
A Written Information Security Plan (WISP) is a federally mandated documented framework that organizations must implement to protect sensitive customer information under the Gramm-Leach-Bliley Act (GLBA) and the FTC Safeguards Rule. Creating a WISP requires tax professionals, financial institutions, and businesses handling sensitive data to implement specific technical safeguards including multi-factor authentication, encryption, risk assessments, and incident response procedures.
As of June 2023, the IRS requires all tax preparers maintaining a Preparer Tax Identification Number (PTIN) to attest to WISP compliance on Form W-12, making this documentation a legal prerequisite for practicing tax preparation. The regulatory landscape surrounding creating a WISP has fundamentally shifted from voluntary best practice to mandatory legal obligation.
Key Takeaway
Step-by-step guide to creating a Written Information Security Plan for your tax practice. Meet IRS requirements and protect client data.
WISP Implementation By The Numbers
Initial WISP development time for small practices
Breaches involving human factors (Verizon 2024)
Cost reduction with incident response plans (IBM)
Understanding the Legal Foundation for Creating a WISP
The legal requirement for creating a WISP stems from multiple overlapping regulatory frameworks that collectively establish comprehensive information security obligations. The Gramm-Leach-Bliley Act, enacted in 1999, fundamentally redefined privacy and security requirements for financial institutions by requiring organizations to explain information-sharing practices and protect sensitive data.
The FTC's Safeguards Rule, originally implemented in 2003 under GLBA authority and substantially amended in December 2021, provides specific implementation requirements that transform general security obligations into concrete technical mandates. The IRS reinforces these requirements through multiple publications and by making WISP compliance a condition of PTIN renewal.
The FTC Safeguards Rule explicitly defines covered entities as "financial institutions," a category that encompasses tax preparation services under GLBA's broad definition. This classification subjects tax professionals to identical information security requirements as banks, credit unions, and investment firms.
2021 Safeguards Rule Requirements
Multi-Factor Authentication
Required for all accounts accessing customer information
Data Encryption
Encryption of data both in transit and at rest
Penetration Testing
Regular vulnerability assessments for qualifying organizations
Incident Response
Documented procedures with notification protocols
Comprehensive Step-by-Step Guide to Creating a WISP
Creating a WISP becomes systematically manageable when approached through structured phases, each building upon previous foundations. Most small to mid-size tax practices can complete initial WISP development in 15-20 focused hours distributed over a 30-60 day implementation period, with ongoing maintenance requiring approximately 2-4 hours quarterly for reviews and updates.
This investment protects against regulatory penalties, reduces breach likelihood, demonstrates professional diligence, and can reduce cyber insurance premiums by 15-30% according to industry underwriting standards.
7-Phase WISP Implementation Process
Conducting the Comprehensive Risk Assessment
Risk assessment forms the foundational cornerstone when creating a WISP. The FTC explicitly requires organizations to identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information.
Designating the Qualified Individual
The FTC Safeguards Rule mandates that organizations designate a Qualified Individual specifically responsible for implementing and supervising the comprehensive information security program.
Implementing Essential Technical Safeguards
Technical safeguards form the operational core when creating a WISP that genuinely protects sensitive information. The FTC Safeguards Rule mandates specific technical controls including encryption and multi-factor authentication.
Establishing Access Controls and Authentication Standards
Creating a WISP requires rigorous implementation of the principle of least privilege throughout your organization. Employees receive only the minimum system access necessary to perform their specific job functions.
Developing the Comprehensive Incident Response Plan
A comprehensive, tested incident response plan represents a mandatory component when creating a WISP under FTC requirements. The plan must document specific procedures for responding to security events.
Implementing Required Security Awareness Training
Creating a WISP mandates documented security awareness training for all personnel with any level of access to customer information. Training must occur initially upon hire and at least annually thereafter.
Managing Service Provider Security Requirements
Creating a WISP requires comprehensively addressing third-party vendor risks that extend your organization's attack surface. Organizations are responsible for ensuring service providers implement appropriate safeguards.
Risk assessment forms the foundational cornerstone when creating a WISP. The FTC explicitly requires organizations to identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information. This assessment must be formally documented and address three critical dimensions: information systems and data storage, detected security events and vulnerabilities, and organizational responses to identified risks.
The IRS Publication 4557 provides tax-specific guidance that complements the general NIST framework approach.
The FTC Safeguards Rule mandates that organizations designate a Qualified Individual specifically responsible for implementing and supervising the comprehensive information security program. For solo practitioners, this responsibility defaults to the owner by necessity. Larger firms should designate someone with sufficient organizational authority, appropriate technical aptitude, and comprehensive operational knowledge to coordinate security efforts effectively across departments.
Key Takeaway
The Qualified Individual need not possess advanced cybersecurity certifications but must understand the organization's operations thoroughly and have authority to implement security measures and policy changes.
Technical safeguards form the operational core when creating a WISP that genuinely protects sensitive information. The FTC Safeguards Rule mandates specific technical controls including encryption of customer information both in transit and at rest, multi-factor authentication for all accounts accessing sensitive data, and secure development practices for custom applications.
Small tax practices should strategically prioritize controls addressing the most common attack vectors while remaining operationally feasible for staff to use consistently. These controls must be appropriate to the organization's size, complexity, and scope of activities according to federal requirements.
Creating a WISP requires rigorous implementation of the principle of least privilege throughout your organization. This fundamental security concept means employees receive only the minimum system access and data permissions necessary to perform their specific job functions effectively. Overly broad access permissions dramatically increase organizational risk by expanding the potential impact of compromised credentials, insider threats, or social engineering attacks.
