Encrypting NPI in Transit & the Safeguards Rule

Posted by

on

In the ever-evolving world of digital communication, protecting Non-Public Personal Information (NPI) remains a paramount concern for businesses. The Federal Trade Commission’s (FTC) revised Safeguards Rule (Rule) underscores the importance of secure information transit. In response, ComplyAuto has been hard at work creating innovative solutions to address these evolving challenges. We’ll spend some time discussing the Rule’s actual requirements as well as our newest solution that answers the question, “How do I deal with sending and receiving sensitive customer information?” 

What is Encryption In-Transit? 

The Rule requires financial institutions to encrypt NPI “in transit” over external networks. Encryption in transit refers to the practice of encrypting data while it is being transmitted over a network. When data is sent from one point to another, such as between a user’s device and a server, encryption in transit ensures that the data is protected from unauthorized access or interception during its journey. This is commonly achieved by using protocols like Transport Layer Security (TLS) or Secure Sockets Layer (SSL) to encrypt the data while it’s in transit. The good news is that almost all enterprise email accounts will have this enabled by default, and it’s usually free. Indeed, the FTC has noted that it would be “unusual” in today’s environment for a business to not be satisfying this requirement with respect to emails. 

It’s important to note that the Rule does not require “end-to-end encryption”, which provides a higher level of security by encrypting data at the source (sender) and decrypting it only at the destination (receiver). End-to-end encryption, usually accomplished by special tools that come at a cost, ensures that the data remains encrypted and unreadable to anyone in between, including service providers or intermediaries. However, even though not required by the Rule, we’ll discuss below why using tools with end-to-end encryption may be a best practice under certain circumstances. 

The Pitfalls of Regular Email and Text Messages for NPI

Commonly used communication channels like email and text messaging pose significant challenges to the safe transmission of NPI. They lack proper encryption and can be intercepted by unauthorized individuals (i.e., “man-in-the-middle” attacks) making them unsuitable tools for the safe and secure transmission of sensitive information. This concern directly affects dealership sales & finance teams (as well as other departments) who often need to send and receive sensitive customer information such as driver’s licenses, social security numbers, insurance information, proof of residence, proof of income, and credit applications.

Secure Communication Alternatives

Fortunately, there are secure alternatives that are widely available to anyone who looks for it. Microsoft Office 365, for example, offers a built-in end-to-end encryption tool that provides an extra layer of protection for the dealership’s email messages. This encrypted email service ensures that only the intended recipient can read the email content and its attachments, thereby aligning with the requirements of the Safeguards Rule. Moreover, numerous other tools on the market offer similar protection. Regardless of the solution the dealership chooses, it is crucial to remember that an encrypted communication tool is only as good as its usage policy. Meaning, giving your employees access to the “best in breed” solutions will do nothing to reduce the dealership’s risk of data breaches if the employees don’t use it.

Electronic Use Policy

To ensure secure communication, it is imperative to implement an Electronic Use Policy that prohibits employees from sending or requesting NPI via unencrypted email and text messages. By using ComplyAuto’s free electronic use policy builder, dealerships will reduce the risk of data breaches because the policy the dealership will create sets out clear guidelines for employees on the safe and acceptable use of electronic communication. The policies ComplyAuto’s tool creates are tailored for  the Safeguards Rule and other similar regulations across all 50 states. Dealers are now able to easily create a comprehensive, legally sound policy that can protect the company and its sensitive information.

ComplyAuto’s Innovative Encrypted Email Messaging Tool

To further strengthen the protection of NPI, ComplyAuto is developing its own end-to-end encrypted messaging tool that will be available later this year. This tool will integrate seamlessly with popular email clients like Gmail and Office 365 and provide an additional layer of security to the dealership’s digital communication.

Solving the Texting Issue

Recognizing the convenience and ubiquity of text messages in the dealership’s daily operations, ComplyAuto is creating a secure solution to solve this problem. Soon, employees will also be able to scan a QR code or copy a unique URL that will give them access to a secure portal similar to popular chatting applications. Here, they can easily request sensitive information and documents through their phone without sacrificing convenience, and, most importantly, security.

As our world becomes more digital, the importance of secure data transmission grows exponentially. By understanding the Rule, leveraging available encrypted communication tools, and capitalizing on ComplyAuto’s innovative solutions, dealerships can significantly reduce their risk of a data breach and potential fines from the FTC and other liabilities.

This article should be used as a compliance aid only and though its accuracy has been made a priority, it is not a substitute for professional legal advice. Each dealer should rely on their own expertise when using it.

Leave a Reply

Are You Updated on Workplace Violence and Active Shooter Training?
All Cookies are Not Created Equal: FTC Cracks Down on Targeted Advertising Without User Consent

Mock OSHA Assessment

FEATURES:

  • On-demand eight-hour assessment that imitates a real OSHA audit.
  • Conducted by an EHS Pro with OSHA-10 or OSHA-30 certification and 5+ years of experience. 
  • Simulated employee interviews
  • Issue tracking and task management
  • Detailed assessment reports after the assessment with images, videos, and recommended steps for remediation.

    Privacy & Cyber Compliance Suite

    FEATURES:

    • Custom legal policies with real-time updates, including the Information Security Program (ISP)
    • Customized Incident Response Plan (IRP)
    • Internal risk assessment tools and hands-on guidance
    • Biannual penetration testing (2) 
    • Biannual vulnerability scans (2)
    • Employee security awareness training and completion tracking
    • Extensive vendor management library – hundreds of vendor-completed GLBA contracts & risk assessments
    • Device & systems inventory automation and mapping tools
    • Unlimited industry-specific internal phishing simulations to train staff
    • Complete 50-state privacy compliance required by your state (CA, CO, CT, DE, IA, IN, MT, OR, TN, TX, UT, VA)
    • Website cookie consent banners and unique consumer privacy request portals
    • Annual report to the Board of Directors generated every year
    • Compliance Guarantee

      CPR/AED Certification

      FEATURES:

      • Instruction provided by Certified American Red Cross Instructors.
      • Practical, hands-on training sessions to practice CPR and AED techniques
      • Proper automated external defibrillator (AEDs) instruction and operation
      • American Red Cross exam and certification
      • Access to study materials, manuals, and resources for continued education and reference.
      • Available for organizations and groups, allowing for tailored training sessions.

      HR Fundamentals

      FEATURES:

      • Customized policy builder with real-time updates
      • E-sign functionality for required employee policies 
      • Online HR training with employee completion tracking
      • State-specific policies and training
      • Employee management tool
      • Training and policies include Workplace Violence, Active Shooter, IT and Electronic Device Use, Biometric Data Privacy, Sexual Harassment, and more 
      • HR Fundamentals access is included with any other ComplyAuto product

        Encrypted Messaging

        FEATURES:

        • Encrypt SMS text and email messaging among staff, clients, and customers when sending and receiving files
        • Track usage and detect violations in real-time
        • Advanced security features include auto-deletion of files, Multi-Factor Authentication protection, IP safelisting, and domain blocklisting
        • Supports compliance with various state and federal regulations and recognized industry standards: GLBA, HIPAA, SOC 2, ISO 27001, NIST, CIS Controls, SEC

          Safety Compliance Suite

          FEATURES:

          • Concierge on-site onboarding 
          • On-demand safety walkthroughs conducted by experienced EHS Pros at various intervals – once, twice, or four times per year
          • Comprehensive Online Training Library and employee progress tracking
          • Automated 50-State Legal Injury & Illness Reporting
          • Policy Builders with Automatic Updates
          • Simplified SDS Creation and Management
          • Guided risk mitigation
          • Signage builder & tracking
          • Efficient equipment inspections with QR Codes
          • Tier 1 Spill Prevention Control and Countermeasure Plan 
          • Automated Tier 2 environmental reporting for all 50 states 
          • Unlimited one-on-one support from our dedicated team
          • Workplace Violence and Active Shooter Policy and Training
          • Unlimited one-on-one support from our dedicated team
          • Automated Tier II environmental reporting for all 50 states.

            EduTech Course 3

            Program to Fulfill AG Disciplinary Order - $299/student

            The California AG routinely penalizes facilities that violate these laws and requires them to perform specific remedies while on probation. One of these remedies requires the ARD to take a course that outlines the laws and regulations of the Automotive Repair Act. This program fulfills the requirement.

            FEATURES:  

            • Comprehensive online course about the Automotive Repair Act

            • Access to training materials anytime (24/7/365)

            • Comprehensive companion manual to the training material

            • Quizzes and final exam to track engagement and learning ability

            • Certificate generated upon completion

            EduTech Course 2

            Program to Fulfill BAR Remedial Training - $299/student

            As part of their authority to levy fines and corrective actions against repair facilities, the Bureau of Automotive Repair may direct them to take a remedial training program. This program is intended for facilities who have already been identified by the BAR as needing corrective action and have committed to taking a remedial training course in lieu of specific penalties.The California Attorney General (AG) has required violating automotive repair dealers to take a course that instructs students on the laws and regulations of the Automotive Repair Act as part of the disciplinary order.

            FEATURES:

            • Comprehensive online course about the Automotive Repair Act

            • Access to training materials anytime (24/7/365)

            • Comprehensive companion manual to the training material

            • Quizzes and final exam to track engagement and learning ability

            • Certificate generated upon completion

            • Automated notification to the Bureau of Automotive Repair

             

            EduTech Course 1

            Automotive Repair Act Certification Training - $49/month per rooftop

            Provide advisors and technicians with the knowledge and tools necessary to comply with California laws and regulations and be viewed favorably by the Bureau of Automotive Repair.

            FEATURES:

            • Comprehensive online course about the Automotive Repair Act

            • Access to training materials anytime (24/7/365)

            • Comprehensive companion manual to the training material

            • Quizzes and final exam to track engagement and learning ability

            • Certificate generated upon completion

            F&I Compliance Suite

              • Precise Deal Jacket Audits to identify and address real-world F&I compliance issues accurately.
              • Focused Compliance on specific F&I compliance concerns such as Fair Lending Compliance Solutions, California Litigation, Vehicle Safety Recalls, Used Vehicle History, FTC Buyers Guide & Federal Warranty Disclosures, 
              • Automated EZ Cash Reporting & Anti-Money Laundering with IRS Reporting 
              • Spot Delivery & Unwind Management
              • Real-Time Issue Identification Quickly detect compliance gaps and issues, enabling swift corrective action and risk mitigation.
              • Online F&I Compliance Training 
              • Compliance Guarantee

                Device & Email Security

                FEATURES:

                The combined features create a dynamic defense system that adapts to evolving cybersecurity threats and secures the organization's digital ecosystem.

                • Continuous threat detection and response powered by Coro:
                  • EDR (Endpoint Detection and Response) 
                  • MDR (Managed Detection and Response) 
                  • 24/7 Security Operations Center team
                  • Swift response and alert to potential security breaches
                • Enhanced authentication and access control via Multi-factor Authentication (MFA) powered by Duo Security™
                • Advanced email security to shield e-threats such as phishing, malware, spam, and scams – integrates with Google Workspace & Microsoft Office 365.
                • Data governance and Data Loss Prevention (DLP)  detect and manage employee data-sharing practices. 
                • Device-level encryption for Windows and macOS
                • Public & unencrypted wifi blocking
                • Next-gen antivirus
                • Automated password policy and session locking enforcement