Why Every PTIN Holder Needs a Written Information Security Plan
If you hold an active Preparer Tax Identification Number (PTIN), you are legally obligated to protect every piece of client data that flows through your practice — and the IRS has made the mechanism for doing that explicit: a Written Information Security Plan (WISP). This is not advisory language. IRS Publication 4557 and the Federal Trade Commission (FTC) Safeguards Rule together establish binding data security obligations for every compensated tax preparer in the United States, regardless of firm size.
With more than 730,000 active PTIN holders on file with the IRS, tax professionals collectively hold some of the most sensitive personal and financial data in existence — Social Security numbers, income records, bank account details, and employer identification numbers. That concentration of high-value data makes the tax preparation field a primary target for identity thieves, ransomware operators, and business email compromise actors.
Your PTIN WISP serves two functions simultaneously. First, it is documented evidence of compliance with federal law — your proof, if the IRS or FTC ever asks, that your practice takes data protection seriously. Second, it is an operational security document that guides your firm's response when — not if — a security incident occurs. This guide explains the exact legal basis for the requirement, what your PTIN WISP must contain, the most common compliance failures, and how to build a plan that will hold up under regulatory scrutiny.
The Legal Basis: How Your PTIN Creates a WISP Obligation
The Preparer Tax Identification Number is required under IRS regulations at 26 CFR § 1.6109-2 for any individual who prepares or substantially assists in preparing federal tax returns for compensation. Annual PTIN renewal is mandatory, and the IRS uses the PTIN registry to track, discipline, and when necessary, sanction preparers who violate professional or legal standards.
The WISP obligation for PTIN holders flows from two overlapping legal frameworks that together leave no room for ambiguity:
- IRS Publication 4557 — Safeguarding Taxpayer Data: This publication instructs all tax professionals to create and maintain a written information security plan. The IRS explicitly states that "all tax professionals, regardless of firm size" must have a plan in place. Publication 4557 draws directly from the FTC Safeguards Rule and is the IRS's primary mechanism for communicating data security expectations to PTIN holders.
- FTC Safeguards Rule (16 CFR Part 314): Under the Gramm-Leach-Bliley Act (GLBA), tax preparers qualify as "financial institutions" because they engage in activities incidental to financial services. The FTC's Safeguards Rule — significantly updated effective June 9, 2023 — requires all covered financial institutions to implement a written information security program with specific technical, administrative, and physical controls.
The 2023 Safeguards Rule update introduced several new mandates that apply directly to PTIN holders: Multi-Factor Authentication (MFA) for any system that accesses client financial data, encryption of client records both in transit and at rest, and a written incident response plan that must be tested and updated regularly. Preparers with fewer than 5,000 customer records receive a limited exemption from certain reporting provisions, but the written plan requirement applies without exception to all covered preparers.
Beyond the FTC, the IRS can pursue preparers under Internal Revenue Code (IRC) §6713, which covers unauthorized disclosure of tax return information, and §7216, which imposes criminal penalties for willful disclosure. A data breach involving client information — even absent a regulatory complaint — can trigger an IRS review of whether the preparer maintained adequate safeguards. For a broader view of IRS cybersecurity mandates that affect PTIN holders, see our guide on IRS cybersecurity requirements for tax professionals.
Tax Preparer Data Security: By the Numbers
IRS PTIN registry, 2026 — each individually responsible for maintaining a compliant WISP
IBM Cost of Data Breach Report 2024 — a 10% increase over the prior year
Verizon Data Breach Investigations Report 2024 — phishing and credential theft remain the dominant vectors
What IRS Publication 4557 Actually Requires of PTIN Holders
IRS Publication 4557, Safeguarding Taxpayer Data, is not structured as a compliance checklist, but it establishes non-negotiable requirements for every PTIN WISP. The publication organizes its guidance around three operational areas where tax preparers must assess and control risk:
- Employee management and training — How do you screen employees who handle client data? How do you limit access? What security training do staff receive, and how do you document it?
- Information systems — What hardware, software, and network infrastructure do you use to process and store client information, and how are these systems protected from unauthorized access?
- Detecting and managing system failures — Do you have procedures to detect unauthorized access or anomalies in your systems? What steps does your practice take when something goes wrong?
Publication 4557 draws directly from the FTC Safeguards Rule, which means your PTIN WISP must reflect both sets of requirements simultaneously. The IRS further emphasizes that the WISP is a living document — it must be reviewed and updated at minimum annually, and whenever a material change occurs in your business. Adopting new tax software, onboarding a cloud storage provider, expanding your staff, or relocating your office all constitute material changes that require WISP review.
One area where PTIN holders frequently fall short is service provider oversight. If you use a cloud-based practice management system, an off-site document storage service, or a third-party IT support firm, your WISP must address how you verify that those vendors maintain adequate security. This includes reviewing vendor contracts for security provisions and confirming that any third party who accesses client data is contractually obligated to protect it. For a template that addresses this and other requirements, download our free PTIN WISP template for 2026.
How to Build a Compliant PTIN WISP: 7 Implementation Steps
Map Your Data and Systems
Document every location where client data is stored or transmitted — tax preparation software, email, cloud drives, portable devices, and paper files. You cannot build effective safeguards around data you have not identified and inventoried.
Conduct a Written Risk Assessment
Evaluate the likelihood and potential impact of threats to each data category and system. The FTC Safeguards Rule requires this assessment to be documented in writing and updated periodically. Identify specific threat scenarios — phishing, ransomware, insider access — not just generic categories.
Appoint an Information Security Coordinator
Designate a specific individual responsible for overseeing your security program. For solo practitioners, this is you by default. For firms, assign a qualified employee with clear authority and documented responsibilities so there is no ambiguity about accountability.
Define Technical, Physical, and Administrative Safeguards
Based on your risk assessment, select and document specific controls. Technical safeguards include MFA, encryption, and antivirus software. Physical safeguards include locked file storage and visitor access policies. Administrative safeguards include password policies and access revocation procedures.
Build Your Incident Response Plan
Document the exact steps your firm will take if a breach is detected — who is notified internally, how clients are informed, how evidence is preserved, and how the incident is reported to the IRS and applicable state regulators. Under FTC rules, notification may be required within 30 days for breaches affecting 500 or more customers.
Train All Staff Who Handle Client Data
Annual security awareness training is required under the Safeguards Rule. Document training dates, topics, and completion for every participant. At minimum, cover phishing recognition, strong password practices, and your firm's data handling procedures.
Schedule Annual Reviews and Update After Incidents
Review your PTIN WISP at least once every 12 months and immediately after any security incident or material change to your business or technology environment. Date and version-control every revision, and retain prior versions for at least five years.
The Nine Elements the FTC Safeguards Rule Requires in Your WISP
The FTC Safeguards Rule (16 CFR Part 314) mandates nine specific elements in a qualified information security program. Because tax preparers are covered financial institutions under GLBA, your PTIN WISP must address all nine. Here is what each element means in practical terms for a tax preparation practice.
1. Qualified Individual
Designate a specific person to oversee your information security program. This individual must have the authority, resources, and knowledge to implement and maintain the plan. For a solo practitioner, you fill this role by default — document it explicitly in your WISP.
2. Risk Assessment
Conduct a written assessment of internal and external risks to the security, confidentiality, and integrity of client information. Your assessment must cover all three areas outlined in Publication 4557 and must be updated when your risk environment changes.
3. Safeguards Design and Implementation
Implement safeguards to control the risks identified in your assessment. The updated Safeguards Rule specifies that covered institutions must implement MFA for any system that accesses client financial data — a mandatory technical control for PTIN holders using cloud-based tax software. The NIST Special Publication 800-171 Revision 3 provides a detailed control catalog that maps well to Safeguards Rule requirements for small practices.
4. Monitoring and Testing
Regularly test and monitor your safeguards. For firms below the 5,000-record threshold, continuous monitoring is not mandated, but periodic vulnerability assessments are strongly advisable. See our overview of penetration testing for small businesses for what this process involves.
5. Staff Training
Train employees who access client data on your security policies and the specific threats relevant to tax practice — particularly phishing attacks targeting tax professionals, which the IRS warns about every filing season through its Security Summit alerts.
6. Service Provider Oversight
Select and retain service providers that maintain appropriate safeguards. Contracts with vendors who access client data must include provisions requiring them to protect that data. You must also verify compliance with those provisions on a regular basis.
7. Program Updates
Keep your security program current with changes in your business, your technology environment, and the threat environment. An annual review is the minimum standard — not a ceiling.
