Didn’t See That Coming: The Real Threat to Dealerships is Not the Revised FTC Safeguards Rule 

Posted by

on

By Chris Cleveland Co-Founder, Chief Executive Officer

The automotive dealership industry is abuzz with talk about the revised FTC Safeguards Rule. The potential for FTC enforcement action, combined with fines of $50-120 per violation, has dealerships rightfully concerned. However, while the industry is fixated on these substantial fines, a more covert and dangerous threat is present: data breaches.

Fear Mongering and Misinformation It is no secret that some vendors are exploiting the industry’s general inexperience with these specific requirements by capitalizing on  fear of the FTC. Aggressive marketing campaigns, filled with dire warnings and hyperbolic statements, are often designed to simply push their products and make a quick buck. One such campaign even claims that dealerships could be fined $50,120 per text or email containing customer personally identifiable information (PII)! By this logic, all the text and emails between a salesperson and a customer sharing an address or phone number could potentially bankrupt a dealership. This is preposterous because not only would it be extremely unlikely for the FTC to enforce the regulations this way, it is also a complete misunderstanding of the Safeguards Rule, which regulates only non-public personal information (NPI), not PII. But let’s cut through the noise and focus on the real issue at hand: data breaches.

Data Breaches: The Actual Menace As difficult as it is to admit, the FTC’s primary motivation behind the Safeguards Rule isn’t just to levy fines on covered businesses and dealerships. As noted by the NADA, the Safeguards Rule was originally created in response to widespread harm to customers caused by data breaches and cyberattacks.

On the whole, data breaches and cyberattacks have grown significantly over the past two decades (since the last time the Safeguards Rule was updated in 2003). Hackers, fueled by the potential for significant monetary gains, a low risk of getting caught, and a global footprint, have launched cyberattacks on businesses at an astronomical rate. One statistic shows that a cyberattack occurs every 39 seconds! On the other hand, the FTC, given its finite resources and team of auditors, can only oversee a limited number of dealerships annually.

It is telling that the number of dealerships that have undergone FTC inspections in recent months can be counted on one hand, yet dealerships experience cyberattacks  almost on a weekly basis. Furthermore, while an FTC visit might typically be a rare occurrence, a publicized data breach of your dealership skyrockets this likelihood to a near certainty.

If you think five-star Google reviews are tough to acquire now, just wait until word gets out that your dealership had a data breach or that someone walked off-site with a banker’s box full of deal jackets.

Dealerships are On the Menu Dealerships are ideal victims for hackers. Coupled with poor data protection and cybersecurity protocols across the industry, dealerships are regular targets due to their vast reservoir of customer data involving sensitive financial and credit information. However, recent statistics reveal that only 37% of auto retailers are confident in their current protection. 

Apart from the immediate financial repercussions, a data breach can diminish customer trust, tarnish a dealership’s image, and lead to legal complications. Not surprisingly, studies have shown that most consumers won’t purchase from a dealer that has had a data breach. If you think five star Google reviews are tough to acquire now, just wait until word gets out that your dealership had a data breach or that someone walked off-site with a banker’s box full of deal jackets. Astonishingly, the average financial toll of a single data breach is an eye-watering $4.45 million in 2023, which is an increase of 15% over the past three years.

Confronting the Threat ProactivelyChris Cleveland, ComplyAuto’s CEO, in partnership with Brad Miller, NADA Regulatory Affairs Director, hosted a webinar on the Safeguards Rule for the NADA and its members. The session underscored the significance of preventing a data breach by implementing the following protections at a typical dealership:

  • Penetration Testing: A mock cyber assault on your dealer’s network infrastructure to pinpoint potential weak spots.
  • Vulnerability Scanning: Identifying and addressing common vulnerabilities in your computer systems that often lead to cybersecurity incidents
  • Threat Detection: Employing endpoint detection and response software to monitor systems for attacks and malware around the clock.
  • Phishing Simulations: Evaluating employees’ responses to counterfeit phishing emails to prepare them for genuine threats.
  • Unauthorized Activity Monitoring: Utilizing data-leak prevention (DLP) software to monitor and regulate data movement across the company’s network.
  • Multi-Factor Authentication (MFA): Deploying MFA, a verification method requiring multiple authentication factors, across all devices and software.
  • Encryption: Safeguarding data by ensuring it is encrypted at rest (e.g., stored on hard drives), and in transit (e.g., email and text).

