November 05, 2025

CPE: Information Security Plans for Tax Professionals: A Review of Existing Guidance

By: Eric Gooden, Ph.D.

By Eric Gooden, Ph.D.

~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~

CPE Self Study Article & Quiz Register to gain access to the self-study quiz and earn one hour of continuing professional education credit by passing the quiz.

REGISTER

DOWNLOAD PDF

~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~

CPE Hours: 1

Curriculum: Accounting and Auditing; Tax

Level: Basic

Designed For: CPAs in public practice; tax practitioners

Objectives: Discuss and highlight the dangers of poor information security preparation, detail essential responsibilities and regulations, and provide an overview of IRS and FTC guidance on protecting data and addressing breaches

Key Topics: Information security and cybersecurity overview; professional responsibility to safeguard data privacy; Gramm-Leach-Bliley Act; IRS publications and resources; response to a data breach

Prerequisites: None

Advanced Preparation: None

~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~ ~~

The Security Summit partners – the IRS, state tax agencies and the tax industry – urge tax professionals to adopt information security plans as cyber incidents rise. With the digitization of accounting, CPAs now shoulder responsibilities for data security and privacy. Cybercriminals increasingly target CPAs, not only for their data but also for access to client accounting systems linked to bank accounts and vendor payments.

This article defines information security, outlines the risks of inadequate planning, reviews key responsibilities and regulations, and summarizes IRS and FTC guidance on safeguarding data and responding to breaches.

Information Security and Cybersecurity Overview

Ideally, firms should begin the data security process by understanding the definitions of information security and cybersecurity (Paulsen and Toth, 2016). According to Paulsen and Toth (2016), information security is the protection of digital information and related systems from unauthorized alteration, delay, destruction, use, access, disclosure, or disruption to provide confidentiality, integrity and availability. It encompasses people, processes and technologies.

According to Paulsen and Toth, cybersecurity is key to information security and means protecting electronic devices and electronically stored information. It is formally defined as preventing damage to, protecting and restoring electronic records, software and related hardware to maintain integrity, confidentiality, availability, verification, and nonrepudiation.

An information security incident can be devastating for CPA firms. The greatest risk is data theft, where cybercriminals steal sensitive client financial and personal information to commit fraud. For firms, this leads to infrastructure damage, litigation, productivity loss, higher costs, and reputational harm. For clients, breaches open the door to fraud schemes such as manipulated records, fake vendors, redirected payments, or unauthorized transactions.

Cybercriminals increasingly target small businesses, which often lack strong governance and security, making them easy prey. These clients may hold valuable assets or data, and compromised systems can be used to attack others. CPA firms must stay vigilant, as a weakness at one client can endanger many.

To combat breaches, the IRS requires written information security plans (WISPs). A breach may signal noncompliance, which also violates state and federal privacy laws and can result in fines or sanctions. CPA firms that fail to comply with data privacy laws face steep penalties. Likewise, the AICPA Code of Professional Conduct requires adherence to legal standards and violations can lead to disciplinary action from state boards or AICPA.

Professional Responsibilities

Data privacy is not a new concept in the accounting profession and CPAs have always been required to take reasonable steps to safeguard data privacy. For example, the "Confidential Client Information Rule" is a well-established professional duty in the AICPA Code (AICPA, ET §1.700). Similarly, the Code has always required CPAs to act in their client's best interest and uphold the public trust.

What is new concerning information security, specifically for tax professionals, is that AICPA has revised its Statements on Standards for Tax Services (SSTSs), effective January 1, 2024, to address data protection, adding Section 1.3, which uses standards to describe reasonable efforts to safeguard taxpayer data rather than setting strict rules. This standard broadly considers firm differences and constant technological changes, laws and threats. CPAs applying this standard should consider laws, data storage methods, digital tools, and third-party providers.

Firms must review privacy policies based on technology, services and size—ensuring even sole practitioners use protections like antivirus software, VPNs, secure programs, and strong passwords. They should also provide employee training, set data retention policies and use encryption for personal information.