A comprehensive, tested incident response plan represents a mandatory component when creating a WISP under FTC requirements. The plan must document specific procedures for responding to security events including initial detection, containment to prevent spread, eradication of threats, recovery to normal operations, and post-incident analysis for continuous improvement.
According to IBM's Cost of a Data Breach Report, organizations with documented incident response plans and regularly tested response teams save an average of $2.66 million per breach compared to organizations without formal plans—a compelling financial justification beyond regulatory compliance.
Creating a WISP mandates documented security awareness training for all personnel with any level of access to customer information. The FTC Safeguards Rule explicitly requires organizations to provide training appropriate to employees' specific roles and responsibilities within the organization. Training must occur initially upon hire or role change and at least annually thereafter, with additional training sessions following security incidents, significant program changes, or emerging threat identification.
Critical Security Statistic
According to the Verizon 2024 Data Breach Investigations Report, 68% of breaches involved human elements including social engineering attacks, errors, or misuse—threats that training directly addresses.
WISP Documentation Requirements and Maintenance Best Practices
Creating a WISP requires producing specific documentation that demonstrates both regulatory compliance and operational implementation. The IRS provides a foundational template through Publication 5708 that serves as an excellent starting point, but this template must be substantially customized to reflect your actual practices, specific risks, and implemented controls.
Generic, unmodified templates consistently fail regulatory examinations because they demonstrate no genuine understanding of your organization's specific risks, operations, or security posture.
Frequently Asked Questions
Effective WISPs for small tax practices typically range from 20-40 pages including policies, procedures, and supporting documentation appendices. Document length matters significantly less than comprehensive coverage of all nine FTC-required components and operational usability for staff reference. Your WISP must address all mandatory elements with sufficient procedural detail to guide actual implementation, but remain accessible and clear enough that employees actually reference it during security decision-making.
Many tax professionals successfully create compliant WISPs independently using IRS templates and authoritative published guidance. The IRS Publication 5708 provides an excellent starting template with tax-specific considerations. However, professional cybersecurity assistance makes compelling sense when you operate multiple office locations, employ more than 10-15 people, maintain complex technology environments with custom applications, or have extremely limited time availability during tax season. Professional WISP development services typically cost $2,500-7,500 for small practices.
Failure to create and implement a compliant WISP carries severe multi-dimensional consequences across regulatory, financial, and professional domains. The FTC can impose civil penalties up to $100,000 per violation under GLBA authority, with each affected customer potentially constituting a separate violation creating exponential penalty exposure. The IRS can revoke your PTIN entirely, preventing you from preparing returns professionally and destroying your practice overnight. Falsely attesting to WISP compliance on IRS Form W-12 constitutes perjury under 18 U.S.C. § 1621, punishable by fines and up to five years imprisonment.
WISPs require regular ongoing maintenance through both scheduled periodic reviews and event-triggered immediate updates. Conduct quarterly brief reviews (30-60 minutes) confirming no major operational changes require WISP updates and reviewing any security events or near-misses. Perform comprehensive annual reviews including full risk assessment updates, complete control effectiveness testing, staff training delivery, and thorough documentation review ensuring continued accuracy and relevance.
Creating a WISP provides legitimate competitive differentiation in the increasingly security-conscious 2025 marketplace. Security-conscious clients progressively prioritize data protection capabilities when selecting tax professionals, particularly high-net-worth individuals and business clients with sophisticated security awareness. Appropriately mention your WISP and security program in engagement letters, on your website's dedicated security page, in new client onboarding materials, and in professional directory profiles.
A WISP is a specific regulatory requirement with nine explicitly mandated components under the FTC Safeguards Rule implementing GLBA obligations. General cybersecurity policies may address some security topics adequately but won't necessarily meet the comprehensive legal requirements imposed on tax professionals as GLBA-covered financial institutions. Creating a WISP requires comprehensive information security documentation including formal risk assessment with documented findings, designated Qualified Individual with specified authority, and technical safeguards implementation addressing identified risks.
Advanced WISP Strategies for Enhanced Security Posture
Organizations that have completed foundational WISP implementation can substantially enhance security posture through advanced strategies exceeding minimum compliance requirements. These approaches provide defense-in-depth protecting against sophisticated attacks, systematically reduce attack surface exposure, and demonstrate security maturity that differentiates your practice in competitive engagements and reduces cyber insurance premiums.
Insurance Benefits
Comprehensive WISP implementation can reduce cyber insurance premiums by 15-30% according to industry underwriting standards, providing ongoing financial benefits beyond compliance.
Conclusion: Creating a WISP Represents Essential Practice Management
Creating a WISP has permanently evolved from optional best practice to mandatory business operation for all tax professionals handling sensitive client information. The regulatory environment fundamentally shifted with the FTC's 2021 Safeguards Rule amendments establishing specific technical requirements and the IRS's 2023 PTIN attestation requirements making compliance a professional credential prerequisite.
Federal agencies actively enforce compliance through examinations and substantial penalties. Cyber insurance carriers increasingly deny breach claims for organizations lacking proper security documentation. Sophisticated clients progressively evaluate information security capabilities when selecting tax professionals, making security posture a competitive differentiator rather than back-office administrative burden.
The competitive landscape increasingly favors tax practices demonstrating verifiable commitment to data protection through documented, tested, regularly updated information security programs. The tax professionals who thrive in 2025 and beyond will be those who genuinely protect client data through comprehensive WISPs that exceed minimum compliance thresholds.
Protect Your Tax Practice Today
Schedule a free consultation to discuss your cybersecurity needs and IRS compliance requirements.
Free Consultation
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



