Inori
FeaturesToolsPricing
Learn
GuidesStep-by-step tutorials and walkthroughs
GlossaryInsurance and compliance terminology
CompareSee how Inori compares to alternatives
Support
Help CenterFind answers and get support
ChangelogLatest updates and improvements
DemoSee Inori in action
Legal
PrivacyHow we handle your data
TermsTerms of service and usage
Blog
Sign InStart Free

Product

  • Features
  • Pricing
  • Tools
  • Demo

Resources

  • Help Center
  • Guides
  • Glossary
  • Compare

Company

  • About
  • Blog
  • Changelog
  • Contact

Legal

  • Privacy
  • Terms
  • DPA
  • Security

© 2026 Inori Inc.

  1. Home
  2. /Glossary
  3. /Written Information Security Program (WISP)

Written Information Security Program (WISP)

A formal, documented information security program required by Massachusetts regulation 201 CMR 17.00 for any entity that owns or licenses personal information about a Massachusetts resident — regardless of where the entity is located.

Overview

A Written Information Security Program (WISP) is a comprehensive, written set of administrative, technical, and physical safeguards an entity adopts to protect personal information. Massachusetts regulation 201 CMR 17.00, first issued in 2010 and still the most detailed prescriptive state security regulation in the US, requires any person or entity that "owns or licenses" personal information about a Massachusetts resident to develop, implement, and maintain a WISP.

The regulation is extraterritorial — it does not matter where the business is located, where the data is stored, or where the processing occurs. If a single Massachusetts resident's personal information is in the dataset, the full 201 CMR 17.00 apparatus applies.

The WISP must be appropriate to the size, scope, and type of business; the resources available; the amount of stored data; and the need for security. A two-person consultancy and a Fortune 500 financial institution are both required to have a WISP, but the content will look very different.

When It Applies

A WISP is required when all of the following are true:

  1. The entity is a person or entity (no size threshold)
  2. The entity owns or licenses (collects, processes, stores, or transmits) personal information
  3. The personal information is about a Massachusetts resident — the regulation is triggered by residency of the data subject, not by the location of the controller

"Personal information" under 201 CMR 17.02 is defined as a resident's first name or initial + last name combined with any of: Social Security number, driver's license number, state-issued ID number, financial account number, credit or debit card number (with or without a security code).

Required Elements of a WISP

Under 201 CMR 17.03 and 17.04, a compliant WISP must include:

ElementSpecific Requirement
Designated security officerOne or more individuals responsible for the program
Risk assessmentIdentification of foreseeable internal and external risks
Employee trainingRegular training on the WISP and appropriate practices
Access restrictionsLimit access on a need-to-know basis; immediate termination of departed personnel
Third-party oversightVerify that service providers apply comparable safeguards; written contracts
Regular monitoringOngoing review of safeguards; post-incident review; annual program review
Incident responseDocumented procedures for breach detection, response, and post-mortem
Encryption in transitRequired for personal information transmitted across public networks or wirelessly
Encryption at restRequired on portable devices (laptops, USB drives, backup tapes)
Authentication controlsSecure user authentication protocols; password management
System securityUp-to-date firmware, firewall protection, malware protection, patch management
Physical securityPhysical access controls to systems and records

Variations Across Jurisdictions

Massachusetts is unique in the prescriptive specificity of 201 CMR 17.00. Other states impose information-security obligations but at a higher level of abstraction:

JurisdictionSecurity LawPrescriptive?
Massachusetts201 CMR 17.00Yes — itemized control list
New YorkSHIELD ActPartial — requires "reasonable" administrative, technical, physical safeguards with examples
GeorgiaInsurance Data Security ActYes — for insurance licensees; follows NAIC Model Law
South CarolinaInsurance Data Security ActYes — for insurance licensees; follows NAIC Model Law
OhioData Protection Act (SB 220)Voluntary — safe harbor incentive, not obligation
California, Virginia, Colorado, 17 other comprehensive statesReasonable security clauseNo — general "appropriate" or "reasonable" standard

Massachusetts also couples 201 CMR 17.00 with chapter 93A — its consumer-protection statute — so violations can trigger treble damages via private action, making the WISP one of the more consequential security regulations in the country despite the relatively small state population.

How Inori Handles This

Because Inori's customer base includes commercial real estate operators with Massachusetts properties — and vendors, tenants, and certificate holders with Massachusetts residency — the platform processes personal information about Massachusetts residents and falls squarely within 201 CMR 17.00.

Grounding in code and policy:

  • Designated security officer — documented in src/content/legal/privacy.mdx v1.2 with a dedicated security@ contact.
  • Access restrictions — Supabase Row Level Security (supabase/migrations/002_rls_policies.sql) and app_tenant_id() enforcement (migration 012_harden_app_tenant_id.sql) limit access to authenticated users within their tenant scope.
  • Encryption — all traffic is TLS 1.2+; Supabase Cloud encrypts data at rest; Firebase App Hosting enforces HTTPS-only.
  • Authentication — Supabase Auth with session timeout and login-lockout per inori-security-audit-2026-04-12.md.
  • Third-party oversight — every subprocessor operates under a DPA with equivalent-safeguards language (see DPA).
  • Incident response — the breach-notification playbook in src/lib/incident/ meets the strictest state notice window and generates the documentation 201 CMR 17.03(2)(j) requires.
  • Monitoring and review — the error-catalog cron plus src/app/api/admin/errors provide the ongoing-monitoring evidence the regulation expects.

Related Concepts

A WISP is the security layer; the DPA is the contractual layer that extends WISP-equivalent obligations to processors. The WISP is a primary input to the security sections of a DPIA. In the insurance-vendor context, WISP posture is one of the safeguards an underwriter may evaluate when issuing or renewing the Certificate of Insurance — the two instruments together attest to the vendor's operational and cyber-risk readiness.

See how Inori handles written information security program (wisp)

Try our free COI checker first, or start a free trial of the full platform.

Free COI CheckerStart Free Trial

Related Terms

Data Processing Agreement (DPA)

A contract required by every US state privacy law between a controller and any processor that handles personal data on its behalf, binding the processor to specific security, confidentiality, and subprocessor obligations.

Sensitive Personal Information (SPI)

Categories of personal data that receive heightened protection under state privacy laws — including race, health, biometric, genetic, precise geolocation, sexual orientation, immigration status, and children's data — typically requiring opt-in consent.

Data Protection Impact Assessment (DPIA)

A documented risk analysis required before processing activities that present a heightened risk to consumers — such as profiling, targeted advertising, sale of personal data, or processing of sensitive categories.

Certificate of Insurance (COI)

A standardized document issued by an insurance agent or broker that provides evidence of insurance coverage, including policy types, limits, effective dates, and named parties.