Protecting Customer Information: the Safeguards Rule - Tire Review Magazine

Protecting Customer Information: the Safeguards Rule

The Federal Trade Commission (FTC) enacted Standards for Safeguarding Customer Information on May 23, 2003. By now, most dealerships should have implemented their information security programs and taken steps to ensure compliance with the Safeguards Rule. If you have not, we recommend taking steps to get in compliance immediately. If you have, it’s still important to periodically review and assess your program to ensure you remain in compliance.

President Clinton signed the Gramm-Leach-Bliley Act into law on Nov. 12, 1999. In addition to reforming the financial services industry, the GLB Act included provisions for how “financial institutions” should share and protect their customers’ non-public personal information.

As a result of its passage, the GLB Act required the FTC and other government agencies that regulate financial institutions to implement regulations to carry out the GLB Act’s provisions. The regulations required all covered businesses to be in full compliance by July 1, 2001.

The FTC first issued the Privacy of Consumer Financial Information Rule to address provisions in the GLB Act about how customer information is shared. The Privacy Rule defines “consumers” and “customers” and deals with how you share information about customers who obtain or apply for credit or lease products from you.

Following the Privacy Rule, the FTC then enacted the Safeguards Rule to address provisions in the GLB Act regarding how customer information is protected. The Safeguards Rule deals with how you protect information about your finance and lease customers.

Who Must Comply
The definition of “financial institution” includes many businesses that may not normally describe themselves that way. In fact, the Safeguards Rule applies to all businesses, regardless of size, that are “significantly engaged” in providing financial products or services – including serving as the middle man in credit applications. While the FTC has never defined the phrase “significantly engaged,” you should consider yourself “significantly engaged” in financial activities for purposes of the Safeguard Rule if you regularly provide installment sale and/or lease financing to consumers, even if you immediately assign sales and lease contracts to bank or finance company.

Objectives of the Safeguards Rule
In order to understand the objectives of the Safeguards Rule, it’s important to recognize why the GLB Act required the FTC and other government agencies to enact rules to protect sensitive customer information.

Identify theft and customer data breaches are now commonplace, with stories found frequently in the news. In one case several years ago, an employee of a software vendor, who provided services to the three national credit agencies, sold customer information to identity thieves. At last report, authorities knew of at least 30,000 victims and an estimated $2.7 million in losses.

Consider the amount of current and historical customer data your business has accumulated over the years. It could be stored in paper format in a file drawer, or digital format on a computer hard drive. Now consider how safe and secure that information is. The objective of the Safeguards Rule is to:

1. Ensure the security and confidentiality of customer information

2. Protect against any anticipated threats or hazards to the security or integrity of such information

3. Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer

Assess Your Compliance
The Safeguards Rule requires companies to develop and implement an information security program. As part of the program, each company must:

• Have a written information security plan that describes the actions and steps your business will take to protect customer information. The Safeguards Rules specifies the size of your plan should be appropriate to your dealerships’ size and complexity, the nature and scope of its activities, and the sensitivity of the customer information at issue

• Designate one or more employees to coordinate your security plan. These employee(s) should be documented in your written security plan, and aware that they have been so designated. In addition, it is recommended you update the written plan coordinators names in the security plan as personnel changes.

• Identify and assess the risks to customer information in each relevant area of your organization’s operation. In addition, you should evaluate the effectiveness of current safeguards for controlling these risks at reasonable intervals.

• Routinely monitor and test their information security program.

• Select appropriate service providers and require them, by contract, to implement safeguards that are appropriate to their organization in protecting consumer information.

• Evaluate all aspects of your program from time to time, to make appropriate adjustments and to explain why you believed the adjustments were appropriate.

Securing Information
The Safeguards Rule requires that you consider risks to customer information in all areas of your operation, with special emphasis on three critical areas: Employee Training and Management; Information Systems; and Detecting and Managing System Failures.

Please refer to the full Safeguards Rule, referenced at the end of this bulletin, for the complete content and practices to be implemented.

Employee Training and Management
The success or failure of your information security program depends largely on the employees who implement it. Some best practices to consider:

• Check references prior to hiring employees who will have access to customer information.

• Ask every new employee to sign an agreement to follow your organization’s confidentiality and security standards for handling customer information.

• Train employees to take basic steps to maintain the security, confidentiality and integrity of customer information, such as:

– Locking rooms and file cabinets where paper records are kept.

– Using strong passwords, at least eight characters long.

– Encrypting sensitive customer information when it is transmitted electronically over networks or stored online.

– Referring calls or other requests for customer information to designated individuals who have had safeguards training.

• Regularly instruct and remind all employees of your organization’s policy – and the legal requirement – to keep customer information secure and confidential. You may want to provide employees with a detailed description of the kind of customer information you handle (name, address, account number, and any other relevant information) and post reminders about their responsibility for security in areas where such information is stored.

• Limit access to customer information to employees who have a business reason for seeing it. For example, grant access to customer information files to employees who respond to customer inquiries, but only to the extent they need it to do their job.
 
Information Systems: Information systems include network and software design, and information processing, storage, transmission, retrieval, and disposal. Below are some suggestions on how to maintain security throughout the life cycle of customer information – that is, from data entry to data disposal:

• Store records in a secure area. Make sure only authorized employees have access to the area. For example:

– Store paper records in a room, cabinet, or other container that is locked when unattended.

– Store electronic customer information on a secure server that is accessible only with a password – or has other security protections – and is kept in a physically secure area.

– Don’t store sensitive customer data on a machine with an Internet connection.

