Skip to content

Free 15-minute cybersecurity consultation — no obligation

Book Free Call
Tax & IRSCompliance35 min read

IRS Written Information Security Plan: 2026 Guide

Learn what an IRS Written Information Security Plan requires, who must comply, and how to build yours. Get IRS Publication 4557 compliant today.

BC
Bellator Cyber Guard

What Is an IRS Written Information Security Plan?

An IRS Written Information Security Plan (WISP) is a formal, documented policy that tax professionals must maintain to protect client data from unauthorized access, theft, or destruction. The legal obligation originates from the Gramm-Leach-Bliley Act (GLBA), which classifies tax preparers as financial institutions subject to the FTC Safeguards Rule (16 CFR Part 314). Under this framework, every tax professional who receives, maintains, processes, or transmits taxpayer data must have a WISP in place.

The IRS reinforces this requirement through IRS Publication 4557, "Safeguarding Taxpayer Data," which outlines the specific security measures expected of tax preparers. Unlike a general IT policy, a WISP tailored to the tax profession must address the unique risks of handling Personally Identifiable Information (PII) — Social Security numbers, financial records, banking details, and dependent information that make tax clients among the most targeted individuals in cybercrime.

In plain terms: your WISP is your security program in writing. It documents how your firm identifies risks, implements controls, trains employees, responds to incidents, and reviews its practices annually. Without one, your firm is both legally exposed and operationally unprepared for the data threats that specifically target tax professionals every filing season.

Tax Data Security By The Numbers

$4.88M
Avg. Data Breach Cost

IBM Cost of Data Breach Report 2024

68%
Breaches Involve Human Element

Verizon Data Breach Investigations Report 2024

$6.3B
Fraudulent Refunds Blocked by IRS

IRS Data Book 2023 — identity theft filters

Who Is Required to Have a Written Information Security Plan?

If you prepare federal tax returns or handle taxpayer data in any capacity, you need a WISP. This applies whether you run a solo practice or a multi-partner CPA firm. The FTC Safeguards Rule, strengthened and updated effective June 9, 2023, eliminated the informal distinction between large and small preparers. All tax professionals are now subject to the same baseline written security program requirements.

The following must maintain an IRS written information security plan:

  • Individual tax preparers filing returns for any clients
  • Enrolled Agents (EAs) and Certified Public Accountants (CPAs)
  • Accounting and bookkeeping firms of all sizes
  • Payroll processors who handle employee tax data
  • Electronic Return Originators (EROs) and tax software resellers

The IRS makes the requirement explicit in Publication 4557: tax preparers must implement a written security program. Failure to comply does not require a breach to trigger consequences — the absence of a documented plan alone can constitute a violation. The broader IRS cybersecurity requirements build on this WISP foundation, making it the cornerstone of your compliance posture.

The Gramm-Leach-Bliley Act Connection

Many tax professionals are surprised to learn they are classified as financial institutions under the GLBA. The Act defines financial institutions broadly to include any business that is "significantly engaged" in providing financial services — and tax preparation clearly qualifies. This classification brings the obligation to safeguard customer financial information, with the WISP serving as the primary documented mechanism for doing so. The NIST Cybersecurity Framework provides a widely-adopted reference architecture that many WISP authors use to structure their risk management approach.

Solo Preparers Are Not Exempt

A persistent misconception is that solo tax preparers or home-based practitioners do not need a WISP. The FTC Safeguards Rule and IRS Publication 4557 apply to all tax professionals who handle client data, regardless of firm size or the number of returns prepared. Even a one-person practice must have a documented, functioning written information security plan.

Core Components of an IRS-Compliant WISP

The IRS and FTC specify several mandatory elements that every written information security plan must address. These are not optional additions — each element must be documented in your plan and supported by actual operational controls. IRS WISP requirements break down into five primary areas that every compliant plan must cover.

Designated Program Coordinator

Your WISP must name a specific individual responsible for the security program. In small firms, this is typically the owner or managing partner. This person oversees risk assessments, implements safeguards, and coordinates incident response. The designation must be in writing — verbal assignment does not satisfy the requirement.

Inventory of Client Data and Systems

Before you can protect data, you must document where it lives. Your plan must include an inventory of all systems, devices, and storage locations that contain taxpayer data: workstations, laptops, mobile devices, cloud storage, email servers, and third-party software platforms. Tax preparation software, document management tools, and client portals all fall within scope.

