
Written Information Security Plans (WISPs) are federally mandated cybersecurity frameworks that small tax firms must implement under the Gramm-Leach-Bliley Act (GLBA) and FTC Safeguards Rule. These documented security programs outline how tax preparation businesses identify, assess, and mitigate cybersecurity risks to protect sensitive taxpayer information including Social Security numbers, financial records, and personal identification data.
WISP for small tax firms has become a non-negotiable requirement since the IRS began requiring PTIN holders to confirm WISP implementation during annual renewal processes starting in 2023. Non-compliance results in civil penalties up to $46,517 per violation per day, potential PTIN/EFIN revocation, professional liability exposure, and data breach costs averaging $4.88 million according to IBM Security research.
Key Takeaway
Create a WISP for your small tax firm without enterprise complexity. Simplified security plan tailored for solo and small tax practices.
WISP Compliance By The Numbers
FTC civil penalties per violation
IBM Security research
Successful cyberattacks involve human error
Federal regulators classify tax preparation services as financial institutions under GLBA, subjecting them to identical data protection standards applied to banks and credit unions. The FTC enforces these requirements through its Safeguards Rule (16 CFR Part 314), which mandates specific administrative, technical, and physical safeguards documented in written security plans.
The IRS amplifies enforcement through its Security Summit initiative, treating WISP documentation as fundamental practice infrastructure rather than optional enhancement. The August 2024 update to IRS Publication 5708 introduced mandatory multi-factor authentication requirements and new breach notification obligations, raising compliance stakes for tax professionals nationwide.
Legal and Regulatory Framework Requiring WISP Implementation
The Gramm-Leach-Bliley Act, enacted in 1999, established the foundational legal requirement for financial institutions to protect customer information through comprehensive security programs. Title V of GLBA requires financial institutions—a category explicitly including tax preparation businesses—to develop, implement, and maintain safeguards protecting customer records and information. The FTC implements GLBA provisions through the Safeguards Rule (16 CFR Part 314), which mandates written information security plans addressing specific risk management components.
Compliance Alert
The FTC can impose civil penalties reaching $46,517 per violation per day for Safeguards Rule non-compliance. The IRS may revoke PTIN and EFIN privileges for practices lacking compliant WISPs, immediately ending professional tax preparation authorization. These penalties apply regardless of whether data breaches occur—the absence of required documentation itself constitutes a violation subject to enforcement action.
The FTC Safeguards Rule underwent significant amendments effective December 2022, introducing explicit requirements that previously existed as general principles. Updated regulations mandate designating a qualified individual to oversee information security programs, conducting periodic risk assessments identifying reasonably foreseeable internal and external threats, implementing administrative, technical, and physical safeguards addressing identified risks, and regularly monitoring and testing security control effectiveness.
IRS enforcement mechanisms add substantial compliance pressure beyond FTC regulations. Through the Security Summit partnership between federal and state tax agencies and private industry, the IRS established data security standards documented in Publication 4557, Safeguarding Taxpayer Data. Starting with the 2023 filing season, Form W-12 PTIN renewal applications require tax professionals to confirm they have implemented written data security plans meeting federal requirements.
Core Components Required in Tax Firm Written Information Security Plans
Security Officer Designation and Governance Structure
Federal regulations mandate designating a qualified individual responsible for developing, implementing, and overseeing information security programs. The FTC Safeguards Rule explicitly requires appointing a coordinator possessing appropriate expertise to manage security risks facing financial institutions. In solo tax practices, the owner typically assumes this designated role, while multi-professional firms may assign responsibility to office managers, IT professionals, or external consultants with relevant technical knowledge.
Security Officer Key Responsibilities
Risk Assessment Management
Conducting annual risk assessments identifying threats to client information
Policy Development
Developing and updating security policies as technologies and threats evolve
Vendor Oversight
Managing vendor relationships ensuring third-party service providers meet security standards
Training Coordination
Overseeing employee training programs building security awareness throughout the practice
Comprehensive Risk Assessment Methodology
Risk assessment forms the foundation of effective written information security plans for small tax firms, identifying specific threats and prioritizing protective measures based on actual vulnerability exposure. Begin by cataloging all locations where sensitive taxpayer information resides within practice operations. This inventory should include tax preparation software databases, client management systems, email servers and archived messages, cloud storage services, local file servers and network attached storage devices, backup systems and media, paper files and physical documents, workstations and laptops, mobile devices accessing client data, and removable media like USB drives.
Risk Assessment Checklist
- ✅ Complete inventory of all systems storing taxpayer information
- ✅ Document information flows between systems and users
- ✅ Identify external, internal, and environmental threats
- ✅ Evaluate existing control effectiveness against each threat
- ✅ Prioritize remediation based on risk severity scores
- ✅ Schedule annual reassessment and update procedures
- ✅ Document findings in formal risk assessment reports
Evaluate threats that could compromise information confidentiality, integrity, or availability across each identified location. External threats include cybercriminals seeking financial information for fraud schemes, ransomware operators targeting valuable tax data, phishing attacks exploiting employee trust, and malware infections through email attachments or malicious websites. Internal threats encompass employees accidentally exposing information through security policy violations, malicious insiders stealing data for personal gain, inadequate access controls allowing unauthorized information viewing, and improper disposal practices exposing documents in trash or recycling.
The NIST Cybersecurity Framework offers structured methodologies ensuring comprehensive threat identification. Update risk assessments annually at minimum, and whenever significant practice changes occur such as adopting new technology platforms, opening additional office locations, implementing remote work arrangements, or experiencing security incidents revealing previously unrecognized vulnerabilities.
WISP Implementation Steps
Designate Security Officer
Appoint qualified individual to oversee information security program development and implementation
Conduct Risk Assessment
Complete comprehensive inventory of systems and identify threats to taxpayer information
Develop Administrative Safeguards
Create policies governing employee access, training, and information handling procedures
Implement Technical Controls
Deploy encryption, multi-factor authentication, and endpoint protection across all systems
Establish Physical Security
Secure facilities, workstations, and document storage with appropriate access controls
Document Vendor Management
Assess and contractually obligate third-party service providers to maintain security standards
Create Incident Response Plan
Develop procedures for detecting, containing, and reporting security incidents
Implement Training Program
Conduct comprehensive security awareness training for all staff members
Administrative Safeguards: Policies and Procedures
Administrative safeguards establish policy frameworks governing how tax practices protect client information through employee management, vendor oversight, and operational procedures. Written information security plans must include clear policies addressing access control management, password requirements and authentication procedures, acceptable use of technology resources, email and internet usage standards, clean desk and clear screen practices, physical document handling and storage, remote work security requirements, and incident reporting obligations.
Access control procedures ensure employees access only information necessary for their specific job functions, following the principle of least privilege. Document processes for granting initial system access when employees join practices, including security training completion requirements before accessing taxpayer data, identity verification procedures confirming individuals' authority to receive access, approval workflows requiring manager authorization for access requests, and periodic access reviews validating that permissions remain appropriate for current roles.
Key Insight
Microsoft security research demonstrates that 95% of successful cyberattacks involve human error, making training investment one of the most cost-effective security measures available. For additional guidance on building effective security awareness programs, explore cybersecurity training best practices.
Technical Safeguards: Protecting Electronic Information
Technical safeguards form digital defense perimeters, implementing technology controls preventing unauthorized access to electronic taxpayer information. Written information security plans must specify technical protections deployed across all systems handling client data. Fundamental controls include next-generation antivirus and anti-malware software with real-time threat detection on all endpoints, firewalls controlling network traffic between practices and the internet, endpoint detection and response solutions monitoring for suspicious activities, intrusion detection and prevention systems identifying attack attempts, and virtual private networks encrypting remote connections to practice systems.
Multi-Factor Authentication Impact
MFA blocks automated account compromise attacks
Business email compromise attacks during 2024 tax season
Encryption protects data confidentiality even if other security controls fail, rendering information unreadable without proper decryption keys. Implement full-disk encryption on all devices that store or access taxpayer information, including desktop computers, laptops, tablets, and smartphones. Modern operating systems include built-in encryption capabilities—BitLocker for Windows, FileVault for macOS, and native encryption for iOS and Android—providing strong protection with minimal performance impact.
Multi-factor authentication dramatically reduces account compromise risk by requiring multiple forms of verification before granting system access. The August 2024 update to IRS Publication 5708 now mandates MFA for all information system access, not just remote connections. Implement MFA on all systems containing sensitive information, prioritizing tax preparation software, email accounts, cloud storage platforms, remote access solutions, and administrative interfaces.
Physical Safeguards: Securing Office Environments
Physical security prevents unauthorized individuals from accessing facilities, equipment, and documents containing taxpayer information. Written information security plans must address facility access controls restricting entry to authorized personnel only. Implement locked doors with key or card access for areas containing sensitive information, visitor management procedures requiring sign-in and escort by staff members, security cameras monitoring entry points and sensitive areas, and after-hours security systems detecting unauthorized access attempts.
Workstation security policies prevent information exposure when employees step away from desks. Require automatic screen locks activating after 5-10 minutes of inactivity, with password authentication needed to resume work. Position computer monitors to prevent viewing by visitors, clients, or unauthorized staff members. Implement clean desk policies requiring employees to secure documents in locked drawers or cabinets when leaving workspaces unattended.
Vendor Management and Third-Party Oversight
Tax practices increasingly rely on third-party vendors for critical services, from cloud-based tax preparation software to IT support providers accessing systems. The FTC Safeguards Rule explicitly requires selecting qualified service providers capable of maintaining appropriate safeguards and contractually obligating them to implement security measures protecting client data. WISP for small tax firms must establish vendor management procedures ensuring third parties meet security standards equivalent to internal practices.
Pro Tip
Create a vendor security questionnaire that all potential service providers must complete before engagement. Include questions about encryption standards, employee background checks, security incident history, compliance certifications, and disaster recovery capabilities. This standardized process ensures consistent evaluation across all third-party relationships while building documentation demonstrating vendor oversight efforts to regulators.
Incident Response and Breach Notification Requirements
Developing Incident Response Procedures
Despite comprehensive preventive measures, security incidents may still occur through sophisticated attacks, employee errors, or unforeseen vulnerabilities. Written information security plans must include detailed incident response procedures enabling rapid, coordinated reactions that minimize damage and ensure regulatory compliance. Begin by defining what constitutes security incidents requiring response activation, including confirmed or suspected unauthorized access to taxpayer information, malware infections or ransomware attacks, lost or stolen devices containing client data, successful phishing attacks compromising employee credentials, and suspicious system activities suggesting potential compromise.
Breach Notification Requirements
| Feature | Notification Requirement | Timeframe | RecommendedMethod |
|---|---|---|---|
| IRS Data Security Office | Within 24 hours | Stakeholder Liaison reporting | — |
| FTC (500+ consumers) | Within 30 days | FTC online reporting system | — |
| Affected Individuals | Varies by state (often 30-90 days) | Written notice or email | — |
| State Attorneys General | Varies by state | Written notification or portal | — |
| Credit Reporting Agencies | When 1,000+ affected | Direct agency notification | — |
Understanding Federal and State Breach Notification Requirements
When security incidents result in unauthorized access to taxpayer information, multiple notification obligations may apply depending on affected data types and individual locations. The IRS requires tax professionals to report confirmed breaches involving taxpayer information to the IRS Data Security Office within 24 hours. Use the IRS Stakeholder Liaison reporting process documented in Publication 4557, providing details about incident scope, affected individuals, and response actions taken.
The August 2024 update to the FTC Safeguards Rule introduced mandatory breach notification requirements when security events affect 500 or more consumers. Financial institutions must notify the FTC within 30 days of determining that security events have occurred, using the FTC's online notification system. This federal requirement applies in addition to any state-level notification obligations, not as a replacement for them.
WISP Documentation Checklist
- ☐ Executive summary outlining program scope and objectives
- ☐ Security officer designation with defined responsibilities
- ☐ Annual risk assessment documenting threats and vulnerabilities
- ☐ Administrative safeguards covering all employee-related policies
- ☐ Technical safeguards specifying all deployed security technologies
- ☐ Physical safeguards addressing facility and document security
- ☐ Vendor management procedures and assessment criteria
- ☐ Incident response plan with notification templates
- ☐ Employee training program outline and materials
- ☐ Testing and validation procedures with schedules
- ☐ Review and update procedures ensuring currency
- ☐ Approval signatures from practice leadership
Phased Rollout Strategy
WISP documentation provides value only when actually implemented through changed employee behaviors and deployed technical controls. Develop phased rollout plans sequencing implementation efforts logically, starting with quick wins demonstrating progress before tackling more complex or expensive initiatives. Initial priorities typically include completing risk assessments to identify critical vulnerabilities, designating information security officers, implementing multi-factor authentication on key systems, deploying endpoint protection across all devices, conducting comprehensive employee training, and establishing incident reporting procedures.
Communicate WISP implementation clearly to all staff members, explaining why security matters to practice success and client trust. Avoid framing security solely as compliance requirements, instead emphasizing practical benefits like reduced fraud risk, enhanced client confidence, competitive advantages in professional services markets, and personal protection for employees' own information.
Testing and Validation
Regular testing validates that documented security controls actually function as designed and provide intended protection. Written information security plans should establish testing schedules covering all critical safeguards. Technical controls require frequent validation—test backup and restore procedures quarterly ensuring actual data recovery when needed, conduct vulnerability scans monthly identifying security weaknesses before criminals discover them, run simulated phishing exercises quarterly testing employee ability to recognize social engineering attempts, and verify encryption implementation on all devices handling taxpayer information.
