FTC Safeguards Rule Compliance for Regulated Businesses in PA, NJ & DE

Tera Partners provides structured managed IT services and IT security support designed to help regulated businesses across Pennsylvania, New Jersey, and Delaware meet Safeguards Rule requirements with documented controls, appropriate oversight, and clear accountability.

What Is the FTC Safeguards Rule?

The FTC Safeguards Rule, issued under the Gramm-Leach-Bliley Act (GLBA), requires covered organizations to develop, implement, and maintain a written information security program designed to protect consumer financial information.

The rule was significantly strengthened in 2023, adding specific technical requirements including multi-factor authentication, encryption of data in transit and at rest, annual penetration testing, and designation of a qualified individual responsible for overseeing the program. The FTC began active enforcement in 2024 and has continued to pursue violations through 2026.

For many professional firms and businesses, the critical issue is not whether compliance is required — it is whether their current IT environment, access controls, vendor relationships, and documentation actually meet the rule’s requirements in practice.

Which Organizations Are Covered

The FTC’s definition of “financial institution” is broader than most business owners expect. Coverage is determined by the nature of the activity — not the organization’s primary identity.

IT Support for Law Firms

Law Firms

Law firms engaged in real estate transactions, estate planning, business formation, or any activity involving consumer financial information are covered. The 2023 amendments made this explicit, and the FTC has issued guidance specifically addressing law firm obligations.

IT Support for Law Firms →

IT support for financial services firms maintaining secure financial systems

Financial Services & Advisory Firms

Registered investment advisers, wealth management firms, mortgage brokers, insurance agencies, tax preparers, and lenders are covered under the Safeguards Rule and subject to GLBA’s broader privacy and security requirements.

IT Support for Financial Firms →

IT support for accounting firms managing secure tax and audit systems

CPA & Accounting Firms

CPA firms and accounting practices that handle consumer financial data — including tax preparation, financial planning, and payroll services — are covered. The IRS Publication 4557 requirements align with and reinforce Safeguards Rule obligations.

IT Support for Accounting →

IT Support for Automotive Dealerships

Auto Dealerships

Auto dealers that arrange or facilitate consumer financing are explicitly covered. The FTC released dealer-specific Safeguards Rule guidance in 2025. The CDK Global incident demonstrated how exposed dealership IT environments can be when controls are insufficient.

IT Support for Auto Dealerships →

The Nine Required Elements of a Safeguards Rule Program

The FTC Safeguards Rule specifies nine elements that every covered organization’s information security program must include. Tera Partners addresses each element through structured managed IT services, security oversight, and documented controls.

1
Qualified Individual
Designate a qualified individual to oversee the information security program. This role can be filled internally or by a qualified external service provider.

✓ Tera Partners can serve in this function or support an internal designee with the documentation, reporting, and oversight they need.

2
Written Risk Assessment
Identify foreseeable internal and external risks to the security of customer information, evaluate existing safeguards, and document findings in writing.

✓ Risk assessments are conducted as part of onboarding and reviewed on a defined cycle.

3
Access Controls
Implement controls that limit access to customer information to authorized individuals only, based on the principle of least privilege.

✓ Role-based access, Active Directory governance, and periodic access reviews are managed as part of ongoing IT oversight.

4
Encryption
Encrypt customer information in transit and at rest, using industry-standard methods appropriate to the organization’s environment and risk profile.

✓ Encryption standards are applied across endpoints, cloud storage, and data in transit as part of standard security configuration.

5
Multi-Factor Authentication
Require MFA for any individual accessing customer information – including remote access to internal systems, email, and cloud platforms.

✓ MFA deployment and enforcement are managed across Microsoft 365 and all connected systems.

6
Secure Development Practices
Apply secure development practices when designing, developing, or procuring applications that access or transmit customer information.

✓ Vendor and application vetting procedures are established as part of IT governance practice.

7
Penetration Testing & Monitoring
Conduct penetration testing at least annually and maintain continuous monitoring of systems for unauthorized activity and security events.

✓ Annual third-party penetration testing is coordinated and monitoring is maintained through managed security services.

8
Vendor & Service Provider Oversight
Select and retain service providers that maintain appropriate safeguards, and include security requirements in contracts with vendors who access customer information.

✓ Vendor security review and contract requirements are part of IT governance and vendor coordination services.

9
Incident Response Plan
Implement a written incident response plan that defines roles, procedures, and communication protocols for detecting, containing, and recovering from security incidents.

✓ Incident response planning is developed and reviewed as part of security and continuity oversight, coordinated with Backup & Disaster Recovery planning.

A Structured Approach to FTC Safeguards Rule Compliance

The FTC Safeguards Rule is not a checklist exercise. Regulators evaluate whether an organization has a functioning, documented information security program — not simply whether individual controls exist.

For professional firms and regulated businesses, that distinction matters. A written risk assessment sitting in a folder, disconnected from actual IT practice, does not constitute a defensible compliance posture. Neither does MFA applied inconsistently, or vendor contracts that do not address security responsibilities.

Tera Partners provides managed IT services and IT security support that translate compliance requirements into operational practice — across access control, endpoint management, Microsoft 365 configuration, vendor oversight, documentation, and ongoing security review.

This work is delivered through a coordinated model that connects:

Tera Partners does not provide legal counsel or serve as a compliance attorney. The information on this page describes how structured managed IT services address the technical and operational requirements of the FTC Safeguards Rule. Organizations should work with qualified legal counsel on their specific compliance obligations.

Compliance Looks Different Across Regulated Industries

The Safeguards Rule applies the same core requirements to all covered organizations, but the operational context — the systems in use, the data being handled, the vendors involved, and the workflows at risk — differs significantly by industry. Tera Partners provides industry-specific IT support that reflects those differences.

Law Firm IT Security & Safeguards Compliance

Matter confidentiality, document management security, remote attorney access, and compliance with ABA Model Rule 1.6 and FTC Safeguards obligations.

Financial Services Firm IT Security

RIA and wealth management IT environments, SEC cybersecurity requirements, GLBA obligations, and secure client data handling for advisory and financial planning practices.

Accounting Firm IT Security & IRS Pub. 4557

Tax season IT readiness, written information security plan (WISP) support, IRS Publication 4557 requirements, and FTC Safeguards compliance for accounting practices.

Auto Dealership IT Security & Safeguards

DMS platform security, F&I data protection, FTC Safeguards Rule compliance for dealer financing operations, and network security for multi-system dealership environments.

If Your Organization Is Covered, the Conversation Is Worth Having

Request an introductory conversation