MYCPE ONE

The  creates a major compliance challenge for CPA firms today. Data breaches now cost $4.24 million on average per incident FTC Safeguards Rule. The updated regulation took effect on June 9, 2023, and brings harsh penalties. Firms could face fines up to $100,000 per violation, plus $43,000 daily for consent violations, among other penalties . 

The FTC Safeguards Rule, 20 years old, went through major changes in 2021 and 2023 to tackle new technology challenges . CPAs must understand these requirements and create a detailed ftc safeguards rule checklist before busy season starts .  

The consequences reach far beyond the $100,000 per-violation fines. Firm leaders could face personal fines up to $10,000 per violation and maybe even serve prison time up to five years if they fail to comply .  

This piece walks you through what CPA firms must know to meet these requirements in 2026. You'll find practical steps to protect your practice and clients effectively. 

Who Must Comply with the FTC Safeguards Rule? 

Most accounting professionals don't realize they need to follow the FTC Safeguards Rule. The rule affects more businesses than you might expect. You need to know if your firm must comply to avoid hefty penalties. 

Definition of a Financial Institution Under the Rule 

The FTC Safeguards Rule says a "financial institution" is "an entity engaging in an activity that is financial in nature or incidental to such financial activities". This definition goes way beyond just banks. The Rule lists 13 types of businesses that must comply: 

  • Mortgage lenders and brokers 
  • Collection agencies 
  • Credit counselors 
  • Tax preparation firms 
  • Investment advisors not registered with the SEC 
  • Finance companies 
  • Check cashers 

The 2021 amendments to the Safeguards Rule added "finders" – businesses that connect buyers and sellers – to this growing list. 

Why CPA Firms and Tax Preparers are Included 

The Safeguards Rule covers CPA firms and tax professionals because they offer " to any person for personal, family, or household purposes" tax planning and preparation services. The IRS makes this clear: "Protecting taxpayer data is the law. Federal law gives the Federal Trade Commission authority to set data safeguard regulations for various entities, including professional tax return preparers". 

Tax preparers must follow the FTC Safeguards Rule since they're named in the regulation. Breaking these rules can cost you  up to $46,000 per day. That's why accounting professionals need to know their responsibilities. 

Understanding the 5,000-Consumer Threshold 

The Safeguards Rule applies to all financial institutions, but firms with fewer than 5,000 consumers get some exceptions. This threshold often creates confusion. 

A consumer means "an individual who obtains or has obtained a financial product or service from the financial institution that is used primarily for personal, family, or household purposes, or that individual's legal representative". You need to count all consumers whose records contain nonpublic personal information handled by you, your affiliates, or service providers. 

The 5,000-consumer exception only covers certain parts of the Rule. The Tax Advisor points out that "Even sole proprietors and small firms must develop, implement, and maintain a written information security plan". Your firm loses this exception if it ever handles more than 5,000 personally identifiable records. 

What the FTC Safeguards Rule Requires in 2025

CPA firms must implement detailed safeguards to protect sensitive client information and comply with the FTC Safeguards Rule. These requirements help firms avoid penalties and protect client data. 

Overview of the Written Information Security Program (ISP) 

The life-blood of FTC Safeguards Rule compliance lies in developing a written . This goes beyond a simple checklist. Your practice needs a detailed framework that matches your business's size, complexity, activities, and the sensitivity of handled information Information Security Program

Your ISP needs administrative, technical, and physical safeguards to protect customer information. CPA firms must document specific protocols that safeguard tax returns, financial statements, and personal client data. "Customer information" refers to any record with nonpublic personal information about a customer in paper, electronic, or other form. 

CTA

Objectives of the ISP: Confidentiality, Integrity, and Security 

The information security program focuses on three main goals: 

  • Ensuring confidentiality - Access controls, encryption, and security policies protect information from unauthorized access
  • Maintaining integrity - Digital signatures, checksums, and change logging ensure information stays correct, complete, and unaltered 
  • Safeguarding availability - Redundancy, backups, and disaster recovery plans keep systems and information reliable and accessible

New Breach Notification Requirements Effective May 2024 

The FTC added major breach notification requirements starting May 13, 2024. CPA firms must alert the FTC within 30 days after they find a "notification event" - a security breach where unauthorized parties acquire  at least 500 consumers' unencrypted information

Key points about this requirement: 

  • "Unencrypted" includes encrypted information if unauthorized people accessed the encryption key 
  • The FTC assumes unauthorized access means "unauthorized acquisition" unless proven otherwise
  • Firms must submit notifications through the FTC's online form 

Accounting professionals need proper encryption and access controls more than ever to prepare for potential breaches. 

