FTC Safeguards Rule for CPA Firms

Follow these essential steps to comply with the FTC Safeguards Rule and secure your clients’ sensitive information.
CPA firm
CPA firm

The FTC Safeguards Rule CPA firms must follow represents one of the most significant cybersecurity requirements facing accounting professionals today. This federal regulation, enforced by the Federal Trade Commission, mandates that CPA firms implement comprehensive information security programs to protect customer information from unauthorized access and data breaches.

The FTC Safeguards Rule applies to CPA firms because they qualify as financial institutions under the Gramm-Leach-Bliley Act. Any firm that provides tax preparation services, financial planning, or other financial activities falls under this classification. The rule covers all customer information that firms handle, whether stored electronically or in physical form.

Recent amendments to the Safeguards Rule took effect on June 9, 2023, introducing nine specific elements that covered financial institutions must implement. These updates provide more concrete guidance than previous versions and address modern cybersecurity threats with clear standards for protecting customer data.

Key Takeaways

  • The FTC Safeguards Rule requires all CPA firms to implement nine essential elements protecting customer information from unauthorized access.
  • Covered financial institutions must designate a qualified individual and conduct written risk assessments identifying foreseeable risks.
  • Firms must encrypt customer information, implement secure access controls with multi-factor authentication, and maintain physical safeguards.
  • The Safeguards Rule requires monitoring service providers, training security personnel on emerging threats, and keeping information security programs current.
  • Federal Trade Commission enforcement can impose fines up to $100,000 per violation for non-compliance with reporting security events requirements.
  • Professional experts like Relevant Compliance help CPA firms navigate complex requirements while safeguarding taxpayer data under the Gramm-Leach-Bliley Act.

Get Compliant. Stay Compliant.

Whether you’re just starting your compliance journey or preparing for your official assessment, our platform is your compliance center.

Understanding the FTC Safeguards Rule Requirements

The FTC Safeguards Rule defines financial institutions more broadly than most people expect. Under federal regulations, any entity engaged in activities that are “financial in nature or incidental to such financial activities” qualifies as a covered financial institution. This definition specifically includes tax preparation services provided to individuals for personal, family, or household purposes and extends to other industries like auto dealers who also handle customer financial information.

CPA firms qualify as covered financial institutions regardless of their size or structure. Solo practitioners, small partnerships, and large accounting firms all fall under the rule’s jurisdiction. The key factor is the type of services provided, not the firm’s organizational structure or revenue.

The rule protects customer information, which includes any record containing nonpublic personal information about clients. This encompasses tax returns, financial statements, bank account numbers, Social Security numbers, addresses, and any other confidential client data. The protection extends to information stored in physical files, computer systems, cloud applications, and backup storage.

All covered financial institutions must develop, implement, and maintain a written information security plan. This plan must include administrative, technical, and physical safeguards designed to protect customer information. The plan should be appropriate to the firm’s size, complexity, business activities, and the sensitivity of the information involved.

The information security program serves three primary objectives: ensuring the security and confidentiality of customer information, protecting against anticipated threats to information security, and preventing unauthorized access that could cause substantial harm to clients.

Nine Essential Elements of Information Security Program

The Safeguards Rule specifies nine essential elements that must be included in every information security program. Using an FTC Safeguards checklist helps ensure all required components are systematically addressed.

1. Qualified Individual Designation

Every covered financial institution must designate a qualified individual to implement and supervise the company’s information security program. This person serves as the primary point of accountability for cybersecurity compliance and program effectiveness.

The qualified individual does not need specific credentials or job titles. What matters is real-world experience and knowledge suited to the firm’s circumstances. The qualified individual can be a firm employee, partner, or external service provider. Many smaller CPA firms choose to designate their managed service provider’s cybersecurity expert as the qualified individual.

When using an external qualified individual, the firm must designate a senior officer responsible to supervise that person. This internal liaison should understand the business operations and serve as the primary contact with the qualified individual.

