Skip to content

Free 15-minute cybersecurity consultation — no obligation

Book Free Call
Tax & IRSHow-To Guides41 min read

IRS WISP Example: Build Your Tax Firm's Security Plan

See a real IRS WISP example for tax professionals. Learn what IRS Publication 4557 requires, get sample policy language, and protect client data today.

BC
Bellator Cyber Guard

What Is an IRS WISP and Who Must Have One?

If you prepare federal tax returns for clients, the IRS requires you to maintain a Written Information Security Plan (WISP) — a formal, written document that describes exactly how your firm protects client data. This requirement comes directly from IRS Publication 4557, Safeguarding Taxpayer Data, which applies to every tax professional who handles federal returns, regardless of firm size.

A WISP is not a checkbox exercise. It is an operational document that maps your firm's specific risks, describes the technical and administrative controls you have in place, and defines exactly what happens when a data breach occurs. The IRS — in coordination with the Federal Trade Commission (FTC) Safeguards Rule under the Gramm-Leach-Bliley Act (GLBA) — treats an absent or incomplete WISP as a compliance failure that can result in civil penalties and referral to state licensing boards.

This guide provides a real IRS WISP example: actual policy language, required section breakdowns, and the 2026 compliance standards your plan must meet. Whether you are writing your first WISP or auditing an existing one, the sections below give you a practitioner-level model to follow.

Two IRS publications govern this requirement:

  • IRS Publication 4557 — Safeguarding Taxpayer Data: the primary guidance document for tax professionals on data security obligations
  • IRS Publication 5709 — A Step-by-Step Guide to Creating a Written Information Security Plan: a template-based guide updated in April 2024 specifically to help smaller practices build compliant WISPs

Together, these publications define the IRS WISP example framework that every compliant tax preparer should follow. See also our deeper analysis of IRS WISP requirements and the full breakdown of what a Written Information Security Plan must contain.

Tax Preparer Data Security: By the Numbers

$4.88M
Average Data Breach Cost

IBM Cost of Data Breach Report 2024 — applies to firms of all sizes, not just enterprises

68%
Breaches Involve Human Element

Verizon Data Breach Investigations Report 2024 — phishing, credential theft, and social engineering dominate

277 Days
Average Breach Detection Time

IBM Cost of Data Breach Report 2024 — time to identify and contain a confirmed breach

The Nine Required Sections of an IRS WISP

IRS Publication 5709 organizes a compliant WISP into nine core sections. Every IRS WISP example must address all nine — omitting even one section leaves your firm exposed to both regulatory scrutiny and real security gaps. Below is each required section with the policy language the IRS expects to see.

1. Designation of a Security Coordinator

Your WISP must name a specific individual — not a role or department — as your Information Security Program Coordinator. This person owns the plan, updates it annually, and is the point of contact during a breach. For a sole proprietor, that is you. For a multi-partner firm, designate one named partner or office manager with documented authority to enforce the plan firm-wide.

2. Risk Assessment

Before you can protect client data, you must identify where it lives. Your risk assessment must catalog every location — physical and digital — where Personally Identifiable Information (PII) is stored, processed, or transmitted. This includes desktop workstations, laptops, mobile devices, cloud storage, email servers, physical file cabinets, and every third-party software platform your firm uses.

The risk assessment does not need to be a lengthy technical document. For a small practice, a two-page inventory that lists each data location and its associated risks — unauthorized access, theft, hardware failure, ransomware — satisfies the IRS requirement. Update this inventory every time you adopt a new tool or change your infrastructure.

3. Safeguards Implementation

This is the operational core of your WISP. Safeguards fall into three categories the IRS and FTC Safeguards Rule both recognize:

  • Technical safeguards: Multi-Factor Authentication (MFA) on all systems, disk encryption on laptops and workstations, encrypted email for client communications, automatic screen lock, firewall and endpoint protection software
  • Administrative safeguards: Written access control policies, annual security training for all staff, background checks for employees with data access, incident response procedures
  • Physical safeguards: Locked filing cabinets for paper records, restricted access to server rooms, secure shredding (cross-cut or micro-cut) of documents containing PII, visitor sign-in logs

For a detailed breakdown of encryption standards that apply to tax data, see our guide on tax document encryption requirements.

