Federal Trade Commission Safeguards Rule

LOCATION
  • United States
industry
  • Financial Services
  • Automotive
Requirements

9

compliance-hero-img
Blue decoration
Achieve Compliance Confidence

Understanding the Safeguards Rule: Protecting Non-Public Customer Information

What the Rule Actually Requires:
If you handle consumer financial data, whether you’re a CPA firm, mortgage broker, auto dealer, F&I office, or investment adviser—you’re required to implement a written security program with nine specific elements: a designated security lead, documented risk assessments, access controls, encryption, employee training, monitoring and testing, MFA, an incident response plan, and annual board reporting.

What That Looks Like in Practice:
ForgePath turns these requirements into operational controls. We run your risk assessment workshops. We write the policies your auditors actually want to see. We deploy the monitoring and testing tools that generate audit-ready evidence—so compliance isn’t a fire drill, it’s a baseline.

The Nine Requirements

FTC Safeguards Compliance At a Glance

If you’re a non-bank financial institution, CPA firm, mortgage broker, auto dealer, tax preparer, or investment adviser—you must implement all nine elements below. Here’s exactly what you’re required to have in place and what regulators will look for.

accordion-icon Requirements

Qualified Individual

Designate a Qualified Individual responsible for overseeing and enforcing the information-security program. This can be an internal hire or an outsourced vCISO, as long as that someone is formally serving as your Qualified Individual.

Written Risk Assessment

Document reasonably foreseeable internal and external risks to customer data and align safeguards to mitigate them.

Access Controls

Limit information access to authorized users and implement least-privilege, role-based permissions.

Encryption of Data in Transit & at Rest

Encrypt customer information both while stored and during transmission over external networks.

Security & Phishing Awareness Training

Provide ongoing training and phishing simulations to ensure employees understand their security responsibilities.

Monitoring & Testing

Implement continuous monitoring of your security program, or at minimum, conduct annual penetration testing and vulnerability assessments at least every six months.

Multi-Factor Authentication (MFA)

Require MFA for any individual accessing customer information in information systems.

Incident Response Plan

Develop a written IRP outlining procedures for detecting, responding to, and recovering from security events.

Board Reporting

Provide the board of directors (or equivalent) with a written report, at least annually, on program status, incidents, and recommendations.

accordion-icon How ForgePath Can Help

vCISO & Board Reporting Support

Need a qualified individual but not a full-time hire? Our vCISO service gives you executive-level security leadership, including the annual board reports the rule requires.

Vulnerability Management

Continuous scanning. Tracked remediation. Audit-ready reports. We run the program so you can prove to regulators it's actually working.

Penetration Testing Services

Your annual testing requirement, Covered. We simulate real attacker techniques against your network and applications, then document exactly what we found and how to fix it.

Security Awareness Training

Equip your staff to recognize social engineering, phishing, and other threats. The rule requires ongoing training. We deliver programs that meet the requirement and actually change behavior.

Phishing Simulation

Run continuous phishing campaigns to test employee readiness and document training effectiveness for regulators.

IR Plan Development & Review

The Safeguards Rule requires a written incident response plan. We build IRPs tailored to your environment, or review and strengthen what you already have.

Tabletop Exercises

Test your incident response plan before a real breach does. We run realistic scenarios so your team knows exactly what to do when something goes wrong.

Access Management Review

Evaluate your current access policies against least-privilege principles and identify over-permissioned accounts before auditors do.

Privileged Access Management (PAM)

Protect the accounts that matter most. We implement controls around admin and service accounts that access customer data.

Data Security Governance

Build the policies and controls that govern how customer data is stored, transmitted, and encrypted which is core to meeting the rule's technical safeguards.

Forge Path logo
YHB-Testimonial-Main-Plus-Avatar-Image_v3
Cyrus Kapadia
Chief Technology & Innovation Officer
YHB | CPAs & Consultants
Working With ForgePath

Forgepath has become a trusted security partner for YHB.

View Full Testimonial
Cyrus Kapadia
Chief Technology & Innovation Officer
YHB | CPAs & Consultants

Forgepath has become a trusted security partner for YHB. Beyond helping us comply with FTC Safeguards requirements, they provide the governance, oversight, and guidance we rely on to protect our firm and our clients’ data. Their team understands how a CPA firm operates and has helped us build a security program that’s both practical and sustainable.

ZeroHealth-Testimonial-Main-Plus-Avatar-Image
Jeromy Labit
Director, Cloud Systems & Security
ZERO
Working With ForgePath

Forgepath delivered outstanding service on our network and app security tests.

