Bellator Cyber Guard
FTC Compliance

FTC Safeguards Rule compliance checklist

A complete, step-by-step checklist for tax firms to achieve and maintain compliance with the FTC Safeguards Rule. Covers everything from designating your Qualified Individual to ongoing monitoring and annual reporting.

Overview

What the FTC Safeguards Rule requires

The FTC Safeguards Rule (16 CFR Part 314) applies to all “financial institutions” as defined under the Gramm-Leach-Bliley Act, which explicitly includes tax return preparers. The amended rule, effective June 9, 2023, introduced significant new requirements including mandatory encryption, multi-factor authentication, penetration testing, and the designation of a Qualified Individual.

Non-compliance is not just a regulatory risk. In the event of a data breach, failure to comply with the Safeguards Rule can result in FTC enforcement actions, state attorney general investigations, civil lawsuits from affected taxpayers, and loss of your PTIN and ability to practice.

This checklist is organized into four phases that mirror the structure of the rule itself. Work through each phase in order, and use the detailed tasks to build or audit your compliance program.

1

Designate a Qualified Individual

2

Conduct a Risk Assessment

3

Implement Safeguards

4

Monitor, Test, and Update

1

Designate a Qualified Individual

Required as of June 9, 2023

Section 314.4(a) of the amended Safeguards Rule requires you to designate a single Qualified Individual (QI) responsible for overseeing, implementing, and enforcing your information security program. This person does not need to be an employee. You may designate an outside service provider, but your firm retains ultimate responsibility for compliance.

Identify and formally designate a Qualified Individual in writing

Create a written appointment letter specifying the QI's name, title, responsibilities, authority, and effective date. The QI must have sufficient authority to direct resources and make decisions.

Verify the QI has appropriate expertise or access to expertise

The QI must understand information security risks relevant to tax preparation. If using an outside provider, verify their credentials and document the engagement agreement.

Establish a reporting structure to senior management

The QI must report in writing at least annually to the board of directors, a senior officer, or the firm owner. Reports must cover program status, risk assessment findings, and material security events.

Define the QI's scope of authority and budget

Document that the QI has authority to approve security expenditures, mandate policy changes, and escalate critical issues to firm leadership.

2

Conduct a Risk Assessment

Initial assessment required; reassess periodically

Section 314.4(b) requires a written risk assessment that identifies reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information. The assessment must evaluate the sufficiency of existing safeguards and be updated whenever there are material changes to your operations.

Inventory all systems that store, process, or transmit taxpayer data

Include tax preparation software, email systems, file servers, cloud storage, printers, scanners, mobile devices, and backup systems. Note the physical location of each.

Identify internal threats to taxpayer data

Consider employee error, insider theft, inadequate training, weak passwords, unauthorized software installation, and loss or theft of devices.

Identify external threats to taxpayer data

Consider phishing attacks, ransomware, malware, brute force attacks, social engineering, physical break-ins, and compromised third-party vendors.

Assess the likelihood and potential damage of each identified threat

Use a consistent rating methodology (e.g., High/Medium/Low) for both likelihood and impact. Document your reasoning for each rating.

Evaluate the sufficiency of existing safeguards for each threat

For each identified risk, document what controls are currently in place and whether they adequately mitigate the risk to an acceptable level.

Document remediation plans for gaps identified

For any risk where existing safeguards are insufficient, create a remediation plan with specific actions, responsible parties, and target completion dates.

3

Implement Safeguards

Ongoing based on risk assessment findings

Section 314.4(c) and (d) require you to design and implement safeguards to control the risks identified in your assessment. The rule specifies several mandatory safeguards that apply to all covered financial institutions, including tax preparers.

Implement access controls based on the principle of least privilege

Restrict each employee's access to only the taxpayer data and systems they need to perform their job. Use role-based access control and review permissions quarterly.

Deploy multi-factor authentication on all systems with customer data

MFA is mandatory for any individual accessing customer information on your systems. This includes tax software, email, cloud storage, and remote access.

Encrypt all customer information in transit and at rest

Use TLS 1.2 or higher for data in transit. Use AES-256 or equivalent for data at rest. This includes email attachments, file transfers, database storage, and backups.

Develop and maintain a data retention and disposal policy

Define how long you retain different types of taxpayer data, and implement secure disposal methods (cross-cut shredding, cryptographic wiping) when retention periods expire.

Implement change management procedures

Document procedures for evaluating the security impact of changes to your systems, networks, or operations before implementing them.

Maintain audit trails and logging

Configure systems to log user access, authentication attempts, data modifications, and administrator actions. Retain logs for a minimum of three years.

Establish a security awareness training program

Train all employees upon hiring and at least annually thereafter. Cover phishing recognition, password security, social engineering, physical security, and incident reporting.

Develop a written incident response plan

Document procedures for detecting, containing, investigating, and recovering from security incidents. Include notification procedures for the IRS, FTC, state regulators, and affected taxpayers.

4

Monitor, Test, and Update

Continuous monitoring or annual testing required

Section 314.4(d)(2) requires you to either implement continuous monitoring or conduct annual penetration testing and semi-annual vulnerability assessments. Beyond testing, you must regularly evaluate and adjust your program.

Conduct annual penetration testing by a qualified professional

Engage an independent security firm to attempt to breach your defenses. The test should cover network, application, and social engineering attack vectors. Document the scope, findings, and remediation.

Perform vulnerability assessments every six months

Run automated vulnerability scans against all systems in scope. Compare results against previous scans to identify new vulnerabilities and verify previously identified issues were resolved.

Or implement continuous monitoring as an alternative to annual testing

Deploy a Security Information and Event Management (SIEM) system or managed detection and response (MDR) service that continuously monitors for threats and anomalies.

Review access logs and user activity regularly

At minimum, conduct quarterly reviews of user access privileges and monthly reviews of authentication logs for anomalies such as logins from unusual locations or after-hours access.

Reassess your security program after material changes

Trigger a reassessment when you add new software, change vendors, open new offices, experience a security incident, or undergo significant staffing changes.

Produce an annual written report from the Qualified Individual

The QI must report to the board or senior management on the overall status of the program, compliance with the rule, material events, risk assessment results, and recommendations.

Evaluate and oversee service providers

Select service providers capable of maintaining appropriate safeguards. Require them by contract to implement and maintain safeguards. Periodically assess them based on the risk they present.

Consequences

Penalties for non-compliance

The FTC has enforcement authority and has pursued action against tax preparers who fail to maintain adequate safeguards.

ViolationPotential Consequence
Failure to implement a written security programUp to $100,000 per violation
Failure to designate a Qualified IndividualUp to $100,000 per violation
Inadequate risk assessment documentationUp to $50,000 per violation
Failure to encrypt customer informationUp to $100,000 per violation
Missing or inadequate incident response planUp to $50,000 per violation
Failure to monitor and test safeguardsUp to $100,000 per violation

Compliance is not optional. We make it achievable.

Our team has helped hundreds of tax firms achieve full FTC Safeguards Rule compliance. We handle everything from your risk assessment to ongoing monitoring so you can focus on your clients.