Skip to content

Free 15-minute cybersecurity consultation — no obligation

Book Free Call
Tax24 min read

FTC Safeguards Rule for Tax Return Preparers (2026)

The FTC Safeguards Rule applies to every tax return preparer. Learn the 9 required elements, penalties up to $51,744/day, and steps to comply in 2026.

FTC Safeguards Rule for Tax Return Preparers (2026) - ftc safeguards rule for a tax return preparer

Who the FTC Safeguards Rule Covers — and Why Tax Preparers Are Not Exempt

If you prepare federal or state tax returns for clients, the FTC Safeguards Rule applies to your practice. It does not matter whether you operate as a solo preparer out of a home office, a seasonal tax service, or a multi-preparer firm. Under the Gramm-Leach-Bliley Act (GLBA) and its implementing regulation, 16 CFR Part 314, tax return preparers are explicitly classified as financial institutions — businesses that are significantly engaged in financial activities.

The FTC finalized substantial amendments to the Safeguards Rule in October 2021, and the most demanding provisions became enforceable on June 9, 2023. Many tax professionals remain unaware of these obligations or assume that small practice size grants them an exemption. It does not.

Every tax return preparer who handles nonpublic personal information (NPI) — which includes names, Social Security numbers, income data, and filing status — must implement a written information security program that meets the rule's specific requirements. This applies whether you file ten returns or ten thousand.

This guide breaks down exactly what the FTC Safeguards Rule requires of a tax return preparer: the nine mandatory program elements, eight technical safeguards, how the rule interacts with IRS Publication 4557, what enforcement looks like in practice, and how to build a compliant program even as a small or solo firm.

If you need to build or audit your current program, start with our free WISP template for 2026 — built to satisfy both FTC and IRS requirements.

Tax Preparer Data Security: By the Numbers

$4.88M
Avg. Data Breach Cost

IBM Cost of a Data Breach Report 2024

$51,744
FTC Fine Per Violation Per Day

Adjusted annually for inflation

68%
Breaches Involve Human Element

Verizon 2024 DBIR

258 Days
Avg. Breach Detection Time

IBM Cost of a Data Breach Report 2024

What the FTC Safeguards Rule Actually Requires

The FTC Safeguards Rule mandates that every covered financial institution — including tax return preparers — develop, implement, and maintain a written information security program. This is not a checkbox exercise. The program must be tailored to the size, complexity, and sensitivity of the information your practice handles, and it must address nine specific elements spelled out in 16 CFR § 314.4.

Think of the rule as a framework rather than a rigid prescription. A two-person tax office is not expected to build the same controls as a bank — but both are expected to have a proportionate, documented program that identifies risks and addresses them systematically.

The Nine Required Elements (16 CFR § 314.4)

  1. Designate a Qualified Individual (QI): Name one person responsible for overseeing your information security program. This can be an employee, an affiliate, or a qualified third-party service provider — such as a managed security provider — with the knowledge, skills, and experience to manage the program effectively.
  2. Conduct a written risk assessment: Identify foreseeable internal and external risks to the security, confidentiality, and integrity of customer information, and assess whether your current safeguards adequately control those risks. The assessment must be documented and dated — an undated risk assessment carries little weight in an FTC investigation.
  3. Design and implement safeguards: Based on your risk assessment, put controls in place. The rule specifies eight categories of required safeguards, detailed in the section below.
  4. Regularly monitor and test safeguards: Implement continuous monitoring or conduct periodic testing of key controls, systems, and procedures to verify they are functioning as intended.
  5. Train and manage staff: All personnel with access to customer information must receive security awareness training. Training must be updated as threats evolve — once at hire is not sufficient. Document every session with the date, topics covered, and attendees.
  6. Oversee service providers: Select and retain service providers that maintain appropriate safeguards, and require that by contract. This includes cloud storage providers, tax software vendors, and payroll processors.
  7. Keep the program current: Evaluate and update your program whenever your operations, technology, or threat environment changes materially — not just on an annual review cycle.
  8. Create a written incident response plan: Document how your practice will respond to and recover from a security event. Practices with fewer than 5,000 customer records are formally exempt from this specific FTC requirement, but IRS and state law obligations still apply.
  9. Report to the board or senior officer annually: Your Qualified Individual must present a written report on the overall status of the information security program to your board of directors or, if you have no board, to a senior officer. This requirement is also waived for practices with fewer than 5,000 customer records.