View Full Testimonial
Jeromy Labit
Director, Cloud Systems & Security
ZERO

Forgepath delivered outstanding service on both our network penetration test and application security assessment.

When a critical customer need arose, they quickly adjusted their schedule to meet our urgent timeline without compromising quality. Their technical expertise, clear guidance, and hands-on remediation support helped us meet our EOY goals efficiently.

We were especially impressed by their flexibility, responsiveness, and professionalism throughout the process.

Parsysco-Testimonial-Main-Plus-Avatar-Image
H.T. Gordon
Chief Executive Officer
Parsysco
Working With ForgePath

Forgepath separates themselves from the rest as they’re a true security partner.

View Full Testimonial
H.T. Gordon
Chief Executive Officer
Parsysco

Forgepath separates themselves from the rest as they’re a true security partner to Parsysco. They took the time to understand our requirements and how things were working with our previous provider. We were impressed by how quickly they formulated a new strategy and approach. They helped us identify our challenges and consistently brought forward solutions that were in Parsysco’s best interest.

Most vendors only care about selling something, Forgepath took the personal relationship and partnership approach that we value greatly.

logo-decor
Ready to Get Started?

Strengthen Client Trust with FTC Safeguards

Stop treating compliance as a checkbox. The firms that get Safeguards right don’t just satisfy regulators, they build security programs that actually reduce risk. ForgePath takes you from gap assessment to continuous monitoring, with documentation that holds up under FTC scrutiny.
support-cta-img
FAQ

Have Questions About The FTC Safeguards Rule?

Non-bank financial institutions such as mortgage brokers, CPAs, auto-dealership finance arms, accounting firms, payday lenders, and investment advisers.

The amended rule became fully enforceable on June 9, 2023. If you haven’t implemented all nine required elements, you’re already subject to FTC enforcement.

The Safeguards Rule requires strong encryption; FIPS-validated algorithms are recommended but not explicitly mandated.

The rule requires either continuous monitoring or, alternatively, annual penetration testing combined with vulnerability assessments at least every six months.

The FTC can levy civil penalties, mandate corrective actions, and pursue injunctive relief for violations of the Safeguards Rule.

If you’re a non-bank financial institution—CPA or accounting firm, mortgage broker, auto dealer finance office, payday lender, tax preparer, investment adviser, or similar—the answer is yes.

FTC enforcement has ramped up since the 2023 deadline. Penalties can reach tens of thousands of dollars per violation, and public consent orders name your firm in headlines.

Expert Perspectives on Emerging Cyber Threats and Trends

Forgepath FTC Safeguards Rule

What Is the FTC Safeguards Rule?

The FTC Safeguards Rule is about how to protect customers’ non-public personal informat…
Read Full Article
The top ten web application vulnerabilities

Web Application Vulnerabilities – And How to Fix Them

Modern businesses heavily rely on web applications to facilitate transactions, customer e…
Read Full Article
An infographic highlighting the benefits of PAM solutions

What is Application Penetration Testing? Benefits & FAQs

Application Penetration Testing: Key Takeaways Application penetration testing helps …
Read Full Article
An infographic highlighting the benefits of cloud security assessments

Identity and Access Management: How It Works, Pillars And FAQs

Identity Management Explained: Key Takeaways Identity and access management (IAM) ens…
Read Full Article
An infographic highlighting the benefits of PAM solutions

Privileged Access Management: Types, Benefits & Challenges

Privileged Access Management: Key Takeaways Privileged access management (PAM) is a c…
Read Full Article
An infographic highlighting the benefits of cloud security assessments

Cloud Security Assessments: Benefits, Checklist And Processess

Cloud Security Assessment: Key Takeaways A cloud security assessment identifies vulne…
Read Full Article
An infographic highlighting what’s included in AI pen testing, the tools used, and the top AI threats

AI Pen Testing: Inclusions, Testing Tools & AI Threats

AI Pen Testing Explained: Key Takeaways Each AI pen test includes expert analysis, re…
Read Full Article
How AI enhances threat detection and response

What Is AI In Cybersecurity? What You Need to Know

Introduction: The Intersection of AI and Cybersecurity Artificial Intelligence (AI) is…
Read Full Article
Forgepath Penetration Testing

Introduction to Penetration Testing

A penetration test or pentest, is a simulated cyber-attack carried out by experienced sec…
Read Full Article