Written Risk Assessment

The risk assessment is the analytical engine of your WISP. It requires you to identify threats to taxpayer data, evaluate the likelihood and potential impact of each threat, and document your current controls. The FTC Safeguards Rule requires this assessment to be conducted in writing and updated whenever significant operational changes occur. Common threats to assess include phishing attacks, ransomware, insider threats, and physical theft of devices. Our guide on phishing attacks targeting tax professionals details the specific vectors your assessment must address.

Security Safeguards

Based on your risk assessment, your WISP must document the specific controls you have implemented. The FTC groups these into three categories: technical safeguards (encryption, Multi-Factor Authentication (MFA), firewalls), administrative safeguards (employee training, access controls), and physical safeguards (screen locks, secure document disposal, office access controls). Your ransomware protection strategy should be explicitly referenced as part of your technical safeguards section.

Incident Response Plan

Your WISP must include written procedures for responding to security incidents. This plan must specify who is notified — including the IRS — what steps are taken to contain the breach, how affected clients are informed, and how the incident is documented. The IRS requires tax professionals to report data theft through the IRS Stakeholder Partnerships, Education and Communication (SPEC) channel and to notify their state tax agencies within required timeframes.

Essential WISP Safeguard Categories

Technical Safeguards

Encryption at rest and in transit, MFA on all systems with taxpayer data access, endpoint protection, secure Wi-Fi protocols, and automated backup procedures.

Administrative Safeguards

Security awareness training, access control policies, employee onboarding and offboarding procedures, background check requirements, and vendor management.

Physical Safeguards

Locked filing cabinets, clean desk policies, secure document shredding, screen privacy filters, and controlled physical access to workstations and servers.

Incident Response

Documented breach response procedures including IRS notification contacts, state reporting requirements, client communication templates, and post-incident review steps.

Vendor Oversight

Written security requirements for third-party service providers, annual vendor reviews, and contractual data protection obligations for all vendors with data access.

Annual Risk Review

Scheduled review cycle for your risk assessment, controls effectiveness testing, and WISP updates after any material operational or technology change.

How to Write Your IRS Written Information Security Plan

1

Designate Your Program Coordinator

Identify the individual responsible for your security program by name and title. Document their specific responsibilities: risk oversight, vendor management, employee training coordination, and incident response leadership.

2

Inventory All Data and Systems

List every system, device, software application, and storage location that touches taxpayer data. Include cloud platforms, email systems, tax software, portable drives, and any mobile devices used for business purposes.

3

Conduct a Written Risk Assessment

Identify reasonably foreseeable threats — phishing, ransomware, physical theft, insider access. Rate each by likelihood and impact. Document your current controls and explicitly identify gaps that require remediation.

4

Document Your Security Controls

For each identified risk, document the technical, administrative, and physical controls in place. Specify encryption standards, MFA requirements, backup procedures, access policies, and any compensating controls.

5

Write Your Incident Response Procedures

Create step-by-step procedures for different incident types. Include IRS notification contacts, state reporting requirements, client notification templates, evidence preservation steps, and assignment of response roles.

6

Establish Employee Training Requirements

Document your security awareness training program including frequency, topics covered, and verification methods. Specify new employee onboarding security training procedures and how completion records are maintained.

7

Set Your Review and Update Schedule

Define when and how your WISP will be reviewed — at minimum annually, after any significant operational change, following a breach event, or when new threat intelligence warrants reassessment.

Conducting a WISP-Compliant Risk Assessment

The risk assessment section is where many tax professionals fall short. Writing "we use antivirus software" does not constitute a compliant assessment. The FTC Safeguards Rule requires a systematic, documented evaluation of your specific threat environment. Here is what that looks like in practice.

Start by mapping your data flows. Where does client data enter your systems? Tax returns arrive via email, client portals, fax, and paper documents. Each entry point represents a potential attack surface. Map data from receipt through processing, storage, and eventual destruction. The tax document encryption requirements guide covers the specific standards that apply at each stage of this lifecycle.

