
Tax preparers in 2025 need a comprehensive WISP compliance checklist to meet strict federal requirements for protecting client data. With penalties reaching $100,000 per violation and active IRS enforcement, implementing proper security documentation isn't optional—it's a legal necessity under the Gramm-Leach-Bliley Act and FTC Safeguards Rule.
This WISP compliance checklist provides actionable steps to achieve full compliance while protecting your practice from devastating penalties. Whether managing a solo practice or larger firm, these requirements ensure you meet all federal mandates outlined in IRS Publication 5708 and current FTC regulations.
Key Takeaway
Verify your Written Information Security Plan covers all IRS requirements. Printable WISP compliance checklist for tax preparers with scoring guide.
WISP Compliance By The Numbers
Per violation for businesses
For continued violations
Including remediation & legal fees
Essential WISP Compliance Checklist for Federal Requirements
Operating without proper security documentation creates immediate legal exposure. When renewing your PTIN, Form W-12 Line 11 requires attestation that you maintain compliant security measures. False attestation constitutes fraud with criminal penalties beyond financial consequences.
Recent enforcement demonstrates serious regulatory commitment. Tax preparers lacking proper documentation face penalties starting at $10,000 for individuals and $100,000 for businesses. Daily penalties accumulate to $43,000 for continued violations. This enforcement reality affects unprepared practitioners nationwide.
Risk Assessment Implementation Steps
Conduct Initial Assessment
Examine internal and external risks to customer information
Document Identified Threats
Catalog all potential security threats and vulnerabilities
Prioritize by Impact
Rank threats by likelihood and potential damage
Schedule Annual Reviews
Establish regular assessment updates and reviews
Update for Changes
Revise assessments when technology or processes change
Employee Training and Security Awareness
Every team member requires comprehensive security education covering password policies, phishing recognition, data handling procedures, and incident reporting. Provide training during onboarding, conduct annual refreshers, and document completion for compliance records.
Regular knowledge testing ensures training effectiveness. Monthly phishing simulations, quarterly security assessments, and annual comprehensive evaluations identify knowledge gaps requiring additional education. Human error causes most data breaches, making ongoing education your primary defense.
Third-Party Vendor Management
Your compliance obligations extend to every vendor accessing client data. Create comprehensive service provider inventories from cloud storage to document destruction services. Require contractual safeguards mandating equivalent security standards and conduct annual compliance monitoring.
Document vendor oversight procedures including evaluation processes, relationship monitoring, and security incident responses. The FTC specifically requires written agreements addressing security requirements with service providers.
For detailed vendor management guidance, explore our cybersecurity solutions for tax professionals.
Technical Security Controls
Access Control Implementation
Unique user IDs, 12-character minimum passwords, multi-factor authentication on critical systems
Data Encryption Standards
Industry-standard encryption for stored and transmitted data using TLS 1.2 or higher
Network Security Architecture
Business-grade firewalls, network segmentation, traffic monitoring, quarterly vulnerability scans
Endpoint Protection
Comprehensive antivirus, automatic updates, behavioral analysis, ransomware protection
Access Control Best Practice
Review access permissions quarterly ensuring employees have only necessary system access. Immediate access removal or modification when employees leave or change roles prevents unauthorized data exposure.
Physical Security Measures
Facility Access Controls
Physical security protects client data through controlled office access using locks, key cards, or biometric systems. Secure server rooms and storage areas with additional protection, install entry point cameras, and maintain visitor logs.
Implement clean desk policies requiring document security when employees leave workstations. This prevents unauthorized information viewing and demonstrates security awareness to visiting clients. Document physical security procedures including access management and breach responses.
Device and Document Security
Security plans must address electronic devices and paper documents containing client information. Lock unattended workstations with automatic timeouts, secure stationary portable devices with cable locks, and encrypt mobile devices including smartphones.
Paper documents require equal attention through locked filing cabinets, retention policies specifying record-keeping periods, and cross-cut shredders for secure disposal. Control document reproduction and maintain secure mail handling procedures.
Learn about incident response requirements in our cybersecurity compliance guide.
FTC Safeguards Rule: Nine Mandatory Elements
Qualified Individual
Designated security officer with documented qualifications
Risk Assessments
Identify threats and evaluate existing controls
Safeguard Design
Implement access controls and encryption
Regular Testing
Validate security control effectiveness
Staff Training
Comprehensive security education programs
Service Provider Oversight
Monitor vendor security compliance
Program Evaluation
Assess effectiveness based on results
Incident Response
Detailed breach response procedures
Annual Reporting
Leadership reporting on program status
Testing, Training, and Monitoring
Annual testing validates security control effectiveness through vulnerability assessments and penetration testing when required. Document all results for compliance demonstration.