Small Practice Does Not Mean Exempt Practice

The FTC Safeguards Rule applies to every tax return preparer regardless of firm size. While practices with fewer than 5,000 customer records are exempt from the incident response plan and annual reporting requirements, the remaining seven elements — including the Qualified Individual designation, written risk assessment, and all eight technical safeguards — apply in full. There is no revenue threshold, no minimum return count, and no small-business carve-out.

The Eight Technical and Operational Safeguards

Element three of the Safeguards Rule is where most tax practices fall short. The rule specifies eight categories of safeguards that your information security program must address under 16 CFR § 314.4(c). These are baseline requirements, not optional enhancements.

1. Access Controls

Limit access to customer information to only those employees who need it to perform their jobs. Implement role-based access controls and ensure that access is revoked promptly when an employee leaves or changes roles. Every user account should have the minimum permissions necessary — a principle known as least privilege. Shared logins are a common violation in small tax offices and should be eliminated entirely.

2. Data Inventory and Classification

You must know where customer information lives. That means mapping all systems, databases, paper files, portable drives, and cloud storage that contain nonpublic personal information. Without a data inventory, you cannot protect what you cannot locate. Our guide on tax document encryption requirements provides a practical starting point for this exercise.

3. Encryption

Customer information must be encrypted both in transit — when sent over the internet or email — and at rest, when stored on servers, laptops, and backup media. The FTC does not mandate a specific algorithm, but NIST Special Publication 800-111 recommends AES-256 for storage encryption. Unencrypted tax files transmitted by email remain one of the most exploited vulnerabilities in small tax practices. Attackers intercept these files through man-in-the-middle attacks and email compromise — both well-documented techniques in the MITRE ATT&CK framework.

4. Multi-Factor Authentication (MFA)

The Safeguards Rule explicitly requires Multi-Factor Authentication (MFA) for any individual accessing systems containing customer information. This is one of the most specific technical mandates in the rule. MFA must be implemented on tax software portals, email systems, cloud storage, and any remote access tools your practice uses. A single compromised password without MFA in place can expose every client record in your system.

5. Secure Disposal

When customer information is no longer needed, it must be disposed of securely. For digital records, this means overwriting or cryptographic erasure — deleting a file does not remove it from storage media. For paper records, cross-cut shredding is the minimum acceptable standard. Retention schedules should be documented in your WISP.

6. Change Management

Anticipate and evaluate changes to information systems before implementing them. New software, new hardware, and changes to network architecture all introduce potential risks. A documented change management process catches security gaps before they become exploitable. Even switching tax preparation software or upgrading your operating system qualifies as a change that should be assessed.

7. Monitoring and Testing

You must implement continuous monitoring of systems or conduct periodic penetration testing and vulnerability assessments. The 2023 amendments strengthened this requirement: practices with 5,000 or more customer records must conduct annual penetration testing and biannual vulnerability assessments. Smaller practices must still test their key controls to verify they function as intended.

8. Secure Development Practices

If your practice configures web forms, client portals, or custom applications to collect client data, those systems must be designed with security in mind — including input validation to prevent injection attacks and secure review of any custom code before deployment.

FTC Safeguards Rule Compliance Checklist for Tax Preparers

  • Designate a Qualified Individual to oversee your information security program
  • Complete and document a written risk assessment with dates and findings
  • Inventory all systems, devices, and locations where client NPI is stored
  • Enable multi-factor authentication on all systems with access to client data
  • Encrypt client data both in transit and at rest using AES-256 or equivalent
  • Implement role-based access controls with least-privilege permissions
  • Eliminate all shared login credentials across the practice
  • Schedule recurring security awareness training for all staff and document attendance
  • Review and document security practices of all third-party service providers
  • Obtain signed Data Processing Agreements from each vendor handling client data
  • Establish secure disposal procedures for both digital and paper records
  • Create a written incident response plan with defined roles and notification steps
  • Conduct annual penetration testing or periodic vulnerability assessments
  • Document all security decisions, changes, and reviews with dates and responsible parties

How the FTC Safeguards Rule Interacts With IRS Requirements

Tax return preparers face a layered compliance environment. The FTC Safeguards Rule is federal law enforced by the FTC, but it operates alongside IRS cybersecurity mandates enforced through a separate mechanism. Understanding how these requirements overlap — and where they diverge — is essential for building a program that satisfies both without duplicating effort.

