Information Security Policy for [Accounting Firm Name] Purpose This Information Security Policy establishes the framework for [Accounting Firm Name] to protect nonpublic personal information (NPI) of clients, comply with federal and state regulations, including the Gramm-Leach-Bliley Act (GLBA) and applicable state data protection laws, and mitigate cybersecurity risks. Scope This policy applies to all employees, contractors, and third-party service providers who access, process, or store NPI on behalf of [Accounting Firm Name]. NPI includes client names, Social Security numbers, tax records, financial statements, or any information that could identify a client. Definitions Nonpublic Personal Information (NPI): Information about clients, including names, Social Security numbers, tax IDs, financial data, or account details, as defined by GLBA. Sensitive Client Information: NPI that, if compromised, could cause significant harm (e.g., tax IDs, bank account numbers). Policy 1. Information Safeguards Access Controls: Access to NPI is restricted to authorized personnel. Systems require unique user IDs, strong passwords (minimum 12 characters, mixed case, numbers, symbols), and multi-factor authentication (MFA) for all client data systems. Encryption: NPI is encrypted at rest (AES-256) and in transit (TLS 1.3). Portable devices (laptops, USB drives) containing NPI must use full-disk encryption. Physical Security: Physical records containing NPI are stored in locked cabinets in a secure office. Office access is restricted via keycard or lock-and-key systems. Network Security: Firewalls, endpoint detection, and antivirus software are deployed and updated regularly. Secure Wi-Fi (WPA3) is used for all network connections. Data Disposal: NPI is securely disposed of via shredding for physical records and secure wiping (NIST 800-88 standards) for digital records. 2. Incident Response Program Detection and Assessment: [Accounting Firm Name] will monitor systems for unauthorized access to NPI using intrusion detection tools. Suspected breaches will be assessed within 24 hours to determine the scope and affected systems. Notification: If sensitive client information is accessed or reasonably likely to have been accessed without authorization, affected clients will be notified within 30 days, per state data breach laws (e.g., California’s CCPA, New York’s SHIELD Act). Notifications will include incident details, protective steps (e.g., credit monitoring), and contact information. Documentation: All incidents and responses are documented and retained for at least 5 years, compliant with state recordkeeping requirements. Recovery: The firm will contain breaches (e.g., isolating affected systems) and restore operations, coordinating with IT and legal counsel. 3. Vendor Management Due Diligence: Third-party service providers (e.g., cloud accounting software, tax preparation platforms) handling NPI must be vetted for cybersecurity practices. Contracts must include breach notification clauses within 72 hours. Oversight: Vendors are reviewed annually for compliance with GLBA and state laws. Documentation of vendor agreements is maintained. 4. Employee Training All employees are trained annually on this policy, data protection, and recognizing phishing or social engineering attacks. New hires receive training within 30 days of onboarding. Training includes procedures for reporting suspected breaches to the designated Compliance Officer. 5. Privacy Notices Initial Notice: Clients receive a clear, conspicuous privacy notice at the time of establishing a client relationship, detailing NPI collection, sharing practices, and opt-out rights under GLBA. Annual Notice: Privacy notices are provided annually to all clients, included with tax documents or via mail/email. 6. Annual Review and Updates The Compliance Officer will review this policy annually to ensure it remains effective and compliant with federal and state regulations. Updates will address new threats or regulatory changes. Tabletop exercises are conducted annually to test the incident response plan. 7. Compliance and Enforcement The Compliance Officer is responsible for administering this policy. Violations (e.g., unauthorized disclosure of NPI) may result in disciplinary action, up to termination. Records of policy distribution and employee acknowledgments are maintained for regulatory inspections. Approval This policy is approved by [Compliance Officer Name], Compliance Officer, and effective as of [Date]. Annual reviews are documented and maintained for regulatory inspections.