Maintaining Compliance as Tax Practices Evolve
Annual Review and Update Procedures
Written information security plans require regular updates reflecting changed threats, technologies, regulations, and practice circumstances. Establish annual review schedules where designated security officers comprehensively evaluate all WISP components. Annual reviews should reassess risks identifying new threats or vulnerabilities that emerged during the year, evaluate control effectiveness based on testing results and incident experiences, update policies reflecting technology changes like new software platforms or cloud services, incorporate regulatory updates from IRS guidance or FTC rule amendments, and revise training programs addressing current threat trends and employee knowledge gaps identified through assessments.
Emerging Threat Alert
The IRS Security Summit reports that business email compromise attacks targeting tax professionals increased 43% during the 2024 filing season. Criminals impersonated partners and senior staff members, directing employees to urgently transfer funds or provide client tax return files. These sophisticated attacks bypass traditional email filtering, making employee training and verification procedures essential defense layers.
Building Security Culture
Technical controls and documented procedures provide limited protection without strong security culture where every team member understands their role in protecting client information. Building this culture requires consistent messaging from practice leadership demonstrating that security is a core business value rather than an IT concern. When partners and senior staff members visibly follow security policies—locking workstations when leaving desks, challenging unfamiliar individuals in restricted areas, reporting suspicious emails—other employees naturally adopt similar behaviors.
Recognize and reward employees who demonstrate strong security practices or identify potential vulnerabilities. Public acknowledgment during staff meetings, small bonuses for meaningful security improvement suggestions, or security excellence awards create positive associations with security consciousness. Avoid punitive responses to honest mistakes that will discourage incident reporting, instead viewing errors as training opportunities.
Professional Resources and Implementation Support
Creating and maintaining compliant written information security plans for small tax firms requires significant effort and specialized knowledge that many tax professionals lack despite their financial expertise. Professional resources can accelerate WISP development while ensuring regulatory compliance and practical effectiveness. The IRS provides foundational guidance through Publication 5708, a comprehensive WISP template specifically designed for tax professionals, and Publication 4557 offering detailed security guidance.
Professional associations including AICPA, NATP, and NSA offer WISP guidance, sample policies, and educational programs helping members understand and meet security requirements. Many provide member-exclusive resources like customizable policy templates, security assessment checklists, and discounted access to cybersecurity vendors offering practice-specific solutions.
Specialized cybersecurity firms serving tax and accounting practices provide comprehensive WISP development, implementation, and ongoing management services. These turnkey solutions often cost less than in-house implementation attempts while providing superior security posture through specialized expertise and enterprise-grade technologies. Organizations can explore comprehensive cybersecurity resources for additional implementation guidance and threat intelligence specific to financial services sectors.
Frequently Asked Questions
A Written Information Security Plan is a comprehensive document outlining how tax practices identify, assess, and manage cybersecurity risks to protect sensitive client information. Federal law under the Gramm-Leach-Bliley Act classifies tax preparation businesses as financial institutions subject to strict data protection requirements enforced by the FTC through its Safeguards Rule. The IRS requires all tax professionals to confirm WISP implementation during annual PTIN renewal, with false statements constituting perjury. Beyond legal compliance, WISPs provide practical frameworks for preventing costly data breaches averaging $4.88 million according to IBM research, maintaining client trust, and preserving professional credentials essential for practice operations.
WISP complexity should match practice size, scope, and risk profile, but all practices must address the same core components regardless of size. Solo practitioners need WISPs covering all required elements—designated security officer, risk assessment, administrative safeguards, technical controls, physical security, vendor management, incident response, and training—but with implementation appropriate for single-person operations. Smaller practices benefit from focused documentation avoiding unnecessary complexity while ensuring comprehensive risk coverage. The IRS Publication 5708 sample WISP provides a reasonable starting point that solo practitioners can customize, while larger firms typically require more detailed policies addressing multiple locations, larger staff, and more complex technology environments.
While templates provide useful starting points ensuring all required components are addressed, generic WISPs without practice-specific customization fail to satisfy regulatory requirements for risk-based security programs. WISP for small tax firms must reflect actual security practices, technologies deployed, specific risks identified through assessments, and procedures genuinely followed. Regulators increasingly scrutinize whether documented plans match actual implementation, with template language that clearly doesn't reflect practices potentially indicating checkbox compliance rather than meaningful security programs. Use templates as frameworks, then customize every section with specific details about systems, policies, and procedures to create documentation that actually guides security efforts.
