Written information security plan (WISP)
INTRODUCTION
Digital Therapy's Wisp Service is designed to equip tax and accounting firms with a robust framework to evaluate and document a company's current state, to identify vulnerabilities across SOPs, hardware, network, software, policies, and training. This plan is constructed using IRS Publications 5708, 4557, 1345, and the FTC Safeguards Rule (16 CFR Part 314). The plan is designed to serve as a guideline and checklist and leverages a risk-based scoring rubric to strengthen companies' data integrity, security, and overall durability.
Each section contains:
-- U.S. Code citation and IRS/FTC publication attribution
-- Professional summary of the purpose of operation controls and their significance
-- Actionable-Compliance Checklist
-- Structured input fields for documentation
-- Scoring area for audit teams
-- Attachment fields for supporting artifacts
This document can be digitized, scored, and stored for evidence and internal use, transforming what was once a static compliance plan into a dynamic risk management tool.
SECTION 1 — SECURITY GOVERNANCE & PROGRAM MANAGEMENT
Objective: Define and formalize the oversight structure for information security.
Purpose: Demonstrate to federal agencies and internal stakeholders that a Qualified Individual (QI) is assigned, authorized, and actively responsible for maintaining WISP compliance across the firm.
Sources:
-- IRS Pub 5708, p. 5
-- IRS Pub 4557, Security Leadership
-- IRS Pub 1345, Chapter 2
-- FTC Safeguards Rule §314.4(a)
CHECKLIST
• Qualified Individual designated by firm leadership
• Written job description issued and signed
INPUT:
Company:
TEST 2
Name of QI:
Title/Role in Firm:
Date Assigned:
Reporting Chain:
COMPLIANCE SCORE (1–5):
EVIDENCE ATTACHED:
—
SECTION 2 — DATA RISK ASSESSMENT & INVENTORY
Objective: Conduct an annual data risk analysis and maintain an up-to-date inventory of all IT assets and data repositories.
Purpose: Identify exposure points and vulnerabilities within the firm’s technological infrastructure that may result in unauthorized disclosure or loss of taxpayer information.
Authoritative Sources:
-- FTC §314.4(b)
-- IRS Pub 5708, p. 6–8
-- IRS Pub 4557
-- IRS Pub 1345
CHECKLIST
—
INPUT:
Date of Last Risk Assessment:
Responsible Staff/Consultant:
Risk Framework or Tool Used:
Top 3 Risks Identified:
1.
2.
3.
COMPLIANCE SCORE (1–5):
EVIDENCE ATTACHED:
—
SECTION 3 — TECHNICAL SAFEGUARDS: THE SECURITY SIX
Objective: Implement the six core technical protections defined by the IRS.
Purpose: Ensure that digital security protections are deployed, monitored, and documented to minimize intrusion risk.
Authoritative Sources:
CHECKLIST
—
INPUT:
Control
Antivirus
Firewall
MFA
Encryption
Backup
VPN
Status
—
—
—
—
—
—
Last Verified
Tool Used
COMPLIANCE SCORE (1–5):
EVIDENCE ATTACHED:
—
SECTION 4 — EMPLOYEE TRAINING & HUMAN CONTROLS
Objective: Educate staff in secure behaviors and enforce human-centric controls.
Purpose: Build a human firewall. Teach staff to prevent, detect, & respond to security events.
Authoritative Sources:
-- IRS Pub 4557
-- IRS Pub 5708, p. 9
-- FTC §314.4(e)
CHECKLIST
—
INPUT:
Training Provider:
Most Recent Session:
Phishing Simulation Conducted:
—
% Staff Passing:
COMPLIANCE SCORE (1–5):
EVIDENCE ATTACHED:
