Table of Contents Table of Contents
Previous Page  137 / 284 Next Page
Information
Show Menu
Previous Page 137 / 284 Next Page
Page Background

HOT TOPICS

2017

MEMBERSHIP

DIRECTORY

122

devices for dealership business and accessing nonpublic personal information of consumers in doing so. The risk

assessment should identify the types of devices and security features available to select the best technical means

for program implementation, and develop the specific policies and procedures governing BYOD administration

and management. A good example is Multiple Device Management Software (MDMS) that controls all third-

party devices accessing your system and sends and receives information from the device securely. Lack of physical

control over the device should be high on the list for every dealership – the baseline assumption always is that

the device will be lost or stolen, or at the very least, accessible to unauthorized third parties. Placing tracking

devices on these devices if lost or stolen is a prudent security practice but may raise privacy concerns among

employees. Another good practice is to make it clear that intertwining business and personal communications on

one device creates a risk of personal information being exposed when parties are in litigation. A best practice is to

provide that the employer has the right and capability to wipe or erase all data remotely from any device used for

business purposes – and that means the device may be wiped entirely, including personal photos and contacts.

Dealerships also must consider various technical issues, which include the use of untrusted devices, wireless

networks, or applications; support for multiple mobile operating systems; installation of security patches and

software updates; and interaction with other systems for data synchronization and storage.

Consider the risks. The FTC entered into a consent decree with a dealer that encountered a breach of thousands of

consumers. The genesis of the breach was a P2P system installed on an employee’s home PC that the employee

used to access dealership customer nonpublic personal information and which thereby became available to other

users of the P2P network who were able to access the customer information as well. In 2014, hackers broke into a

national bank’s system through the personal

computer of an employee who was working from home. From there, the intruders reportedly were able to move

further throughout the network through the employee’s virtual-private-network connection. Vendors with access

to your customer information should be limited and monitored. A national retailer’s huge data security breach

occurred when a vendor using a compromised PC accessed the retailer’s systemwhich allowed a hacker to get into

the retailer’s system as well and create accounts and stealth utilities to steal data.

Employees may resist the implementation of security software and measures on their personal devices as well

as forced encryption of customer information in transit to and from the device and at rest on the device which

is a best practice. Dealerships also must detect and prevent “jail breaking” of the device where the employee

circumvents the organization’s security policies and measures, a practice that MDMS software can make more

difficult. Consider having the dealership provide remote devices to employees that you can centrally manage and

secure, subject to applicable state law.

FTC Consumer Report Information and Records Disposal Rule

The Disposal Rule requires persons who maintain or otherwise possess consumer report information for a business

purpose to properly dispose of such information by taking reasonable measures to protect against unauthorized

access to or use of the information in connection with its disposal. For example, paper records should be cross-

shredded, burned, or pulverized so the consumer information cannot be read. Consumer information must also

be destroyed or erased from all electronic media so that the information cannot be read or reconstructed. For PCs,

copiers, smartphones, tablets, and fax machines, this means not only deleting the information but wiping the

hard drive clean, as deleted information can remain on the hard drives of these digital devices even if the data is