By
OCD Tech
March 25, 2026
•
14
min read
.jpg)
If you handle sensitive client data — whether you're a tax professional, a healthcare provider, a financial services firm, or a growing SaaS company — you've likely heard the term WISP thrown around in compliance conversations. But what does it actually mean to build one, and where do you even start?
A Written Information Security Program (WISP) is a documented framework that defines how your organization identifies, manages, and protects sensitive data. It's not just a bureaucratic checkbox — it's your roadmap for data security and, in many industries, a federal requirement.
Here's how to build a WISP from scratch, step by step.
A WISP is a comprehensive, written document that outlines the administrative, technical, and physical safeguards your organization uses to protect personally identifiable information (PII) and other sensitive data.
Under the Gramm-Leach-Bliley Act (GLBA) and the FTC Safeguards Rule (16 CFR Part 314), businesses classified as financial institutions — including tax professionals, CPAs, and accounting firms — are legally required to maintain a compliant WISP. Similarly, HIPAA mandates written security programs for healthcare organizations, and PCI-DSS requires one for any business that accepts credit or debit card payments.
The consequences of non-compliance are real. The FTC has assessed penalties reaching $500,000 for notification failures and up to $46,517 per violation per day for non-compliance. Beyond the legal exposure, a well-built WISP also protects your business reputation and builds client trust.
The first thing your WISP needs is a person responsible for it. At least one employee must be designated to coordinate and report on information security. In smaller organizations, this is often the owner or office manager. In larger ones, it may be an IT director or a dedicated compliance officer.
This person's responsibilities include:
Document this designation formally inside the WISP itself. The role doesn't require a technical background — but it does require accountability.
Before you can protect your data, you need to know where it lives and what threatens it. Your risk assessment must list out the type of information your office handles and how that information may be potentially threatened — internally or externally, disclosed to unauthorized individuals, accidentally deleted, etc.
Your risk assessment should cover:
This assessment becomes the foundation for every other section of your WISP. Revisit it at least once a year — or any time your business operations change significantly.
With risks identified, you can now define the controls you'll put in place to address them. Your WISP should document safeguards across three categories:
Technical safeguards:
Administrative safeguards:
Physical safeguards:
Don't overcomplicate this section. Write it in plain language that your team can actually follow.
Your WISP must include a plan for what happens when something goes wrong. An incident response plan (IRP) defines the steps your organization takes when a data breach or security incident occurs.
At minimum, your IRP should cover:
Having this plan written in advance is the difference between a contained incident and an organizational crisis.
Your security is only as strong as your weakest third party. Holding third-party vendors to the same standards as the company that originally collects the information is a central concept in a WISP. WISPs require that vendors be adequately vetted and that periodic risk assessments are included in the contract terms.
For every vendor or service provider with access to your client data — cloud storage, payroll platforms, CRMs, IT support — your WISP should document:
This section is frequently overlooked and frequently cited in breach investigations. Don't skip it.
A WISP that lives in a folder and never gets read isn't compliance — it's paperwork. Employee training is mandatory, not optional. Without documented training records, you can't prove compliance. Keep signed acknowledgments, training dates, and materials covered.
Your training program should be:
Tax professionals are legally required to have a written, accessible plan and should review, test and update it regularly. Adjustments should be made based on changes in the firm's operations or security testing and monitoring results.
Set a calendar reminder for an annual WISP review. Ask:
A WISP is a living document, not a one-time project.
Building a WISP from scratch may feel overwhelming, but it doesn't have to be. Start with a risk assessment, assign ownership, document your controls, and build from there. You don't need a perfect document on day one — you need a real one that your team actually follows and that improves over time.
Whether you're driven by compliance requirements, client expectations, or simply the desire to protect your business, a solid WISP is one of the highest-leverage investments you can make in your organization's security posture.
Ready to build your WISP but not sure where to start?
→ Our team at OCD Tech helps businesses of all sizes design, document, and implement Written Information Security Programs that meet compliance requirements and actually work in practice. Talk to an expert today — and stop leaving your data protection to chance.

Audit. Security. Assurance.
IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.
Contact Info
OCD Tech
25 BHOP, Suite 407, Braintree MA, 02184
844-623-8324
https://ocd-tech.com
Follow Us
Videos
Check Out the Latest Videos From OCD Tech!
Services
SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®
IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review
IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO