Complying with the Safeguards Rule

All firms, or people, in the United States who prepare tax returns fall under the provisions of the Graham-Leach-Bliley Act and are required to insure privacy of client data. The FTC Safeguards rule and IRS 4557 guidelines detail additional laws and guidelines that must be met.

Failure to have, and implement, a Written Information Security Plan (WISP) which details your process to meet these requirements can result in fines starting at $ 10,000.

Do you prepare any Tax Returns? CALL US (321) 345-1676 For any inquiry




.

Information Security Policies.

...

All tax preparers are required by the FTC Safeguards rule, IRS IRM Part 10, Chapter 5, The Gramm-Leach-Bliley Act, and IRS 4557 guidelines to have in place a Written Data Security Plan which outlines the protocols and processes which protect customer information and guard against data breaches.
The fines start at $ 10,000 if you are not in compliance

100% Free Consultation: Connect with us and get a free Data Security consultation!




Solutions that fit your size

...

BASIC EVALUATION PACKAGE $999


 Risk assessment
 WISP Compliant Recommendations
 Outlining Risk Mitigation Strategies
 Designing Encryption, Multifactor Authentication, & Data Disposal policies
 Implementable Written Information Security Plan WISP

INDIVIDUAL DEPLOYMENT PACKAGE $1,499

Suitable for Individuals / Work from Home.
INCLUDES ALL ITEMS IN THE BASIC EVALUATION PACKAGE
 Up to 10 Software Deployments
 Installation of Firewalls, Routers, Switches
 1 Computer included
 Individual training
 VPN setup
 Inactivity locks on screens
 File storage encryption
 Multifactor Authentication Deployment

SMALL BUSINESS WISP DEPLOYMENT PACKAGE $1,999

INCLUDES ALL ITEMS IN THE BASIC EVALUATION PACKAGE PLUS:
 up to 5 Computers included
 Up to 10 Software Deployments per computer
 Installation of Firewalls, Routers, Switches
 Staff training
 Testing and monitoring
 Inactivity locks on screens
 File storage encryption
 Multifactor Authentication Deployment
 Periodic evaluations

MEDIUM BUSINESS WISP DEPLOYMENT PACKAGE $2,999

INCLUDES ALL ITEMS IN THE BASIC EVALUATION PACKAGE PLUS:
 up to 15 Computers included
 Up to 10 Software Deployments per computer
 Installation of Firewalls, Routers, Switches
 Staff training
 Testing and monitoring
 Inactivity locks on screens
 File storage encryption
 Multifactor Authentication Deployment
 Follow up Phone Calls

REMOTE WORK $25 /HR (or part)

Suitable for minor issues or follow-up training/troubleshooting.

ON-SITE PLUS PACKAGE $50/HR (or part)

Suitable for major issues, follow-up training/troubleshooting, or hardware failure.



CUSTOM PROGRAMS AVAILABLE

Blog Image

Unlocking the Safeguards Rule: Secure your Tax Preparer Practice Today!

The rapid evolution of technology has necessitated the establishment of advanced regulations for safeguarding customer data. In 2021, the Federal Trade Commission (FTC) updated the Standards for Safeguarding Customer Information, known as the Safeguards Rule (16 C.F.R. Part 314), under the Gramm-Leach-Bliley Act, P.L. 106-102. Although a final rule issued on Dec. 9, 2022 (86 Fed. Reg. 70272), retroactively took effect to Jan. 10, 2022, certain provisions' requirements (outlined below) were deferred and are set to be enforced from June 9, 2023.

Applicable to businesses heavily involved in providing financial services, including professional tax preparers and CPA firms, the revised rules offer more explicit guidance while adapting to current technology and emerging threats. Covered financial services institutions, encompassing even sole proprietors and small firms, are obligated to formulate, implement, and maintain a written information security plan. This plan must delineate how the business intends to safeguard and protect clients' nonpublic personal information, addressing administrative, technical, and physical safeguards across various mediums.

Tailored to each firm's size, complexity, and nature of activities, the information security plan aims to ensure the security and confidentiality of customer information, guard against anticipated threats, and prevent unauthorized access. Despite differences in scale, the plan's objectives remain consistent.

Outlined in Section 314.4 of the Safeguards Rule, the information security plan must include nine key elements:

  • Designation of an individual in charge
  • Risk assessment
  • Safeguard implementation
  • Testing and monitoring
  • Staff training
  • Assessment of service providers
  • Periodic evaluations
  • Incident response plan
  • Internal reporting

For firms with information on at least 5,000 customers, a written risk assessment is mandatory, covering criteria for evaluating security risks, assessing information systems' confidentiality, integrity, and availability, and outlining risk mitigation strategies.

Safeguard implementation involves designing and enforcing measures such as encryption, multifactor authentication, data disposal policies, and continuous monitoring of authorized user activity. Regular testing or monitoring of key controls, systems, and procedures is required for larger firms.

Staff training ensures personnel can effectively implement the information security program, with a focus on maintaining current knowledge of changing threats. Firms must oversee service providers, ensuring they maintain adequate security measures.

Regular evaluations and adjustments to the information security program, based on operational changes and risk assessments, are crucial. Firms with over 5,000 customers must establish an incident response plan to address security events promptly.

Internal reporting requirements mandate firms to report annually to the board of directors or an equivalent authority on the overall status and compliance with the information security program.

While most provisions of the Safeguards Rule are already in effect, some compliance deadlines were extended to June 9, 2023. Noncompliance can have significant consequences, including penalties, fines, civil liability, and damage to customer trust. Various resources, such as the FTC Safeguards Rule guide and AICPA Information Security Plan Template, provide assistance, but compliance requires a thorough understanding and adaptation to each firm's specific circumstances. Noncompliance may jeopardize a firm's operation, trust, and financial standing, emphasizing the importance of diligent adherence to the Safeguards Rule.

In this modern digital era, information security has taken a front seat in all business organizations. No profession is more sensitive to information breaches than Certified Public Accountants (CPA) who handle a vast range of financial data every day. Complying with the Safeguards Rule for information security is a non-negotiable mandate for CPA firms today.

Understanding the Safeguards Rule and Its Importance
At the heart of the Gramm-Leach-Bliley Act (GLBA) lies the Safeguards Rule, a requirement for financial institutions, which includes CPA firms, to have an overarching information security program in place. This rule wasn't created on a whim, it serves a crucial purpose - to safeguard customer information, preventing it from falling into the wrong hands and leading to potentially disastrous scenarios such as financial fraud or identity theft. As a CPA, adhering to the Safeguards Rule goes beyond ticking off regulatory checkboxes. It's an integral part of client trust-building. When clients entrust their sensitive financial data to you, they do so with the expectation that their information is in safe hands. Complying with the Safeguards Rule demonstrates your commitment to ensuring their data's safety, thereby fostering a relationship of trust and assurance with your clients. Therefore, understanding the Safeguards Rule and its role in information security is not just a necessity but a responsibility. It's a pillar in the architecture of a safe and secure CPA practice, a safeguard against the unknown, and a promise of trust to your clients. A strong understanding of this rule lays the groundwork for the development of an effective information security program, further enhancing your firm's commitment to data security.

Essential Elements of an Information Security Program
In the realm of the Safeguards Rule, an effective information security program isn't an arbitrary concept; it is guided by core elements that are deliberately designed to secure and safeguard sensitive customer information. The first element is a comprehensive risk assessment. This crucial step involves a deep dive into your operations to uncover potential risks. From scrutinizing the way customer data is handled and stored, to identifying vulnerabilities in your computer systems, physical files, and employee actions - all aspects need to be taken into consideration. Prioritizing these risks based on their potential damage and likelihood forms the basis for designing appropriate safeguards. Next comes the design and implementation of these safeguards. This could range from strengthening your data encryption protocols and limiting access to confidential information, to bolstering physical security measures. Remember to include a response plan for potential security breaches, as this helps limit the damage and disruption caused. Of course, information security isn't a 'set-it-and-forget-it' operation. Regular monitoring and tweaking of your program is essential. This ensures that your safeguards remain effective as the threat landscape evolves. Regular audits, system tests, and feedback from your team can reveal valuable insights, prompting timely adjustments. Another important aspect is oversight of your service providers. If you outsource tasks involving client data, it's imperative to ensure these providers also adhere to stringent security standards. Regular monitoring of their compliance is key, and contracts with those failing to meet your security needs should be renegotiated or terminated. Lastly, it's essential to invest in regular training and awareness programs for your team. This not only equips them with the latest knowledge about security threats and mitigation techniques but also fosters a culture of responsibility and vigilance. After all, your team is the first line of defense against information security breaches. These are the essential components that combine to create a robust and effective information security program, one that not only meets the requirements of the Safeguards Rule but ensures a level of trust with your clients that's irreplaceable.

