Skip to main content
FTC Safeguards Rule Coverage for Florida Insurance Agencies — Why Most Agencies Don't Realize They're Covered (and What to Do About It)
← Back to Blog
Cybersecurity

FTC Safeguards Rule Coverage for Florida Insurance Agencies — Why Most Agencies Don't Realize They're Covered (and What to Do About It)

May 14, 20268 min readSteve Condit — Founder, Simply IT
Cybersecurity
FTC Safeguards Rule Coverage for Florida Insurance Agencies — Why Most Agencies Don't Realize They're Covered (and What to Do About It)

Most Florida insurance agency principals heard “FTC Safeguards Rule” for the first time when an enforcement letter landed at a competitor in 2024 or 2025. The Rule covers “financial institutions” — a term that, in 16 CFR 314.2, the FTC defines so broadly it sweeps in nearly every independent insurance agent, broker, and producer in the state. If your agency collects social security numbers, drivers’ licenses, dates of birth, financial account information, or claims history, you are a financial institution under federal law — whether you call yourself one or not. Here’s the 9-element WISP applied to insurance, what an FTC investigation actually looks like in 2026, and how to close the gap before enforcement finds you. For the line-by-line implementation reference, read our FTC Safeguards implementation pillar guide (written for CPA firms but the framework is identical for any covered financial institution).

9
Required WISP elements
16 CFR 314
Governing regulation
$100K+
Civil penalty per violation
$50M
Recent FTC settlement totals

Why Insurance Agencies Are Covered — The Definition Most Agencies Miss

The trap is the word “financial institution.” Most Florida agency owners hear that phrase and picture banks. The FTC’s definition at 16 CFR 314.2(h) is far broader: any business that engages in activities “financial in nature” as listed in section 4(k) of the Bank Holding Company Act. The activities expressly listed include insurance underwriting and insurance agency activity. The FTC’s 2023 amendment and the Commission’s plain-English guidance confirm that the following Florida businesses are all financial institutions under the Rule:

  • Independent P&C agencies: auto, home, commercial, umbrella — whether captive or independent.
  • Life and annuity agents: writing applications that capture SSN, DOB, beneficiaries, medical history, financial information.
  • Health agents and Medicare brokers: Marketplace plans, MAPD, Med Supp, group health — especially Medicare Advantage which collects extensive PHI alongside financial data.
  • Employee-benefits brokers: handling SSN, DOB, dependent data, and financial elections for group clients.
  • Surplus-lines brokers and MGAs: any role in the application chain that touches consumer financial information.
  • Premium-finance affiliates: almost universally covered — this is core consumer financial activity.

The narrow exemption (fewer than 5,000 consumers’ nonpublic personal information) helps almost no Florida agency. A 3-person personal-lines shop in The Villages crosses 5,000 in less than a year. If you’re reading this and wondering whether you’re covered, the safe assumption is yes.

The Specific Data Triggers Inside an Insurance Agency

The Rule attaches to “customer information” — any record about a consumer that contains nonpublic personal information. Inside a typical Florida agency, that includes:

  • SSNs collected on life applications, group enrollments, Medicare apps
  • Drivers’ license + DOB captured for auto quotes and MVR pulls
  • Financial-account numbers used for premium-finance authorizations and EFT setup
  • Claims history pulled from CLUE/A-PLUS during quoting
  • Medical information collected for life underwriting (HIPAA may also apply here)
  • Beneficiary SSNs and dates of birth captured for life and annuity policies

The 9 WISP Elements Applied to a Florida Insurance Agency

The Rule requires a written information security program (WISP) with 9 specific elements. Here’s how each lands for an insurance agency in practice:

01
Qualified Individual
A named single individual responsible for the program. Usually the agency principal or the operations manager. Cannot be a generic title or a committee. Put it in writing and have it signed.
02
Written Risk Assessment
Document the customer information you collect, where it lives, who can access it, and what threats apply (BEC, ransomware, lost laptop, vendor breach, insider misuse). Reassessed annually.
03
Safeguards Implementation
MFA on AMS (AMS360, Applied Epic, EZLynx, NowCerts, HawkSoft), MFA on email, encryption of laptops and mobile devices, role-based access controls, secure disposal of paper applications and old hard drives.
04
Staff Security Training
Annual training for all staff who touch customer information. Topics include phishing, BEC, social engineering on carrier portals, secure handling of paper apps, locked screens at workstations.
05
Service-Provider Oversight
Inventory every vendor that touches customer info: AMS host, comparative rater, carrier portals, e-signature, payment processor, MSP, cloud backup. Confirm each has appropriate contractual security commitments and conduct periodic oversight.
06
Program Updates
Reassess and update the WISP whenever the agency materially changes — new office, new AMS, new product line, post-incident, after the annual risk assessment.
07
Incident Response Plan
Written IR plan covering detection, response, recovery, and notification. For Florida, layer in the state breach-notification statute (FS 501.171) which has a 30-day notice requirement.
08
Annual Board Report
For incorporated agencies and LLCs with a governing board, the Qualified Individual reports annually on the state of the program, material risks, results of testing, and recommended improvements.
09
Continuous Monitoring OR Annual Pen Test + Biannual Vulnerability Scans
Pick one. Continuous monitoring (a managed EDR/SIEM stack) is generally easier for small agencies than coordinating annual penetration testing and biannual vulnerability scanning.
“Most independent agencies we audit have 3 or 4 of the 9 elements partially in place. The missing 5 or 6 are where the FTC’s enforcement leverage lives.”
Steve Condit, Simply IT