The 8 Key Elements of a Compliant Security Program 

The 8 Key Elements of a Compliant Security Program

The FTC Safeguards Rule requires CPA firms to follow nine specific security elements. A well-laid-out framework will give you both compliance and real protection for your clients' financial data. 

1. Designate a Qualified Individual

Your security program needs one person to take charge of implementation and oversight. This "Qualified Individual" doesn't need specific certifications. They just need the right security knowledge that matches your firm's size and complexity. You can choose an employee, affiliate, or service provider, but your firm ended up being responsible for compliance. The Qualified Individual must give written reports about the program's status to your board or governing body at least once a year. 

2. Conduct a Written Risk Assessment

You need to base your security program on a documented risk assessment that spots potential threats to customer information. Your assessment must show how you evaluate security risks, check your systems' integrity, and tackle identified risks. Companies that handle data for  need a detailed assessment that gets updated as threats change 5,000+ consumers

3. Implement Access Controls and Encryption

The "least privilege" principle must guide access to customer information. Your employees should only have access to what they need for their job. Therefore, you must encrypt sensitive customer data during transmission and storage. Anyone accessing customer information must use multi-factor authentication. This step alone can stop up to  99.9% of account compromise attempts

4. Monitor and Test Safeguards Regularly 

Your security safeguards need constant monitoring and testing. You can either set up continuous monitoring systems or do yearly penetration testing plus vulnerability checks every six months. Continuous monitoring lets you spot threats right away and see your security status on a dashboard. Penetration tests show you vulnerabilities at specific points in time. 

5. Train Staff and Raise Awareness

Everyone who can access customer information needs security awareness training. The training should match each person's role and address your firm's specific risks. In fact, good training can drop phishing test failure rates from about 30% to 4%. Your program should cover phishing awareness, data handling, and new threats. 

6. Manage Third-party Service Providers

Your service providers' security practices are your responsibility. You need to pick vendors with good safeguards, put security requirements in contracts, and check their security measures based on risk. Make sure to document and review all vendor assessments. 

7. Keep the ISP Updated 

Your information security program should change with circumstances. New operations, staff changes, infrastructure updates, risk findings, and emerging threats all need attention. Regular reviews help your program stay strong against current security challenges. 

8. Create Anincident Response Plan

You need a written plan that shows how to handle security breaches. The plan should list goals, internal processes, roles, responsibilities, communication steps, fixes, documentation needs, and evaluation methods. Running practice scenarios helps everyone know what to do during a real security incident. 

Practical Steps for CPA Firms to Achieve Compliance 

Practical Steps for CPA Firms to Achieve Compliance

CPA firms can feel overwhelmed when they need to turn regulatory requirements into action. You can guide your firm through ftc safeguards rule compliance with a systematic approach. Let's get into the most practical steps. 

Start with a Data Inventory and Gap Analysis 

Your firm needs a map of where client information exists. A complete data inventory should show all systems, devices, platforms, and staff members who can access customer information. The FTC states, "You can't formulate an effective information security program until you know what information you have and where it's stored". 

A gap analysis should follow your inventory to compare your current security against the ftc safeguards rule requirements. This helps measure your compliance level and reveals weak spots. Your organization's flow of customer information needs special attention - from how you collect it to how you store and eventually destroy it. 

Use Templates and Tools like the FTC Safeguards Rule Checklist 

Available resources can make compliance simpler. Free ftc safeguards rule checklist templates from many organizations help streamline the process. These templates typically have: 

  • Information Security Plan templates 
  • Incident Response Plan frameworks 
  • Risk Assessment Matrix tools

These resources can help you "breeze through your WISP in 2 hours"  instead of creating everything from scratch. Make sure any template you pick fits your firm's size, complexity, and risk profile. 

Think Over Outsourcing to Cybersecurity Experts 

Partnering with security experts are a great way to get advantages for many CPA firms. Managed Service Providers (MSPs) can: 

  • Conduct in-depth risk assessments 
  • Perform periodic penetration tests 
  • Implement required technology controls 
  • Develop tailored security awareness training 

One expert points out that your qualified individual doesn't need to be an internal hire - they "can be someone who works for the firm's cloud provider". 

Document Everything for Audit Readiness 

Detailed documentation proves essential throughout your compliance process. Keep records of: 

  • Risk assessments and their findings 
  • Security control implementations 
  • Staff training completion records 
  • Service provider evaluations 

Good documentation shows your due diligence and readiness for regulatory review. Note that anything without documentation might as well not have happened at all. 

