FTC safeguard rule

🛡️ FTC Safeguards Rule


🔍 What Is the FTC Safeguards Rule?

The FTC Safeguards Rule is part of the Gramm-Leach-Bliley Act (GLBA), a federal law enacted in 1999. It requires financial institutions — including tax preparers, accountants, CPAs, and bookkeepers — to develop, implement, and maintain a comprehensive information security program to protect sensitive customer data.

📅 The rule was significantly updated in 2021, and enforcement began in June 2023.


🎯 Who Must Comply?

You must comply with the Safeguards Rule if you are classified as a “financial institution” under the GLBA — this includes:

  • Tax preparers
  • CPA firms
  • Bookkeepers & payroll services
  • Loan brokers
  • Investment advisors not regulated by the SEC
  • Mortgage lenders & servicers

📝 Even small firms or sole proprietors are covered if they handle consumer financial information.


⚖️ Legal Authority:

  • Law: Gramm-Leach-Bliley Act (15 U.S.C. §§ 6801–6809)
  • Regulation: FTC’s 16 CFR Part 314 — “Standards for Safeguarding Customer Information”
  • Official Text FTC

🔐 What the Rule Requires: 9 Key Elements of a Safeguards Program

You must design and implement a written information security program that contains administrative, technical, and physical safeguards. Here’s what it must include:


1. ✅ Appoint a Qualified Individual

Assign someone (internal or external) to be responsible for your security program.

  • Must oversee implementation and training
  • Must report to leadership annually
  • Can be a contractor or IT provider for small businesses

2. 🧠 Conduct a Risk Assessment

Identify risks to the security, confidentiality, and integrity of customer data.

  • Must be written/documented
  • Must evaluate internal and external risks (e.g., malware, unauthorized access, remote access)
  • Use findings to develop controls

3. 🔒 Design and Implement Safeguards

Based on your risk assessment, create safeguards that are reasonable and appropriate for your firm’s size and complexity.

Examples:

  • Firewalls and antivirus software
  • Multifactor authentication (MFA)
  • Role-based access controls
  • Secure remote access
  • Monitoring and logging systems

4. 👨‍🏫 Employee Training and Management

Train staff to understand and follow data security policies.

  • Conduct initial and periodic security training
  • Include phishing awareness
  • Enforce security responsibilities

5. 📦 Monitor Service Providers

If you use third-party vendors (e.g., cloud software, payroll systems), you must:

  • Vet their security practices
  • Ensure they are contractually required to safeguard data
  • Periodically reassess their performance

6. 🔁 Regularly Monitor and Test Safeguards

Ongoing testing is required to ensure your protections work.

  • Use continuous monitoring or
  • Perform annual penetration testing and vulnerability scans

7. ♻️ Keep the Program Current

As your firm changes (new software, remote work, new threats), you must update your safeguards accordingly.


8. 🧽 Create an Incident Response Plan

You must be ready to respond to a security event or breach. Your plan should:

  • Define roles/responsibilities
  • Describe how you’ll contain, report, and recover from incidents
  • Detail how you’ll notify customers and regulators if needed

9. 📊 Annual Report to Senior Management

Your Qualified Individual must report at least once a year to firm leadership with:

  • Program status
  • Risk assessments
  • Test results
  • Incidents and responses
  • Recommendations for improvement

📌 Safeguards Rule vs. IRS Publication 4557

While Publication 4557 is IRS guidance, the Safeguards Rule is federal law enforced by the FTC.

Requirement IRS Pub 4557 FTC Safeguards Rule
Written Plan Recommended Mandatory
Risk Assessment Recommended Mandatory
Training Advised Required
Incident Response Plan Strongly advised Mandatory
Annual Report Not required Mandatory

🛠️ Penalties for Non-Compliance

Violating the Safeguards Rule can result in:

  • Civil penalties from the FTC
  • Injunctions or mandatory compliance orders
  • Loss of PTIN (Preparer Tax Identification Number) or e-File privileges
  • Loss of trust from clients due to data breaches

Quick Checklist for Small Firms

✔ Appoint a security officer (internal or external)
✔ Write and maintain a WISP
✔ Conduct and document a risk assessment
✔ Use firewalls, antivirus, encryption, MFA
✔ Train employees annually
✔ Vet and contractually bind all vendors
✔ Test security controls (annually at minimum)
✔ Maintain an incident response plan
✔ Deliver an annual report to leadership