Feeds

Failed tax system still causing grief

More help needed for vulnerable

High performance access to file storage

The Public Accounts Committee has found the government's tax system overpaid tax credits by £7.3bn in the first four years of the scheme and is still clocking up £1bn a year in overpayments.

Her Majesty's Revenue and Customs is trying to recover some £4.3bn of that from some of the most vulnerable families in the country. Delays in moving over to its new National Insurance Recording System mean that the backlog of 16m cases which need clerical checking is likely to increase.

Edward Leigh, chairman of the PAC, said: "HMRC should be more sensitive in how it deals with the recovery of overpayments. The Department is only now starting to introduce measures to support claimants, including helping them navigate the complex tax credit procedures."

The existing PAYE system was designed in the 1980s on the assumption that most people would continue to work for one employer. The new system is based on individuals rather than employers.

The tax credit system was designed for some overpayment to occur because it uses provisional data to make the payments at the beginning of the year. A final assessment at year end is based on actual circumstances. But the scale of these over-payments concerned the committee.

It leaves the poorest families in the country having to pay, on average, £770 a year back to the Revenue. The problems caused have left thousands of families in fear of having to pay back credits they have received.

Changes made in 2005 have helped the Revenue reduce overpayments from £1.9bn a year to £1bn.

Fraud and error are also an issue - HMRC lost between £1.31bn and £1.54bn in 2006 to 2007.

The system was provided by EDS between 1994 and 2004 when HMRC sacked them and gave the work to CapGemini. Both sides blamed the other for the failure of the project.

The full report is available as from here (pdf). ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.