Training extends beyond basic awareness to specialized education for security officers, comprehensive staff programs, role-specific instruction for elevated access personnel, and detailed completion tracking.
Continuous monitoring represents fundamental shifts from periodic reviews to ongoing vigilance. Monitor systems real-time, review security events daily, update controls for emerging threats, and adjust security postures as needed.
Service Provider Oversight Requirements
FTC requirements extend to comprehensive oversight of all service providers accessing customer information. Evaluate provider security before engagement, require contractual protections matching your obligations, conduct regular assessments, and document oversight activities.
Incident response obligations include detailed plans addressing various scenarios, regular testing through exercises, required legal reporting, and improvement based on lessons learned.
For complete FTC implementation guidance, see our detailed compliance resource.
IRS Security Six Requirements
Professional Antivirus
Business-grade protection with real-time monitoring
Configured Firewalls
Properly set up network security barriers
Two-Factor Authentication
Multi-factor access controls on all systems
Data Encryption
Protection for stored and transmitted data
Reliable Backups
Automated, tested data recovery systems
Security Updates
Regular patching and system maintenance
IRS Publication 5708 Requirements
Data Security Plan Components
IRS Publication 5708 provides the blueprint for tax professional requirements. Catalog all taxpayer data types collected from basic identity to complex financial records. Document data flow through systems, identify storage locations including cloud services, track retention periods, and map disposal methods ensuring complete destruction.
Security measures must address IRS Security Six requirements: professional-grade antivirus, properly configured firewalls, two-factor authentication, data encryption, and reliable backups. These represent minimum requirements, not optional enhancements.
Employee Security and Client Communication
The IRS expects robust employee measures including background checks for data access personnel, signed confidentiality agreements before system access, documented security training completion, detailed access control procedures, and comprehensive termination checklists.
Secure client communication requires specific protocols: encrypted email for sensitive data, client portals with strong authentication, documented file sharing procedures, identity verification for interactions, and appropriate communication channel encryption.
Download our free template including all IRS Publication 5708 requirements.
For help avoiding these common pitfalls, review our step-by-step guide to creating compliant security plans.
Critical Compliance Point
Form W-12 Line 11 requires attestation that you maintain compliant security measures when renewing your PTIN. False attestation constitutes fraud with criminal penalties beyond financial consequences.
Professional Support Options
Complex requirements often benefit from professional support. Cybersecurity consultants specializing in tax practices understand unique industry requirements. Compliance attorneys familiar with GLBA provide legal guidance. IT managed service providers offer technical implementation and ongoing support.
Invest in appropriate professional support based on practice complexity and internal capabilities. Document engagements, recommendations, and implementation decisions.
Return on Investment
While implementation requires investment, returns far exceed costs considering potential losses. FTC penalties start at $100,000 immediately exceeding years of security investments. Data breaches average $4.35 million including notification, remediation, legal fees, and lost business.
Beyond avoiding losses, proper security provides competitive advantages. Clients increasingly expect robust protection making security a differentiator. Cyber insurance premiums decrease with documented programs. Operational efficiency improves through standardized procedures.
Getting Started Today
Download Free Resources
Get our IRS-compliant template and assessment tools
Assess Current Security
Identify gaps and prioritize critical vulnerabilities
Implement High-Impact Items
Focus on encryption, access controls, and training
Document Everything
Record all measures, even temporary solutions
Build Security Culture
Make security everyone's responsibility
Long-Term Success
Building Security Culture
Long-term success requires security-conscious culture throughout your practice. Security becomes everyone's responsibility through regular training, consistent enforcement, and management commitment. Celebrate successes like phishing test results making security positive rather than punitive.
Document culture-building through training attendance, awareness communications, and policy acknowledgments. These records demonstrate ongoing commitment beyond initial implementation.
Adapting to Evolution
Your security program must evolve continuously as threats advance and regulations expand. Monitor emerging threats through industry publications and professional networks. Track regulatory changes at federal and state levels adjusting programs before non-compliance develops.
Document adaptation processes including intelligence sources, regulatory updates, and program modifications. This demonstrates proactive management rather than reactive scrambling.
Measuring Effectiveness
Regular measurement ensures continued effectiveness rather than shelf-ware. Track metrics including incident frequency, training completion, patch implementation, and audit findings. Analyze trends identifying improvement opportunities while celebrating successes.
Use metrics justifying security investments, demonstrating compliance effectiveness, and identifying areas needing attention. Regular management reporting ensures ongoing support and resource allocation.
Protect Your Tax Practice Today
Schedule a free consultation to discuss your cybersecurity needs and IRS compliance requirements.
Free Consultation
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