2. Risk Assessment Requirements

Firms must conduct comprehensive risk assessments to identify foreseeable risks and threats to customer information security. The assessment must be written and include criteria for evaluating identified risks and threats.

The risk assessment process begins with inventorying all customer information and identifying where it is collected, stored, and transmitted. This includes physical files, computer hard drives, cloud applications, backup systems, and any other storage locations.

Written risk assessments must address criteria for evaluating and categorizing security risks, methods for assessing information confidentiality and availability, and procedures for determining how identified risks will be mitigated or accepted. The assessment should consider how customer information could be disclosed without authorization, misused, altered, or destroyed.

Risk assessments must be conducted periodically as business operations change and emerging threats appear. Changes in technology, personnel, office locations, or business processes may create new vulnerabilities that require assessment and response.

3. Access Controls Implementation

Firms must implement and periodically review access controls to determine who has legitimate access to customer information. The principle of least privilege should guide these decisions, granting employees access only to information necessary for their job functions.

Access controls begin with identifying all individuals who need to access sensitive customer information and regularly reviewing whether their access remains appropriate. Employees should only maintain access for legitimate business needs related to their current responsibilities.

The firm should periodically review access controls to ensure they remain current and appropriate. Secure access controls represent a critical requirement. Anyone accessing customer information must use multi-factor authentication with at least two authentication factors: knowledge factors like passwords, possession factors like tokens, or inherence factors like biometric characteristics.

4. Safeguards Design and Implementation

Technical and physical safeguards form the foundation of effective customer information protection. These measures address how firms secure, transmit, and manage customer data through technology controls and procedures.

Firms must encrypt customer information both when stored on systems and during transmission. Encryption transforms data into unreadable formats that protect information even if unauthorized individuals gain access. If encryption is not feasible for specific applications, firms must implement alternative controls approved by the qualified individual.

All applications used to store, access, or transmit customer information require security evaluations. This includes both internally developed applications and third-party software. Firms should implement procedures for assessing application security features and identifying vulnerabilities.

Customer information disposal requires secure procedures to prevent unauthorized access to discarded data. Firms must securely dispose of customer information no later than two years after the most recent use, unless retention is required for legitimate business purposes or legal requirements.

Physical safeguards must protect systems and facilities that store customer information. This includes securing office spaces, limiting access to server rooms, and implementing appropriate safeguards for physical documents containing customer data.

5. Monitor and Test Effectiveness

Firms must regularly monitor and test the effectiveness of their safeguards to detect unauthorized access and track user activity. This includes maintaining logs of authorized users activity and implementing procedures to detect unauthorized access attempts.

System and network changes can undermine existing security measures and require careful evaluation. New servers, software updates, network modifications, or other infrastructure changes may create security vulnerabilities. Firms must implement change management procedures to assess security impacts before implementing modifications.

Monitoring capabilities help detect actual and attempted attacks against customer information systems. These logs provide valuable information for investigating security incidents and demonstrating compliance with monitoring requirements.

Regular testing should include vulnerability assessments and penetration testing to identify potential weaknesses in security controls before they can be exploited by unauthorized individuals.

Get Compliant. Stay Compliant.

Whether you’re just starting your compliance journey or preparing for your official assessment, our platform is your compliance center.

6. Train Your Staff

Security awareness training programs help ensure personnel can implement the information security program effectively. The FTC Safeguards Rule requires firms to provide adequate training and verify that key personnel maintain current knowledge of emerging threats and countermeasures.

Training programs should address common cybersecurity risks including phishing attacks, social engineering, password security, and proper handling of customer information. Regular training sessions help reinforce security practices and keep employees informed about new threats.

Specialized training is required for employees, affiliates, or service providers with hands-on responsibility for carrying out the information security program. These individuals need deeper technical knowledge about security tools, incident response procedures, and compliance requirements.

Train security personnel on proper procedures for safeguarding customer information and responding to security incidents. This training should be updated regularly to address new threats and changes in the firm’s security program.

7. Monitor Service Providers

The Safeguards Rule requires firms to monitor service providers that have access to customer information. Service providers include any affiliate or service provider that receives, maintains, processes, or accesses customer information while providing services to the firm.

