Power Up Boston
WISP Template
MA 201 CMR 17.00
2025

Written Information Security Program (WISP)

[YOUR COMPANY NAME]

Document Version: [1.0]  |  Effective Date: [DATE]  |  Last Reviewed: [DATE]

⚠️ Legal Disclaimer: This template is provided for informational purposes only and does not constitute legal advice. It is designed to help small businesses create a Written Information Security Program that addresses the requirements of Massachusetts 201 CMR 17.00. You should consult with a qualified attorney to ensure your WISP meets all applicable legal requirements for your specific business and industry. Power Up Boston is an IT services provider, not a law firm.

1. Purpose & Scope

The purpose of this Written Information Security Program ("WISP") is to establish and maintain a comprehensive information security program for [YOUR COMPANY NAME] ("the Company") that contains administrative, technical, and physical safeguards to protect the personal information of Massachusetts residents, in compliance with Massachusetts General Laws Chapter 93H and 201 CMR 17.00.

This program applies to all employees, contractors, temporary workers, volunteers, and third-party service providers who access, collect, store, use, transmit, or dispose of personal information on behalf of the Company.

Personal Information (PI) as defined by MA law includes a Massachusetts resident's first name and last name (or first initial and last name) in combination with any one or more of the following:

The Company handles personal information in the following systems and processes: [LIST YOUR SYSTEMS — e.g., payroll, HR records, customer database, accounting software, paper files]

2. Designated Security Coordinator

The following individual has been designated as the Company's Data Security Coordinator, responsible for implementing, supervising, and maintaining this WISP:

The Data Security Coordinator is responsible for:

In the absence of the Data Security Coordinator, [BACKUP PERSON NAME, TITLE] will assume these responsibilities.

3. Risk Assessment

The Company shall conduct an annual risk assessment to identify and evaluate reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of personal information. This assessment shall include:

3.1 Internal Risks

3.2 External Risks

3.3 Risk Mitigation

Following each risk assessment, the Data Security Coordinator shall document identified risks and implement appropriate safeguards to mitigate them. The most recent risk assessment was completed on [DATE] and is maintained as a separate document on file.

4. Access Controls

Access to personal information shall be restricted to those employees and service providers who require it to perform their job duties. The Company implements the following access controls:

5. Data Handling & Storage

5.1 Data Collection

The Company shall collect only the minimum amount of personal information reasonably necessary for its business purposes. PI is collected through the following channels: [e.g., employment applications, customer intake forms, payroll processing].

5.2 Data Storage

5.3 Data Transmission

Personal information transmitted over public networks (including the internet and email) shall be encrypted using industry-standard encryption protocols (TLS 1.2 or higher). PI shall never be transmitted via unencrypted email.

5.4 Data Disposal

When personal information is no longer needed for its business purpose or required to be retained by law, it shall be disposed of in a manner that ensures it cannot be read or reconstructed:

6. Employee Training

All employees who have access to personal information shall receive security awareness training:

Training shall cover, at minimum:

Training completion shall be documented and records retained by the Data Security Coordinator. Employees who fail to complete required training within [30] days of the due date shall have their access to PI suspended until training is completed.

7. Incident Response

7.1 Definition

A security incident is any event that compromises or may compromise the security, confidentiality, or integrity of personal information maintained by the Company.

7.2 Reporting

All employees must immediately report suspected security incidents to the Data Security Coordinator at [PHONE / EMAIL]. "Immediately" means as soon as the employee becomes aware — not at the end of the day, not after trying to fix it themselves.

7.3 Response Procedures

  1. Contain: Immediately take steps to limit the scope of the incident (isolate affected systems, disable compromised accounts, change passwords)
  2. Assess: Determine what PI was involved, how many individuals were affected, and the likely cause of the breach
  3. Notify: If a breach of PI is confirmed, notify the Massachusetts Attorney General's Office and the Office of Consumer Affairs and Business Regulation as required by M.G.L. c. 93H, § 3. Affected individuals must also be notified.
  4. Remediate: Implement corrective actions to prevent recurrence
  5. Document: Maintain a written record of the incident, investigation, and response actions taken

7.4 Breach Notification Requirements (MA Law)

Under M.G.L. c. 93H, notification must be made "as soon as practicable and without unreasonable delay." Notification must include:

8. Third-Party Service Providers

The Company shall take reasonable steps to ensure that third-party service providers with access to PI are capable of maintaining appropriate security measures consistent with 201 CMR 17.00. This includes:

Current third-party service providers with access to PI include: [LIST — e.g., payroll processor, cloud hosting provider, IT managed services provider, accounting firm]

9. Physical Security

The Company maintains the following physical safeguards to protect PI:

10. Document Retention & Destruction

The Company shall retain personal information only for as long as there is a legitimate business need or legal requirement to do so. The following retention periods apply:

Records that have exceeded their retention period shall be securely destroyed in accordance with Section 5.4 of this WISP.

11. Technical Security Measures

The Company implements the following technical safeguards:

12. Review & Updates

This WISP shall be reviewed and updated:

All revisions shall be documented with the date of the revision and a summary of changes made.

Acknowledgment & Signatures

By signing below, the undersigned acknowledge that they have read, understand, and agree to comply with this Written Information Security Program.

Data Security Coordinator — Signature
Printed Name & Title
Date
Company Owner / Executive — Signature
Printed Name & Title
Date
📚 Regulatory References • Massachusetts 201 CMR 17.00 — Standards for the Protection of Personal Information of Residents of the Commonwealth
• Massachusetts General Laws Chapter 93H — Security Breaches
• Massachusetts General Laws Chapter 93I — Disposal of Records Containing Personal Information
• NIST Cybersecurity Framework (CSF) 2.0
• Massachusetts Attorney General's Data Breach Notification Form: mass.gov/ago/data-breach

Need Help Completing Your WISP?

Filling in the blanks requires understanding your actual IT environment. We'll audit your systems, identify gaps, and help you complete a WISP that actually reflects your security posture — not just a template you filed away.

Book a Free WISP Consultation →