
WISP requirements 2025 represent federally mandated cybersecurity standards enforced by the Federal Trade Commission under the Gramm-Leach-Bliley Act (GLBA) and Internal Revenue Service regulations. All tax professionals, accounting firms, enrolled agents, and CPAs handling tax returns must maintain documented Written Information Security Plans regardless of firm size or client volume.
The FTC Safeguards Rule (16 CFR Part 314) mandates specific security elements including multi-factor authentication for all system access, formal risk assessments, vendor oversight, and incident response procedures. Non-compliance results in penalties starting at $50,000 per violation, with data breach costs averaging $4.88 million per incident according to IBM's 2025 Cost of a Data Breach Report.
The IRS now requires attestation of compliant security measures during PTIN renewal, with false attestation constituting federal fraud subject to criminal prosecution under 18 U.S.C. § 1001. Recent regulatory enforcement demonstrates that WISP requirements 2025 represent critical operational mandates rather than optional best practices.
The FTC has strengthened enforcement mechanisms, conducting targeted audits of tax preparation firms and imposing substantial penalties for non-compliance. As of 2026, tax professionals face an increasingly complex compliance landscape where cybersecurity requirements continue to expand. IRS Publication 5708 provides comprehensive implementation guidance specifically designed for tax professionals, while Publication 4557 addresses broader data security requirements.
WISP Compliance By The Numbers
IBM Cost of Data Breach Report 2025
Gramm-Leach-Bliley Act enforcement
Without proper monitoring systems
Regardless of firm size or client count
Legal Foundation and Regulatory Authority
The WISP requirements 2025 originate from the Gramm-Leach-Bliley Act enacted in 1999, which designated tax professionals as financial institutions subject to identical data protection standards as banks and investment firms. The GLBA Section 501(b) specifically requires financial institutions to establish appropriate administrative, technical, and physical safeguards to protect customer information.
The FTC implements these statutory requirements through the Standards for Safeguarding Customer Information regulation (16 CFR Part 314), commonly called the Safeguards Rule. Tax preparers fall under GLBA jurisdiction because they regularly access and process nonpublic personal information including Social Security numbers, income data, financial account details, and family composition information.
FTC Safeguards Rule Evolution
The FTC's 2021 amendments to the Safeguards Rule strengthened requirements significantly, mandating specific technical controls that previously were recommended but not required. These updates reflect the evolving threat landscape and increased sophistication of cybercriminals targeting tax professionals for valuable taxpayer data.
The amendments closed previous loopholes that allowed minimal compliance efforts and established clear, measurable security standards. The IRS reinforces these federal mandates through its own security requirements outlined in Publication 4557 and the Security Summit initiative launched in 2015.
This public-private partnership between the IRS, state tax agencies, and the tax industry established the "Protect Your Clients; Protect Yourself" framework emphasizing tax professional responsibility for taxpayer data security. During PTIN renewal, tax professionals must now certify compliance with security requirements, making false statements subject to penalties under 18 U.S.C. § 1001.
The August 2024 update to IRS Publication 5708 introduced significant changes including universal multi-factor authentication requirements, updated password management standards aligned with NIST SP 800-63B, and clarified breach notification obligations.
2026 Tax Season Compliance Deadline
All tax preparers must have a compliant WISP in place before the start of the 2026 filing season. The IRS requires attestation of security measures during PTIN renewal, and the FTC has increased audit frequency for tax preparation firms. Firms without compliant plans face PTIN suspension, FTC penalties starting at $50,000 per violation, and potential liability in the event of a data breach.
Universal Applicability: Debunking the 5,000-Consumer Myth
A critical misconception about WISP requirements 2025 involves the 5,000-consumer threshold mentioned in FTC regulations. Many tax professionals incorrectly believe firms serving fewer than 5,000 clients are completely exempt from WISP requirements. This dangerous misunderstanding exposes small practices to significant compliance violations and security vulnerabilities.
The reality is more nuanced and far-reaching than this common myth suggests. While the FTC Safeguards Rule does reference a 5,000-consumer threshold, this exemption applies only to specific documentation requirements for certain subsections—not to the entire WISP mandate itself.
All tax professionals handling customer information must maintain information security programs addressing the fundamental safeguard categories. Solo practitioners preparing tax returns for even a single client must maintain documented security programs addressing core safeguard categories.
The exemption merely reduces documentation burden for specific subsections while maintaining the overall security framework mandate. Specifically, firms with fewer than 5,000 consumers may have reduced requirements for written risk assessments and incident response testing documentation, but they must still conduct these activities and implement the security measures they identify.
Critical Compliance Clarification
Every tax professional needs a WISP—no exceptions. The 5,000-consumer threshold only affects documentation depth for specific elements, not the core requirement to have a Written Information Security Plan. If you handle even one tax return containing client data, you must comply with WISP requirements 2025.
The Nine Mandatory WISP Elements
Federal regulations mandate that WISP requirements 2025 address nine specific components within documented security programs. The FTC Safeguards Rule section 314.4 details these required elements, which collectively create comprehensive protection frameworks addressing administrative, technical, and physical security dimensions.
Each element serves a distinct purpose in the overall security architecture. Organizations must address all nine components with appropriate policies, procedures, and technical controls proportionate to the size, complexity, and scope of their operations. The interconnected nature of these requirements means that weakness in any single area compromises the entire security framework.
Nine Required WISP Elements
Designate a Qualified Individual
Appoint a responsible person to oversee your information security program, coordinate security activities, and manage vendor relationships.
Conduct Comprehensive Risk Assessments
Identify reasonably foreseeable internal and external threats to customer information and evaluate current safeguard effectiveness.
Design and Implement Safeguards
Deploy administrative, technical, and physical controls to address identified risks, and regularly test and monitor their effectiveness.
Oversee Service Providers
Select vendors capable of maintaining appropriate safeguards and require security protections through written contracts.
Regularly Evaluate and Adjust
Conduct ongoing program reviews based on testing results, business changes, emerging threats, and regulatory updates.
Implement Multi-Factor Authentication
Require MFA for any individual accessing customer information systems—no exceptions for local or remote access.
Encrypt Customer Information
Protect data both in transit over external networks and at rest using industry-standard encryption protocols.
Develop Secure Disposal Procedures
Establish methods for destroying customer information when no longer needed, preventing unauthorized access during disposal.
Maintain an Incident Response Plan
Create written procedures addressing detection, response, recovery, and notification for security incidents.
1. Qualified Individual Designation
Every covered entity must designate a qualified individual responsible for overseeing, implementing, and enforcing the information security program. This person coordinates all security activities, ensures policy implementation across the organization, manages vendor relationships, oversees incident response, and reports to practice leadership on security matters.
For solo practitioners, the tax professional serves as their own qualified individual, making formal documentation of security responsibilities critical for compliance verification. The qualified individual must possess sufficient knowledge, experience, and authority to effectively fulfill oversight responsibilities. This may require external training, certification programs, or partnering with cybersecurity firms that specialize in tax professional compliance.
2. Comprehensive Risk Assessment
Risk assessments form the analytical foundation identifying threats to customer information and evaluating whether existing safeguards adequately address those threats. Assessments must examine:
- Internal threats: Employee errors, inadequate training, insider threats, system misconfigurations
- External threats: Hacking attempts, malware infections, phishing campaigns, physical theft, social engineering attacks
Document your risk assessment methodology, specific findings, likelihood and impact analysis, and prioritization criteria. Create comprehensive risk registers listing each identified threat, potential consequences for clients and practice operations, probability of occurrence, current mitigation measures, and residual risk levels.
The risk assessment should address all systems, applications, networks, physical locations, and third-party relationships that involve customer information. Update assessments at least annually or when significant changes occur to your technology environment, business operations, or threat landscape.
3. Safeguard Design and Implementation
Based on risk assessment findings, organizations must design and implement administrative, technical, and physical safeguards proportionate to identified risks:
- Technical safeguards: Firewall protection, intrusion detection systems, encryption protocols, access controls, security monitoring tools
- Administrative safeguards: Policies, procedures, employee training programs, governance frameworks
- Physical safeguards: Facility security, device management, secure disposal procedures
Regular testing and monitoring verify safeguard effectiveness through vulnerability scanning, penetration testing, security audits, and continuous monitoring systems. Document all testing activities, findings, remediation actions, and validation of fixes. This creates an audit trail demonstrating ongoing commitment to security program effectiveness.
4. Service Provider Oversight
Tax practices must select service providers capable of maintaining appropriate safeguards for customer information and require those safeguards through written contracts. This applies to:
- Tax software vendors
- Cloud storage providers
- IT support firms
- Accounting software companies
- Payroll processors
- Any other entity accessing customer information on your behalf
Written agreements must specifically address security obligations, data handling requirements, breach notification procedures, audit rights, and termination provisions. Conduct due diligence before engaging service providers by reviewing their security certifications (SOC 2 Type II, ISO 27001:2022), security questionnaires, and contractual commitments.
Periodically reassess service provider security posture through questionnaires, third-party audit reports, or security assessments. This ongoing oversight ensures vendors maintain appropriate protections as threats evolve and technology changes.
5. Program Evaluation and Adjustment
Information security programs require regular evaluation and adjustment based on monitoring results, security testing outcomes, changes in business operations, emerging threats, and regulatory updates. At minimum, conduct annual comprehensive program reviews examining:
- All nine WISP elements for continued relevance and effectiveness
- Whether implemented safeguards remain effective against current threats
- New risks requiring mitigation
- Documentation updates to reflect current operations
More frequent evaluations may be necessary following significant changes such as implementing new technology systems, expanding service offerings, experiencing security incidents, or when regulations change. Document all evaluation activities, findings, decisions, and program modifications to demonstrate continuous improvement commitment.
6. Multi-Factor Authentication Implementation
The 2021 Safeguards Rule amendments established universal multi-factor authentication (MFA) requirements for any individual accessing customer information systems. This mandate eliminates previous distinctions between local and remote access. All users—including employees, contractors, practice owners, and IT administrators—must use MFA when accessing systems containing customer data.
Acceptable MFA implementations combine at least two authentication factors from different categories:
- Something you know: Password, PIN
- Something you have: Security token, smartphone app, smart card
- Something you are: Fingerprint, facial recognition
Common acceptable solutions include authenticator apps (Microsoft Authenticator, Google Authenticator), hardware security keys (YubiKey), SMS-based codes (though less secure than app-based methods), and biometric authentication combined with passwords.
Multi-Factor Authentication Implementation Checklist
- Inventory all systems and applications that access customer information
- Select MFA solution compatible with your tax software and infrastructure
- Deploy MFA on tax preparation software and all workstations
- Implement MFA for email accounts used for client communication
- Enable MFA on cloud storage and file-sharing platforms
- Require MFA for remote access (VPN, remote desktop, cloud applications)
- Train all staff on MFA enrollment and daily authentication procedures
- Document MFA implementation in your WISP
- Establish backup authentication methods for device loss scenarios
- Test MFA functionality across all critical systems before tax season
7. Encryption Requirements
Organizations must encrypt customer information both in transit over external networks and at rest. Transit encryption protects data moving between systems, such as:
- Email transmissions
- Cloud synchronization
- Remote access sessions
- File transfers
Use industry-standard protocols like TLS 1.2 or higher for web traffic, secure file transfer protocols (SFTP, FTPS), and VPN connections for remote access.
At-rest encryption protects stored data on servers, workstations, laptops, mobile devices, backup media, and cloud storage. Implement full-disk encryption on all devices containing customer information using solutions like BitLocker (Windows), FileVault (macOS), or enterprise encryption management platforms.
For cloud storage, verify that providers implement encryption both in transit and at rest, and consider client-side encryption for sensitive information before upload.
8. Secure Disposal Procedures
Develop and implement procedures for secure disposal of customer information when it is no longer needed for business purposes or required by law. Disposal procedures must prevent unauthorized access during the disposal process through methods appropriate to the information format:
- Electronic data: Secure deletion tools that overwrite data multiple times, degaussing for magnetic media, or physical destruction of storage devices
- Paper records: Cross-cut shredding or professional document destruction services with certificates of destruction
Maintain records documenting disposal activities including dates, methods used, and individuals responsible. Disposal procedures should address all formats including paper files, electronic documents, backup tapes, decommissioned hardware, and temporary files.
9. Incident Response Plan
Maintain a written incident response plan addressing detection, response, recovery, and notification procedures for security events. The plan should:
- Define what constitutes a security incident
- Establish clear roles and responsibilities
- Provide step-by-step response procedures
- Outline communication protocols
- Specify notification requirements for affected clients, regulators, and law enforcement
Include procedures for containing incidents to prevent further damage, preserving evidence for investigation, conducting forensic analysis to determine scope and impact, restoring affected systems and data, and implementing corrective actions to prevent recurrence.
Test the incident response plan at least annually through tabletop exercises or simulations to identify gaps and ensure team members understand their responsibilities. Document all testing activities and update the plan based on lessons learned.
Step-by-Step WISP Implementation Roadmap
Creating a compliant WISP requires systematic planning and execution. The following implementation roadmap provides a structured approach for tax professionals at any stage of compliance:
Phase 1: Assessment and Planning (Weeks 1-2)
Begin by conducting an honest assessment of your current security posture. Review existing policies, procedures, and technical controls against the nine mandatory WISP elements. Identify specific gaps such as missing multi-factor authentication, inadequate encryption, absent incident response procedures, or undocumented risk assessments.
Designate your qualified individual—either yourself for solo practices or a specific staff member with appropriate knowledge and authority. If internal expertise is insufficient, identify potential cybersecurity partners who specialize in tax professional compliance.
Phase 2: Risk Assessment and Documentation (Weeks 3-4)
Conduct a comprehensive risk assessment covering all systems, applications, networks, and physical locations handling customer information. Document identified threats, vulnerabilities, likelihood assessments, and potential impact. Create a risk register prioritizing threats based on severity and probability.
Begin drafting your core WISP document addressing each of the nine required elements with specific policies tailored to your practice operations. Avoid generic template language—customize every section to reflect your actual technology environment, business processes, and security controls.
Phase 3: Technical Implementation (Weeks 5-8)
Deploy critical technical controls identified in your risk assessment. Priority implementations typically include:
- Multi-factor authentication across all systems accessing customer data
- Full-disk encryption on all devices (workstations, laptops, mobile devices)
- Email encryption for client communications containing sensitive information
- Firewall configuration and network segmentation
- Endpoint protection (antivirus, EDR) with centralized management
- Secure backup systems with encryption and offsite storage
Work with your IT support provider or cybersecurity partner to ensure proper configuration and testing of all technical controls.
Phase 4: Vendor Management and Contracts (Weeks 9-10)
Review all service provider relationships involving customer information access. Request security documentation from vendors including SOC 2 reports, security certifications, and compliance attestations. Ensure written contracts include specific security requirements, data handling obligations, breach notification procedures, and audit rights.
For vendors lacking adequate security controls or unwilling to provide contractual commitments, begin transition planning to alternative providers that meet regulatory requirements.
Phase 5: Training and Testing (Weeks 11-12)
Develop and deliver security awareness training covering phishing recognition, password management, MFA usage, physical security protocols, and incident reporting procedures. Document training completion for all staff members.
Conduct initial testing of your incident response plan through tabletop exercises. Test technical controls through vulnerability scanning and verification of encryption, MFA, and backup systems. Document all testing results and identified improvement areas.
Phase 6: Ongoing Compliance (Continuous)
Establish schedules for recurring compliance activities including annual WISP reviews and updates, quarterly security training refreshers, monthly vulnerability scans, regular incident response plan testing, and ongoing vendor security reassessments. Implement continuous monitoring where feasible to detect security events in real-time.
Critical 2026 Updates and Changes
The August 2024 update to IRS Publication 5708 implemented particularly significant changes affecting tax professionals entering the 2026 filing season. Understanding these updates is essential for maintaining compliance as regulatory expectations continue to evolve.
Universal Multi-Factor Authentication
The universal multi-factor authentication requirement eliminates previous distinctions between local and remote access, requiring MFA implementation across all systems accessing customer information. This change reflects the reality that internal threats and lateral movement after initial compromise pose risks comparable to external access vulnerabilities.
Tax practices must implement MFA for all users, including workstations accessed from within the office network. The days of password-only authentication for in-office staff are over—every access point requires multi-factor verification.
Updated Password Management Standards
Password management guidance shifted from frequent mandatory changes every 90 days to minimum 365-day intervals, reflecting current NIST SP 800-63B guidance that frequent forced password changes often reduce security by encouraging weaker passwords or unsafe password management practices.
However, passwords must still be changed immediately when compromise is suspected, when individuals with knowledge of the password leave the organization, or when unauthorized access is detected. Length requirements now emphasize minimum 12-character passwords with complexity requirements including uppercase, lowercase, numbers, and special characters.
Enhanced Breach Notification Requirements
The updated guidance clarified breach notification requirements, emphasizing that tax professionals must notify the IRS, affected clients, and potentially state regulators and law enforcement when data breaches occur. Notification timelines vary by jurisdiction but generally require prompt notification without unreasonable delay—typically within 72 hours of breach discovery for federal requirements.
Failure to properly notify affected parties can result in additional penalties beyond those for the underlying security failures. Document your notification procedures, contact lists, and communication templates before incidents occur to ensure rapid response capability.
Strengthened Vendor Management
Enhanced vendor management requirements now require more rigorous due diligence and ongoing monitoring of service providers. Tax practices must actively verify vendor security capabilities rather than simply accepting contractual representations. This may include reviewing SOC 2 Type II reports, conducting security questionnaire assessments, or requiring evidence of specific security controls implementation.
Annual vendor reassessments are now considered best practice, with more frequent reviews for high-risk providers handling particularly sensitive data or providing critical services.
WISP Compliance Approaches: Cost vs. Consequence
| Feature | Non-Compliance | Minimum WISP Compliance | RecommendedBest Practice Implementation |
|---|---|---|---|
| Multi-Factor Authentication | |||
| Encryption | |||
| Risk Assessment | |||
| Incident Response | |||
| Annual Cost | |||
| FTC Penalty Risk | |||
| Data Breach Cost | |||
| Cyber Insurance |
Common Implementation Mistakes to Avoid
Understanding frequent implementation errors helps tax practices avoid compliance gaps and security vulnerabilities that undermine otherwise well-intentioned security programs. Throughout 2026, regulatory audits increasingly focus on these common deficiencies.
1. One-Time Documentation Exercise
Perhaps the most critical mistake involves treating WISP creation as a one-time documentation exercise rather than an ongoing program requiring regular attention, updates, and refinement. Organizations create initial documentation, file it away, and never revisit policies as operations evolve, technology changes, or new threats emerge.
This approach creates dangerous gaps between documented security measures and actual practices. Your WISP must be a living document reviewed at least annually and updated whenever significant changes occur to your technology environment, business operations, regulatory requirements, or threat landscape.
2. Generic Template Reliance
Many practices write high-level generic policies copied from templates without customization for their specific operations, technology environment, or risk profile. Generic policies fail to provide actionable guidance for employees, miss practice-specific security requirements, and demonstrate superficial compliance efforts rather than genuine security commitment.
While templates provide useful starting points, every WISP must reflect the actual operations, systems, and circumstances of the specific practice it governs. Customize every section with your specific software applications, network architecture, physical locations, vendor relationships, and business processes.
3. Inadequate Employee Training
Employee training represents another frequent gap. Some organizations conduct initial training during onboarding but provide no ongoing reinforcement, refresher training, or updates as threats evolve. Security awareness requires continuous reinforcement through:
- Regular training sessions (at minimum annually, preferably quarterly)
- Simulated phishing campaigns to test and improve threat recognition
- Security reminders and policy updates distributed via email
- Role-specific training for staff with elevated system access
Annual training represents the regulatory minimum—best practices suggest more frequent touchpoints to maintain awareness as attack techniques evolve.
4. Insufficient Documentation of Activities
Inadequate documentation of security activities creates significant compliance vulnerabilities. Organizations may implement appropriate security measures but fail to document risk assessments, testing activities, incident investigations, or program evaluations.
Without documentation, demonstrating compliance becomes impossible during regulatory audits or legal proceedings following data breaches. Document everything: risk assessment findings, testing results, training completion, vendor evaluations, incident investigations, and program reviews. Create audit trails proving your ongoing commitment to security.
5. Neglecting Physical Security
Many practices implement robust cybersecurity controls while neglecting physical security measures. Physical threats remain significant—theft of laptops or backup media, unauthorized access to server rooms, dumpster diving for improperly disposed documents, and social engineering to gain building access.
Your WISP must address physical security including facility access controls, visitor management, device security (cable locks, secure storage), server room protections, and secure disposal of both paper and electronic media.
6. Inadequate Remote Work Considerations
Another increasingly common error involves inadequate consideration of remote work arrangements in security planning. As hybrid work models become standard throughout 2026, WISPs must specifically address:
- Home network security requirements and guidance
- Secure remote access protocols (VPN requirements, MFA enforcement)
- Device management for equipment used outside office environments
- Procedures for protecting physical documents in home offices
- Secure communication channels for client interactions from remote locations
Remote work creates expanded attack surfaces requiring specific security controls beyond traditional office-based protections.
Documentation Is Your Compliance Proof
The most compliant security program in the world cannot protect you during an FTC audit if you cannot prove your compliance through documentation. Document every risk assessment, every training session, every vendor evaluation, every security test, and every program review. If it is not documented, it did not happen from a regulatory perspective.