What an FTC Investigation Actually Looks Like in 2026

The FTC almost never shows up unannounced. The trigger is usually one of three things: a consumer complaint, a breach notification under state law that the FTC then picks up, or a referral from a state regulator (in Florida, the Department of Financial Services). Once an investigation is opened, the sequence is:

  • Data call: The FTC requests written copies of your WISP, your risk assessment, your training records, your IR plan, vendor list with executed security agreements, and access logs for the period under review. Response time: typically 30 days.
  • Document review: The Commission’s technology counsel reviews everything and identifies gaps. If your WISP is missing 4 of 9 elements, that’s 4 separate findings on the record.
  • On-site or remote interviews: Interviews with the Qualified Individual, the agency principal, IT staff (or MSP), and sometimes line staff to verify the WISP actually reflects how the agency operates.
  • Consent order: Most enforcement ends in a consent order requiring 20 years of audited compliance, mandatory annual reporting to the FTC, and civil penalty. Recent settlements have hit $5M-$50M for larger institutions; small agencies typically see six-figure penalties plus the long-tail compliance cost.

The Three Areas Insurance Agencies Almost Always Fail

After remediating dozens of Florida agencies, three failures show up almost universally:

  • Vendor inventory of carrier portals: Producers log into 30+ carrier portals across the year. Each one is a service-provider relationship under Element 5. Almost no agency has documented oversight of those portals.
  • MFA on the AMS: Many AMS platforms still default to password-only. Element 3 requires MFA on systems containing customer information. This is fixable in a day — almost no agency has done it.
  • Written incident response plan: Element 7 requires a written plan. “We’d call our MSP” isn’t a plan. The written plan has to cover detection criteria, decision rights, notification triggers (including the FS 501.171 30-day clock), and post-incident review.
// Florida DFS Overlay
The Florida Department of Financial Services has its own cybersecurity expectations for licensed agents and adjusters under FS Chapter 626 and related administrative code. The DFS framework layers on top of FTC Safeguards — it doesn’t replace it. Compliance with one doesn’t satisfy the other. Build a WISP that satisfies both, document it once, present it from whichever side is asking.
// Key Takeaway
Almost every Florida insurance agency is a “financial institution” under FTC Safeguards. The 9-element WISP is the price of admission for 2026 enforcement, and most agencies have 3-4 of 9 partially in place. The fastest path to closure is: name the Qualified Individual, deploy MFA on the AMS and email, inventory the carrier portals and vendors, write the IR plan, and document the whole thing. 60-90 days for most agencies. Then you’re defensible.
Read the FTC Safeguards Pillar Guide →
Steve Condit — Founder of Simply IT, Ocala FL
// Written By
STEVE CONDIT
Founder & Owner, Simply IT · US Marine Veteran · 30+ Years IT Experience

Steve Condit founded Simply IT to bring enterprise-grade IT management to small and mid-sized businesses across North Central Florida. With over 30 years of IT experience and a background in the US Marine Corps, Steve built Simply IT around the principle that local businesses deserve the same quality of technology partnership that large companies take for granted — without long-term contracts or national call center support.

// More From Cybersecurity

KEEP READING

Blog Article · Cybersecurity
Real-Estate Closing Wire Fraud — The #1 BEC Pattern Hitting Florida Law Firms in 2026 and the Documented Defense
Florida real-estate closings remain the highest-value, highest-frequency target for business email compromise (BEC) in 2026 — a...
May 14, 2026 · 9 min read
Read →
Blog Article · Cybersecurity
When Does a Small Business Need a vCIO? The 5 Signals That Mean You've Outgrown Pure Helpdesk IT
By the time most North Central Florida small businesses realize they need strategic IT leadership, they've already paid for it ...
May 14, 2026 · 7 min read
Read →
Blog Article · Cybersecurity
Run Your Florida Business's Hurricane IT Tabletop Exercise — The 90-Minute Pre-Season Drill
Most Florida small businesses 'have' a hurricane plan — until the storm actually hits and nobody can remember where the generat...
May 14, 2026 · 8 min read
Read →
// Continue Reading

RELATED SOLUTIONS & SERVICE AREAS

SolutionCybersecurity ServicesSolutionSecurity Awareness TrainingService AreaManaged IT in Ocala, FLService AreaManaged IT in Gainesville, FL

READY TO SOLVE YOUR IT CHALLENGES?

Get a free technology assessment and find out exactly where your business stands.

Get a Free Assessment →See Our Pricing →