Threat Categories to Assess

Your written risk assessment must address at minimum the threat categories outlined in IRS Publication 5709:

  • External threats: Phishing campaigns, credential stuffing, ransomware deployments, and social engineering attacks targeting staff
  • Internal threats: Unauthorized employee access, accidental data disclosure, and malicious insider activity
  • Physical threats: Theft of laptops or storage media, unauthorized office access, and improper document disposal
  • Vendor and third-party threats: Breaches at software providers, cloud storage vendors, or payroll processors with access to your data

For each threat, document the likelihood of occurrence, the potential impact on clients and your business, your current controls, and whether additional safeguards are needed. The gap between your current state and required controls becomes your action plan. The asset management and security assessment methodology provides a detailed framework for this process.

Using NIST SP 800-171 as a Framework

While the FTC Safeguards Rule does not mandate a specific framework, many tax professionals use NIST Special Publication (SP) 800-171 to structure their risk assessment. SP 800-171 organizes security requirements into 14 control families covering access control, incident response, configuration management, and more. Using this framework ensures your assessment is thorough and defensible in the event of an audit or regulatory review.

WISP Development Options: DIY vs. Template vs. Managed

FeatureDIY From ScratchRecommendedIRS Template (Pub. 5709)Professionally Managed
Time to Complete20–40 hours4–8 hours1–2 hours (your input)
Regulatory AccuracyVariesIRS-alignedFTC + IRS aligned
Risk Assessment IncludedManualTemplate provided✓ Customized
Incident Response PlanSelf-authoredBasic template✓ Firm-specific
Annual Update Support✓ Included
Employee Training PlanGuidance only✓ Included
Audit-Ready DocumentationUncertainPartial✓ Complete

Maintaining Your WISP: Ongoing Obligations After Year One

Creating your IRS written information security plan is not a one-time task. Both the FTC Safeguards Rule and IRS Publication 4557 require ongoing maintenance. A WISP that was accurate three years ago but has not been updated since your firm moved to a cloud-based practice management system is not a compliant WISP — it is a liability document that could be used against you.

When You Must Update Your WISP

Your written information security plan must be reviewed and updated in any of the following circumstances:

  • At least annually, regardless of whether changes have occurred
  • When you adopt new technology — new tax software, cloud storage, or mobile devices
  • After any security incident or near-miss event
  • When you hire or terminate employees with data access
  • When you add new service lines such as payroll processing
  • When a key vendor experiences a breach or changes its security practices

Employee Security Training Documentation

Your WISP must document a security training program for all employees who handle taxpayer data. Employees must actually receive this training, and you must keep records of completion. Annual training covering phishing recognition, password security, and data handling procedures satisfies the baseline requirement. Review the common cyberattacks on tax firms to build a training curriculum that addresses real-world threats your staff will encounter.

Hands-on phishing simulations, rather than slideshow-only training, produce the most measurable improvement in employee behavior. Document your training method, topics covered, and outcomes in your WISP.

Vendor Management Requirements

The updated FTC Safeguards Rule places specific weight on third-party vendor oversight. Your WISP must include written procedures for selecting, vetting, and monitoring service providers who have access to your client data — including your tax software provider, cloud backup vendor, payroll processor, and IT support company. Contracts with these vendors should include data protection obligations and audit rights. Maintain a vendor log as part of your WISP documentation package.

Consequences of Operating Without a WISP

Tax professionals who lack a documented written information security plan face risks on multiple fronts. Understanding these consequences is essential for any practitioner who has deferred this compliance obligation.

FTC Enforcement and Civil Penalties

The FTC actively enforces the Safeguards Rule against financial institutions, including tax preparers. Violations can result in civil penalties of up to $51,744 per violation per day under the FTC Act. While large-scale enforcement actions against solo preparers are less common, the risk escalates dramatically following a data breach. Regulators use the absence of a WISP as evidence of systemic negligence, which amplifies both penalties and reputational damage.

IRS Implications for Preparer Credentials

The IRS can revoke your Electronic Filing Identification Number (EFIN) if you fail to maintain adequate security safeguards. Without an EFIN, you cannot e-file returns on behalf of clients — effectively ending your practice. The IRS also expects preparers to self-report data breaches promptly, and a missing WISP significantly weakens your position in any subsequent review. Understanding the full scope of IRS WISP requirements for tax professionals is essential to protecting your EFIN and preparer credentials.