Key Regulators and Regulatory Requirements

The Gramm-Leach-Bliley Act (Safeguards Rule) applies to all tax return preparation firms regardless of size and requires a WISP describing how the business protects consumers' nonpublic personal information. The IRS and FTC have increased their focus on this rule.

Federal law, enforced by the FTC, mandates that all professional tax preparers utilize a WISP. In addition to increased data security, the Security Summit, through the Tax Professional Working Group, notes that a WISP can be helpful in other disruptive events like fire, flood or theft. Accordingly, creating a WISP is critical to running a successful tax preparation business.

The scope and complexity of a security plan should be appropriate to the company's size, activities, and the sensitivity of the customer data in question. Thus, there is no one-size-fits-all solution to developing a good WISP. Instead, a good WISP should focus on key factors, including prevention, detection and oversight of system failures, system hardware and software protection, and employee training and oversight. The FTC's Data Breach Response Guide PDF is a valuable resource and is discussed below.

IRS Publications and Resources

The IRS provides several publications and resources designed to assist professionals in understanding data security issues and developing an effective response strategy. For example, IRS Publication 5293 focuses on critical aspects of data security concerning protecting clients and the tax professional's business from the increasing threat of data theft. This publication outlines several key areas where tax professionals can focus to establish and maintain robust security measures for safeguarding sensitive taxpayer data.

Similarly, IRS Publication 4557 provides guidelines on handling and protecting taxpayer information. Publication 4557 also outlines administrative, technical and physical security guidelines. The key points of Publication 5293 and 4557 are summarized below. Please see Figure 1 for data privacy regulations when operating across jurisdictions.

Figure 1. Data Privacy Regulations for CPAs Operating Across Jurisdictions

International Regulations:

  • GDPR (European Union)
  • PDPA (Argentina)

U.S. State Regulations:

  • CCPA (California)
  • CPA (Colorado)
  • CTDPA (Connecticut)
  • VCDPA (Virginia)

Key Considerations:

  • CPAs must navigate complex data privacy laws.
  • Regulations mandate data protection obligations.
  • Applies to handling personal data both internationally and domestically.

IRS Publication 5293, Protect Your Clients; Protect Yourself: Data Security Resource Guide for Tax Professionals, and IRS Publication 4557, Safeguarding Taxpayer Data, are available at IRS.gov. Key points from both documents are noted below.

Implementing basic security steps involves the execution of several key control activities concerning data security, including:

  • Recognizing phishing attempts,
  • Creating a data security plan,
  • Reviewing internal controls,
  • Regularly updating anti-malware software,
  • Using strong passwords with multi-factor authentication and encrypting sensitive data,
  • Backing up data securely,
  • Carefully reviewing return information before filing,
  • Properly disposing of old hardware,
  • Limiting data access to taxpayer information,
  • Monitoring electronic filing identification numbers (EFIN) and preparer tax identification numbers (PTIN) accounts,
  • Staying informed through IRS resources, educating clients, and reviewing FTC security tips and guidelines.

In addition to control activities, an essential dimension of any system of internal control environment is the monitoring process. Monitoring controls ensure systems function properly while identifying areas for improvement. Publication 4557 advises firms to detect and manage failures by monitoring threats, updating security controls, using intrusion detection, tracking data transfers, and preparing breach responses. Firms should also monitor EFIN/PTIN accounts, follow IRS updates, maintain audit trails, and educate clients on emerging risks.

Security software is a critical component of data security and the IRS guidance notes that it is vital to download security software only from official vendor sites. Software utilization processes include installing and regularly updating firewall software, using drive encryption, anti-virus and spyware software, and ensuring that security software and internet browsers regularly receive automatic updates.

It is important to create strong passwords. Strong password creation includes requirements regarding complexity, including limitations on repeated characters. For example, requiring complex character combinations (symbols, letters and numbers). Password complexity may also include the implementation of minimum character requirements. Older guidelines suggested eight characters. Security experts now recommend a minimum of 12 characters or 16 characters for system administrators.

Concerning the creation of strong passwords, IRS Publication 5293 advises tax professionals to use strong, confidential passwords – avoiding personal details, changing defaults, not reusing old ones, and considering password managers. It also recommends multi-factor authentication for all critical functions, especially those involving client data.