Essential WISP Documentation Requirements
Comprehensive documentation forms the foundation of WISP compliance, providing evidence of your security program's existence, implementation, and ongoing management. Regulatory audits, client due diligence inquiries, professional liability claims, and breach investigations all require extensive documentation demonstrating security commitment and compliance efforts.
Core WISP Document Components
Your core WISP document should include:
- Executive summary outlining security program scope and objectives
- Designated qualified individual and organizational structure for security responsibilities
- Detailed policies addressing each of the nine required WISP elements
- Specific procedures for implementing policies with step-by-step instructions
- Roles and responsibilities throughout the organization
- Schedules for reviews, updates, and testing activities
Supporting Documentation
Beyond the core WISP document, maintain supporting documentation including:
- Risk assessment reports identifying threats, vulnerabilities, and risk mitigation strategies
- Incident response plans with detailed procedures and current contact information
- Vendor management records including contracts, due diligence reports, and security questionnaires
- Employee training materials, schedules, and attendance records
- Security testing results from vulnerability scans, penetration tests, and incident response exercises
- Incident logs documenting security events, investigations, and remediation actions
- Program evaluation reports from annual WISP reviews and updates
Documentation Organization and Storage
Structure documentation logically beginning with high-level policies establishing security commitments and program scope, progressing to detailed procedures providing step-by-step implementation instructions, and including supporting documentation such as risk assessments, training records, vendor evaluations, and incident logs.
Implement version control tracking all document revisions with dates, descriptions of changes, approval records, and reasons for modifications. Maintain both current and historical versions demonstrating program evolution over time, typically retaining documentation for at least seven years aligning with IRS recordkeeping requirements.
Store WISP documentation securely with appropriate access controls limiting access to authorized personnel, encryption for electronic documents, physical security for paper copies, and backup procedures ensuring documentation availability during emergencies. Consider maintaining both electronic and physical copies in different locations for redundancy.
Get Your Free WISP Template for 2026
Download our comprehensive WISP template specifically designed for tax professionals. Includes all nine required elements, customizable policies, and implementation checklists.
Moving Forward with WISP Compliance
Achieving WISP requirements 2025 compliance protects your practice from substantial regulatory penalties, reduces breach risk exposure, demonstrates professional responsibility to clients, and establishes competitive differentiation in an increasingly security-conscious marketplace.
The comprehensive requirements outlined in IRS Publications 5708, 5709, and 4557 may seem overwhelming initially, but systematic implementation following this guide makes compliance achievable for practices of any size.
Take Action Now
Begin immediately by conducting an honest assessment of your current security posture against the nine mandatory WISP elements. Identify specific gaps between existing practices and federal mandates, such as missing multi-factor authentication, inadequate encryption, absent incident response procedures, or undocumented risk assessments.
Develop a prioritized implementation plan with defined timelines, responsible parties, and resource allocation addressing the most critical gaps first. Focus on high-risk areas like MFA deployment, encryption implementation, and incident response planning before addressing lower-priority documentation refinements.
Consider partnering with cybersecurity firms specializing in tax professional compliance to accelerate implementation and ensure technical accuracy. Managed security service providers can handle complex technical requirements like endpoint detection and response (EDR) deployment, security monitoring, vulnerability management, and incident response support, allowing you to focus on client service while maintaining regulatory compliance.
The Business Case for Compliance
Remember that compliance represents more than merely checking regulatory boxes—it establishes a comprehensive framework for protecting the foundation of your practice: client trust and confidential information. Every security measure you implement:
- Reduces breach probability and potential damages
- Demonstrates professional competence and responsibility
- Protects both your clients and your practice from devastating security incidents
- Provides competitive advantage as clients increasingly evaluate security capabilities
- Reduces cyber insurance premiums through demonstrated security controls
- Streamlines client onboarding as larger firms require vendor security documentation
As we progress through 2026, regulatory scrutiny of tax professional cybersecurity practices continues intensifying. The IRS and FTC increasingly coordinate enforcement efforts, sharing information about non-compliant firms and conducting joint investigations following data breaches.
Tax professionals who invest in robust security programs now position themselves advantageously for both regulatory compliance and competitive differentiation. Clients increasingly ask about security measures, vendor questionnaires require security documentation, and professional liability insurers demand evidence of cybersecurity controls.