IRS Publication 4557 and the WISP Requirement

The IRS requires all tax preparers handling 11 or more returns to maintain a Written Information Security Plan (WISP) under IRS Publication 4557. This WISP requirement parallels — but does not replace — the FTC Safeguards Rule obligation. A WISP built to meet FTC requirements will generally satisfy IRS Publication 4557 as well, provided it covers IRS-specific elements such as Electronic Filing Identification Number (EFIN) protection and safeguarding of IRS e-Services credentials.

See our in-depth breakdown of IRS WISP requirements for a side-by-side view of how both sets of obligations map to each other.

Where the FTC Safeguards Rule Goes Further

The FTC Safeguards Rule imposes several requirements that IRS Publication 4557 does not explicitly mandate: a formally designated Qualified Individual, a written and dated risk assessment, specific contractual requirements for service providers, a documented change management process, and — for larger practices — written incident response plans and annual reporting to senior leadership. Treating the IRS WISP requirement as your ceiling for compliance leaves your practice exposed to FTC enforcement risk. The FTC rule is the higher standard, and your program should be built to meet it from the outset.

State-Level Data Security Laws

Several states have enacted data security laws that apply to financial institutions and tax preparers independently of federal requirements. New York's SHIELD Act, Massachusetts 201 CMR 17.00, and California's Consumer Privacy Rights Act (CPRA) each impose obligations that may exceed federal standards in specific areas — including breach notification timelines and data minimization requirements.

A Safeguards Rule-compliant program should be reviewed against the laws of every state where you have clients or maintain a physical presence. Our resource on PTIN and WISP requirements for tax preparers provides additional context on how federal and state obligations interact.

FTC Enforcement: What Noncompliance Costs Tax Preparers

The FTC Safeguards Rule carries enforceable legal penalties — it is not advisory guidance. Under Section 5 of the FTC Act (15 U.S.C. § 45(m)), the FTC can pursue civil penalties of up to $51,744 per violation per day, adjusted annually for inflation. In a multi-element enforcement action — where a practice has failed to implement a risk assessment, has no designated Qualified Individual, and lacks staff training — the aggregate exposure can be substantial. Each day of continued violation can be treated as a separate offense.

Beyond FTC penalties, noncompliance exposes your practice to several additional consequences that compound quickly.

IRS EFIN Suspension: The IRS can suspend or revoke your Electronic Filing Identification Number for failure to maintain adequate data security, effectively shutting down your tax practice during filing season. Our EFIN and PTIN protection guide details how to safeguard these credentials and what to do if they are compromised.

Client Litigation: Clients whose data is exposed due to inadequate safeguards can sue under state consumer protection laws. Data breach litigation has become a standard follow-on to any significant incident, and settlements in the financial services space routinely reach six to seven figures. Courts increasingly look at whether the business had a documented security program in place — and whether it followed that program.

State Regulatory Action: State attorneys general can bring independent enforcement actions under state data security and consumer protection laws, layering additional penalties on top of any federal action. New York, Massachusetts, and California have been particularly active in this space.

Reputational Damage: A reported data breach in the tax preparation space has outsized consequences. Clients trust you with their most sensitive financial information — Social Security numbers, income records, bank accounts — and a publicly reported incident often ends those relationships permanently. That revenue loss is a harm no penalty payment can reverse.

FTC enforcement of the Safeguards Rule has intensified since the 2023 amendments took effect. While the agency historically focused on large financial institutions, recent consent decrees and civil investigative demands have targeted smaller financial services companies. Tax preparers cannot assume they fall below the agency's enforcement threshold. For a detailed look at the most common attack vectors targeting practices like yours, see our guide on cyberattacks on tax firms.

FTC Enforcement Is Accelerating in 2026

Since the 2023 amendments took full effect, the FTC has expanded enforcement beyond large financial institutions to include smaller financial services companies. Civil penalties of up to $51,744 per violation per day — combined with IRS EFIN suspension risk and state attorney general actions — make noncompliance a significant financial threat to tax practices of any size. If your information security program has gaps, the time to address them is before an investigation begins, not after.