Protecting client data starts with locking down both wireless networks and internal systems. On the wireless side: change default router passwords, use a non-identifying SSID, limit network range, enable WPA-3 encryption, avoid WEP and public Wi-Fi, and require VPNs with multi-factor authentication for remote access.

For information systems, know where sensitive data resides and protect it with strong passwords, encryption and secure backups. Transmit files only through protected channels like SSL or SFTP. These steps build critical layers of defense, reducing risk and strengthening client trust.

Protecting stored client data includes backing up encrypted data to secure external sources or the cloud (encrypting before upload), using drive encryption, avoiding public computers for client data, limiting software installations, maintaining a device and software inventory, limiting internet access for data storage devices, and securely disposing of old devices and client information. Publication 4557 strongly recommends using multi-factor authentication for accessing sensitive information.

Professional vigilance suggests being aware of the signs of data theft, such as rejected returns, clients receiving unexpected IRS communications or refunds, unauthorized account access, discrepancies in filed returns, and unusual computer activity. Monitoring electronic filing identification numbers (EFIN) and Preparer Tax Identification Number (PTIN) accounts weekly is crucial. Education on phishing and spear phishing is also vital.

When a data breach occurs, Publication 4557 advises tax professionals to act quickly. Steps include:

  • Reporting breaches to the IRS, law enforcement and state agencies,
  • Contacting security experts and insurers,
  • Reviewing FTC guidance,
  • Identifying the cause,
  • Developing a continuity plan, and
  • Maintaining full backups.

FTC Safeguards Rule

Complying with the FTC Safeguards Rule is required under the Gramm-Leach-Bliley Act. Tax preparers must maintain a WISP suited to their size and complexity. A WISP should designate a responsible individual and cover employee training, multi-factor authentication, risk assessments, system safeguards, service provider oversight, and ongoing monitoring and remediation of vulnerabilities.

Even strong WISPs can fail, so CPA firms must know how to respond when breaches occur. The FTC’s Data Breach Response: A Guide for Business outlines critical steps firms should follow in managing an incident.

Responding to a Data Breach

Securing operations is the first step in the response to a data breach. CPAs must be prepared to treat the operational areas impacted by a data breach like a crime scene investigator. For example, secure physical areas by locking access and updating codes. Protect affected systems by taking equipment offline (without shutting it down), monitoring entry points and updating user credentials. Finally, address the vulnerabilities that caused the breach to prevent recurrence.

After a data breach has occurred, the response team should be mobilized to prevent additional data loss. A data breach response team should be designated before a breach incident. The team should include individuals with the requisite expertise in areas affected by the data breach, including experts in computer forensics, legal, information technology, and human resources. Given the structure of many CPA firms, this may require outside expertise, particularly in the areas of digital forensics, information technology, and legal. Please see Figure 2 for mobilization considerations.

Figure 2. Mobilization Considerations for a Data Breach Response

1. Legal and Expert Consultation

  • Consult Legal Counsel: Especially with privacy/data security expertise.
  • Assemble Response Team: Include digital forensic experts.

2. Digital Forensics

  • Identify Breach Source
  • Collect Evidence: Forensic imaging, analysis, remediation steps
  • Consider External Experts: If breach is complex or resources are limited

3. Immediate Actions

  • Remove Exposed Data: From your site and cached search results
  • Search and Request Removal: Of leaked data from other websites

4. Investigation and Documentation

  • Interview Witnesses
  • Preserve Evidence
  • Document Findings

5. Service Provider Review

  • Assess Access and Security
  • Confirm Fixes to Vulnerabilities

6. Network and Data Review

  • Check Network Segmentation
  • Analyze Encryption, Backups, Logs
  • Restrict Data Access
  • Verify Compromised Data and Affected Individuals

7. Remediation

  • Implement Forensic Recommendations Promptly

Another important step is to fix vulnerabilities. Fixing vulnerabilities is simply the process of identifying and remediating the weaknesses in the information system that allowed the breach to occur.

