top of page
RCG Written Information Security Program
Today's businesses are expected to have policies and procedures around the security, confidentiality, and integrity of the data they are responsible for.
There is no question that data breaches can happen to any business. And if a data breach does occur, the organization will likely face client fallout, regulatory scrutiny, liability expense, and reputation risk. Every business, regardless of size or industry, should ensure that it has deployed appropriate and legally compliant data security measures.

To demonstrate conformity with applicable standards, organizations need to consider adopting a comprehensive written information security program (WISP). The WISP must contain certain minimum administrative, technical, and physical safeguards to protect personal information.
Preparing a WISP
At RCG, our Risk Advisory Team can assist in formulating and implementing a comprehensive written information security program that aligns with industry standards and regulatory requirements. Our delivery model will benefit your organization by accomplishing the following: 
  • Establish a process to identify and assess  foreseeable internal and external risks to the security, confidentiality, and integrity of any electronic, paper or other records containing personal information.
  • Evaluate the sufficiency of existing safeguards that are in place to control risks.
  • Design and implement policies and procedures that put safeguards in place to minimize those risks, and are consistent with customer expectations and compliance requirements.
  • Implement a maintenance program and checklist to monitor the effectiveness of those safeguards and to manage compliance. 
How Can We Help?
If there is any way we can help, please reach out to our Risk Advisory Team to discuss your situation. 

We provide the resources and expertise to help implement a WISP that will establish the necessary information security controls in a practical and cost-effective manner.
bottom of page