FTC Safeguards Rule Checklist for Small Businesses (Plain-English)

Table of Contents
    Add a header to begin generating the table of contents

    The FTC Safeguards Rule says some small businesses that handle consumer financial data must protect that data with a written security program. The basics are: assign a person in charge, figure out your main risks, put key safeguards in place (like MFA and encryption), and keep simple proof that you do these things. Some requirements are lighter if you keep customer information for fewer than 5,000 consumers, but most core expectations still apply. If you’re not sure the Rule applies to your business, confirm with counsel or a qualified compliance advisor.

    TL;DR

    • Name a Qualified Individual (QI) who owns the security program.
    • Write down your risk assessment and your Written Information Security Program (WISP).
    • Cover key controls: access limits, MFA, encryption, secure disposal, change control, and logging/monitoring.
    • Train your team, watch your vendors, and test that controls work.
    • Know the FTC reporting trigger: 500+ consumers and 30 days for certain events.

    Who This Is For

    This is for small business owners and managers who may be covered by the FTC Safeguards Rule because they handle consumer financial information.

    This is not legal advice, and it’s not a full replacement for reading official guidance or getting help when rules are unclear.

    What This Is

    The FTC Safeguards Rule is a federal rule that requires covered businesses to have a written information security program to protect customer information (nonpublic personal information).

    Key terms (in plain English):

    • Qualified Individual (QI): the person responsible for your security program.
    • Risk assessment: a written look at what could go wrong and what you will do about it.
    • WISP (Written Information Security Program): your written plan that explains your safeguards and how you run them.

    If coverage or exceptions are unclear for your business, confirm with counsel if unsure.

    Why This Matters

    The goal is simple: protect sensitive customer information and be able to show you are doing it in a consistent way. For small businesses, the biggest problems are often missing documentation and missing routine follow-through.

    Scenario (anonymized): A partner asks for your WISP, proof of MFA, vendor security notes, and recent testing results. You have security tools, but you don’t have written documents or records. The request turns into a rush, and the partnership gets delayed.

    Detailed Plain-English Breakdown

    Key Exception / Applicability (Small Business Note): If you keep customer information for fewer than 5,000 consumers, some parts of the Rule may not apply (mainly certain “written” items and certain testing/monitoring details). Many businesses still document these items because it makes reviews, audits, and insurance requests easier. Confirm your status if you’re unsure.

    Quick checklist (copy/paste)

    Ownership

    • 1. Name a Qualified Individual (QI) and write down the role and responsibilities
    • 2. Set a simple approval path for security decisions and exceptions

    Risk + plan

    • 3. Do a risk assessment (what data you have, where it is, what could happen, what you will do)
    • 4. Create or update your WISP (your written program)
    • 5. Review and update these documents on a schedule and after major changes

    Required safeguard areas (make sure you cover each one)

    • 6. Access controls (least privilege + access reviews)
    • 7. Inventory (systems, apps, devices, accounts, vendors that touch customer info)
    • 8. Encryption (in transit + at rest) or approved alternatives with written reasoning
    • 9. Multi-factor authentication (MFA) for system access (or approved alternatives)
    • 10. Secure disposal (no later than 2 years after most recent use, with documented exceptions)
    • 11. Change management (review security impact before major changes)
    • 12. Logging and monitoring (detect suspicious or unauthorized access)
    • 13. Security evaluation of applications and systems (including third-party tools)

    Proof it works

    • 14. Test/monitor controls and track fixes
    • 15. Train staff and keep completion records
    • 16. Manage vendors (choose carefully, require security in contracts, review regularly)

    Incident readiness + reporting

    • 17. Keep an incident response plan (written unless you are clearly exempt; recommended either way)
    • 18. Include an FTC reporting check: 500+ consumers and 30 days for certain qualifying events
    • 19. Provide annual QI reporting to leadership (required unless you are clearly exempt; recommended either way)

    1. Qualified Individual (QI)

    Meaning: One person is responsible for running the security program.

    Common failure: No clear owner, so policies and tools are not enforced.

    What good looks like:

    • A written QI designation (name or role)
    • Clear authority to approve changes and require fixes
    • A simple record of reviews and decisions (even brief notes are helpful)

    2. Risk assessment (and keeping it current)

    Meaning: You list where customer information is, what could threaten it, and what safeguards you will use.

    Common failure: A one-time checklist with no inventory and no updates.

    What good looks like:

    • Inventory of where customer information is stored and used
    • A written list of key risks (internal and external)
    • Clear choices: what you will fix first and why
    • Update triggers (new vendor, new app, migration, incident)

    3. Safeguards you must cover (plain-English)

    Below are the required safeguard areas. For each one, use: Meaning → Common failure → What good looks like.

    3.1 Access controls

    Meaning: People only get the access they need.

