Understanding Encryption: What Tax Professionals Need to Know
Encryption is essential for protecting client data, but it can seem confusing. This guide explains what encryption is and how to use it.

Encryption is one of the most important tools for protecting client data, yet many tax professionals aren't quite sure what it is or how it works. Understanding the basics helps you make informed decisions about your security practices and communicate more effectively with clients about how their information is protected.
What Is Encryption?
At its simplest, encryption scrambles information so that only authorized parties can read it. Unencrypted data—sometimes called plaintext—is converted using a mathematical process into ciphertext that appears as random gibberish. To read the original information, you need the key to decrypt it.
Think of it like a lockbox for your data. Without the key, even if someone gets the box, they can't access what's inside. This protects information during transmission over networks and while stored on computers, drives, or cloud services.
Encryption in Transit vs. At Rest
Data can be encrypted at different stages. "In transit" refers to data moving from one place to another—when a client uploads a document to your portal, when you send an email, or when information travels between your computer and cloud services.
"At rest" refers to data stored on devices or servers. When your hard drive, cloud storage, or backup drive is encrypted, the data can't be read even if someone physically accesses the storage device.
Both types of encryption are important. In-transit encryption prevents interception during transmission. At-rest encryption protects against physical theft or unauthorized access to storage.
Common Encryption You Already Use
You probably use encryption daily without thinking about it. When you see "https" in a web address, your connection is encrypted using TLS. When you log into your bank's website or access a client portal, encryption protects the transmission.
Modern smartphones encrypt stored data by default when you set a passcode. Many email services encrypt messages between their servers. Windows BitLocker and Mac FileVault encrypt entire drives. You may already have more encryption protection than you realize.
Where You Need Encryption
For tax professionals, encryption should protect client data wherever it exists. This includes your computer's hard drive, backup drives, cloud storage services, email containing sensitive information, and data transmitted through client portals.
Pay attention to portable devices and removable media. A laptop or USB drive containing unencrypted client data represents significant risk if lost or stolen. Enable full-disk encryption on any device that stores client information.
Email Encryption Considerations
Regular email is not encrypted by default. While transmission between major email providers may be encrypted, the messages themselves remain readable by anyone who gains access to the email accounts. For truly sensitive communications, additional encryption is necessary.
Several options exist for secure email communication. Encrypted email services, email encryption add-ons, and secure messaging features in client portals all provide stronger protection than regular email. The best choice depends on your practice's needs and your clients' technical comfort.
Practical Implementation
Start by taking inventory of where client data lives and flows. For each location, determine whether encryption is in place and what type. Address gaps starting with the highest-risk areas—portable devices and data transmission typically deserve priority.
Choose tools that make encryption easy. If encryption requires extra steps that interrupt your workflow, you might skip it when you're busy. Solutions that work automatically or integrate seamlessly with your existing processes are more likely to be used consistently.
Limitations to Understand
Encryption is powerful but not magic. It protects data from unauthorized access, but if someone gets your password or the encryption key, they can decrypt the information. Strong passwords and proper key management remain essential.
Encryption also doesn't prevent all threats. A malicious attachment can still infect your computer even if it was encrypted during transmission. Encryption is one layer of a comprehensive security approach, not a complete solution by itself.