Unparalleled Bookkeeping, Tax & CFO Services

Privacy Policy

Effective Date: August 22, 2024

The purpose of this Written Information Security Plan (WISP) is to create a comprehensive program aimed at ensuring the security and confidentiality of sensitive information. It seeks to protect against potential threats to the security or integrity of such information and prevent unauthorized access or use.

This WISP is applicable to all employees, contractors, and third-party service providers of My Financial Suite Inc. It encompasses all sensitive information, including client data, financial records, and personally identifiable information (PII) that is collected, maintained, or transmitted by the firm.

The information security policy within this plan begins with data classification. Confidential information, such as client financial records and tax returns, is identified as information that could cause significant harm if disclosed. Internal use information is intended for use within the firm, including internal communications, while public information is approved for public dissemination.

Access to confidential information is restricted to authorized personnel only, and such access is granted based on the principle of least privilege. This ensures that individuals have access only to the information necessary for their role.

In terms of physical security, the firm secures its office premises with controlled entry systems. All physical documents containing sensitive information are locked and secured, and shredders are used for disposing of confidential paper documents.

For electronic security, the WISP mandates the encryption of all sensitive information, both when stored electronically and during transmission. Strong encryption methods that comply with industry standards are used. Network security measures include the use of firewalls, antivirus software, and intrusion detection systems, with regular updates and patches applied to all systems and software.

Employee training is a key component of this plan. Regular training sessions on information security policies and procedures are provided, along with security awareness programs to educate employees about phishing and other cyber threats.

An incident response plan is in place to address data breaches and other security incidents. This plan includes the prompt reporting of incidents to relevant authorities and affected clients.

Regular audits are conducted to ensure compliance with the WISP, and the network and systems are monitored for any unusual activity. Vendor management is also addressed by ensuring that third-party service providers comply with security policies. Contracts with vendors include data protection clauses to safeguard sensitive information.

The WISP is reviewed and updated annually, or as needed, to address new threats and changes in regulations. Compliance with legal and regulatory requirements is emphasized, particularly with IRS Publication 4557, Safeguarding Taxpayer Data, and other relevant federal and state regulations.

The responsibilities within this plan include the assignment of a designated information security officer to oversee and enforce the WISP. Roles and responsibilities for all employees in maintaining information security are clearly defined to ensure accountability and adherence to the plan.

Incident Response Plan for Addressing Data Breaches and Other Security Incidents

1. Purpose

The purpose of this Incident Response Plan is to provide a structured approach for managing data breaches and other security incidents. The plan is designed to minimize the impact of such incidents on the firm, its clients, and its operations, while ensuring a swift and effective response to restore normal operations and safeguard sensitive information.

2. Scope

This plan applies to all employees, contractors, and third-party service providers of My Financial Suite Inc. It covers any incident that could potentially compromise the confidentiality, integrity, or availability of sensitive information, including client data, financial records, and personally identifiable information (PII).

3. Incident Identification

– Detection: Incidents can be detected through various channels, including automated monitoring systems, employee reports, client notifications, or alerts from third-party providers.

– Initial Assessment: Once an incident is detected, the first step is to assess its nature and severity. This includes determining whether it constitutes a data breach or another type of security incident, and identifying the potential impact on the firm and its clients.

4. Incident Containment

– Immediate Action: Upon identifying an incident, immediate steps should be taken to contain it. This may involve disconnecting affected systems from the network, revoking access privileges, or temporarily shutting down specific operations to prevent further damage.

– Short-Term Containment: In the early stages of containment, the focus is on isolating the affected systems or data to prevent the incident from spreading.

5. Incident Eradication

– Root Cause Analysis: Identify the root cause of the incident. This may involve examining logs, interviewing relevant personnel, or analyzing affected systems to determine how the breach or security incident occurred.

– Eradication Measures: Once the root cause is identified, implement measures to remove the threat. This may include applying security patches, updating software, removing malware, or addressing any vulnerabilities that led to the incident.

6. Recovery

– System Restoration: After the incident has been contained and eradicated, work on restoring affected systems and data to their normal operating state. Ensure that backups are verified for integrity before restoration.

– Verification: Conduct thorough testing to ensure that the threat has been completely eliminated and that systems are functioning correctly. This includes confirming that no unauthorized access points remain and that all security controls are back in place.

7. Communication and Notification

– Internal Communication: Keep all relevant internal stakeholders informed throughout the incident response process, including senior management, the IT team, and the legal department.

– Client Notification: If client data has been compromised, promptly notify affected clients, providing them with details of the incident, the potential impact, and the steps being taken to mitigate the situation.

– Regulatory Reporting: Report the incident to relevant regulatory authorities as required by law. This includes complying with any notification deadlines and providing all necessary information about the breach.

8. Documentation and Reporting

– Incident Log: Maintain a detailed log of the incident, including timelines, actions taken, and decisions made throughout the response process. This log will be essential for post-incident review and for any legal or regulatory requirements.

– Final Report: Prepare a comprehensive report summarizing the incident, including the cause, impact, response actions, and lessons learned. This report should be reviewed by senior management and retained for future reference.

9. Post-Incident Review

– Debriefing: After the incident has been resolved, conduct a debriefing session with all involved parties to discuss what happened, what was done, and what could be improved. This session should aim to identify any gaps in the response plan and make recommendations for future improvements.

– Plan Update: Based on the findings from the post-incident review, update the Incident Response Plan to address any identified weaknesses and to incorporate any new best practices.

10. Training and Awareness

– Regular Training: Ensure that all employees receive regular training on the Incident Response Plan and their roles within it. This training should include simulated incidents to test and reinforce their understanding of the response process.

– Awareness Programs: Conduct ongoing awareness programs to keep employees informed about the latest security threats and the importance of promptly reporting any suspicious activities or potential security incidents.

11. Continuous Improvement

– Feedback Loop: Establish a feedback loop to continually improve the Incident Response Plan. This includes incorporating lessons learned from actual incidents, staying updated on evolving threats, and regularly reviewing and refining response procedures.

– Audit and Monitoring: Periodically audit the Incident Response Plan and the firm’s overall security posture to ensure that it remains effective and compliant with relevant regulations. Continuous monitoring of systems should be in place to detect and respond to incidents proactively.

This Incident Response Plan is a critical component of My Financial Suite Inc.’s commitment to safeguarding sensitive information and maintaining the trust of our clients. All employees, contractors, and third-party service providers are expected to adhere to the procedures outlined in this plan to ensure a coordinated and effective response to any data breach or security incident.