How to Write Your IRS WISP: Step-by-Step

1

Download IRS Publication 5709

Start with the IRS's own template (Rev. 4-2024). It provides fillable sections for each required WISP component and walks through the FTC Safeguards Rule simultaneously. This is the authoritative IRS WISP example framework.

2

Conduct Your Data Inventory

List every location where client PII exists — cloud drives, local servers, email, paper files, tax software databases, and portable drives. This inventory becomes the foundation of your risk assessment section.

3

Assign Your Security Coordinator

Name the specific individual responsible for the plan. Document their contact information and define their authority to enforce security policies firm-wide, including the ability to revoke access and direct breach response.

4

Document All Existing Safeguards

Write down every technical control (antivirus, MFA, encryption), administrative control (training schedule, access policies), and physical control (locked cabinets, clean desk policy) already in place at your firm.

5

Identify Gaps and Remediate

Compare your existing controls against IRS Publication 4557's requirements. Document any gaps and create a remediation timeline with target resolution dates. Documented gaps with plans are far better than undocumented gaps with none.

6

Write Your Incident Response Procedures

Define exactly what your firm does when a breach occurs: who gets notified, what systems get isolated, how you contact the IRS Identity Theft Unit (1-800-908-4490), and how you notify affected taxpayers per your state's breach notification law.

7

Train All Staff and Obtain Signatures

Deliver documented security training to every employee with data access. Obtain signed acknowledgment forms confirming each person has read and understood the current version of the WISP.

8

Schedule Your Annual Review

Set a calendar reminder to review and re-sign your WISP every year — or any time your firm adopts new technology, hires or terminates employees, or experiences a security incident.

IRS WISP Example: Sample Policy Language for Each Required Section

The sections below provide ready-to-adapt policy language drawn from IRS Publication 5709 requirements and the FTC Safeguards Rule. Replace bracketed placeholders with your firm's specific details. This is not a copy-paste document — you must tailor each section to reflect your actual practices, actual technology, and actual risks. An IRS WISP example that still contains generic placeholder text is a compliance failure, not a compliance solution.

Employee Training Policy (Sample)

"All [Firm Name] employees with access to client data must complete information security awareness training within 30 days of hire and annually thereafter. Training covers: phishing identification, password security, secure document handling, clean desk policy, and breach reporting procedures. Completion is documented with a signed acknowledgment form retained in each employee's personnel file for a minimum of three years."

For context on the phishing threats your staff training should address, see our guide on phishing attacks targeting tax professionals.

Terminated Employee Access Revocation (Sample)

"Upon termination or resignation of any employee, [Firm Name]'s Security Coordinator will revoke all system access — including email, tax software, cloud storage, and VPN — within one business hour of the separation being confirmed, and before the employee completes an exit interview. Physical access credentials (keys, keycards) are collected at the exit interview. A termination checklist documenting completed access revocation is signed by the Security Coordinator and retained for three years."

Third-Party Vendor Management (Sample)

"[Firm Name] will only share client PII with third-party service providers who have executed a written data security agreement confirming they maintain safeguards equivalent to those required under the FTC Safeguards Rule. All vendor agreements are reviewed annually by the Security Coordinator. A current list of approved vendors and their data access scope is maintained as Appendix B of this plan."

The IRS explicitly requires you to vet all software providers, payroll platforms, and cloud storage vendors under this provision. For a full treatment of the FTC Safeguards Rule's application to tax preparers, see our analysis of the FTC Safeguards Rule for tax preparers.

Data Retention and Disposal (Sample)

"Client records containing PII are retained for a minimum of seven years from the date of filing, or longer if required by applicable federal or state law. Upon expiration of the retention period, paper records are destroyed using a cross-cut or micro-cut shredder, or by a certified third-party shredding service that provides a Certificate of Destruction. Electronic records are securely deleted using software that overwrites data in conformance with NIST Special Publication 800-88, Guidelines for Media Sanitization."

The seven-year retention minimum aligns with IRS audit statute of limitations periods and is the most commonly cited standard across state-level WISP requirements. Referencing NIST SP 800-88 for electronic media disposal adds measurable specificity that auditors look for when reviewing a plan for genuine operational grounding.