    Common failure: Too many admin accounts, shared accounts, and old users left active.

    What good looks like:

    • Least privilege by role
    • Regular access reviews
    • Fast offboarding and access removal

    3.2 Inventory (systems + data)

    Meaning: You can’t protect what you don’t know exists.

    Common failure: Unknown apps, unmanaged devices, and vendors added without review.

    What good looks like:

    • A living list of systems, apps, devices, and key accounts
    • A list of vendors that can access customer information

    3.3 Encryption (or approved alternatives)

    Meaning: Encryption helps keep data unreadable if it is intercepted or exposed.

    Common failure: Assuming encryption is “automatic” without confirming it.

    What good looks like:

    • Encryption in transit (for data moving over networks)
    • Encryption at rest (for stored data)
    • If you can’t encrypt somewhere, a written exception with alternative safeguards and QI approval

    3.4 Multi-factor authentication (MFA)

    Meaning: A second step to log in, not just a password.

    Common failure: MFA for email only, but not for admin tools or remote access.

    What good looks like:

    • MFA for key systems, especially where customer information is accessed
    • Written exceptions only when necessary, with strong alternatives

    3.5 Secure disposal and retention

    Meaning: Don’t keep customer information longer than you need.

    Common failure: “We never delete anything,” with no retention rules.

    What good looks like:

    • Secure disposal no later than two years after the most recent use to provide a product or service
    • Written exceptions when needed (legal needs, business needs, or technical limits)
    • Secure disposal methods for paper, devices, and cloud storage

    3.6 Change management

    Meaning: Big changes can create new security gaps.

    Common failure: Making major changes with no security review.

    What good looks like:

    • A simple process to review the security impact before major changes
    • Post-change checks (access, encryption, logging, monitoring)

    3.7 Logging and monitoring

    Meaning: You need visibility to spot unauthorized access and unusual activity.

    Common failure: Logs exist, but no one reviews them.

    What good looks like:

    • Logs turned on for key systems
    • Alerts for high-risk events (new admin access, suspicious sign-ins)
    • A regular review habit and an escalation path

    3.8 Application and system security evaluation

    Meaning: You evaluate the security of systems and apps that touch customer information.

    Common failure: Adding tools without understanding what data they access or store.

    What good looks like:

    • A repeatable review for new apps and vendors (risk-based)
    • Security expectations included in vendor agreements

    4. Testing and monitoring

    Meaning: You check that safeguards work and you fix what you find.

    Common failure: Testing once and never following up.

    What good looks like:

    • A simple testing or monitoring plan tied to your risks
    • A list of findings with owners and due dates
    • Proof of fixes (tickets, notes, screenshots, reports)

    5. Staff training

    Meaning: Training reduces mistakes and speeds up reporting.

    Common failure: Training exists but is not tracked or refreshed.

    What good looks like:

    • New-hire training and regular refreshers
    • Role-based training for higher-access staff
    • Records of completion

    6. Vendor (service provider) oversight

    Meaning: Vendors can create risk if they can access your customer information.

    Common failure: No security expectations in contracts and no review process.

    What good looks like:

    • A vendor list with risk levels
    • Contract language for security and incident notice
    • Periodic vendor reviews for higher-risk vendors

    7. Incident response plan

    Meaning: You have a plan for what to do if something happens.

    Common failure: A template that does not match your real contacts and systems.

    What good looks like:

    • Roles and steps for triage, containment, and recovery
    • Contact list (internal + outside help)
    • Documentation and “lessons learned” after an incident

    8. Leadership reporting (required unless clearly exempt)

    Meaning: The QI provides a written report to leadership at least annually (and more often if needed).

    Common failure: No record that leadership reviewed risks and results.

    What good looks like:

    • A short written annual report: major risks, key control status, testing results, incidents, and priorities
    • Notes on decisions and approved actions

    9. FTC breach reporting (know the basics)

    For certain qualifying security events, the Rule requires notice to the FTC as soon as possible and no later than 30 days after discovery when it involves 500 or more consumers. This is separate from state breach notification laws. Your incident plan should include who decides whether an FTC notice is required and how that decision is documented.

    Common Mistakes & Misconceptions

    • Tools are not the same as compliance. You need policies, enforcement, and records.
    • Outsourcing is not the same as transferring responsibility. Your business still owns the program.
    • No evidence. If you can’t show training, reviews, and follow-up, it’s hard to prove the program runs.
    • Overlooking vendors. Vendor access to customer information is a common weak spot.
    • Policies that don’t match reality. Your WISP should reflect how you actually work.

