FTC Safeguards Rule: Complete Compliance Guide for Tax Preparers
The FTC Safeguards Rule affects all tax preparers handling client financial data. Here's everything you need to know about compliance requirements.

The Federal Trade Commission's Standards for Safeguarding Customer Information, commonly known as the Safeguards Rule, has significant implications for tax professionals. As a tax preparer who handles financial information, you are likely subject to these requirements, and understanding them is crucial for compliance and client protection.
Who Must Comply?
The Safeguards Rule applies to financial institutions, a category that the FTC defines broadly. Tax return preparers, accountants, and bookkeepers who handle customers' financial information fall within this definition. If you prepare tax returns for clients, you are almost certainly required to comply with the Safeguards Rule.
This applies regardless of your practice size. Whether you're a solo practitioner working from home or a large firm with multiple locations, the core requirements remain the same. The FTC does allow some flexibility in implementation based on the size and complexity of your operations, but the fundamental obligations are universal.
Core Requirements of the Safeguards Rule
The Safeguards Rule requires you to develop, implement, and maintain a comprehensive information security program. This program must include administrative, technical, and physical safeguards designed to protect customer information from anticipated threats and unauthorized access.
Key elements include designating a qualified individual to oversee your security program, conducting regular risk assessments, implementing safeguards to address identified risks, and continuously monitoring and testing the effectiveness of your security measures. The rule also requires you to train your staff and ensure your service providers maintain appropriate safeguards.
The Written Information Security Plan
Central to Safeguards Rule compliance is the requirement to have a written information security plan (WISP). This document should describe your safeguards, outline policies and procedures, and provide a roadmap for maintaining security. The WISP should be a living document, regularly reviewed and updated as your practice evolves and new threats emerge.
Your WISP should address how you secure customer information at rest and in transit, how you control access to sensitive data, what happens when employees leave, how you respond to security incidents, and how you evaluate the security practices of third parties you work with.
Risk Assessment Requirements
The Safeguards Rule requires periodic risk assessments to identify foreseeable threats to customer information. These assessments should consider internal and external risks, evaluate the sufficiency of current safeguards, and identify areas needing improvement.
Risk assessments should be documented and should inform your security decisions. When you identify a risk, you need to implement appropriate safeguards to address it. This might mean updating software, improving physical security, adding access controls, or implementing new policies and procedures.
Technical Safeguards
Several technical requirements deserve special attention. Encryption of customer information is now explicitly required, both during transmission over external networks and when data is at rest. Access controls must be implemented to limit who can view customer information to those who need it for their job functions.
Multi-factor authentication is required for anyone accessing customer information, with very limited exceptions. Regular monitoring for unauthorized access and continuous assessment of your information systems' vulnerabilities are also mandated.
Staff Training and Oversight
Your employees are both your greatest asset and a potential vulnerability. The Safeguards Rule requires that you provide security awareness training to all personnel and that staff with hands-on security responsibilities receive specialized training appropriate to their roles.
Beyond initial training, you need to verify that employees are following security procedures and update training as threats evolve. Creating a culture where security is everyone's responsibility is as important as any technical measure.
Service Provider Management
If you use third-party services—cloud storage, tax software, document management systems—you must take steps to ensure those providers maintain appropriate security. This means selecting providers capable of maintaining appropriate safeguards and contractually requiring them to implement and maintain such safeguards.
You should also periodically assess your service providers' security practices. While you don't need to be a security expert, you should be able to identify red flags and make informed decisions about who handles your clients' data.
Consequences of Non-Compliance
The FTC has authority to enforce the Safeguards Rule, and violations can result in significant penalties. Beyond regulatory consequences, a data breach resulting from inadequate security can damage your reputation, expose you to lawsuits, and harm the clients who trusted you with their information.
Compliance isn't just about avoiding penalties—it's about protecting your clients and your practice. Taking security seriously demonstrates professionalism and builds client trust.