A comprehensive communications plan should be in place that addresses all potential stakeholders (employees, customers, investors, business partners, etc.) and should avoid misleading statements or provisions that may withhold key details that could help consumers protect themselves. Additionally, the plan should avoid publicly sharing information that might put consumers at further risk. The plan should also anticipate questions and provide clear, plain-language answers on your website.

Notifications

In the event of a breach, three categories of parties should be notified: law enforcement, other businesses and affected individuals. In addition to the parties noted above, CPAs should explicitly consider the legal requirements regarding data breach notification under applicable state and federal laws.

In particular, law enforcement, such as the local police, FBI, Secret Service (for electronic breaches), or the U.S. Postal Inspection Service (for mail theft), should be contacted immediately. If electronic personal health records are involved, check if the Health Breach Notification Rule applies and notify the FTC and possibly the media. If the HIPAA Breach Notification Rule applies, inform the Secretary of Department of Health and Human Services (HHS) and perhaps the press.

Concerning the timing of notifications to additional parties, such as the media, CPAs should consult law enforcement to avoid unduly compromising the investigation.

CPAs should notify affected businesses, especially if account access information was stolen but is maintained by another institution or if you collected or stored personal information on their behalf. If cybercriminals have stolen SSNs, contact the major credit bureaus for guidance and advise them if you recommend fraud alerts or credit freezes.

CPAs should also notify individuals promptly so they can take steps to protect themselves. The notification should be made in light of thoughtful consideration of all the facts and circumstances of the specific incident. Tax professionals should explicitly consider factors such as the likelihood of misuse of the compromised data, the regulatory requirements of applicable privacy laws, the nature of the breach, potential damages, and the compromised information type.

Protecting Client Data: A Professional and Legal Responsibility

Data security is a critical issue for CPA firms in recent years due to changes in practice, technological developments, threats from cybercriminals, and new legislation. Data security is particularly vital for tax professionals, given their access to sensitive personal information.

While complete data privacy cannot be guaranteed, the courts expect CPAs to take reasonable steps in their business practices to ensure data privacy for their clients. Key expectations for CPAs include staying updated on regulations and threats, maintaining a WISP, developing internal data protection policies, and keeping clients informed.

The article also provides helpful summaries of IRS and FTC guidance regarding data security plans and steps to take in the event of a data breach. Addressing the matters noted in this article should help tax professionals ensure compliance with applicable regulatory/professional standards concerning data privacy, which in turn may significantly limit their legal liability and associated costs.

Related CPE:

About the Author: Eric Gooden, Ph.D., is an Associate Professor at Boise State University. Contact him at ericgooden@boisestate.edu.

References

AICPA. 2023. Statements on Standards for Tax Services. Issued by the Tax Executive Committee. Effective Date: January 1, 2024, Accessed January 7, 2025, Available at: https://www.aicpa-cima.com/resources/download/revised-statements-on-standards-for-tax-services-no-1-4-1-1-2024

AICPA Code of Professional Conduct, ET §1.700, Confidential Client Information Rule.

Controlaltprotect. 2024. Another Reason Why Cybercriminals Attack CPAs, Accessed Controlaltprotect website, Updated: November 30, 2024, Accessed February 3, 2025, Available at: https://www.controlaltprotect.com/another-reason-why-cybercriminals-attack-cpas/

Federal Trade Commission. 2021. ?Data Breach Response: A Guide for Business. Updated: April 3, 2024, Accessed January 7, 2025, Available at: https://www.ftc.gov/business-guidance/resources/data-breach-response-guide-business

IRS. 2018. Protect Your Clients; Protect Yourself: Data Security Resource Guide for Tax Professionals. Publication 5293, Accessed January 7, 2025, Available at: https://www.irs.gov/pub/irs-pdf/p5293.pdf

IRS. 2024. Safeguarding Taxpayer Data: A Guide for Your Business. Publication 4557, Accessed January 7, 2025, Available at: https://www.irs.gov/pub/irs-pdf/p4557.pdf

Paulsen, Celia, and Patricia Toth. 2016. "Small Business Information Security: The Fundamentals." ? NIST Interagency Report 7621 Revision 1, National Institute of Standards and Technology, ?Accessed January 7, 2025, Available at: https://doi.org/10.6028/NIST.IR.7621r1