IRS WISP Coverage: Minimal vs. IRS-Compliant vs. Best Practice

FeatureMinimal (At Risk)RecommendedIRS-CompliantBest Practice
Security CoordinatorRole only, no nameNamed individualNamed individual + named backup
Risk AssessmentNone documentedAnnual written assessmentAnnual + triggered by any material change
Multi-Factor AuthenticationNot mentionedRequired on all client data systemsMFA on all systems, phishing-resistant method specified
Employee TrainingVerbal only, no recordsAnnual documented training + signed acknowledgmentsAnnual training + simulated phishing exercises
Vendor ManagementNo written agreementsWritten data security agreements on fileWritten agreements + annual vendor security reviews
Incident ResponseNo written proceduresWritten IRS and taxpayer notification planWritten plan + annual tabletop exercise
Data DisposalStandard delete or trash binSecure wipe per NIST SP 800-88Certified disposal vendor + destruction certificates retained
WISP Review FrequencyNever or ad hocAnnual mandatory reviewAnnual + after every incident or technology change

IRS Requirement: Every Tax Preparer Must Have a WISP

IRS Publication 4557 requires every tax professional who handles federal tax returns to maintain a Written Information Security Plan — regardless of firm size. A sole proprietor filing 5 returns per year carries the same WISP obligation as a 50-person CPA firm. The FTC Safeguards Rule, which also applies to tax preparers as "financial institutions" under GLBA, adds enforceable federal teeth to this requirement. Operating without a documented WISP exposes your PTIN, EFIN, and state preparer license to regulatory action.

IRS Publication 5709: The Official WISP Template Explained

In April 2024, the IRS released Revision 4 of Publication 5709, "Written Information Security Plan — A Step-by-Step Guide." This is the closest thing to an official IRS WISP example, and it reflects current FTC Safeguards Rule requirements that took full effect for tax preparers in 2023.

Publication 5709 is structured as a fillable PDF that walks you through each required section. Key updates in the 2024 revision include explicit language around four areas that smaller practices frequently overlook:

  • Multi-Factor Authentication: The FTC Safeguards Rule now requires MFA on any system that contains or accesses customer financial data. Publication 5709 includes a dedicated MFA section your WISP must address by name — listing each system and the authentication method deployed.
  • Encryption in transit and at rest: The revised template distinguishes between encryption of stored data (at rest) and data transmitted via email or file transfer (in transit). Both are required, and your WISP must specify which tools or protocols you use for each.
  • Access control and least privilege: Employees should only access the specific client records necessary for their role. Publication 5709 provides sample language for documenting your access control matrix, including what happens when an employee changes roles internally.
  • Security event logging: The updated guidance recommends retaining system access logs for a minimum of two years to support incident investigation. Your WISP should specify which systems generate logs and where those logs are stored.

If you have not reviewed your WISP against the 2024 version of Publication 5709, that review is overdue. Tax software providers including Drake, Lacerte, and ProSeries reference this publication in their own security documentation. Use our free WISP template for 2026 as a starting framework, then customize it against the actual risks your practice faces.

For practices that also serve business clients subject to state privacy laws — particularly those in California (CCPA), Massachusetts (201 CMR 17), or New York (SHIELD Act) — your WISP may need to incorporate additional state-specific requirements on top of the federal IRS baseline. These state frameworks generally require the same core elements as the IRS standard but may impose shorter breach notification windows and broader definitions of covered personal information.

Essential Components of a Strong IRS WISP

Designated Security Coordinator

A named individual who owns, updates, and enforces the WISP. Not a job title — a specific person with documented authority and a defined backup when they are unavailable.

Written Risk Assessment

A documented inventory of where client PII exists, who can access it, and what threatens it. Updated annually and any time your technology or staffing changes materially.

Multi-Factor Authentication

MFA required on all systems containing taxpayer data per the FTC Safeguards Rule. Phishing-resistant MFA — authenticator apps or hardware keys — is preferred over SMS-based codes.

Incident Response Plan

Step-by-step breach procedures including IRS Identity Theft Unit notification (1-800-908-4490), client notification, system isolation, forensic documentation, and breach log maintenance.

Employee Training Program

Annual documented training with signed acknowledgments retained for three years. Must cover phishing identification, password hygiene, physical security, and breach reporting.