8. Incident Response Plan
Establish a written plan for responding to a security event. This plan must include procedures for assessing and containing the incident, notifying affected clients and regulators as required, and documenting lessons learned to prevent recurrence.
9. Reporting
Report regularly on the status of the security program to your governing body. For sole practitioners, this means a documented annual self-review. For firms, partners or managing members must receive a written update at least annually confirming the program's status and any changes made.
Core Components of a Compliant PTIN WISP
Data Inventory and Classification
A complete map of where client data lives — tax files, email, cloud storage, portable media — with sensitivity classifications for each data type and retention schedules.
Technical Safeguards
MFA on all systems accessing client data, endpoint encryption, antivirus and anti-malware software, firewall configuration, and automatic software patching policies.
Access Control Policy
Documented rules for who can access client data, how access is granted and revoked when employees leave, and how privileged administrator access is managed.
Employee Training Program
Annual security awareness training with documented completion records covering phishing recognition, password hygiene, data handling procedures, and incident reporting.
Incident Response Plan
Step-by-step procedures for detecting, containing, notifying, and recovering from a data breach or security event, including IRS and state regulatory notification timelines.
Vendor Management Provisions
A current list of all vendors who access client data, with contract provisions requiring security safeguards and documentation of annual vendor security reviews.
Common PTIN WISP Mistakes That Expose Tax Preparers to Risk
The most frequent compliance failure among PTIN holders is not the outright absence of a WISP — it is maintaining a WISP that exists only on paper, one that bears no relationship to how the practice actually operates. IRS examiners and FTC investigators look for internal consistency: does the document describe the systems the preparer actually uses? Do the access control policies reflect who actually has system access? Are training records dated and retained?
Using a Generic Template Without Customization
Downloadable WISP templates are a valid starting point, but they must be customized to accurately reflect your specific tax software, network configuration, staff roles, and physical location. A WISP that references systems you do not use — or omits systems you do use — fails the basic compliance standard of being an accurate description of your security program. Our review of best WISP templates for accountants explains what thorough customization looks like in practice, and our accounting firm WISP template examples show how different practice types should approach the document.
No Documented Risk Assessment
The FTC Safeguards Rule requires a written risk assessment — not a mental note, not a conversation, a written document. Many preparers skip this step entirely or treat it as a formality. A genuine risk assessment should identify specific threat scenarios: credential theft via phishing, ransomware delivered through a malicious email attachment, unauthorized access by a former employee after offboarding. Each scenario should be evaluated for likelihood and potential impact, with the findings driving your safeguard selection.
Missing MFA for Tax Software Access
Since the Safeguards Rule update in 2023, MFA is mandatory for any system that accesses customer financial data. Many small practices still rely on password-only authentication for their tax preparation software and client portals. This is a direct regulatory violation and one the IRS specifically highlights in its annual Security Summit campaigns. For implementation guidance, see our resource on two-factor authentication for tax professionals.
No Vendor Contracts with Security Provisions
If you use a cloud-based document management system, a remote IT support service, or a third-party payroll provider, your contracts with those vendors must include security provisions. Many preparers assume that major software vendors handle security automatically — but the FTC requires you to verify this contractually and document that verification in your WISP.
Annual Review Not Performed or Documented
A WISP dated 2022 that has never been revised is not a compliant document in 2026. Each annual review should be dated, signed by the designated information security coordinator, and retained as part of your compliance records. To understand the cyberthreats driving the need for regular updates, see our analysis of ransomware protection for tax practices and how cyberattacks on tax firms typically unfold.
DIY PTIN WISP vs. Professionally Managed WISP
| Feature | DIY WISP | RecommendedManaged WISP |
|---|---|---|
| Written Plan Document | Template-based | Custom to your systems and workflows |
| Formal Risk Assessment | Self-directed | Conducted by a security professional |
| Annual Review and Update | Your responsibility to schedule | Scheduled, conducted, and documented |
| Employee Security Training | You source and track | Delivered and tracked on your behalf |
| MFA Implementation | Self-configured | Configured, tested, and verified |
| Incident Response Support | Written plan only — no live assistance | 24/7 response team available |
| Vendor Security Review | Manual review required by you | Automated and documented annually |
| IRS Audit Documentation | Assembled on your own under pressure | Maintained and audit-ready at all times |
Enforcement: What Happens to PTIN Holders Without a Compliant WISP
The IRS enforces data security requirements for PTIN holders through several channels, and understanding those mechanisms clarifies why treating the PTIN WISP as optional is a serious miscalculation.
