WISP

https://www.irs.gov/pub/opr-taxpros/2023-10-careful-wisp%28er%29-professional-responsibility-and-data-security.pdf

Professional Responsibility and Data Security: Practitioners’ Obligation to Have a Written Information Security Plan

A good WISP should identify the risks of date loss for the types of information handled by a firm or company and focus on employee management and training, information systems and detecting and managing system failures There is no stake, "one-size-fits-all" solution to tax practitioners date security challenges. Rather, a security plan should be scaled to the busines 's size, scope of activities, complexity, and the sensitivity of the customer data it handles and should be updated as business or technology changes dictate. That said, as a general matter, certain protocols should be considered:

• Do not collect more Personally Identifiable Information (Pll) of clients than is necessary for your business operations, and do not retain Pll longer than necessary or legally required for business purposes
• Protect the PII you collect, use, disclose, and retain. For example store Pll in a locked room or file cabinets (with information secured at the end of each workday).
• Restrict access to Pll to only those individuals with a business need to access the information.
• Dispose of Pll appropriately, such as shredding documents and wiping (or destroying) old hard drives, fax machines, printers, and other equipment.
• Use qualified and vetted contractors, including physical and data security consultants.
• Instill awareness and train employees (professional and nonprofessional alike) on properly handling Pll.
• Establish security protocols for electronic programs and files, including server locks, password policies * , guidance on phishing / malware
schemes, and laptop and mobile device security.

* Tax professionals should generally observe the following guidelines concerning passwords:
    • use strong passwords. Never share usernames or passwords with others. Strong passwords consist ofa random sequence ofupper and lower-case letters that include numbers and special characters. Ideally, passwords should be at least 14 characters long. For systems or applications that have sensitive information, use multiple forms ofidentify verification (multifactor or dual-factor authentication).
    • change default password. Many devices come with default administrative passwords. Change them immediately and regularly thereafter. Default passwords are easily found or known by hackers.
    • change passwords often. Every three months is recommended. Consider using a password management application to store passwords. Passwords to devices and applications that contain business information should not be reused.

• Develop and enforce email policies and procedures that comply with federal and state laws.
• Continually monitor computer networks to identify and redress potential security issues (e.g., software updates, antivirus software,
firewalls, security patches, scan engines).
• Establish guidelines related to Internet browsing, use of smart devices, and use of social media and professional networking sites.
• Establish security policies related to physical files and other records kept at home.
• Maintain good records and have policies and procedures in place for what to do in case of a data breach (including timely notification of the business's insurance carrier). If your employees work remotely, adopt policies relating to the of:
    ○ virtual private networks (VPNs) to securely conduct business;
    ○ separate personal and business computers, mobile devices, and email accounts; and
    ○ "smart" devices.

Here’s a comprehensive template for tracking the implementation of WISP daily operational protocols, with designated responsibilities and a date column for logging:

Procedure Description

Yes (Implemented)

No (Not Implemented)

N/A (Not Applicable)

Firm Responsibility

Data Security Coordinator Responsibility

Date

Verify daily system access controls

Monitor data access logs

Ensure encryption protocols are active

Conduct daily security checks

Review and address any system alerts

Confirm employee adherence to data handling policies

Backup and secure data as per WISP

Report daily on WISP compliance

This template allows for daily tracking of WISP procedures, including fields to log completion status, responsibilities, and the specific date each protocol was checked. Add rows for additional daily protocols as needed.

Here’s a template to track the identification and designation of the firm’s data repositories as Secured Assets with Restricted Access, per WISP protocols, with fields for responsibility assignment and date:

Data Repository/Asset Description

Yes (Secured & Restricted Access)

No (Not Secured)

N/A (Not Applicable)

Firm Responsibility

Data Security Coordinator Responsibility

Date

Customer Personal Data Storage

Financial Records Database

Employee Records Repository

Intellectual Property Storage

Archived Data Files

Backup Storage Locations

Cloud Storage for Sensitive Data

Physical Document Storage

This template provides a structured way to verify each data repository's security status, designate responsibilities, and log the date of assessment. Additional rows can be added for more data repositories as required.

Here’s a template for tracking the completion of recurring Information Security Plan Training for each employee, including columns for responsibility designation and date:

Employee Name

Yes (Training Completed)

No (Not Completed)

N/A (Not Applicable)

Firm Responsibility

Data Security Coordinator Responsibility

Date of Verification

1
2
3
4
5
6

This template allows the Data Security Coordinator to verify and record each employee’s training status, assign responsibility, and log the date when verification was completed. Add rows for each employee in the firm as needed.

Here’s a template for tracking the monitoring and testing of employee compliance with the Information Security Plan’s policies and procedures, with fields for responsibility assignment and date:

Employee Name

Yes (Compliant)

No (Non-Compliant)

N/A (Not Applicable)

Firm Responsibility

Data Security Coordinator Responsibility

Date of Monitoring/Testing

1
2
3
4
5
6

This template provides a structured way for the Data Security Coordinator to monitor and document each employee's compliance status, specify responsibilities, and log the date of monitoring or testing. Additional rows can be added for each employee as needed.

Here’s a template for tracking the evaluation of third-party service providers' ability to implement and maintain appropriate security measures for Personally Identifiable Information (PII), including fields for responsibility designation and date:

Third-Party Service Provider Name

Yes (Security Measures Verified)

No (Not Verified)

N/A (Not Applicable)

Firm Responsibility

Data Security Coordinator Responsibility

Date of Evaluation

1
2
3
4
5
6

This template allows the Data Security Coordinator to document the evaluation of each third-party service provider’s security measures, specify responsibilities, and log the date of evaluation. Add rows as needed for each relevant third-party provider.

Here’s a template for tracking the requirement for third-party service providers to implement and maintain security measures in compliance with the WISP, with fields for responsibility assignment and date:

Third-Party Service Provider Name

Yes (Security Measures Implemented)

No (Not Implemented)

N/A (Not Applicable)

Firm Responsibility

Data Security Coordinator Responsibility

Date of Verification

1
2
3
4
5
6

This template allows the Data Security Coordinator to document each third-party provider’s compliance with WISP security measures, assign responsibilities, and record the date of verification. Add rows as needed for additional third-party service providers.

Here’s a template for tracking the review of the scope of security measures in the WISP, including fields for responsibility designation and date:

Review Description

Yes (Reviewed)

No (Not Reviewed)

N/A (Not Applicable)

Firm Responsibility

Data Security Coordinator Responsibility

Date of Review

Annual review of WISP security measures

Review due to material change in business practices

Review after changes in data storage practices

Review after updates in regulatory requirements

Review after a security incident or breach

Review due to changes in third-party access

This template allows the Data Security Coordinator to document each review of the WISP's scope, designate responsibilities, and log the date of each review. Add rows as needed for other specific review instances based on business needs.

Here’s a template for tracking the completion of annual training sessions for all individuals with access to PII, including fields for responsibility designation, certification status, and date:

Attendee Name

Yes (Training Completed)

No (Not Completed)

N/A (Not Applicable)

Firm Responsibility

Data Security Coordinator Responsibility

Date of Training

1            
2
3
4
5
6

This template allows the Data Security Coordinator to document each attendee’s training completion, assign responsibilities, and log the date of the training. Additional rows can be added for each owner, manager, employee, and contractor who attended the session.

Information resources to create and complete your Written Information Security Plan (WISP):




Contact Us for Written Data Security Plan payment processing