Introduction – This section sets the stage by providing an overview of the purpose and scope of the WISP. It includes the firm’s commitment to safeguarding information and the regulatory requirements it complies with, such as the Federal Trade Commission (FTC) Safeguards Rule, the Health Insurance Portability and Accountability Act (HIPAA), or state-specific privacy laws.
Risk Assessment – A thorough risk assessment identifies potential threats and vulnerabilities to the firm’s information systems. This section should detail the methods used to conduct the risk assessment, including the following:
Information Security Policies – This section outlines the specific policies and procedures designed to protect sensitive data. Key policies often include:
Employee Training and Awareness – Employee education is crucial for the effectiveness of a WISP. This section should describe the firm’s training programs, including:
Physical Security Measures – Protecting physical access to sensitive information is equally important. This section covers the measures in place to secure physical premises. Some items covered may include:
Technical Controls – Technical controls play a vital role in protecting digital information. This section should detail the technical safeguards implemented. Here are a few items that may be discussed:
Incident Response Plan – In the event of a security breach, having a well-defined incident response plan is essential. This section should outline the steps to be taken, such as the following:
Audit and Monitoring – Regular auditing and monitoring are critical to ensure ongoing compliance and effectiveness of the WISP. This section should describe the following:
To ensure the completeness and effectiveness of a WISP, accounting firms must gather and maintain specific evidence and reports. Here are some of the reports, logs, and forms you should be gathering:
A comprehensive WISP is essential for accounting firms to protect sensitive information and comply with regulatory requirements. By understanding the key components and gathering the necessary evidence and reports, firms can build a robust information security framework that ensures the safety and integrity of their data.
Marc Umstead is president of technology solution provider Plus 1 Technology in Pottstown, Pa. He can be reached at mumstead@plus1technology.com.
Sign up for PICPA's weekly professional and technical updates by completing this form.
Statements of fact and opinion are the authors’ responsibility alone and do not imply an opinion on the part of the PICPA's officers or members. The information contained herein does not constitute accounting, legal, or professional advice. For actionable advice, you must engage or consult with a qualified professional.