Prior to the next round of revisions in the indirect tax regime, which will complete five years of implementation on July 1, the Goods and Services Tax (GST) Council is set to take up a proposal for tougher examination and verification of high-risk taxpayers.
Ajit Pawar, the finance minister for Maharashtra, is leading a group of ministers (GoM) that will present the council with a report on GST system reforms. The GoM has recommended, among other things, that information about phony traders who are not registered be made public and that banks be required to provide information on transactions made through Point of Sale (POS).
As compensation to the states comes to an end this month, the council meeting this week in Chandigarh on June 28—29 is anticipated to concentrate on methods to increase revenue collection and plug leaks.
The council had established a GoM under Pawar the previous year to assess the IT resources and user interface accessible to tax officials and recommend actions to improve the system’s effectiveness and efficiency, including modifications to business procedures. In order to stop income leaks, it was also instructed to pinpoint probable evasion sources.
To stop input tax credit fraud, the GoM advised verifying the physical addresses of high-risk taxpayers. Additionally, it has advised requiring the inclusion of an energy customer registration number at the time of GSTN registration, having the National Payments Corporation of India (NPCI) certify taxpayers’ bank accounts, and setting up a feedback system to identify suspicious activities.
Related Tags
IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000
IIFL Capital Services Support WhatsApp Number
+91 9892691696
IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)
This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.