 

Thanks to the Sponsors of Today's CPA Magazine

This content was made possible by the sponsors of this issue of Today's CPA Magazine:

Accounting Biz Brokers

Accounting Practice Sales

Capstan Tax

CPA Charge

Goodman Financial

Paychex

Poe Group Advisors

TaxDome

 

  • Large Language Models

    AI in Accounting 2026: From Practical Automation to Strategic Advantage

    AI in 2026 is integrated into accounting workflows, moving from simple assistance to agentic systems that automate document intake, data extraction, exception management and review-ready outputs. CPAs spend less time on manual tasks and more on judgment, oversight and communication. Organizations that adopt AI deliberately gain efficiency and quality while those with weak processes see their gaps exposed.
    View Article
  • CPE: AI-Powered Tax Compliance, Part 2

    Machine learning is becoming central to sales and use tax operations, improving taxability classification, reducing manual review and strengthening auditability through NLP, dual‑threshold controls and human‑in‑the‑loop review. Case studies show ML reducing false negatives, cutting coding hours and accelerating reconciliation with anomaly detection. With strong governance and expert oversight, ML enhances accuracy, efficiency and compliance while allowing tax professionals to focus on higher‑value advisory work.
    View Article
    LLMs
  • LLMs

    Beyond Compliance – The Ways CPAs and CMAs Can Embrace the AI-Powered Future

    AI is shifting accounting from routine compliance work to higher-value analysis and advisory roles. CPAs and CMAs can use GenAI to automate repetitive tasks, improve risk analysis and forecasting, and streamline onboarding and documentation with custom GPTs and low-code tools. To adopt AI responsibly, professionals must understand its limits, verify outputs and start small - improving one workflow at a time while maintaining strong judgment and ethical oversight.
    View Article
  • Leading Together in an Evolving Profession

    Rapid technological change, especially AI, is reshaping how CPAs serve clients and employers, and this issue of Today’s CPA focuses on helping members lead through that evolution. It features articles on AI in accounting, corporate governance and AI-powered tax compliance, along with statewide chapter updates and a preview of Accounting Opportunities Month. The message emphasizes engagement, lifelong learning and the shared responsibility to strengthen the profession and inspire future CPAs.
    View Article
    TXCPA Accounting Opportunities Month
  • Universal Proxy Card Rules

    Activism Amplified: How Universal Proxy Rules Are Reshaping Corporate Governance

    Universal proxy rules have shifted power dynamics in contested board elections, lowering barriers for activists and increasing pressure on boards to perform, communicate clearly and govern transparently. Companies that fail to proactively engage shareholders, maintain strong internal controls and align strategy with investor expectations face greater risk of disruptive and costly proxy contests - even if activists do not ultimately win board seats.
    View Article
  • Bridging the Skills Gap in ESG - How CPAs Can Prepare for a Growing Service Area

    As ESG reporting becomes mainstream, CPAs are increasingly expected to measure, report and assure nonfinancial data. This article outlines the key competencies needed for ESG roles. By building these capabilities now, CPAs can prepare for one of the fastest-growing areas of the profession.
    View Article
    Sustainability reporting
  • Texas Legislature

    Advocacy Never Stops

    TXCPA is continuing its advocacy momentum after the successful passage of SB 262 and SB 522 in 2025, which created a new CPA licensure pathway and modernized mobility. As rules for the bachelor’s pathway are finalized, TXCPA is actively engaged with TSBPA. The 2026 election is expected to bring major turnover Texas Legislature. The Society is preparing to educate new lawmakers and defend against deregulatory efforts that could weaken licensing standards.
    View Article
  • Momentum and Vision: Key Takeaways from the 2026 Midyear Leadership Council and Members Meeting

    TXCPA’s 2026 Midyear Leadership Council and Members Meeting brought members together in College Station for financial and governance updates, a discussion of proposed Bylaws changes, news on AcctoFi’s launch, and more. The meeting also showcased major advocacy achievements, technology upgrades, continued progress in strengthening the talent pipeline, and long‑term trends shaping the profession. The event closed with a dynamic advocacy panel and an invitation for members to stay involved ahead of the June 2026 Annual Meeting.
    View Article
    TXCPA Bylaws
  • TXCPA Accounting Opportunities Month

