Why the FTC Safeguards Rule Applies to Your Tax Practice
Most tax preparers don't think of themselves as financial institutions — but under the Gramm-Leach-Bliley Act (GLBA), the Federal Trade Commission (FTC) does. The FTC Safeguards Rule, substantially strengthened with a compliance deadline of June 9, 2023, treats any business significantly engaged in financial activities — including tax preparation — as a financial institution subject to federal data security law. If your practice collects, stores, or transmits nonpublic personal information (NPI) for clients, you are legally required to maintain a written information security program that meets the FTC's current standards.
This isn't a technicality buried in regulatory footnotes. The FTC has stated explicitly in guidance and enforcement actions that tax preparers, accountants, and other financial service providers face real consequences for non-compliance. Understanding exactly what the FTC Safeguards Rule for tax preparers and financial institutions requires — and how it intersects with IRS obligations — is essential for every firm that handles client financial data in 2026.
The rule traces its authority to 16 C.F.R. Part 314, the FTC's implementing regulation under GLBA Title V. The 2023 update replaced general best-practice language with specific, enforceable technical controls — making this one of the most operationally detailed federal data security requirements facing tax professionals today.
Tax & Financial Data Security By the Numbers
IBM Cost of Data Breach Report 2024
Verizon Data Breach Investigations Report 2024
FTC Act Section 5, adjusted for inflation
Who Qualifies as a Financial Institution Under the FTC Safeguards Rule?
The GLBA defines financial institution broadly. Under the FTC's implementing rule, any entity significantly engaged in financial activities falls within its scope. The FTC's own published examples include tax preparation firms, mortgage brokers, check cashers, and credit counselors. For tax preparers, the connection is direct: preparing returns means collecting Social Security numbers, wage records, bank routing numbers, and investment statements — exactly the type of NPI the Safeguards Rule is designed to protect.
The FTC Safeguards Rule for tax preparers and financial institutions applies regardless of firm size. Whether you prepare 40 returns or 40,000, if you handle client NPI, you must comply. There is no revenue threshold and no minimum return volume that creates an exemption.
What Counts as Nonpublic Personal Information?
NPI includes any financial information a client provides to obtain a financial product or service, plus any information about clients derived from transactions. For a tax practice, this means:
- Social Security numbers and Individual Taxpayer Identification Numbers (ITINs)
- W-2s, 1099s, and other income records
- Bank account and routing numbers for direct deposit of refunds
- Investment account statements and brokerage records
- Prior-year tax returns used for reference
- Health insurance records provided for ACA-related tax purposes
Information that is publicly available in general — like a business's listed phone number — does not automatically qualify as NPI. But if a client provided that information specifically to obtain your services, it retains NPI status. When in doubt, treat the information as protected. For a thorough look at how these requirements align with IRS standards, see our guide on IRS publication 4557 safeguarding taxpayer data WISP requirements.
Small Firm? You're Still Subject to the Safeguards Rule
The FTC Safeguards Rule has no small-business exemption. Tax firms that maintain NPI on fewer than 5,000 customers qualify for a simplified path on one specific requirement — the annual written report to a governing body — but all other core controls apply in full: written risk assessment, encryption, Multi-Factor Authentication (MFA), incident response plan, staff training, and service provider oversight. Size reduces paperwork, not security obligations.
The 9 Core Requirements of the FTC Safeguards Rule
The 2023 update moved the Safeguards Rule well beyond general principles and into specific, enforceable controls. Your information security program must address all nine of the following areas. Partial compliance is not compliance.
1. Designate a Qualified Individual
You must formally designate a single person — either an employee or an external service provider — to oversee, implement, and enforce your information security program. For small firms, this is often the owner. The requirement is that the person has genuine knowledge and authority to act, not merely a title. If you use a managed security provider to fill this role, the designation must be documented in your service contract.
2. Conduct and Document a Written Risk Assessment
Your security program must be grounded in a written risk assessment that identifies threats to the confidentiality, integrity, and availability of customer information, evaluates the sufficiency of existing safeguards, and prioritizes remediation. This assessment must be reviewed and updated whenever circumstances change materially — not just annually.
3. Implement Safeguards in Eight Specific Areas
Based on your risk assessment, the rule requires safeguards across eight functional areas: access controls, data inventory and classification, encryption, secure development practices, authentication (MFA), activity monitoring and testing, service provider oversight, and change management. Each area must be addressed — skipping one creates a documented compliance gap.