Building Your FTC-Compliant Information Security Program

1

Designate Your Qualified Individual

Appoint an internal employee or contract with a qualified third-party provider to oversee your information security program. This person must have the authority, knowledge, and expertise to make security decisions for your practice.

2

Conduct a Written Risk Assessment

Identify all systems storing client NPI, document internal and external threats, and evaluate whether current controls adequately address each risk. Date the assessment and name the responsible party.

3

Implement the Eight Required Safeguards

Deploy access controls, complete your data inventory, enable encryption, enforce MFA, establish secure disposal, document change management, set up monitoring, and address secure development practices.

4

Document Your WISP

Formalize your Written Information Security Plan to cover both FTC Safeguards Rule and IRS Publication 4557 requirements. Include policies, procedures, responsible parties, and scheduled review dates.

5

Establish Vendor Oversight

Review security practices of all third-party service providers — tax software, cloud backup, email, payroll. Obtain Data Processing Agreements and document contractual safeguard commitments.

6

Train All Staff

Deliver security awareness training to every employee with access to client data. Schedule recurring sessions at least annually and document attendance, topics, and completion dates.

7

Test and Monitor Controls

Implement continuous monitoring or schedule periodic penetration testing and vulnerability assessments. Document all test results and any remediation actions taken.

8

Review, Report, and Update Annually

Your Qualified Individual should report program status to senior leadership at least once per year. Update the entire program whenever operations, technology, or threats change materially.

Practical Compliance Guidance for Small and Solo Tax Practices

Most solo and small-firm tax preparers do not have a dedicated IT department. The FTC Safeguards Rule accommodates this reality — the rule scales requirements to the size and complexity of your operation — but it does not eliminate the obligation to have a documented, functioning security program. The standard is proportionate, not absent.

Start With Your WISP

Your Written Information Security Plan is the foundation of a Safeguards Rule-compliant program. It documents who is responsible for security, what risks exist, what controls are in place to address them, and how you will respond to incidents. Both the IRS and the FTC require it. Our free WISP template for 2026 is built to meet both IRS Publication 4557 and FTC Safeguards Rule requirements. For step-by-step guidance on building yours from scratch, see how to create a WISP.

Address Your Vendors First

The most commonly overlooked Safeguards Rule requirement for small tax practices is service provider oversight. Review the security practices of your tax software vendor, your cloud backup provider, your email host, and your payroll processor. Require each to contractually commit to maintaining appropriate safeguards and to notify you promptly in the event of a security incident. Many vendors will provide a Data Processing Agreement on request — ask for one, and document that you asked.

For guidance on evaluating your software stack, see our analysis of whether tax preparation software is secure for personal information.

Document Every Decision

In an FTC enforcement action or client litigation, documented controls carry far more weight than undocumented practices. Every risk assessment, every training session, every vendor review, and every change to your security program should be recorded in writing with a date and the name of the person responsible. Regulators and plaintiffs' attorneys look for documentation gaps as evidence of willful noncompliance — and the absence of records is treated as the absence of controls.

Defend Against the Most Common Threats

Phishing attacks and ransomware are the two threat categories most directly relevant to the risk assessment your Safeguards Rule program must address. Tax preparers are high-value targets because they hold concentrated stores of NPI — Social Security numbers, income records, and bank account details — all usable for identity theft and fraudulent filings. Your program should include specific controls addressing these threats: email filtering, Endpoint Detection and Response (EDR), secure offsite backups, and staff training on recognizing social engineering attempts. These controls map directly to the safeguard categories the FTC rule requires under § 314.4(c).

Need Help With FTC Safeguards Rule Compliance?

Bellator Cyber Guard's tax cybersecurity specialists have helped thousands of tax professionals build information security programs that satisfy both FTC and IRS requirements.

Get a Free FTC Safeguards Rule Gap Assessment

Our tax cybersecurity specialists will evaluate your current information security program against FTC Safeguards Rule requirements, identify gaps, and provide a prioritized remediation roadmap — at no cost to your practice.

Frequently Asked Questions

Yes. The FTC Safeguards Rule applies to all tax return preparers classified as financial institutions under the Gramm-Leach-Bliley Act, regardless of whether they operate full-time, part-time, or seasonally. If you prepare federal or state tax returns for clients and handle nonpublic personal information, you are covered. There is no minimum number of returns filed or hours worked that would exempt a seasonal or part-time preparer from the rule's requirements.