Firms must select service providers with the skills and experience to maintain appropriate safeguards for customer information. This selection process should include evaluating the provider’s cybersecurity capabilities, track record, and compliance with relevant security standards.

Service provider arrangements must include contractual provisions that specify security expectations and requirements. Contracts should clearly define the provider’s responsibilities for protecting customer information and include provisions for monitoring compliance with security requirements.

Monitor service providers through various methods including security questionnaires, third-party assessments, and reviews of security certifications. Some firms request SOC 2 reports or other independent security evaluations to verify provider security practices.

Risk management for service provider relationships should address the potential impact of provider security failures on the firm’s operations and client data. Firms should develop contingency plans for situations where service providers experience security incidents or fail to maintain adequate safeguards.

8. Keep Information Security Program Current

Keep information security programs current by regularly updating policies, procedures, and security measures based on changes in operations, risk assessment findings, and emerging threats. The cybersecurity landscape evolves rapidly, requiring firms to adapt their programs accordingly.

Continuous monitoring helps firms detect security issues before they become serious incidents. This includes monitoring network activity, user behavior, and system performance for signs of unauthorized access or other security problems.

Firms should establish procedures for staying informed about emerging threats and new security technologies. This may include subscribing to threat intelligence services, participating in industry security groups, or working with cybersecurity professionals who track current threats.

The information security program must be flexible enough to accommodate periodic modifications based on changes in business operations, new threat intelligence, or lessons learned from security incidents and testing activities.

9. Incident Response Plan

Firms maintaining customer information for 5,000 or more consumers must create a written incident response plan to address security events. However, all CPA firms should develop these plans regardless of client volume to ensure proper response to cybersecurity incidents.

A written incident response plan must include specific goals and objectives for responding to security events. The plan should define what constitutes a security event and establish clear procedures for identifying, containing, and resolving incidents that result in unauthorized access to customer information.

The incident response plan must specify internal processes the firm will activate when a security event occurs. This includes immediate response procedures, escalation protocols, and decision-making authority during incidents. Clear roles and responsibilities help ensure coordinated responses and prevent confusion during high-stress situations.

Communication procedures represent a critical component of incident response planning. The plan must address both internal communications within the firm and external notifications to clients, vendors, law enforcement, and regulatory authorities for reporting security events.

The plan should include procedures for documenting security events and the firm’s response activities. This documentation serves as evidence of proper incident handling and provides valuable information for improving future responses. Post-incident analysis helps identify weaknesses in systems and controls that need remediation.

Response and recovery procedures must address how the firm will restore normal operations after a security event. This includes steps for repairing damaged systems, implementing additional security measures, and preventing similar incidents in the future.

Penalties and Enforcement

The Federal Trade Commission actively enforces the Safeguards Rule and has imposed significant penalties on non-compliant organizations. Enforcement actions can result in substantial financial penalties, ongoing compliance monitoring, and reputational damage.

Non-compliance carries severe penalties. The FTC can impose fines of up to $100,000 per violation, with additional daily penalties of $43,000 for ongoing consent violations. Individual firm leaders may face personal liability of up to $10,000 per violation and potential prison sentences of up to five years. These penalties can quickly accumulate to amounts that threaten smaller firms’ financial viability

Beyond direct financial penalties, non-compliance can trigger additional costs including legal fees, forensic investigations, client notification expenses, and credit monitoring services for affected individuals. Data breaches often result in civil litigation that can continue for years.

Reputational damage from security incidents can destroy client relationships and make it difficult to attract new business. CPA firms depend on client trust, and publicized security failures can permanently damage professional reputations.

The FTC may require non-compliant firms to undergo regular compliance audits and reporting for extended periods. These ongoing requirements create additional administrative burdens and costs that continue long after the initial violation.

Implementation Strategy and Best Practices

Successful Safeguards Rule compliance requires a systematic approach that addresses all nine required elements while considering the firm’s specific circumstances and resources. Start with a comprehensive assessment of current security practices to identify gaps and prioritize improvements.