4. Encrypt All NPI In Transit and At Rest
All nonpublic personal information must be encrypted both when transmitted across networks (using TLS 1.2 or higher) and when stored on devices or in cloud systems. Unencrypted client files on a shared drive, portable hard drive, or unprotected email server violate this requirement directly. Full-disk encryption for laptops is the floor, not the ceiling.
5. Implement Multi-Factor Authentication
Any system that stores, accesses, or transmits NPI must require MFA. This applies to tax software portals, email systems where client data arrives, remote access tools such as VPN or Remote Desktop Protocol (RDP), and cloud storage platforms. Single-password access to any of these systems is a direct violation of the 2023 rule.
6. Train Employees Regularly
Staff with access to NPI must receive security awareness training that is updated to reflect current threats. For tax practices, this means training must address phishing, business email compromise (BEC), credential theft, and social engineering — the attack vectors most commonly used against tax preparers. Learn more about purpose-built security awareness training for tax firms.
7. Oversee Third-Party Service Providers
If you share NPI with outside vendors — tax software companies, cloud backup providers, payroll processors, or IT support firms — the rule requires you to select them based on their security practices, contractually require them to implement appropriate safeguards, and periodically monitor their compliance. Vendor contracts that are silent on data security are a documented compliance gap.
8. Maintain a Written Incident Response Plan
You need a documented plan for detecting, containing, assessing, and recovering from a security breach. The 2023 update added a specific notification requirement: if a breach affects 500 or more customers, you must notify the FTC within 30 days of discovery. Your incident response plan must address this timeline explicitly. Firms without a written plan cannot demonstrate compliance to an FTC examiner and have no playbook for their team to follow during an active incident.
9. Report to Your Governing Body (5,000+ Customer Records)
For firms that maintain NPI on 5,000 or more customers, the Qualified Individual must report to the board of directors or equivalent governing body at least annually. The report must cover the risk assessment summary, program status, material security events, and any deficiencies identified. Solo practitioners and partnerships with no formal board structure fulfill this by documenting the annual program review in writing.
Implementing FTC Safeguards Rule Compliance: Step-by-Step
Appoint and Document Your Qualified Individual
Formally designate the person responsible for your information security program. Put it in writing — an internal memo, employment agreement addendum, or service contract with an external provider. Without documented designation, you cannot satisfy this foundational requirement.
Complete a Written Risk Assessment
Inventory every system that stores or processes NPI: tax software, email, cloud drives, laptops, external drives. Identify realistic threats — phishing, ransomware, insider misuse, lost devices — evaluate your current controls against each, and document the gaps. This assessment drives every downstream requirement.
Deploy MFA Across All NPI Systems
Enable MFA on email platforms (Microsoft 365 or Google Workspace), tax software portals, VPN and remote desktop connections, and cloud storage. Authenticator apps such as Microsoft Authenticator are preferred over SMS codes, which are vulnerable to SIM-swapping attacks.
Encrypt Data In Transit and At Rest
Confirm TLS 1.2+ is active on your client portal and email system. Enable full-disk encryption (BitLocker for Windows, FileVault for Mac) on all laptops and workstations. Replace consumer-grade file sharing with business-tier encrypted cloud storage covered by a signed data processing agreement.
Audit and Contractually Bind Service Providers
Review every vendor that touches NPI. Confirm they have their own written security programs. Add contractual security requirements — data encryption, breach notification, access controls — to any agreement where they are missing. Retain documentation of this review.
Write and Test Your Incident Response Plan
Document how your firm will detect, contain, and remediate a breach. Include the FTC's 30-day notification requirement for breaches affecting 500 or more customers. Conduct a tabletop exercise at least annually to verify the plan works under simulated pressure.
Train Staff and Compile Your Written Security Program
Deliver security awareness training to all staff with NPI access and document attendance. Compile your Written Information Security Plan (WISP) — the document that ties all controls together and serves as your audit trail for FTC, IRS, and any state regulator that requests evidence of compliance.
FTC Enforcement: What Non-Compliance Actually Costs
The FTC brings civil actions under Section 5 of the FTC Act for Safeguards Rule violations. As of 2024, civil penalties reach $51,744 per violation per day, adjusted annually for inflation. For a small tax firm with a breach affecting hundreds of clients over multiple days — with unencrypted files, no MFA, and no incident response plan all simultaneously in violation — those penalties compound fast.