While the updated Safeguards Rule accentuated the importance of compliance with a swath of new requirements, dealerships must understand that the genuine peril to a dealership isn’t merely regulatory fines. We need to prevent the catastrophic and debilitating consequences of a data breach, which will in turn invite FTC scrutiny. By channeling their efforts towards comprehensive cybersecurity initiatives and routinely championing data protection practices, dealerships can shield their enterprise, their customers, and their esteemed reputation from these bad actors.

Leave a Reply

Heating Up! OSHA Actively Auditing Dealers for Heat Stress Rules & More
The #1 Most Overlooked Rule: How DLP Tools Address the Safeguards Rule’s “Unauthorized Activity Monitoring” Requirement

Mock OSHA Assessment

FEATURES:

  • On-demand eight-hour assessment that imitates a real OSHA audit.
  • Conducted by an EHS Pro with OSHA-10 or OSHA-30 certification and 5+ years of experience. 
  • Simulated employee interviews
  • Issue tracking and task management
  • Detailed assessment reports after the assessment with images, videos, and recommended steps for remediation.

    Privacy & Cyber Compliance Suite

    FEATURES:

    • Custom legal policies with real-time updates, including the Information Security Program (ISP)
    • Customized Incident Response Plan (IRP)
    • Internal risk assessment tools and hands-on guidance
    • Biannual penetration testing (2) 
    • Biannual vulnerability scans (2)
    • Employee security awareness training and completion tracking
    • Extensive vendor management library – hundreds of vendor-completed GLBA contracts & risk assessments
    • Device & systems inventory automation and mapping tools
    • Unlimited industry-specific internal phishing simulations to train staff
    • Complete 50-state privacy compliance required by your state (CA, CO, CT, DE, IA, IN, MT, OR, TN, TX, UT, VA)
    • Website cookie consent banners and unique consumer privacy request portals
    • Annual report to the Board of Directors generated every year
    • Compliance Guarantee

      CPR/AED Certification

      FEATURES:

      • Instruction provided by Certified American Red Cross Instructors.
      • Practical, hands-on training sessions to practice CPR and AED techniques
      • Proper automated external defibrillator (AEDs) instruction and operation
      • American Red Cross exam and certification
      • Access to study materials, manuals, and resources for continued education and reference.
      • Available for organizations and groups, allowing for tailored training sessions.

      HR Fundamentals

      FEATURES:

      • Customized policy builder with real-time updates
      • E-sign functionality for required employee policies 
      • Online HR training with employee completion tracking
      • State-specific policies and training
      • Employee management tool
      • Training and policies include Workplace Violence, Active Shooter, IT and Electronic Device Use, Biometric Data Privacy, Sexual Harassment, and more 
      • HR Fundamentals access is included with any other ComplyAuto product

        Encrypted Messaging

        FEATURES:

        • Encrypt SMS text and email messaging among staff, clients, and customers when sending and receiving files
        • Track usage and detect violations in real-time
        • Advanced security features include auto-deletion of files, Multi-Factor Authentication protection, IP safelisting, and domain blocklisting
        • Supports compliance with various state and federal regulations and recognized industry standards: GLBA, HIPAA, SOC 2, ISO 27001, NIST, CIS Controls, SEC

          Safety Compliance Suite

          FEATURES:

          • Concierge on-site onboarding 
          • On-demand safety walkthroughs conducted by experienced EHS Pros at various intervals – once, twice, or four times per year
          • Comprehensive Online Training Library and employee progress tracking
          • Automated 50-State Legal Injury & Illness Reporting
          • Policy Builders with Automatic Updates
          • Simplified SDS Creation and Management
          • Guided risk mitigation
          • Signage builder & tracking
          • Efficient equipment inspections with QR Codes
          • Tier 1 Spill Prevention Control and Countermeasure Plan 
          • Automated Tier 2 environmental reporting for all 50 states 
          • Unlimited one-on-one support from our dedicated team
          • Workplace Violence and Active Shooter Policy and Training
          • Unlimited one-on-one support from our dedicated team
          • Automated Tier II environmental reporting for all 50 states.