– Maintain secure backup media and keep archived data secure, for example, by storing off-line or in a physically secure area.

• Provide for secure data transmission (with clear instructions and simple security tools) when you collect or transmit customer information. Specifically:

– If you collect information directly from consumers, make secure transmission automatic. Caution consumers against transmitting sensitive data, like account numbers, via electronic mail.

– If you must transmit sensitive data by electronic mail, ensure that such messages are password protected so that only authorized employees have access.

• Dispose of customer information in a secure manner and, where applicable, consistent with the FTC’s Disposal Rule, ftc.gov/os/2004/11/041118disposalfrn.pdf. For example:

– Hire or designate a records retention manager to supervise the disposal of records containing nonpublic personal information.

– Shred or recycle customer information recorded on paper and store it in a secure area until a recycling service picks it up, and promptly dispose of outdated customer information.

• Use appropriate oversight or audit procedures to detect the improper disclosure or theft of customer information.

Managing System Failures: Effective security management includes the prevention, detection and response to attacks, intrusions or other system failures. Consider the following suggestions:

• Maintain up-to-date and appropriate programs and controls by:

– Following a written contingency plan to address any breaches of your physical, administrative or technical safeguards.

– Checking with software vendors regularly to obtain and install patches that resolve software vulnerabilities.

– Using anti-virus software that updates automatically.

– Maintaining up-to-date firewalls, particularly if you use broadband Internet access or allow employees to connect to your network from home or other off-site locations.

– Providing central management of security tools for your employees and passing along updates about any security risks or breaches.

• Take steps to preserve the security, confidentiality and integrity of customer information in the event of a computer or other technological failure. For example, back up all customer data regularly.

• Maintain systems and procedures to ensure that access to nonpublic consumer information is granted only to legitimate and valid users.

• Notify customers promptly if their nonpublic personal information is subject to loss, damage or unauthorized access.


Additional Resources
• Safeguards Rule: www.ftc.gov/os/2002/05/67fr36585.pdf

• How to Comply With the Safeguards Rule: business.ftc.gov/documents/bus54-financial-institutions-and-customer-information-complying-safeguards-rule

• NADA “A Dealer Guide to Safeguarding Customer Information”: www.nada.org/NR/rdonlyres/3034050F-0D43-4E69-9AD3-85C39959F89E/0/SafeguardingCustomerInfo.pdf

• Privacy Rule: www.ftc.gov/os/2000/05/65fr33645.pdf

• How to Comply With the Privacy Rule: business.ftc.gov/documents/bus67-how-comply-privacy-consumer-financial-information-rule-gramm-leach-bliley-act

• Privacy Rule FAQs for Auto Dealers: business.ftc.gov/documents/bus64-ftcs-privacy-rule-and-auto-dealers-faqs

• Gramm-Leach-Bliley Act: www.gpo.gov/fdsys/pkg/PLAW-106publ102/pdf/PLAW-106publ102.pdf

• Bureau of Consumer Protection – GBL Act: business.ftc.gov/privacy-and-security/gramm-leach-bliley-act

 


For more information about this topic, contact the Zurich Risk Engineering Department at 800-821-7803. For more information on any of Zurich’s products or services, visit zurichna.com/zdu. Copyright 2011
Zurich American Insurance Co.

You May Also Like

Tire Industry Labor Shortage: Improve This to Keep Employees

I’ve spoken to many representatives from manufacturers, wholesalers and retailers who report that techs, counter people, drivers and even white-collar team members have walked off the job, failed to report, or given notice, and their businesses have been impacted by these departures. This isn’t just a tire industry issue—and goes beyond the tech shortage that

Tire Industry-Labor Shortage-Great-Resignation

I’ve spoken to many representatives from manufacturers, wholesalers and retailers who report that techs, counter people, drivers and even white-collar team members have walked off the job, failed to report, or given notice, and their businesses have been impacted by these departures. This isn’t just a tire industry issue—and goes beyond the tech shortage that has plagued the industry for decades.

Consider Software Solutions to Streamline Operations

Representatives from several software providers share how solutions drive efficiency and profitability, as well as what to look for when considering a system in your shop.

software-solutions-stock
How Data, Analytics Can Boost Profitability for Tire Retailers

By collecting and analyzing data about a dealer’s sales history, inventory levels and market demand, data and analytics platforms can analyze the performance of each dealer’s store and recommend actionable improvement opportunities.

How to Start the PPP Loan Payback Process

For many PPP loan recipients, it is time to start the repayment process—or file for PPP loan forgiveness. Read on to find out which portion of your loan may be forgivable and how to apply for forgiveness, as well as how to start the repayment process.

Creating a Positive Work Environment

Larry Sutton of RNR Tire Express shares seven different practices that have helped him create a positive work environment.

Other Posts

How a growing legalized cannabis market affects the tire industry

Since cannabis is a sensitive product, maintaining a consistent and controlled temperature during transportation is crucial.

Cannabis-Tires-Driving-1400
Michelin prevails in IP lawsuit over Chinese KO2 imitation

A Canadian court awarded damages to Michelin over Wideway’s infringement of BFGoodrich tread IP.

Lawyer-stock
TIA Pens Letter to President Biden on Supply Chain Solutions

In the letter, the Tire Industry Association asked the administration to work with its industries to address supply chain-related issues.

Using Data to Enrich the Customer Experience

Attaching data or a number to a vehicle’s service record adds a level of transparency to the discussion, and moves it from an “opinionated upsell” to a true, fact-based service need.

Coats Tread Depth Data