Conducting a Thorough Risk Assessment
To kick-start your information security program, carrying out a meticulous risk assessment is a fundamental step. Think of it as detective work where you're identifying potential danger spots where customer data is stored and used within your operations. It could be as tangible as physical files filled with sensitive information or as intangible as data stored in your computer systems. Then, examine employee conduct. Evaluate how they handle customer data ‐ Are they careful? Do they understand the sensitivity of the data they're handling? These questions will shed light on vulnerabilities you may not have considered before. Following this, shift your detective lens to potential threats. From an accidental email sent to the wrong person to a full-blown cyber attack, picture various risk scenarios. Estimate the potential damage each threat could inflict, and the likelihood of it happening. This will allow you to strategize your safeguard initiatives, putting the most pressing threats on top of the list. Remember, a risk assessment isn't a one-and-done task. It's an ongoing process that requires a keen eye for detail, a deep understanding of your operations, and a relentless pursuit for securing customer information. After all, each risk you uncover and address is a potential crisis averted. So, delve into your detective mode and commence the mission to uncover potential threats to your CPA practice. It's the first step on the road to creating an iron-clad information security program that not only meets the requirements of the Safeguards Rule but, more importantly, upholds your commitment to protecting your client's data.

Designing and Implementing Information Safeguards
Armed with the knowledge of potential threats to your customer data, it's time to morph from a detective into a security architect. Designing and implementing information safeguards is like crafting a protective shield for your client's sensitive data. Think of it as a multi-layered defense strategy that starts at the outer periphery with firewalls and encryption protocols. Consider using cutting-edge technologies to protect digital data. This could include state-of-the-art encryption for data at rest and in transit, multi-factor authentication for system access, and advanced firewall systems. Remember, the stronger your first line of defense, the harder it is for potential breaches to occur. Then, delve into the inner layers of your defense strategy, which involves securing physical data and limiting access to sensitive information. This might require you to revamp your office layout or invest in secure storage solutions. Limiting access to sensitive information is equally critical - the fewer the hands it passes through, the lesser the chance of a breach. Now, let's not forget that even the best-laid plans can fall apart. This is why it's vital to have a plan B - a well-defined response plan in case a breach occurs. This plan should outline the steps to be taken to limit the damage and recover from the incident swiftly. Regular drills can help ensure everyone knows their role when the alarm bells ring. However, designing and implementing safeguards isn't a single sprint; it's a marathon. Threat landscapes are constantly evolving, and your defenses should too. Stay alert and responsive to new threats, regularly update your security systems, and be prepared to adapt your strategies as needed. In essence, designing and implementing safeguards is about creating a fortress around your client's data, one that's armed with advanced technological defenses, smart internal protocols, and a ready-to-act response plan. So, put on your security architect hat and get to work! Your clients' data security relies on your commitment to building and maintaining this fortress.

Regular Monitoring and Adjusting Your Program
As you navigate through the unpredictable and ever-evolving world of information security, vigilance and adaptability are your best allies. Picture your information security program as a living entity; it breathes, adapts, and grows with each passing day. The secret ingredient that ensures this growth and adaptation is regular monitoring and adjusting of your program. Imagine a surveillance control room with multiple screens, each portraying a different aspect of your security program. Anomalies or deviations from the norm are quickly spotted, examined, and rectified. That's the level of vigilance and responsiveness your information security program demands. Initiate regular audits, making them as routine as your morning coffee. These audits can function as a mirror, reflecting the current state of your security measures, shining a light on any cracks or vulnerabilities that might have crept in unnoticed. Don't shy away from these findings; instead, view them as opportunities for enhancement and growth. Additionally, conducting system tests can simulate potential threat scenarios, putting your safeguards to the test. Think of these as fire drills for your data security. The insights gleaned from these tests can be invaluable in strengthening your safeguards and mitigating future threats. Last but not least, your team members - the people on the ground, can be a treasure trove of insights. Inviting feedback from your team can offer a fresh perspective on the workings of your security measures. Their daily interactions with the systems in place could uncover unexpected vulnerabilities, or they might even have innovative suggestions for improvements. In essence, the journey towards robust information security is not a one-time effort but a continual process. It demands an attitude of vigilance, a spirit of adaptability, and a commitment to securing your client's data every single day. So, keep your eyes peeled, your ears to the ground, and your mind open to changes. Your information security program is a living entity, and with regular monitoring and adjustments, you can ensure it thrives in the face of evolving threats.