Penalties for WISP non-compliance include civil fines up to $46,517 per violation per day under FTC Safeguards Rule enforcement, IRS revocation of PTIN and EFIN privileges effectively ending ability to prepare returns professionally, state-level penalties varying by jurisdiction but potentially reaching $100,000 per violation, increased liability in data breach litigation where lack of reasonable security constitutes negligence, insurance claim denials for failing to meet policy requirements, and professional reputation damage where security-conscious clients avoid practices with known compliance failures. These penalties apply regardless of whether breaches occur—the absence of required WISP documentation itself constitutes a violation warranting enforcement action.
Review and update WISPs annually at minimum, with interim updates triggered by significant practice changes affecting security posture. Annual reviews should reassess risks, evaluate control effectiveness, incorporate regulatory updates, and revise policies reflecting technology changes. Immediate WISP updates are necessary when opening new office locations that alter physical security requirements, implementing remote work arrangements requiring new policies, adopting substantially different technologies like cloud-based tax software, experiencing security incidents revealing plan inadequacies, or when new regulations impose additional requirements. Document all changes with version histories demonstrating ongoing security program management. Regular updates ensure WISPs remain current and effective rather than becoming static compliance documents disconnected from actual practice operations.
Employee training transforms written policies into practiced behaviors that actually protect client information, making it essential for WISP effectiveness. Human error causes 95% of successful cyberattacks against tax practices, primarily through phishing emails, weak passwords, and improper data handling. Comprehensive training programs covering security fundamentals, role-specific risks, and emerging threats significantly reduce these vulnerabilities. Federal regulations explicitly require training as a core WISP component, with documented training completion serving as compliance evidence. Effective programs include initial training for new hires before they access client data, annual refresher sessions addressing current threats, simulated phishing exercises testing real-world recognition abilities, and ongoing security awareness communications maintaining high vigilance especially during peak tax season when attacks increase dramatically.
Small tax firms can implement effective WISPs using commonly available business software and security tools without requiring enterprise-grade platforms. Essential technologies include professional antivirus and anti-malware on all devices, built-in operating system encryption like BitLocker or FileVault, password managers enforcing strong credential policies, secure cloud storage with encryption, and automatic backup systems. Free or low-cost solutions often provide adequate protection for smaller practices, though managed security service providers offer comprehensive integrated platforms that simplify compliance for practices lacking internal IT expertise. The critical factor isn't expensive specialized software but rather comprehensive implementation of fundamental security controls consistently applied across all systems. Practices should prioritize MFA, encryption, regular backups, and employee training over costly security tools.
Demonstrating WISP compliance during IRS audits or regulatory examinations requires comprehensive documentation proving not just policy existence but actual implementation. Maintain complete WISP documentation with version histories showing updates over time, risk assessment reports documenting identified threats and remediation efforts, employee training records with attendance logs and completion certificates, security testing results from vulnerability scans and penetration tests, incident response documentation detailing security events and resolution steps, vendor security assessments and contract review documentation, and governance meeting minutes showing leadership oversight. Store this documentation in organized electronic and physical formats accessible to auditors upon request. Regular self-audits using compliance checklists identify documentation gaps before regulatory examinations occur. Many practices engage external cybersecurity assessors to validate WISP implementation and provide independent compliance verification that strengthens regulatory defense positions.
Taking Action: Implementation Steps for Small Tax Firms
Creating and implementing written information security plans represents one of the most important investments small tax firms can make in practice sustainability and client protection. Start today by conducting baseline security assessments identifying current posture and critical gaps requiring immediate attention. Review the IRS Publication 5708 template to understand required components, then evaluate which elements practices already address and which need development. Prioritize quick wins like designating security officers, implementing multi-factor authentication on critical systems, and conducting initial employee security training that provide immediate risk reduction while building implementation momentum.
Don't attempt WISP development alone if lacking security expertise or time during tax season demands. Professional WISP services provide customized documentation meeting all regulatory requirements while remaining practical for specific practice circumstances. These turnkey services typically cost less than single data breach incidents while providing peace of mind that practices meet all legal requirements and maintain strong client data protection.
Remember that WISP compliance is an ongoing journey rather than one-time project. Schedule annual reviews, maintain awareness of emerging threats, continuously train employees, and view security as a core practice competency rather than burdensome compliance obligation. Tax professionals who build strong security programs transform regulatory requirements into competitive advantages, attracting security-conscious clients while protecting practices from costly breaches and regulatory sanctions.
Protect Your Tax Practice Today
Schedule a free consultation to discuss your cybersecurity needs and IRS compliance requirements.
Free Consultation
Need help with IRS compliance?
Our tax cybersecurity specialists can review your security posture and help you get compliant.