Develop a realistic implementation timeline that allows adequate time for policy development, system configuration, staff training, and testing. Rushing implementation often results in incomplete or ineffective security measures that fail to provide adequate protection.

Consider working with cybersecurity professionals who understand the specific requirements for CPA firms and the Safeguards Rule. Companies like Relevant Compliance specialize in helping accounting firms develop comprehensive information security programs that meet regulatory requirements while remaining practical and cost-effective for smaller organizations.

Document all security policies, procedures, and implementation decisions to demonstrate compliance efforts. Proper documentation helps during regulatory examinations and provides guidance for staff members responsible for maintaining security measures.

Regular testing and monitoring help ensure security measures remain effective over time. This includes penetration testing, vulnerability assessments, and ongoing monitoring of access controls and user activity.

Budget for ongoing security expenses including software licenses, training programs, security assessments, and potential upgrades to systems and infrastructure. Cybersecurity represents an ongoing operational expense, not a one-time implementation cost.

Conclusion

The FTC Safeguards Rule represents a fundamental requirement for CPA firms that handle customer information. Compliance protects both client data and firm operations while avoiding severe financial and legal penalties.

The nine essential elements provide a comprehensive framework for information security that addresses modern cybersecurity threats. While implementation requires significant effort and resources, the protection it provides is essential for maintaining client trust and business continuity.

Firms should take immediate action to assess their current compliance status and develop implementation plans for any missing elements. The penalties for non-compliance are severe, but the benefits of proper security extend far beyond regulatory requirements.

Professional assistance from cybersecurity experts Relevant Compliance can help firms develop effective, practical security programs that meet regulatory requirements without overwhelming limited resources. Taking action now protects both current operations and future business growth.

FAQs

Who is responsible for accessing customer information under the FTC Safeguards Rule? 

Only authorized personnel with legitimate business needs should be granted permission for accessing customer information, with firms required to periodically review these access privileges.

What steps must firms take to access sensitive customer data safely? 

Firms must implement multi-factor authentication and secure access controls to ensure only qualified individuals can access sensitive customer data through approved systems.

How should CPA firms handle security requirements for an affiliate or service provider? 

Any affiliate or service provider with access to customer information must maintain appropriate safeguards and be monitored through contractual provisions and periodic assessments.

What are the best practices for storing customer information securely? 

Firms must encrypt all customer data, implement physical safeguards, and establish secure disposal procedures to maintain customer information securely at all times.

What documentation does the Safeguards Rule require from covered financial institutions? 

The Safeguards Rule requires firms to maintain written information security plans, conduct risk assessments, and document all security policies and procedures.

When must firms notify authorities about cybersecurity incidents? 

Firms must establish procedures for reporting security events to the FTC within 30 days of discovering breaches involving 500 or more consumers’ unencrypted information.

Get Compliant. Stay Compliant.

Whether you’re just starting your compliance journey or preparing for your official assessment, our platform is your compliance center.

Picture of Relevant Compliance

Relevant Compliance

Compliance Hub

Related Compliance Content

Step-by-step guidance to meet every 2025 safeguard.
Not all CUI stays controlled forever. Learn who holds the authority to remove CUI protections, when decontrol is allowed, and what happens next.
If your contract involves CUI, you're responsible—learn who must protect it, what the rules require, and how to stay compliant.
Healthcare and finance play by different data protection rules. Learn how HIPAA and GLBA differ—and where your compliance strategy should overlap.
One strategy, two protections—secure health and payment data with a single PCI-HIPAA approach.
Discover the importance of cybersecurity compliance in safeguarding your organization against evolving digital threats
Request Access

Please fill in your details below to get early access to Relevant Compliance.  

Contact Us
FTC Safeguards Compliance for Auto Dealers

Learn how to protect your dealership’s reputation and prevent significant fines with our free guide.

From essential definitions to best practices and actionable steps, we’ve compressed what’s most important into one straightforward guide.
* required
FTC Safeguards for Automotive