Conclusion

CPA firms today must take the FTC Safeguards Rule compliance seriously. The stakes couldn't be higher, personal liability up to $10,000 per violation, and even prison sentences make this regulation impossible to ignore. Your clients trust you with their most sensitive financial information, and protecting that data must stay a priority. potential penalties of $100,000 per violation 

The nine most important elements in this piece give you a clear path to compliance. Your firm's security strategy needs risk assessments, access controls, staff training, and incident response planning. The 5,000-consumer threshold gives limited exemptions but doesn't completely free you from compliance obligations. 

Getting started requires a full data inventory and gap analysis. Many firms succeed by using accessible templates and checklists that streamline the process. It also helps to outsource some compliance tasks to qualified cybersecurity experts for budget-friendly and proper implementation. 

The May 2024 breach notification rules make proactive security even more crucial. Your firm must  if breaches affect at least 500 consumers' unencrypted information. This makes complete encryption and access controls critical. 

These security measures protect more than compliance - they safeguard your firm's reputation and client relationships. A single data breach costs businesses $4.24 million on average, which could devastate most accounting practices. Your Information Security Program serves as essential protection for your firm's future. 

The FTC Safeguards Rule adds complexity to running an accounting practice. All the same, implementing these requirements systematically makes your firm more secure and shows your steadfast dedication to protecting client data. Client trust, once lost through a preventable data breach, becomes almost impossible to restore fully. Taking action now, before busy season hits, gives you the best chance for both compliance and client protection. 

Key Takeaways

The FTC Safeguards Rule presents critical compliance requirements for CPA firms, with severe penalties and new breach notification rules that demand immediate attention and systematic implementation. 

  • All CPA firms must comply - Tax preparers are explicitly covered as "financial institutions" under the rule, regardless of size, with penalties up to $100,000 per violation and personal liability for firm leaders. 
  • Implement a comprehensive written Information Security Program - Your ISP must address confidentiality, integrity, and availability through nine key elements including designated security leadership, risk assessments, and access controls. 
  • New breach notification requirements are now active - Since May 2024, firms must notify the FTC within 30 days of discovering breaches affecting 500+ consumers' unencrypted information. 
  • Start with data inventory and systematic implementation - Map where client information lives, conduct gap analysis, use available templates and checklists, and consider outsourcing to cybersecurity experts for efficient compliance. 
  • Document everything for audit readiness - Maintain comprehensive records of risk assessments, security implementations, staff training, and vendor evaluations to demonstrate due diligence and regulatory compliance. 

The cost of non-compliance far exceeds the investment in proper security measures. With data breaches averaging $4.24 million in damages, implementing these safeguards protects both your firm's financial future and client trust - assets that are nearly impossible to restore once compromised. 

CTA

FAQs

The FTC Safeguards Rule is a regulation that requires financial institutions, including CPA firms and tax preparers, to implement comprehensive safeguards to protect sensitive client information. It's crucial for CPA firms because non-compliance can result in severe penalties, including fines up to $100,000 per violation and potential personal liability for firm leaders. 

If your firm provides tax preparation services or handles financial information for personal, family, or household purposes, you likely need to comply. The rule applies to all such firms, regardless of size, though there are some exemptions for firms handling data for fewer than 5,000 consumers. 

A compliant security program includes nine key elements: designating a qualified individual, conducting risk assessments, implementing access controls and encryption, regular monitoring and testing, staff training, managing third-party providers, keeping the program updated, creating an incident response plan, and documenting everything for audit readiness.

As of May 2024, firms must notify the FTC within 30 days of discovering a security breach involving unauthorized acquisition of at least 500 consumers' unencrypted information. This applies to encrypted information as well if the encryption key was accessed by an unauthorized person. 

Start by conducting a thorough data inventory and gap analysis. Utilize available templates and checklists to streamline the process. Consider outsourcing to cybersecurity experts for specialized assistance. Most importantly, document all your compliance efforts meticulously to demonstrate due diligence in case of an audit.

CA Nemin Vora

CA Nemin Vora

Nemin Vora, a CA and Tax Attorney, leads Client Relations at MYCPE ONE. With 7+ years of experience at Big 4 and top public accounting firms across America, he helps U.S. firms scale globally through remote talent, offshoring, and cloud operations. Known for his sharp tax insights and practical approach to firm growth, Nemin is a dynamic speaker. He breaks down complex topics such as leadership, AI, global staffing, and practice expansion into relatable lessons that professionals actually enjoy learning. Beyond the strategy decks, Nemin is a learner at heart, a stage actor, and a tech enthusiast.

Must Read Blogs