            EduTech Course 3

            Program to Fulfill AG Disciplinary Order - $299/student

            The California AG routinely penalizes facilities that violate these laws and requires them to perform specific remedies while on probation. One of these remedies requires the ARD to take a course that outlines the laws and regulations of the Automotive Repair Act. This program fulfills the requirement.

            FEATURES:  

            • Comprehensive online course about the Automotive Repair Act

            • Access to training materials anytime (24/7/365)

            • Comprehensive companion manual to the training material

            • Quizzes and final exam to track engagement and learning ability

            • Certificate generated upon completion

            EduTech Course 2

            Program to Fulfill BAR Remedial Training - $299/student

            As part of their authority to levy fines and corrective actions against repair facilities, the Bureau of Automotive Repair may direct them to take a remedial training program. This program is intended for facilities who have already been identified by the BAR as needing corrective action and have committed to taking a remedial training course in lieu of specific penalties.The California Attorney General (AG) has required violating automotive repair dealers to take a course that instructs students on the laws and regulations of the Automotive Repair Act as part of the disciplinary order.

            FEATURES:

            • Comprehensive online course about the Automotive Repair Act

            • Access to training materials anytime (24/7/365)

            • Comprehensive companion manual to the training material

            • Quizzes and final exam to track engagement and learning ability

            • Certificate generated upon completion

            • Automated notification to the Bureau of Automotive Repair

             

            EduTech Course 1

            Automotive Repair Act Certification Training - $49/month per rooftop

            Provide advisors and technicians with the knowledge and tools necessary to comply with California laws and regulations and be viewed favorably by the Bureau of Automotive Repair.

            FEATURES:

            • Comprehensive online course about the Automotive Repair Act

            • Access to training materials anytime (24/7/365)

            • Comprehensive companion manual to the training material

            • Quizzes and final exam to track engagement and learning ability

            • Certificate generated upon completion

            F&I Compliance Suite

              • Precise Deal Jacket Audits to identify and address real-world F&I compliance issues accurately.
              • Focused Compliance on specific F&I compliance concerns such as Fair Lending Compliance Solutions, California Litigation, Vehicle Safety Recalls, Used Vehicle History, FTC Buyers Guide & Federal Warranty Disclosures, 
              • Automated EZ Cash Reporting & Anti-Money Laundering with IRS Reporting 
              • Spot Delivery & Unwind Management
              • Real-Time Issue Identification Quickly detect compliance gaps and issues, enabling swift corrective action and risk mitigation.
              • Online F&I Compliance Training 
              • Compliance Guarantee

                Device & Email Security

                FEATURES:

                The combined features create a dynamic defense system that adapts to evolving cybersecurity threats and secures the organization's digital ecosystem.

                • Continuous threat detection and response powered by Coro:
                  • EDR (Endpoint Detection and Response) 
                  • MDR (Managed Detection and Response) 
                  • 24/7 Security Operations Center team
                  • Swift response and alert to potential security breaches
                • Enhanced authentication and access control via Multi-factor Authentication (MFA) powered by Duo Security™
                • Advanced email security to shield e-threats such as phishing, malware, spam, and scams – integrates with Google Workspace & Microsoft Office 365.
                • Data governance and Data Loss Prevention (DLP)  detect and manage employee data-sharing practices. 
                • Device-level encryption for Windows and macOS
                • Public & unencrypted wifi blocking
                • Next-gen antivirus
                • Automated password policy and session locking enforcement