Many business owners hire their children, their spouse, or other family members to work in their business. Sometimes this works out well. Other times it causes problems. Let’s look at the pros and cons of putting family members on your payroll.
Hiring your children
Hiring your kids for a summer or part-time job usually has more tax advantages and fewer drawbacks than hiring other relatives. The financial advantage is that if you’re paying your child to do useful work, the business gets a tax deduction for the wages paid. Your child will probably pay little or no income tax, and the after-tax wages stays in the family.
Follow certain steps to make sure the wages are fully deductible. The child must be doing a real job that helps the business, and the wages must be reasonable for the work performed. Keep detailed records of hours worked and pay salary regularly, preferably on the same schedule as other employees. In other words, treat your child just like any regular employee.
In addition, depending on how your business is organized and the age of your child, you may be able to avoid paying Social Security, Medicare, and unemployment on their wages. To qualify, you must be a sole proprietor or a husband-wife eligible partnership and your child must be under the age of 18.
Hiring your spouse or other relatives
An advantage to hiring your spouse or other relatives is that you have an employee whom you know well, and who may be more motivated or more flexible than a non-family member. And in many family-owned businesses, it’s a powerful way to train the next generation who will take over leadership.
That same familiarity can bring disadvantages, however.
Few families are without some internal or intergenerational conflict, and that can be disastrous if it spills over into the workplace. You must also consider the effect on other employees. Any sign of favoritism or unequal treatment can cause resentment and ruin the motivation of other employees.
Be cautious moving forward
There are plenty of businesses where hiring family members has worked out just fine, but other businesses where it didn’t work out.
So think long and hard before you bring family members into the business. Talk to them and to your key employees beforehand so everyone understands and is comfortable with their roles in the company.
You hang up the phone with a huge smile on your face. You just learned that you’re getting a pretty sizeable tax refund this year. Now all you need to do is kick back and wait a week or two for the IRS to wire the money into your bank account.
This good news, however, is unfortunately short lived. The very next day you get another phone call.
“I’m sorry to tell you this, but someone else has already used your Social Security number to file a tax return.”
You’re told that you’ll still be able to eventually get your nice, big tax refund, but it may be several months before you see the money. You first need to work with the IRS to resolve your case of identity theft.
There’s a secret weapon you can now use to protect your tax return – an Identity Protection PIN (IP PIN).
Beginning this tax season, all taxpayers who can verify their identities are eligible to obtain an IP PIN. An IP PIN is a 6-digit PIN that offers additional protections when filing your tax return. This one-time-use number is sent to you by the IRS and must be entered on your tax return along with your Social Security number. Since the IP PIN is a one-time-use number, you will receive a new IP PIN number each year from the IRS.
If someone tries to fraudulently file a tax return using your Social Security number, they will be unable to do so without this IP PIN.
What You Need to Do
How to get an IP PIN. To obtain an IP PIN, click here to visit the IRS’s Get an IP PIN tool to opt into the IP PIN program.
If your identity has already been stolen. If someone uses your Social Security number to fraudulently file a tax return, ask for help to find out next steps for getting your identity fraud case resolved with the IRS.
Once in, tough to get out…for now. As this is the first year the IRS is making the IP PIN program available for anyone who wishes to use one, they are not ready to let you opt out once you agree to participate. They anticipate adding the opt-out feature in the near future.
How companies use your identity and what you can do to protect it.
One of the most valuable things you own is YOU. Your identity includes the basics – where you live, your age, and your gender. But it also includes your interests, who you know, and what you buy. So, do you know who has your identity? Here’s the life cycle of your identity and what to do to protect it.
It gets collected. Think about the organizations that legally collect information about your identity – your employer, government entities, insurance companies, banks, credit reporting agencies, and non-profit organizations. And then add those companies you give your identity to freely – like Google, Facebook, LinkedIn, Twitter, and any other website or social media platform you visit.
It gets stored. Once your identity gets collected, it then needs to be stored somewhere. Storage is most often on servers or locally on a computer or mobile device. This is one of the core concerns with Tik-Tok, a Chinese-originated short video service. The concern is that a foreign entity will have stored U.S. citizen’s interests and behaviors that can help identify potential targets that can be manipulated.
It gets sold. Once information related to your identity and interests are collected, most organizations then sell it to other companies. Not only is information about your identity sometimes collected without your knowledge, this information is then monetized. Your viewing behavior can also be actively manipulated by the sites you view. So if you read articles about cats, you are going to get a lot more articles about cats and get ads that relate to cat-lover behavior. This is often so subtle, you do not realize it is happening.
It gets accessed. If your information is considered a public record, anybody can see it. Business licenses, property tax records and real estate ownership are just a few examples of personal information that anyone can access.
It gets stolen. Identity thieves are always looking for ways to access your information. Thieves either hack one of the organizations that collects your confidential information or find a way to trick you into giving them your information, with techniques such as phishing emails.
What you can do
Opt-out of providing personal information. The best place to start with protecting your identity is knowing who has access to it and asking if they really need it. Consider opting out of providing information if possible.
Be vigilant with the data you possess. While you can’t control how secure an insurance company’s servers are, you can control how secure you handle the information and documents you possess. Be on the lookout for phishing emails, verify requests for your information and don’t forget about getting rid of documents the old-fashioned way with a shredder.
Deliberately monetize your identity. Stop giving away your identity without a thought. Here’s an idea. Consider you are worth a million dollars. Then see what these services are paying you for your information and how they are using it. If this little exercise gets you to pause before signing up for a new service, then the exercise is worth it!