The most direct enforcement path runs through the IRS Office of Professional Responsibility (OPR), which has authority to sanction enrolled agents, Certified Public Accountants (CPAs), and attorneys under Circular 230. Available sanctions range from a formal reprimand to indefinite suspension or disbarment from practice before the IRS. While Circular 230 applies specifically to credentialed preparers, the IRS can revoke any PTIN holder's number for conduct incompatible with the privilege of preparing federal tax returns.
A data breach affecting client tax information also triggers notification obligations under state law. As of 2026, all 50 states have enacted data breach notification statutes, and many of those statutes impose civil penalties for failures in security program maintenance. Some state laws specifically designate tax return information as a protected data category with elevated notice requirements.
The FTC retains independent enforcement authority under the Safeguards Rule. Violations can result in civil penalties of up to $51,744 per violation per day, plus injunctive relief requiring the preparer to implement a remediation program under FTC oversight. For a small tax preparation practice, even a single enforcement action represents a potentially business-ending financial event.
Beyond regulatory consequences, preparers who experience a breach without documented security programs face substantially elevated civil liability from affected clients. Courts have consistently treated the absence of a written security policy as evidence of negligence per se. Your PTIN WISP is, among other things, a legal defense document — evidence that you exercised reasonable care in protecting client data. For a detailed view of how these incidents develop in the tax field, see our analysis of cyberattacks on tax firms.
PTIN WISP Documentation: What to Keep and for How Long
A WISP is not a single document — it is a documentation system. Beyond the written plan itself, maintaining records that demonstrate your security program is active and operational is what separates a compliant practice from one that simply has paperwork on file. Both the IRS and FTC emphasize that evidence of implementation matters as much as the plan itself.
The records you should maintain as part of your PTIN WISP compliance package include:
- The current WISP, signed and dated by the designated information security coordinator, reflecting your actual systems and workflows
- Prior WISP versions, retained to demonstrate a history of updates and program evolution
- Written risk assessment, including the date conducted, methodology, findings, and the safeguards selected in response
- Employee training records, with names, dates, topics covered, and completion verification for every training session
- Vendor security agreements, including signed contracts with security provisions for every third party who accesses client data
- Incident logs, documenting any security events — even minor ones — and the response actions taken
- Annual review documentation, dated and signed by the security coordinator, confirming the plan was reviewed and identifying any changes made
No single federal statute specifies a retention period for WISP documentation, but IRS practice guidance and FTC enforcement precedent point to a minimum of five years for all security program records. State-level requirements may be longer. Store these records in a secure location separate from the primary systems that a breach might compromise, and ensure your information security coordinator has documented access to all of them.
For guidance on structuring your security documentation alongside your broader IRS compliance obligations — including those related to Electronic Filing Identification Numbers (EFINs) and W-9 collection — see our detailed breakdown of IRS WISP requirements for tax professionals and our PTIN and EFIN protection resources.
IRS Reminder: The WISP Requirement Applies to Every PTIN Holder
IRS Publication 4557 states explicitly that all tax professionals — including sole proprietors and single-preparer offices — must maintain a Written Information Security Plan. The IRS recommends reviewing your PTIN WISP every year and updating it whenever your technology environment, staff, or service providers change. A plan that is never updated after its initial creation does not satisfy the requirement of maintaining an active security program.
Get a Free PTIN WISP Assessment from Bellator Cyber Guard
Our cybersecurity specialists work exclusively with tax professionals. We will review your current security posture, identify gaps in your PTIN WISP, and deliver a prioritized remediation plan — at no cost to you.
PTIN WISP: Frequently Asked Questions
A Written Information Security Plan is required for all tax preparers who hold an active PTIN and prepare federal tax returns for compensation — regardless of firm size. IRS Publication 4557 explicitly states that "all tax professionals, regardless of firm size" must have a written security plan. The FTC Safeguards Rule similarly applies to sole proprietors who qualify as financial institutions under GLBA. There is no firm-size exemption from the written plan requirement itself, though preparers with fewer than 5,000 customer records receive limited exemptions from certain incident reporting provisions of the Safeguards Rule.