    High-Level Implementation Overview

    People

    • Assign a QI
    • Define who owns access reviews, vendor reviews, training, and incident response
    • Set leadership oversight and reporting

    Process

    • Maintain inventory, risk assessment, and WISP
    • Standardize onboarding/offboarding, access reviews, disposal, and change review
    • Track findings and fixes from monitoring/testing
    • Review vendors on a schedule

    Technology

    • Enforce MFA and least privilege
    • Use encryption where customer information is stored or transmitted (or document approved alternatives)
    • Turn on logging and monitoring for key systems
    • Validate security after major changes

    Leader Self-Check

    • We have a named QI with written responsibilities
    • We know where customer information lives
    • We have a current risk assessment and update triggers
    • MFA is enforced (or exceptions are approved and documented)
    • Encryption is in place (or alternatives are approved and documented)
    • We monitor/test controls and track fixes
    • Staff training is current and recorded
    • Vendors with access are identified, contracted, and reviewed
    • We have an incident plan that we can use
    • We understand the FTC reporting basics (500+ / 30 days) and who decides

    How Office Heroes Supports This

    Office Heroes helps you turn Safeguards Rule requirements into a working, provable program, so you can answer “yes” with confidence when clients, insurers, or partners ask for security and compliance proof. We focus on reducing last-minute scramblesclosing common gaps, and keeping your documentation and evidence ready. Office Heroes can support compliance efforts, but responsibility remains with the business.

    What that looks like in real outcomes:

    • Faster, smoother client and insurer requests: You have a ready set of documents and evidence (WISP/risk assessment summaries, MFA/encryption status, vendor oversight notes, training records) instead of rebuilding it under pressure.
    • Clear ownership and decisions: Your team knows who approves exceptions, who reviews results, and how security decisions get documented.
    • Fewer preventable security gaps: Access is tightened, MFA and encryption are enforced consistently, and changes don’t accidentally introduce new risk.
    • Vendor risk kept under control: You know which vendors touch customer information, what you require from them, and how you track follow-ups.
    • Proof that safeguards work: Monitoring/testing is routine, findings are tracked, and remediation doesn’t get lost.
    • Incident readiness without chaos: You have a practical response plan, key contacts, and a clear step for evaluating FTC reporting triggers.
    • Leadership-friendly visibility: You can produce simple, plain-English updates that show risks, progress, and priorities without drowning in technical detail.

    Related Resources & Internal Links

    When to Get Help

    Get help if:

    • You’re not sure the Rule applies to your business
    • You don’t have a clear QI owner, risk assessment, or WISP
    • MFA/encryption/logging are inconsistent (and exceptions aren’t documented)
    • Vendor oversight is informal or undocumented
    • You don’t have an incident plan that includes an FTC reporting check
    • Leadership reporting is missing (even when exempt, it often helps)

    Schedule an FTC-focused compliance assessment to see what you have, what you’re missing, and what to prioritize next: https://office-heroes.com/it-consultation/

    Author Profile
    A soldier from our team stands outdoors in uniform, holding military equipment, with a building and palm trees framing the background.
    Founder & Chief Cybersecurity Strategist at  | Web

    Peter Zendzian is the Founder & Chief Cybersecurity Strategist at Office Heroes, a cybersecurity-focused Managed IT Service Provider helping CPA firms, law firms, credit unions, defense contractors, and small regulated businesses stay secure, compliant, and audit-ready.

    Peter served more than 20 years in the U.S. Navy, retiring as a Chief Petty Officer after leading secure communications, cybersecurity operations, and technology teams across joint military environments. His background in classified systems, compliance, risk management, and operational security directly shapes Office Heroes’ modern, practical approach to protecting small businesses.

    He is the co-author of two bestselling cybersecurity books:


    Your Business Must Have a Cybersecurity Risk Assessment


    Cybersecurity Essentials for Small Businesses

    Peter is a trusted advisor to business owners and a subject matter expert in:

    FTC Safeguards Rule compliance
    GLBA compliance
    NIST SP 800-171
    CMMC Level 2 readiness
    Microsoft 365 and Azure security
    Endpoint protection, EDR, and vulnerability management
    Data protection, disaster recovery, and cloud resilience
    Secure remote access and Azure Virtual Desktop
    Small business workflow automation

    Certifications & Recognition

    Retired U.S. Navy Chief Petty Officer (E-7)
    DoD Cyber & Communications Leadership Training
    20+ years managing classified systems and secure communications
    Co-author of two bestselling cybersecurity books
    Expert in FTC Safeguards, GLBA, NIST SP 800-171, and CMMC Level 2
    Microsoft 365 and Azure security practitioner
    Specialist in data protection, disaster recovery, and ransomware defense

    Peter’s mission is simple: to make world-class cybersecurity, compliance, and IT support accessible to small businesses that don’t have internal IT or security teams — giving them the protection, clarity, and confidence they deserve.

    Share the Post:

    Stay Updated with the Heroes Journal

    Sign up to receive the latest insights, tips, and updates from the Heroes Journal, and never miss a post that helps you power your business forward.
    Scroll to Top