Vendor Security Agreements

Written data security agreements with every third-party vendor who touches client PII — including tax software providers, payroll processors, cloud storage platforms, and IT support contractors.

Maintaining, Testing, and Updating Your WISP

Writing your WISP is the first step. Keeping it current and operational is where most small practices fall short. The IRS does not accept a static document written once and filed away. A compliant WISP is a living document — it must evolve as your firm grows, your technology changes, and new threats emerge.

Annual Review Requirements

Schedule your WISP review every year, ideally before tax season begins. During the review, confirm that:

  • Your Security Coordinator designation is still accurate — people change roles and leave firms
  • Your data inventory reflects every current system, including any new software adopted since the last review
  • All vendor agreements are current and cover current data processing activities
  • Employee training records are complete and no staff member is overdue for recertification
  • Your incident response contact list, including the IRS Identity Theft Unit number, is current

Triggered Updates

Beyond the annual review, your WISP must be updated any time a material change occurs at your firm. The IRS and FTC Safeguards Rule both treat a plan that no longer reflects your actual operations as effectively non-compliant. Material changes include:

  • Hiring or terminating an employee with data access
  • Adopting a new tax software platform, cloud storage provider, or communication tool
  • Moving offices or changing your physical security setup
  • Experiencing a security incident, even one that did not result in a confirmed breach
  • A change in federal or state law that affects your data security obligations

The ransomware threat to tax practices is one of the fastest-evolving risks your WISP should address. A ransomware incident response section — including offline backup procedures and recovery time objectives — is now expected by IRS examiners who review WISPs during preparer compliance checks.

Documenting Breaches and Security Incidents

If your firm experiences a data breach or security incident, your WISP must require you to document it in writing regardless of scale. That documentation should include: the date and nature of the incident, the data affected, the corrective actions taken, and the notification steps completed. This breach log becomes part of your WISP and demonstrates that your security program is responsive and operational rather than theoretical.

For additional guidance on building a defensible breach response posture, see our overview of cyberattacks on tax firms and the incident patterns the IRS most commonly investigates during preparer compliance reviews.

Common IRS WISP Mistakes and How to Avoid Them

After reviewing WISPs from small and mid-size tax practices across multiple states, Bellator Cyber Guard's security team consistently identifies the same patterns of non-compliance. These are not obscure technicalities — they are the gaps that auditors flag first and that attackers exploit most often.

Using a Generic Template Without Customization

Downloading an IRS WISP example template and submitting it unchanged is the single most common mistake. Your WISP must reflect your actual practice: your specific software tools, your actual employee count, your real data storage locations. A template that references "cloud storage" without naming the specific platforms you use, or that lists "MFA" without specifying how it is configured, does not meet the IRS standard. Auditors look for specificity. Generic language signals that the plan was never actually implemented.

Our collection of best WISP templates for accountants and accounting firm WISP examples provides additional reference points across firm sizes and practice types — all formatted for practical customization rather than one-size compliance theater.

No Incident Response Contact List

Many WISPs describe what to do during a breach in general terms but omit the specific contacts required for immediate notification. Your incident response section must include:

  • IRS Identity Theft Unit: 1-800-908-4490
  • Your state tax authority's breach notification contact
  • Your cyber insurance carrier and policy number
  • Your IT support provider or managed security provider
  • The FBI Internet Crime Complaint Center (IC3) at ic3.gov

Skipping the Physical Security Section

Tax preparers who work primarily in digital environments often omit physical safeguards entirely. But physical security is an explicit IRS requirement. Your WISP must address: how paper client files are stored and locked, who has physical access to your office after hours, how you handle disposal of printed tax returns, and whether workstations auto-lock when unattended. A breach through an unlocked filing cabinet is still a reportable breach.

Treating MFA as Optional

As of 2023, Multi-Factor Authentication is mandatory under the FTC Safeguards Rule for all systems that contain or access customer financial data — and the IRS has adopted this requirement by reference in Publication 4557. If your WISP describes MFA as a recommended practice rather than a firm requirement, update your language now. Your WISP should name every system where MFA is enabled and specify the authentication method used for each. See our guide on two-factor authentication for tax professionals for implementation specifics that satisfy both the IRS and FTC standards.

Get Your WISP Reviewed by a Tax Cybersecurity Expert

Bellator Cyber Guard's security team reviews existing WISPs against current IRS and FTC Safeguards Rule requirements, identifies specific compliance gaps, and provides actionable remediation guidance — all in a single consultation.

Frequently Asked Questions: IRS WISP Example

Yes. IRS Publication 4557 and the FTC Safeguards Rule do not include a minimum return threshold. Any tax professional with a Preparer Tax Identification Number (PTIN) who handles federal tax returns is required to maintain a WISP. This applies to part-time preparers and sole proprietors who file fewer than 10 returns annually. The obligation is tied to handling client PII, not to filing volume.

The IRS provides Publication 5709 (Revision 4-2024) as its official step-by-step WISP guide and fillable template. Bellator Cyber Guard also offers a free WISP template for 2026 that aligns Publication 5709 requirements with current FTC Safeguards Rule language and is pre-formatted for small to mid-size tax practices.

Operating without a WISP violates IRS Publication 4557 and the FTC Safeguards Rule. Consequences can include referral to state licensing boards, loss of EFIN or PTIN privileges, FTC enforcement action, and civil liability if client data is breached and you cannot demonstrate that safeguards were in place. The IRS specifically flags absent or inadequate WISPs during preparer compliance reviews, and the FTC has authority to levy penalties up to $51,744 per violation under the Safeguards Rule.

For a sole proprietor or small practice with one to five employees, completing a WISP using IRS Publication 5709 as a guide typically takes three to six hours of focused work. The most time-consuming step is the initial data inventory — cataloging every system, device, and location where client PII exists. Using a pre-built template reduces this significantly. Multi-partner firms with multiple office locations and varied software platforms should plan for a more thorough process and may benefit from professional assistance to ensure nothing is missed.

Yes. The IRS and FTC Safeguards Rule apply to client PII in any format — electronic and physical. Your WISP must address how paper tax returns and client documents are stored (locked cabinets, restricted access), retained (minimum seven years), and destroyed (cross-cut shredding or certified shredding service with a Certificate of Destruction). Ignoring physical records is one of the most common WISP compliance gaps identified during security reviews.

Many tax software providers including Drake, Lacerte, and Thomson Reuters offer WISP starter templates. These are useful starting points but must be customized to reflect your specific firm's practices, technology, and risks. A template that still contains placeholder text or describes security controls your firm does not actually use will not satisfy IRS requirements. Always review any vendor-supplied template against the current version of IRS Publication 5709 before treating it as final.

At minimum, annually — before each tax season. Additionally, your WISP must be updated any time a material change occurs: hiring or terminating staff with data access, adopting new software, changing office locations, or experiencing a security incident. The IRS treats a WISP that has not been reviewed in over a year as effectively non-compliant if your technology or staffing has changed during that period.

IRS Publication 4557 is the foundational policy document describing the overall data security obligations of tax professionals — what you must protect, why, and the general framework for doing so. IRS Publication 5709 is the practical implementation guide: a step-by-step template that walks you through actually writing a compliant WISP section by section. Think of 4557 as the rule and 5709 as the how-to guide. A complete IRS WISP example draws on language and structure from both publications.

No — your WISP is an internal operational document. You are not required to share it with clients. However, you must have it available for review by the IRS or FTC if your firm is subject to a compliance examination. Some larger business clients and state regulators may request evidence of your data security program, in which case providing a summary or redacted version of your WISP is appropriate.

Your incident response section should address ransomware specifically as a threat scenario. This includes: offline backup procedures (backup copies stored disconnected from your network), recovery time objectives (how quickly you can restore operations from a clean backup), your decision framework for whether to pay a ransom (the FBI and IRS both recommend against payment), and the notification steps required under your state's breach notification law and IRS Publication 4557 if client data is potentially exposed. See our guide on ransomware protection for tax practices for a detailed treatment of each component.

Share

Share on X
Share on LinkedIn
Share on Facebook
Send via Email
Copy URL
(800) 492-6076

Free Consultation

Need help with IRS compliance?

Our tax cybersecurity specialists can review your security posture and help you get compliant.

Protect your tax practice from cyber threats

Schedule a free consultation to assess your firm's security posture.