Your WISP is not just a compliance checkbox—it is your roadmap to protecting client data, maintaining professional reputation, and building a sustainable, secure tax practice in an increasingly dangerous digital landscape.
Get Expert Help with Your WISP Implementation
Our cybersecurity specialists have helped thousands of tax professionals create compliant Written Information Security Plans and implement the technical controls required by the FTC and IRS. Schedule a free consultation to assess your current security posture and develop your customized compliance roadmap.
Frequently Asked Questions About WISP Requirements 2025
A Written Information Security Plan (WISP) is a documented cybersecurity program required by the FTC Safeguards Rule under the Gramm-Leach-Bliley Act. All tax professionals, CPAs, enrolled agents, and accounting firms handling tax returns must maintain a WISP regardless of firm size or number of clients. Even solo practitioners preparing a single tax return must comply with WISP requirements 2025.
Yes. The WISP requirement applies to all tax professionals handling customer information, regardless of client volume. The common misconception about a 5,000-consumer exemption is dangerously misleading. While firms with fewer than 5,000 consumers may have reduced documentation requirements for specific subsections, the core WISP mandate applies universally to all tax preparers.
Non-compliance with WISP requirements 2025 results in multiple serious consequences: FTC penalties starting at $50,000 per violation, potential IRS PTIN suspension preventing you from preparing tax returns, personal liability for data breaches affecting clients, denial of cyber insurance coverage, and potential criminal prosecution for false attestation during PTIN renewal under 18 U.S.C. § 1001.
For most small to mid-sized tax practices, creating a compliant WISP typically takes 8-12 weeks following a structured implementation roadmap. This includes conducting risk assessments, drafting policies and procedures, implementing technical controls like multi-factor authentication and encryption, training staff, and testing incident response plans. Practices with existing security measures may complete implementation faster, while firms starting from scratch may require additional time for technology deployment.
While not legally required, working with cybersecurity professionals specializing in tax industry compliance significantly increases the likelihood of creating a truly compliant and effective WISP. Technical requirements like multi-factor authentication deployment, encryption implementation, and security monitoring often exceed the technical capabilities of most tax professionals. Partnering with a managed security service provider ensures both regulatory compliance and effective security implementation while allowing you to focus on client service.
Federal regulations require at minimum annual WISP reviews and updates. However, you must also update your WISP whenever significant changes occur including implementing new technology systems, expanding service offerings, experiencing security incidents, discovering new vulnerabilities during testing, changes to regulatory requirements, or modifications to vendor relationships. Best practice involves quarterly reviews with formal annual comprehensive evaluations.
Multi-factor authentication (MFA) requires users to provide two or more different types of credentials to access systems: something you know (password), something you have (smartphone app, security token), or something you are (fingerprint, facial recognition). The 2021 FTC Safeguards Rule amendments made MFA mandatory for all individuals accessing customer information systems because passwords alone provide insufficient protection against modern cyber threats. Tax professionals must implement MFA on all systems containing taxpayer data, including tax software, email, cloud storage, and remote access systems.
Templates provide helpful starting points, but your WISP must be customized to reflect your specific operations, technology environment, and risk profile. Regulators easily identify generic template language that doesn't match actual business practices. Every section must describe your actual systems, procedures, vendor relationships, and security controls. Use templates as frameworks, but customize every policy, procedure, and control description to accurately represent your practice.
Immediately activate your incident response plan. Key steps include: (1) Contain the breach to prevent further data exposure, (2) Preserve evidence for forensic investigation, (3) Notify your cybersecurity provider or IT support, (4) Document all actions taken, (5) Conduct investigation to determine scope and affected data, (6) Notify the IRS using their Data Theft Information Reporting system, (7) Notify affected clients promptly (typically within 72 hours), (8) Report to state regulators as required by state breach notification laws, and (9) Consider engaging legal counsel and forensic investigators for significant breaches.
Yes. During PTIN renewal, tax professionals must certify compliance with security requirements including having a Written Information Security Plan. The IRS has strengthened enforcement coordination with the FTC, sharing information about non-compliant firms and conducting targeted audits. Making false statements during PTIN renewal constitutes federal fraud under 18 U.S.C. § 1001, punishable by fines and imprisonment. The IRS can suspend or revoke PTIN credentials for non-compliance, effectively preventing you from preparing tax returns professionally.
Schedule
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



