All Resources
Privacy · 5 min read · April 8, 2026

201 CMR 17.00, explained for the people who have to comply with it.

Massachusetts's data security regulation is one of the oldest in the country, one of the shortest, and one of the most widely ignored — right up until a breach makes it suddenly very expensive. Here's a plain-language walkthrough, written for the people inside companies who actually have to carry it out.

201 CMR 17 compliance

Most Massachusetts companies we talk to treat 201 CMR 17.00 the way most people treat the emergency information card in an airline seat pocket. They know it exists. They assume someone more qualified has looked at it. They intend to review it at some point. They have never actually read it.

That was a defensible posture in 2012. It is not defensible now. The regulation has been in force since 2010, has survived intact through every wave of federal privacy legislation, and is the specific framework the Massachusetts Attorney General's office cites in breach notification letters and enforcement actions. It is also, despite the reputation, extremely readable. The entire regulation is about nine pages long.

Here's what it actually says, what it actually requires, and what most organizations miss.

Who it applies to.

Any person or entity — meaning any business, regardless of where it's headquartered — that owns or licenses personal information about a Massachusetts resident. That is it. The regulation is triggered by the presence of one record about one Massachusetts resident in your systems. You do not have to be a Massachusetts company. You do not have to do most of your business in Massachusetts. If you have one employee, one customer, or one applicant who lives in the Commonwealth, 201 CMR 17.00 applies to you.

"Personal information," for the purposes of the regulation, is specific. It means a Massachusetts resident's first name (or initial) and last name, in combination with at least one of: Social Security number, driver's license or state-issued ID number, or financial account number. Not email address. Not phone number. Not IP address. The triggering data set is narrow, but it is also the one most commonly implicated in actual identity theft.

Quick test

Does your HR system contain Massachusetts employees with SSNs? Does your customer database contain Massachusetts customers with stored credit card numbers? Does your applicant tracking system contain Massachusetts job seekers with driver's license numbers? If yes to any, 201 CMR 17.00 applies.

What it requires.

The regulation is built around one central obligation: every covered entity must develop, implement, and maintain a written Comprehensive Information Security Program — a WISP. That single document is the spine of the entire regulation. Every specific control the regulation requires is really an element that must appear in the WISP.

The WISP must include administrative, technical, and physical safeguards that are appropriate to the size of the organization, the amount of resources available, the nature of the data held, and the need for security. It is explicitly a risk-based regulation — the law does not demand that a fifteen-person professional services firm deploy the same controls as a Fortune 500 bank. It does demand that each of them have a written program that reflects the controls appropriate to their situation.

Specifically, a compliant WISP must include:

The technical requirements.

Section 17.04 of the regulation spells out the technical controls that a compliant WISP must include "to the extent technically feasible." These are the most specific, and the most frequently missed:

The regulation is not asking whether you have an information security program. It is asking whether you have a written one, kept up to date, that reflects these specific controls. Most companies have controls. Fewer have the document.

Where organizations actually fall short.

In the 201 CMR 17.00 compliance assessments we've run over the last two years, the pattern of non-compliance is consistent:

What a compliant WISP actually looks like.

A working WISP is not a 60-page document. It is a concise, specific, and operational document that answers the questions the regulation asks, in the language that an auditor — or an employee following it — can actually use. The best WISPs we've worked with are fifteen to twenty-five pages and read like an operating manual, not a legal brief.

It names the person responsible. It enumerates the kinds of personal information the business handles, and where. It lists the specific safeguards in place and maps each one back to the requirement it satisfies. It includes the incident response process, the training curriculum and cadence, the vendor oversight process, and the annual review schedule. It is, in other words, the real operating document for the security program — not a shelf document produced once and forgotten.

The organizations that get this right treat the WISP as a living document that tracks with the business. The ones that don't treat it as a compliance artifact and discover, during the post-breach inquiry, that it bears no resemblance to how the business actually runs. The distinction matters a great deal to the Attorney General's office, and it matters to cyber insurance underwriters, and it matters to the customers who read the incident notification letter.

The regulation has been in force for fifteen years. It is unlikely to be repealed. The cost of coming into compliance is almost always smaller than the cost of being caught out of compliance.


About Colossus. Colossus Technologies Group is a veteran-led data governance and cybersecurity firm headquartered in Boston. Our Data Governance practice includes 201 CMR 17.00 compliance assessments, WISP drafting, HIPAA program development, and AI governance framework design. This piece reflects the pragmatic approach we take with our Massachusetts clients.

This article is general information about Massachusetts's 201 CMR 17.00 regulation and is not legal advice. Organizations with specific compliance questions should consult with qualified counsel.

Need a WISP?

We draft and maintain WISPs for Massachusetts companies.

Current-state assessment, gap analysis, written program, and the operational controls to back it up. Fixed-fee engagements, typically four to six weeks.