Table of Contents Table of Contents
Previous Page  142 / 266 Next Page
Information
Show Menu
Previous Page 142 / 266 Next Page
Page Background

HOT TOPICS

2016

MEMBERSHIP

DIRECTORY

127

i. Put procedures in place to keep your security current and address vulnerabilities that may arise

– Have a detailed security incident response program included in your Safeguards policy. Update

your security software and procedures on a regular basis.

j. Secure paper, physical media, and devices – Prevent NPI from being downloaded or copied onto

remote devices like USBs or external hard drives. View-only access to NPI on a segregated server is

a best practice.

Create a culture of security in your dealership and get senior management buy-in. Limit permissions

to access customer information to only those persons who need access to perform their jobs; require

passwords to contain letters, symbols and numbers and be changed frequently. Know the flow of

information that enters your system and monitor for any unusual data flows in or out. These may be

signs that a hacker has entered your system and is compromising security. Keep logs of who accesses

customer information and when they do so for both electronic and paper files. Train your employees on

the importance of safeguarding customer information. Do not leave credit apps or credit reports out in

the open or in unsecured file drawers. Consider using processes that can determine if your employees are

actually following the policies and procedures in your Information Security Program. Regularly review

access logs of the consumer information records and follow up promptly if you see any unusual spikes

in any employee or other user accessing customer files. Lock down files at night and on weekends and

implement a “clean desk” policy that requires all paper documents containing customer information to

be locked up when not in use. The FTC fined a dealer in Georgia $30,000 for having documents containing

customer information located in plain sight on a salesperson’s desk.

Create an Information Security Program that details how you safeguard and securely dispose of all your

consumer information. Include a detailed data security incident and security breach response plan in the

Information Security Program. Follow FTC guidelines for Information Security Programs and know your

state’s law on use, communication and display of Social Security numbers and consumer notification

requirements in the event of a data breach. Avoid storing consumer information longer than is necessary

or allowing access using widely-known simple passwords. Make sure your dealership’s Information

Security Program includes detailed provisions for the secure disposal of consumer information, both

paper and electronic. Train and re-train employees, perform stress tests to evaluate your systems

regularly and update provisions as required. Destroy hard drives and flash drives on computers, copiers,

fax machines and wireless devices using industry standard procedures before discarding them or trading

them in for replacements. Disable USB flash memory drives. Try to store customer information only in

secure central servers and preclude the ability to download it. Some states (for example, Massachusetts)

require that customer information contained on laptops, tablets, cell phones and other remote devices

must be encrypted. Massachusetts and Nevada also require personal information about residents

be encrypted in transmissions, which is a best practice in any event and required for credit card data

transmission.

Manage user permissions to give customer information access only to those employees and service

providers having a legitimate business need and give them only the permissions they need. More than

half of all identity theft originates in the workplace according to a recent study. In addition to negligently

making customer information available for theft by outsiders, employees can and do steal customer

information and sell it to identity thieves. So it is critical that you keep event access logs of those

persons who access your customer information in both paper and electronic files. Review the access logs

2

3

4