A Qualified Individual (QI) is the person designated to oversee and implement your information security program under 16 CFR § 314.4(a). This role requires sufficient knowledge, skills, and experience to manage data security effectively. The QI can be an employee within your practice, an affiliate, or a qualified third-party service provider such as a managed security firm. Even if you outsource this role, your practice retains ultimate accountability for the program's compliance and effectiveness.

Both require a written security plan, but the FTC Safeguards Rule is broader and more prescriptive. It mandates a formally designated Qualified Individual, a documented and dated risk assessment, specific contractual requirements for service providers, a formal change management process, and — for practices with 5,000 or more customer records — a written incident response plan and annual reporting to senior leadership. IRS Publication 4557 focuses on practical safeguards specific to tax data but does not impose all of these governance requirements. A program built to FTC standards will generally satisfy IRS requirements, but a program built only to IRS standards may leave you exposed to FTC enforcement risk.

Nonpublic personal information (NPI) includes any personally identifiable financial information a client provides to obtain a financial product or service. For tax preparers, this includes Social Security numbers, income and wage data, bank account and routing numbers, filing status, dependent information, employer identification numbers, and any other data collected during the tax preparation process. It also includes information derived from transactions, such as payment histories and account balances. Essentially, if the information came from a client in connection with preparing their return, it is almost certainly NPI.

Under the FTC Safeguards Rule, practices with fewer than 5,000 customer records are formally exempt from the written incident response plan requirement. However, IRS Publication 4557 and most state data breach notification laws still require tax preparers to have documented procedures for responding to security incidents. From a practical standpoint, every tax practice should maintain an incident response plan regardless of size. A data breach without documented response procedures results in slower containment, greater data loss, and significantly higher regulatory and legal exposure.

The FTC can impose civil penalties of up to $51,744 per violation per day under Section 5 of the FTC Act. In multi-element enforcement actions — where a practice fails on several requirements such as risk assessment, staff training, and Qualified Individual designation — penalties accumulate for each separate violation. Beyond FTC fines, noncompliant practices face IRS EFIN suspension, client lawsuits under state consumer protection laws, independent state attorney general actions, and lasting reputational damage that can end client relationships permanently.

The requirement depends on your practice size. Practices with 5,000 or more customer records must conduct annual penetration testing and biannual vulnerability assessments under the 2023 amendments. Smaller practices are not required to conduct formal penetration tests but must still implement continuous monitoring or periodic testing of key controls to verify they function as intended. Regardless of size, regular testing helps identify vulnerabilities before attackers exploit them and demonstrates due diligence if the FTC investigates your practice.

Documentation is your primary defense. Maintain written records of your risk assessment (dated and signed), Qualified Individual designation, security policies and procedures, staff training logs with dates and attendees, vendor security reviews and contracts, change management records, and monitoring or test results. The FTC evaluates whether you have a documented, functioning program — not whether your security is theoretically flawless. Practices that cannot produce records of their security activities are treated as having no program in place, regardless of what controls may actually exist.

A WISP template provides a strong starting point, but the FTC requires your information security program to be tailored to your specific practice — its size, complexity, the nature of the data you handle, and your particular risk profile. A generic, unmodified template will not satisfy the rule. You must customize it to reflect your actual systems, identified risks, implemented controls, and designated personnel. Bellator Cyber Guard's free WISP template for 2026 is designed to meet both FTC Safeguards Rule and IRS Publication 4557 requirements and includes guidance for customization.

Yes. Using cloud-based tax software does not transfer your compliance obligations to the software vendor. You remain responsible for ensuring that your overall information security program meets Safeguards Rule requirements — including verifying that your cloud providers maintain appropriate safeguards and are contractually obligated to protect client data. You must also implement MFA on cloud-based platforms, manage access controls for all users, and include cloud systems in your data inventory and risk assessment. The vendor's security is part of your compliance obligation, not a substitute for it.

Share

Share on X
Share on LinkedIn
Share on Facebook
Send via Email
Copy URL
(800) 492-6076
Share

Schedule

Need help with IRS compliance?

Our tax cybersecurity specialists can review your security posture and help you get compliant.

Protect your tax practice from cyber threats

Schedule a free consultation to assess your firm's security posture.