Who needs a WISP, and why?

A Written Information Security Plan, or “WISP,” is essential for any organization that handles sensitive personal information. Here’s a quick breakdown of who needs a WISP and why, as well as a checklist to develop one:

Who needs a WISP?

  • Businesses handling personal information. Any business that collects, stores, or processes personal information.
  • Regulated industries. Sectors such as health care, insurance, finance, and education have additional federal and state regulations mandating robust information security measures.  For example, effective January 1, 2026, Alaska will require insurers licensed in that state to develop, implement, and maintain WISPs as part of their required risk assessment programs.
  • Entities reporting data breaches. In states like Massachusetts, entities must have a WISP on file when reporting a data security incident.

Why is a WISP important?

  • Legal and regulatory compliance. In jurisdictions where a WISP is required, the WISP can help entities avoid penalties and reduce liability by adhering to state and federal laws.
  • Risk management. A WISP can help the entity identify and mitigate potential security risks through regular assessments.
  • Incident response. A WISP will help to ensure that the entity has a clear plan for responding to data security incidents, as well as notification obligations that may arise from an incident.
  • Organizational alignment. A WISP will provide consistency across an organization’s departments on security protocols and responsibilities.

Checklist for developing a WISP

  • Oversight. Designate an information security officer or similarly qualified individual to oversee and coordinate a program that makes sense for your organization based on its size and the complexity of your business.
  • Risk Assessment. Identify potential internal and external threats and vulnerabilities in each of your organization’s operations that could result in unauthorized access, disclosure, misuse, alteration or destruction of sensitive data in the possession of your organization and the possession of your third-party vendors.
  • Documentation. Record the threats identified in your organization’s risk assessment in such areas as the security and confidentiality of sensitive information in its possession, employee training and management, data classification, vendor security, network design, and data storage. You should also record the safeguards that your organization has in place to manage, detect, prevent, and respond to security incidents. Develop and reference specific policies for each of these areas of concern.
  • Legal requirements. Consult with counsel to determine which laws and regulations apply to your organization, including your obligations in the event of a data security incident, so that your WISP complies with those requirements. You should also be aware of the consequences of non-compliance at both state and federal levels.

If you need assistance in developing a WISP, please contact any of the members of our Cybersecurity Team.

The Constangy Cyber Team regularly counsels businesses of all sizes and industries on how to comply with the growing number of data privacy laws and regulations. If you would like additional information on how to prepare your organization, please contact us at cyber@constangy.com.

*Edwin Jones is a paralegal in the Cybersecurity Practice Group.

  • Lauren Godfrey wearing a gray blazer over a white top, accessorized with a cross necklace and drop earrings, arms crossed, posed against a light blue and white geometric background.
    Partner

    Lauren guides clients through data security incidents, leading initial assessments and coordinating forensic and remediation efforts to contain, investigate, and resolve issues. She helps clients develop privacy, incident ...

The Constangy Cyber Advisor posts regular updates on legislative developments, data privacy, and information security trends. Our blog posts are informed through the Constangy Cyber Team's experience managing thousands of data breaches, providing robust compliance advisory services, and consultation on complex data privacy and security litigation. 

Search

Get Updates By Email

Subscribe

Archives

Jump to Page

Constangy, Brooks, Smith & Prophete, LLP Cookie Preference Center

Your Privacy

When using this website, Constangy and certain third parties may collect and use cookies or similar technologies to enhance your experience. These technologies may collect information about your device, activity on our website, and preferences. Some cookies are essential to site functionality, while others help us analyze performance and usage trends to improve our content and features.

Please note that if you return to this website from a different browser or device, you may need to reselect your cookie preferences.

For more information about our privacy practices, including your rights and choices, please see our Privacy Policy. 

Strictly Necessary Cookies

Always Active

Strictly Necessary Cookies are essential for the website to function, and cannot be turned off. We use this type of cookie for purposes such as security, network management, and accessibility. You can set your browser to block or alert you about these cookies, but if you do so, some parts of the site will not work. 

Functionality Cookies

Always Active

Functionality Cookies are used to enhance the functionality and personalization of this website. These cookies support features like embedded content (such as video or audio), keyword search highlighting, and remembering your preferences across pages—for example, your cookie choices or form inputs during submission.

Some of these cookies are managed by third-party service providers whose features are embedded on our site. These cookies do not store personal information and are necessary for certain site features to work properly.

Performance Cookies

Performance cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.

Powered by Firmseek