Service Provider Oversight: An Extended Responsibility
Your information security armor doesn't stop at the doorstep of your firm, it stretches beyond, reaching out to your service providers. While you might rely on external entities to carry out tasks involving your client's sensitive data, you can't afford to let your guard down. These providers, just like you, need to champion data security. Choosing service providers should involve more than assessing their expertise and cost-effectiveness. It's essential to evaluate their stance on data security. Do they prioritize it? Do they have stringent safeguards in place? Are they willing to adhere to your firm's security standards? These questions can separate the good from the not-so-good, leading you to service providers who don't just deliver a service, but also uphold the trust your clients place in you. But the job doesn't end with choosing the right provider. An essential part of your role involves keeping a keen eye on their compliance. This involves regular checks and monitoring. In this process, you might come across providers who might not live up to your security expectations. It's crucial not to shy away from making tough decisions in such situations. Renegotiating the terms of your contract or even terminating it if necessary, might be the way forward. Remember, when it comes to protecting your client's data, there's no room for compromise. In essence, the responsibility of safeguarding your client's data extends beyond your firm's boundaries, stretching into the domains of your service providers. It's not a light responsibility, but one that carries the weight of your commitment to data security. So, go ahead and extend your information security shield, covering not just your firm, but every entity that comes into contact with your client's sensitive data. The safety of your client's information depends on this extended responsibility.

Staying Ahead of the Curve: Training and Awareness
When it comes to effectively meeting the requirements of the Safeguards Rule, the people factor plays an instrumental role. It's not just about designing secure systems or robust protocols, but also about empowering your team with the right knowledge and skills. The journey of data protection begins with training and awareness, as they are the most potent tools to cultivate a secure culture within your firm. Let's envision your team as the gatekeepers of client data, standing vigilant against potential breaches. With regular training and educational programs, you can ensure these gatekeepers are well-equipped with the latest information on security threats and mitigation strategies. This not only arms them with the requisite tools to handle customer information judiciously, but also encourages them to become proactive agents of data protection. Consider organizing regular workshops and webinars, engaging your team in simulated risk scenarios, and creating a platform for them to share their experiences and insights. Provide them with updates on emerging security risks and innovative techniques for data protection. Encourage them to bring forth ideas for enhancing your existing security measures. By doing so, you can create a security-aware environment that not only complies with the Safeguards Rule but also promotes an overarching culture of information security. Remember, an enlightened team is the most robust line of defense against potential information breaches. Their awareness and commitment can significantly reduce the likelihood of inadvertent data mishandling, hence fortifying your information security program from within. Training and awareness are therefore not just a compliance exercise, but an integral part of your firm's strategic approach towards data protection. In the dynamic landscape of information security, staying ahead of the curve is vital. And what better way to stay ahead than by investing in the education and training of your team? After all, a proactive and well-informed team is a dependable ally in your mission to safeguard client data. So, empower your team, foster a culture of vigilance, and watch your commitment to data security strengthen like never before.



ADDITIONAL DATA SECURITY RESPONSIBILITIES
In addition to the GLBA safeguards rule, tax practitioners should keep in mind other client data security responsibilities.

Sec. 7216 is a criminal provision that prohibits preparers from knowingly or recklessly disclosing or using tax return information. See the AICPA Tax Section's Sec. 7216 guidance and templates at aicpa.org to aid with compliance.

Treasury Circular No. 230, Regulations Governing Practice Before the IRS (31 C.F.R. Part 10), requires practitioners to exercise due diligence in preparing returns or other documents related to a federal tax matter. A violation could subject a practitioner to censure, suspension, or disbarment from practice before the IRS.

The AICPA Code of Professional Conduct addresses member responsibilities to keep client information confidential and secure.

In accordance with best business practices, including practices contained in the Privacy Management Framework (available at aicpa.org/IMTA), a firm should publish its privacy statement on its website.

Depending on a practitioner's focus areas, he or she may need to adhere to other privacy requirements such as those for health-related information.

As the IRS has noted, combating today's cybercriminals requires everyone to work together. Practitioners play a significant role in data security and should continue to assess, improve, and document their processes to keep client data safe. For a simplified path to achieving FTC Safeguards Rule compliance, GilaPro offers a solution. By providing comprehensive visibility into your security posture and aligning it with rule requirements, GilaPro simplifies the integration of your current program with the FTC Safeguards framework. This highlights areas of compliance and identifies gaps that require remediation. Begin your journey toward full compliance today,


Email Us! or CALL US (321) 345-1676 For any inquiry

Contact us

...

Contact Us

Fill up the form below to send us a message.

         
  .