unauthorised parties. This ensures that the message remains incomprehensible to unauthorised eyes, even if intercepted.
The process of transforming the message from its original form to its incomprehensible form is known as encryption . The message to be encrypted is usually referred to as plaintext , and the encrypted message is known as ciphertext . The process of transforming the message from its incomprehensible form back to its original form is known as decryption . The function used to encrypt and decrypt the message is known as a cryptographic algorithm .'[F1]

3. Cryptography is today part of many business's data security arrangements and is being increasingly adopted to ensure trust in key elements of digital transactions, including integrity and confidentiality. Encryption, is a component of cryptography and provides for confidentiality by "scrambling" a message so that it is virtually impossible for other people to read unless they have a "key".[F2]

4. Encryption as explained by the CSIRO statement in relation to digital transactions is done by using a computer and software that applies a mathematical algorithm to a digital file associated with the original information (e.g., a text file). The algorithm generally uses large, unique numbers called "keys" in this process and transforms the plaintext into cyphertext. Without access to the correct key, data encrypted for confidentiality cannot be returned to plaintext without the expenditure of extraordinary computer power over periods of time.

5. Encryption is used by many businesses as one way to achieve security in an open network like the internet. Many commercial arrangements or transactions performed over the internet require a secure environment in which to take place. For example, encryption has enabled credit cards to be used as electronic payment systems on the internet by protecting the details of the card, cardholder and transaction during transmission.

6. Section 262A of the Income Tax Assessment Act 1936 (the Act) provides that a person carrying on business must keep records that record and explain all transactions and other acts that are relevant for the purposes of the Act. Under subsection 262A(3), the person is required to keep records in the English language or in a form readily accessible and convertible into English and to keep records so as to enable the person's liability under the Act to be readily established. This would include all data not only encrypted data, including tables of figures and other non-text (e.g., numeric) data. The Explanatory Memorandum to the Taxation Laws Amendment Bill (No 5) 1989 that introduced subsection 262A(3) into the Act explained, at Clause 42:

'Subsection 262A(3) obliges a person who is required by the section to keep records, to keep those records:

*
by paragraph (a) - in the English language or, if not in written form (e.g., in an electronic medium such as magnetic tape or computer disc), in a form which is readily accessible and convertible into writing in English; and
*
by paragraph (b) - so as to enable the person's assessable income and allowable deductions, and any credits to which the person is entitled, to be readily ascertainable.'

7. Where data encryption is used the record keeping requirements of section 262A will not be met unless :

the encryption key, and all other means to decrypt the records, are provided to the ATO, or
the ATO is provided with decrypted records.

8. Under section 263 the Commissioner or any duly authorised officer has the right of full and free access to all buildings, places, books, documents and other papers including electronically stored records required for the purposes of the Act. The provision enables an authorised officer to access and copy records held on an electronic storage medium.

9. Subsection 263(3) requires the occupier of a building or place to provide an authorised officer with all "reasonable facilities and assistance" for the effective exercise of powers under the section. In the context of electronically stored records, reasonable facilities and assistance extend to the provision of login codes, keys including encryption keys, passwords, etc, and access to hard copies of the records as well as allowing the authorised officer to read computer and software manuals (Refer to Taxation Ruling TR97/21). There are penalties under the tax law for failing to do so.

10. All records should be able to be examined by the ATO to determine their authenticity and their integrity. This may also include updating all of the encrypted data to allow for that data to remain accessible in the event of changes to either computer hardware of software and to ensure that the data stored on magnetic or other media does not become 'corrupted' over time.

11. Businesses should adopt prudential practices to reduce the likelihood of loss of decryption keys. These could include keeping a copy written down or on other storage media such as a floppy disk in a safe place or by the use of trusted third party arrangements.

Your comments

12. We invite you to comment on this draft Taxation Determination. We are allowing 4 weeks for comments before we finalise the Determination. If you want your comments considered, please provide them to us within this period.

Comments Date: 29 June 2001
Contact officer details have been removed following publication of the final ruling.

Commissioner of Taxation
30 May 2001

Footnotes

1 Report of the Research Group into the Law Enforcement Implications of Electronic Commerce (RGEC), "The emerging Information Security Infrastructure", Research and Technical Advice (Vol 3), 1999, at page 91. A copy of this report is available at the date of publication of this Taxation Determination at http://www.austrac.gov.au/text/publications/rgec/3/index.htm.

2 A detailed discussion of Internet security issues is contained in the RGEC Report Research and Technical Advice (Vol 3) 1999 (see above).

Not previously issued in draft form

References

ATO references:
NO 2001/007795

ISSN: 1038-8982

Related Rulings/Determinations:

TR96/7
TR97/21

Subject References:
encryption
record keeping
audit
electronic records
internet

Legislative References:
ITAA 1936 262A
ITAA 1936 262A(3)
ITAA 1936 263
ITAA 1936 263(3)