Breach Liability and Client Trust

Beyond regulatory penalties, a data breach without a documented WISP exposes your firm to civil litigation from affected clients. Courts and arbitration panels view the absence of a written security plan as a failure of professional duty. The reputational cost of a publicized breach — clients whose Social Security numbers and financial records were exposed — can permanently damage a practice built over decades. The cyber risk management framework for small businesses provides additional context on quantifying and managing this exposure before an incident occurs.

Get a Free WISP Compliance Assessment

Not sure if your current security plan meets IRS and FTC requirements? Our tax cybersecurity specialists will review your written information security plan and identify compliance gaps — at no cost.

Frequently Asked Questions

An IRS Written Information Security Plan (WISP) is a formal, documented security policy required of all tax professionals who handle client data. It is mandated under the Gramm-Leach-Bliley Act (GLBA) and the FTC Safeguards Rule (16 CFR Part 314), and reinforced by IRS Publication 4557. The plan must document your risk assessment, security controls, employee training program, incident response procedures, and vendor management policies.

Yes. The FTC Safeguards Rule and IRS Publication 4557 apply to all tax professionals who receive, maintain, process, or transmit taxpayer data — regardless of firm size. Solo preparers, home-based practitioners, and part-time preparers are all subject to the WISP requirement. There is no minimum number of returns filed that triggers the obligation; handling any client tax data is sufficient.

Operating without a WISP exposes you to FTC civil penalties of up to $51,744 per violation per day, potential EFIN revocation by the IRS, civil litigation from affected clients following a breach, and significant reputational harm. The absence of a WISP also signals negligence to courts and regulators, which can amplify consequences following any security incident.

Using the IRS-provided template in Publication 5709 as a starting point, a thorough WISP typically takes 4–8 hours to complete for a small practice. Larger firms with multiple employees and more complex technology environments will require more time. Working with a cybersecurity provider who specializes in tax firm compliance can reduce your direct time investment to 1–2 hours of structured input, with the provider handling the documentation and compliance verification.

Your WISP must be reviewed and updated at minimum annually. You must also update it whenever you adopt new technology, experience a security incident, hire or terminate employees with data access, add new service lines, or when a key vendor changes its security practices. Treating your written information security plan as a living document — rather than a one-time filing exercise — is essential for maintaining genuine compliance.

IRS Publication 5709 is an official IRS-provided WISP template designed specifically for tax professionals. It provides a fill-in-the-blank framework covering the required components of a compliant security plan. While Publication 5709 is a valid starting point, you should customize it to reflect your actual systems, risks, and controls rather than submitting a generic template unchanged. A customized plan provides stronger legal protection and better addresses your firm's specific security gaps.

Yes. Your written information security plan must inventory all systems and storage locations that contain taxpayer data, including cloud-based tax preparation software, client portals, and cloud storage services. For each cloud platform, your plan should document the security controls in place (such as encryption and MFA requirements), your vendor vetting process, and any contractual data protection obligations the vendor has agreed to.

Your incident response plan must specify: who is internally notified first, how to contain the breach, IRS notification procedures via the IRS Stakeholder Partnerships, Education and Communication (SPEC) channel, state tax agency reporting requirements, client notification procedures and templates, how to document the incident, and a post-incident review process to prevent recurrence. Assign responsibilities by role, not just by name, so the plan remains functional if key personnel are unavailable.

You can use a template as your starting point — the IRS provides one in Publication 5709, and Bellator Cyber Guard offers an updated version at our free WISP template page. The key requirement is that your final plan accurately reflects your specific practice, systems, and risk environment. A template filled out generically without customization provides minimal legal protection and fails to address your actual security gaps.

The FTC Safeguards Rule (16 CFR Part 314), issued under the Gramm-Leach-Bliley Act, is the primary legal authority requiring tax preparers to have a written information security program. IRS Publication 4557 is the IRS's implementation guidance for this rule within the tax professional context. Compliance with Publication 4557 satisfies the FTC Safeguards Rule baseline for most small practices, though larger firms with more than 5,000 customer records may have additional obligations under the rule's scaled requirements.

Share

Share on X
Share on LinkedIn
Share on Facebook
Send via Email
Copy URL
(800) 492-6076

Free Consultation

Need help with IRS compliance?

Our tax cybersecurity specialists can review your security posture and help you get compliant.

Protect your tax practice from cyber threats

Schedule a free consultation to assess your firm's security posture.