Holding an active PTIN is the triggering condition for the WISP requirement. The IRS requires a PTIN for any individual who prepares or substantially assists in preparing federal tax returns for compensation. Because those returns contain highly sensitive personal and financial information, the IRS — through Publication 4557 — and the FTC — through the Safeguards Rule — impose data protection obligations on all PTIN holders. The PTIN WISP is the written documentation of how you fulfill those obligations. If you have a PTIN and prepare returns for compensation, you are required to maintain a WISP.
Creating a compliant WISP from scratch typically takes 8 to 20 hours for a solo practitioner or small firm, depending on the complexity of your technology environment. This includes time for the written risk assessment, documenting safeguards, drafting the incident response plan, and assembling vendor agreements. Using a professionally developed template reduces initial drafting time, but customization to your specific systems and workflows is always required. A WISP that does not reflect your actual operations is not a compliant WISP. For practices with multiple staff, complex technology setups, or high client data volumes, working with a cybersecurity professional ensures the finished document meets both IRS and FTC standards from the start.
The IRS does not conduct routine WISP audits of individual preparers, but it can request documentation of a preparer's security program as part of a broader compliance review — particularly following a reported data breach or client complaint. The IRS Office of Professional Responsibility can require credentialed preparers (enrolled agents, CPAs, attorneys) to demonstrate compliance with security requirements under Circular 230. The FTC retains independent authority to audit Safeguards Rule compliance and has brought enforcement actions against businesses that failed to maintain adequate written security programs. State regulators may also conduct their own reviews under state data protection statutes.
A data breach without an adequate security plan significantly increases your regulatory exposure. The IRS can refer the matter to the Office of Professional Responsibility for credentialed preparers, potentially resulting in suspension or revocation of PTIN privileges. The FTC can pursue Safeguards Rule enforcement with civil penalties up to $51,744 per violation per day. State attorneys general may act under state data breach statutes. Civil liability from affected clients is substantially higher when no documented security program exists. You may also be required to notify the IRS using Form 14242 and to notify affected clients under applicable state law. Prompt disclosure to the IRS following a breach — even without a complete WISP in place — can reduce regulatory exposure compared to delayed reporting.
Your PTIN WISP must address both electronic and physical (paper) records. IRS Publication 4557 and the FTC Safeguards Rule both require that safeguards cover all forms of client data regardless of medium. Physical safeguards documented in your WISP should include locked file storage for paper returns and client documents, a clean-desk policy, secure disposal procedures (cross-cut shredding) for paper records, and access controls for physical storage areas. Many preparers inadvertently omit physical safeguards when drafting their WISP, creating a compliance gap even when electronic systems are well-protected.
Free templates are a valid starting point for solo practitioners and very small firms with straightforward technology environments. However, a template alone is never sufficient — it must be customized to accurately reflect your specific systems, staff roles, vendors, and physical setup. A WISP that describes systems you do not use or omits systems you do use fails the basic standard of being an accurate representation of your security program. Bellator Cyber Guard offers a free WISP template for 2026 as a starting point, as well as managed WISP services for practices that need expert customization, risk assessment support, and ongoing compliance management.
At minimum, you must review and update your PTIN WISP annually. Beyond the annual review, you are required to update the plan whenever a material change occurs in your business or technology environment — adopting new tax software, adding or removing staff who handle client data, changing cloud storage providers, moving to a new office location, or experiencing a security incident. Each revision should be dated and version-controlled, and prior versions should be retained for at least five years as part of your compliance records. An undated or unrevised WISP signals to regulators that the security program is not actively maintained.
The FTC Safeguards Rule (16 CFR Part 314) is a regulation issued under the Gramm-Leach-Bliley Act (GLBA) that requires financial institutions to implement written information security programs. Tax preparers — including sole proprietors — qualify as financial institutions under GLBA because they provide financial services to individual consumers. The rule was significantly updated effective June 9, 2023, adding specific requirements for MFA, encryption, vulnerability management, and incident response planning. These requirements apply regardless of firm size, though preparers under the 5,000-record threshold are exempt from some of the reporting provisions. For a detailed breakdown of what the updated rule requires, see our guide on the FTC Safeguards Rule for tax preparers.
Free Consultation
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.
