What is the FTC Safeguards Rule?

The FTC Safeguards Rule (16 CFR Part 314) requires financial institutions under FTC jurisdiction to develop, implement, and maintain a comprehensive information security program to protect customer information. Originally issued in 2003, the rule was substantially amended in 2021, with most provisions taking effect in June 2023. The amendments introduced specific technical requirements that replaced the previous principles-based approach.

The Safeguards Rule applies to non-banking financial institutions, including: mortgage brokers, motor vehicle dealers, payday lenders, finance companies, account servicers, check cashers, wire transferors, travel agencies, real estate settlement services, tax preparers, and other entities that engage in financial activities under FTC jurisdiction.

Key Requirements

The amended Safeguards Rule imposes specific obligations across several areas of information security.

Requirement AreaDescriptionKey Provisions
Qualified IndividualDesignate a person to oversee the security programInternal or external, reports to board, sufficient authority and resources
Written Information Security ProgramDocument a comprehensive WISPRisk-based, covers all customer information, regularly updated
Risk AssessmentIdentify and assess risks to customer informationWritten assessment, criteria for evaluation, periodic updates
Access ControlsRestrict access to customer informationLeast privilege, periodic access reviews, authentication controls
EncryptionEncrypt customer information in transit and at restIndustry-standard encryption, key management, qualified individual approval for alternatives
Multi-Factor AuthenticationRequire MFA for accessing customer informationAll users accessing customer information systems, remote access
Secure DevelopmentImplement secure software development practicesSecurity testing, code reviews, secure coding standards
Change ManagementControl changes to information systemsChange approval, testing, rollback procedures
Incident Response PlanMaintain a written incident response planResponse procedures, roles and responsibilities, communication protocols
Penetration Testing / Vulnerability AssessmentRegularly test security controlsAnnual penetration testing or continuous monitoring with semi-annual vulnerability assessments
Board ReportingReport to the board on security program statusAnnual written report from qualified individual, material matters reporting
Vendor ManagementOversee service providers handling customer informationDue diligence, contractual requirements, periodic assessment

Readiness Assessment Checklist

Before engaging in a full compliance program, evaluate where your organization stands against these six readiness questions:

  1. Have you designated a qualified individual to oversee your information security program, with documented authority and reporting to the board?
  2. Have you conducted a written risk assessment that identifies reasonably foreseeable risks to customer information?
  3. Are access controls, multi-factor authentication, and encryption implemented for all systems handling customer information?
  4. Do you have a written incident response plan with defined roles, procedures, and communication protocols?
  5. Have you implemented a vendor management program with due diligence, contractual requirements, and periodic assessments for service providers?
  6. Does your qualified individual provide annual written reports to the board on the overall status of the security program?

If you can’t confidently answer “yes” to most of these, a readiness sprint will get you there.

Next step: See our control domain breakdown to understand what the FTC expects across all security control areas, with evidence examples for each.