But the direct FTC penalty is often not the highest-cost outcome. Non-compliance exposes tax preparers to a cascade of secondary consequences:
- State attorney general enforcement — Many states have enacted data security laws aligned with GLBA, and state AGs can bring independent enforcement actions with their own penalty structures
- Client lawsuits — A documented Safeguards Rule violation significantly strengthens a negligence claim. Plaintiffs' attorneys routinely obtain FTC compliance records in discovery
- IRS Electronic Filing Identification Number (EFIN) suspension — The IRS can revoke your EFIN if you fail to maintain adequate data security, effectively shutting down your ability to e-file returns during tax season
- Cyber insurance claim denial — Insurers increasingly scrutinize compliance with mandatory security frameworks. A Safeguards Rule violation at the time of a breach may void coverage
The FTC has also required mandatory third-party security audits as part of settlement agreements — an ongoing cost that can run tens of thousands of dollars annually. For firms that want to understand the full scope of tax-season attack vectors that drive these incidents, our guide to online tax filing security risks 2025 2026 provides current threat context.
FTC Safeguards Rule Requirements: All Firms vs. 5,000+ Customer Records
How the FTC Safeguards Rule Aligns with IRS Requirements
Tax preparers operate under layered compliance obligations. The FTC Safeguards Rule runs alongside IRS Publication 4557 (Safeguarding Taxpayer Data), which independently requires all tax professionals to create and maintain a Written Information Security Plan (WISP). The two frameworks are largely complementary — a properly constructed WISP built to IRS standards will satisfy most FTC Safeguards Rule requirements.
Where the FTC rule adds specificity beyond Publication 4557:
- The 30-day FTC breach notification requirement for incidents affecting 500 or more customers is an FTC-specific obligation with no direct IRS equivalent
- The formal annual penetration testing and vulnerability assessment schedule for firms with 5,000+ customer records goes further than general IRS guidance
- The requirement to submit a written annual report to a governing body applies only under the FTC rule, not IRS Publication 4557
For practical compliance, most firms use the IRS WISP template as their foundation and then extend it to address the additional FTC requirements. Our walkthrough of the IRS publication 5708 WISP template covers how to structure that document. For a closer look at how the full IRS framework maps to broader security requirements, see our resource on tax safeguard compliance 4557.
The NIST Cybersecurity Framework as a Compliance Bridge
Both the FTC and IRS point to the NIST Cybersecurity Framework (CSF) as a reference model for building information security programs. NIST CSF's five functions — Identify, Protect, Detect, Respond, and Recover — map directly onto the nine FTC Safeguards Rule requirements. Firms that organize their security program around NIST CSF produce documentation that satisfies FTC examiners, IRS auditors, and cyber insurers simultaneously. See our deep dive on the NIST incident response framework for how the Respond and Recover functions translate into your incident response plan requirements.
Core Security Controls Required by the FTC Safeguards Rule
Multi-Factor Authentication
Mandatory for every system containing NPI. Authenticator apps and hardware security keys satisfy the requirement; SMS codes are acceptable only where technically necessary.
Encryption In Transit and At Rest
TLS 1.2+ for data moving across networks; full-disk or file-level encryption for stored client records on all devices, servers, and cloud platforms.
Continuous Activity Monitoring
System-level logging and monitoring on all NPI-bearing systems to detect unauthorized access, anomalous behavior, and potential data exfiltration before damage compounds.
Written Incident Response Plan
Documented playbook covering detection, containment, eradication, and FTC notification — 30-day deadline for incidents affecting 500 or more customers.
Security Awareness Training
Annual training for all staff with NPI access, updated to reflect current phishing, ransomware, and social engineering tactics targeting tax and financial service firms.
Vendor Risk Management
Contractual security requirements and periodic compliance monitoring for all third parties — tax software vendors, cloud storage providers, IT support firms — that access NPI.
Common FTC Safeguards Rule Gaps in Tax Practices
After assessing tax and accounting firms across the country, Bellator Cyber Guard consistently identifies the same compliance gaps. Recognizing these early prevents enforcement exposure before the next filing season:
Missing or outdated vendor agreements: Most small tax firms use email and cloud storage without a signed data processing agreement that requires the vendor to maintain appropriate safeguards. Consumer-tier cloud services (personal Dropbox, Gmail without Google Workspace) do not satisfy the rule's vendor oversight requirements — and using them transfers risk directly to you without any contractual protection.
MFA gaps across systems: Firms often enable MFA on their primary tax software portal but leave email and remote access tools protected by password alone. Since client NPI typically arrives first via email, an unprotected inbox is one of the highest-risk compliance gaps in any tax practice. The rule requires MFA on every NPI-bearing system — not just the one that feels most sensitive.
Stale risk assessments: A written risk assessment completed in 2022 does not satisfy the current rule. Any material change — adopting new cloud storage, shifting to remote work, onboarding a new software vendor, or hiring staff with system access — triggers an update requirement. The assessment must reflect your current technology environment.
No written incident response plan: Many firms have an informal sense of what they would do after a breach, but the FTC Safeguards Rule requires a written plan. Without documentation, there is no audit trail for regulators and no playbook for staff managing an active incident under time pressure.
Our pillar guide on cybersecurity for tax professionals covers the complete set of technical and administrative controls required for a fully compliant tax practice. If you are assessing your firm's physical security posture alongside digital controls, our reference on which physical security practice is required for FTI? addresses the physical safeguard dimension often overlooked in Safeguards Rule assessments.
For network-level isolation of systems containing NPI — a specific control recommended under both NIST CSF and the FTC Safeguards Rule's access control requirement — see our technical guide on what is network segmentation.
Get a Free FTC Safeguards Rule Compliance Assessment
Bellator Cyber Guard's compliance specialists will evaluate your information security program against FTC Safeguards Rule requirements and deliver a prioritized remediation roadmap at no cost.
Frequently Asked Questions
Yes. The FTC Safeguards Rule applies to all businesses significantly engaged in financial activities, including solo tax preparers. There is no exemption based on firm size, number of employees, or volume of returns prepared. Firms that maintain NPI on fewer than 5,000 customers have a simplified path for one requirement — the annual written report to a governing body — but all core controls, including MFA, encryption, and incident response planning, apply in full.
The FTC Safeguards Rule is a federal regulation under the Gramm-Leach-Bliley Act enforced by the Federal Trade Commission, with civil penalty authority. IRS Publication 4557 is IRS guidance directing tax professionals to create a Written Information Security Plan (WISP). The two frameworks are closely aligned — a compliant WISP satisfies most FTC Safeguards Rule requirements. The FTC rule adds specific obligations not addressed in Publication 4557: the 30-day breach notification to the FTC, mandatory annual penetration testing for larger firms, and a formal annual written report to a governing body.
Under the 2023 update to the Safeguards Rule, financial institutions — including tax preparers — must notify the FTC within 30 days of discovering a breach that affects 500 or more customers. Notification is submitted through the FTC's designated online reporting portal. You must also follow any applicable state breach notification laws, which may have shorter timelines and require notification to affected individuals and state regulators in addition to the FTC.
The rule requires MFA for any information system that accesses, stores, or transmits customer information. Acceptable methods include authenticator apps (such as Microsoft Authenticator, Google Authenticator, or Duo), hardware security keys (FIDO2/WebAuthn standard), and — where technically necessary — SMS-based one-time codes. Authenticator apps and hardware keys are strongly preferred. SMS-based MFA is vulnerable to SIM-swapping attacks and should be phased out wherever app-based authentication is available.
No. Using a security-compliant vendor does not transfer your FTC Safeguards Rule obligations to that vendor. You remain responsible for your own information security program. You can satisfy specific requirements through qualified service providers — for example, using a compliant cloud storage platform for encrypted data storage or contracting with a managed security firm to serve as your Qualified Individual — but the rule requires you to select vendors based on their security practices, bind them by contract, and periodically monitor their compliance.
The FTC can seek civil penalties up to $51,744 per violation per day under FTC Act Section 5 (adjusted annually for inflation). Beyond direct federal penalties, violations expose tax preparers to state attorney general enforcement actions, client lawsuits in which the documented violation strengthens negligence claims, IRS Electronic Filing Identification Number (EFIN) suspension, and potential denial of cyber insurance claims at breach time. FTC settlements also routinely require mandatory third-party security audits for multi-year periods.
The FTC Safeguards Rule does not impose a fixed update interval, but requires that you review and update the risk assessment whenever circumstances change materially — when you adopt new technology, shift to remote operations, add service providers with NPI access, or experience a security incident. Most compliance advisors recommend a formal annual review as a baseline, with a full reassessment triggered by any material change and at minimum every two years regardless of whether changes occurred.
A Qualified Individual is the person formally designated to oversee, implement, and enforce your information security program. The rule does not specify credentials or certifications — it requires that the person have the knowledge and authority to manage the program effectively. This can be an employee (often the firm owner for small practices) or a qualified external service provider such as a managed security company. The designation must be documented in writing, and for external providers, reflected in the service contract.
Schedule
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



