Guide

FTC Safeguards Rule Checklist for CPAs & Tax Preparers

A step-by-step compliance checklist covering all 9 Safeguards Rule requirements, tailored for CPA firms, accounting practices, and tax preparers.

FK

Farhad Mirza Khawar

Founder of HIPAA Agent and Cyber Defense Agent. Compliance infrastructure for SMBs. Sacramento, CA.

2026-05-01

Checklist overview

This checklist covers all 9 updated FTC Safeguards Rule requirements as they apply to CPA firms and tax preparers. Use this as a starting point — then run a Cyber Defense Agent scan to verify your technical controls. The FTC Safeguards Rule applies to every CPA firm and tax preparer in the United States. Over 300,000 tax preparers must comply, and the FTC has actively pursued enforcement actions against accounting practices.

1. Designate a Qualified Individual

Designate someone to oversee your information security program. For small CPA firms, this is typically the managing partner or a qualified IT provider. Action items: - Formally designate your Qualified Individual in writing - Document their qualifications and responsibilities - If outsourcing, ensure the third party is contractually obligated - This person must report to the board/partners at least annually

2. Conduct a risk assessment

Perform a written risk assessment identifying threats to client financial data. Action items: - Inventory all systems that store or process client data (practice management, email, file storage) - Identify internal risks (employee access, lost devices) - Identify external risks (phishing, ransomware, unauthorized access) - Assess likelihood and impact of each risk - Document current safeguards and identify gaps - Run a Cyber Defense Agent scan to identify external technical risks automatically

3. Implement safeguards

Based on your risk assessment, implement controls for identified risks. Action items: - Enable MFA on all systems accessing client data - Encrypt client data at rest and in transit - Implement email authentication (SPF/DKIM/DMARC) - Configure access controls (least privilege) - Deploy endpoint protection (EDR/antivirus) - Secure your website with proper TLS configuration - Implement a firewall and network segmentation

4. Monitor and test

Continuously monitor your safeguards and test them regularly. Action items: - Use Cyber Defense Agent for continuous external monitoring (weekly/daily scans) - Conduct annual penetration testing or continuous monitoring - Perform biannual vulnerability assessments - Review access logs regularly - Test incident response procedures annually

5-9. Training, vendors, updates, incident response, reporting

Complete the remaining requirements: 5. Train all employees on security awareness, with specialized training for the Qualified Individual. 6. Monitor service providers (cloud software, IT providers) — require contractual security obligations. 7. Keep your security program current — review and update when operations, threats, or vulnerabilities change. 8. Create a written incident response plan — include detection, containment, notification, and recovery procedures. 9. Report to partners/board annually on the overall status of the security program, including material matters and recommendations.

Key Takeaways

TL;DR

All 9 Safeguards Rule requirements apply to CPA firms and tax preparers regardless of size.

Start with a Cyber Defense Agent scan to identify external technical gaps immediately.

MFA, encryption, and email authentication are non-negotiable technical requirements.

Document everything — the FTC evaluates your program's documentation, not just its effectiveness.

FAQ

Frequently asked questions

How long does Safeguards Rule compliance take for a CPA firm?

A small CPA firm can achieve baseline compliance in 30-60 days. Start with a Cyber Defense Agent scan (60 seconds) to identify technical gaps, then systematically address documentation and policy requirements. The Qualified Individual designation and risk assessment can be completed in a week.

Can I do this without an IT consultant?

For technical controls (MFA, encryption, email auth), you may need IT support. For the program itself (policies, risk assessment, training), many small firms handle it internally using templates and tools like Cyber Defense Agent. The key is documentation and verification.

What if I use cloud-based tax software?

You're still responsible for compliance. While your cloud provider handles some security, you must verify their controls (vendor management), implement MFA for access, and ensure your own systems (email, network) are secure. CDA scans your external posture regardless of where data is hosted.

Get your Cyber Defense Score™ in 60 seconds.

100 tools. No installation. No credit card. Real evidence.