    Inspiring the Next Generation - Accounting Opportunities Months

    TXCPA’s Accounting Opportunities Months connect CPA volunteers with Texas students through career talks, financial literacy presentations and community outreach. Volunteers showcase accounting as a dynamic, impactful profession while helping students build essential money management skills and explore diverse career paths. TXCPA is aiming to expand the impact to students statewide, strengthening the future of the CPA profession through education, mentorship and community connection.
    View Article
  • Understanding the Stakeholder Model of Corporate Social Responsibility

    Corporate Social Responsibility continues to evolve amid political, regulatory and resource pressures, yet most business leaders still view it as essential to long-term success. Although balancing diverse stakeholder needs can be challenging, opportunities exist to measure impact, improve engagement and integrate ethical practices into decision-making. Understanding and prioritizing stakeholder expectations remain critical drivers of sustainable organizational growth.
    View Article
    State of Corporate Purpose Report
  • What’s Happening Around Texas

    Chapters across Texas have been actively engaging their communities through service, celebration and connection. Highlights include Austin’s support at the TSBPA Swearing-In Ceremony, Corpus Christi’s successful toy drive, Dallas’ holiday gatherings and service projects, Fort Worth’s large Santaccountant toy collection and scholarship fundraiser, and Houston’s lively Mix and Mingle social. Together, these activities highlight the statewide spirit of service, networking and support within TXCPA.
    View Article
  • Take Note

    In this edition of Take Note: TXCPA’s All New Mentor Match Program; Unlock New Opportunities with the CGMA® Designation; ACAN Delivers Confidential Support When You Need It Most; 2025-2026 AcctoFi Scholarship Recipients
    View Article
    Peer Assisatance
  • Classifieds

    The Classifieds section provides a centralized place to find practices for sale, buyers seeking to acquire firms and specialized services, helping members efficiently connect with opportunities to expand, sell or pursue niche markets.
    View Article

CHAIR
Mohan Kuruvilla, Ph.D., CPA

PRESIDENT/CEO
Jodi Ann Ray, CAE, CCE, IOM

CHIEF OPERATING OFFICER
Melinda Bentley, CAE

EDITORIAL BOARD CHAIR
Jennifer Johnson, CPA

MANAGER, MARKETING AND COMMUNICATIONS
Peggy Foley
pfoley@tx.cpa

MANAGING EDITOR
DeLynn Deakins
ddeakins@tx.cpa

COLUMN EDITOR
Don Carpenter, MSAcc/CPA

DIGITAL MARKETING SPECIALIST
Wayne Hardin, CDMP, PCM®

CLASSIFIEDS
DeLynn Deakins

Texas Society of CPAs
14131 Midway Rd., Suite 850
Addison, TX 75001
972-687-8550
ddeakins@tx.cpa

 

Editorial Board
Derrick Bonyuet-Lee, CPA-Austin;
Aaron Borden, CPA-Dallas;
Don Carpenter, CPA-Central Texas;
Rhonda Fronk, CPA-Houston;
Aaron Harris, CPA-Dallas;
Baria Jaroudi, CPA-Houston;
Elle Kathryn Johnson, CPA-Houston;
Jennifer Johnson, CPA-Dallas;
Lucas LaChance, CPA-Dallas, CIA;
Nicholas Larson, CPA-Fort Worth;
Anne-Marie Lelkes, CPA-Corpus Christi;
Bryan Morgan, Jr, CPA-Austin;
Stephanie Morgan, CPA-East Texas;
Kamala Raghavan, CPA-Houston;
Amber Louise Rourke, CPA-Brazos Valley;
Shilpa Boggram Sathyamurthy, CPA-Houston, CA
Nikki Lee Shoemaker, CPA-East Texas, CGMA;
Natasha Winn, CPA-Houston.

CONTRIBUTORS
Melinda Bentley; Kenneth Besserman; Kristie Estrada; Holly McCauley; Craig Nauta; Kari Owen; John Ross; Lani Shepherd; April Twaddle; Patty Wyatt