• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
FTC-Safeguards-Rule-rundown

Are you prepared for the FTC Safeguards Rule Requirements?

February 9, 2022 Posted by Kate Upton IT Security

The Federal Trade Commission (FTC) recently released their Final Rule to amend the Standards for Safeguarding Customer Information. The final Rule includes 5 primary modifications to the existing Safeguards Rule. The Final Rule adds provisions designed to provide covered financial institutions with more guidance on how to develop and implement an information security program, adds provisions designed to improve accountability of financial institutions who are trusted with customer information, exempts some financial institutions from certain requirements if they hold records for less than 5,000 customers, expands the definition of “financial institutions” to include “finders”, and finally, defines several terms and providers related examples for the Rule’s requirements.

FTC Safeguards Rule - What You Need To Know

Many automotive dealerships may question how this applies to them. Afterall, automotive dealerships are not formal banking institutions. However, many automotive dealerships provide financial services to customers, such as automotive loans. These types of continuing financial relationships are what trigger the applicability of the FTC Safeguards Rule.

Included in the amendment to the Safeguards Rule is the change from requiring organizations to have a Chief Information Security Officer (CISO) to a Qualified Individual. Now, organizations must designate a Qualified Individual to facilitate their information security and compliance program. This Qualified Individual must be someone whom the organization can prove is trained in, and understands, information security. Indeed, larger dealerships may elect to hire someone full-time for this role. However, smaller dealerships may already have someone on staff who can fulfill this role in addition to their other job duties. Organizations may also, if they lack this type of talent on their teams, outsource this requirement to a third-party.

A Virtual CISO (hereafter vCISO) may be leveraged by a dealership to provide objective information security guidance and leadership. In some ways, hiring a vCISO can be more cost prohibitive than hiring a dedicated full-time resource, for many vCISO offerings are facilitated via retainer.

No matter the avenue for establishing a Qualified Individual, it is imperative that organizations do this first, for all subsequent requirements must be facilitated by that Qualified Individual. The other requirements established by the Final Rule include:

  • Perform a written risk assessment
  • Identify and manage assets (including data, personnel, devices, systems, and facilities)
  • Encrypt data in transit and at rest
  • Establish a Secure Development Lifecycle (for organization’s that develop software in-house)
  • Establish multi-factor authentication
  • Establish a procedure for securely disposing data
  • Establish a procedure for change management
  • Log activity of authorized users and detect unauthorized access
  • Test or otherwise monitor effectiveness of controls
  • Continuously monitor the system or perform an annual penetration test and biannual vulnerability assessment
  • Establish a security awareness training program
  • Actively managed service providers (MSPs) (including updating contracts to require those MSPs to implement and maintain the Safeguards)
  • Establish a written Incident Response Plan
  • Provide a written status report by the Qualified Individual to organizational leadership at least annually.

Built into the Safeguards Rule is an exemption for financial institutions that hold data for less than 5,000 customers. OCD Tech reached out personally to the FTC to clarify the meaning of this exemption. In their response, the FTC clarified that the exemption for less than 5,000 consumers is total, not annual. Meaning, at any point in time the organization must retain less than 5,000 customers data, not just annually.

This exemption absolves organizations of responsibility for the following requirements:

  • Performing a risk assessment
  • Continuous monitoring or performance of penetration testing
  • Written incident response plan
  • Annual written update by the qualified individual for management

To be clear, all financial institutions are responsible to meet all other requirements of the Rule. This means that for financial institutions, including automotive dealers that hold data for even 1 customer, must implement data security controls within the Rule such as encryption, multi-factor authentication, and access controls.

The Final Rule is effective 10 January 2022 and organizations have until 9 December 2022 to comply with all parts of the Safeguards Rule. Organizations may find that they can meet these controls in-house. Others may determine that they require assistance from a third-party to establish and maintain their compliance program.

With that in mind, certain requirements of the Rule will very likely require the assistance of a third-party. Most notably, the requirements for continuous monitoring or penetration testing and logging will not only take the longest to implement (assuming the organization has not yet implemented these controls) and are very likely to require facilitation by a third-party expert. With just 11 more months to implement these requirements, all organizations should be considering their avenue for compliance.

Share
0
Kate Upton

About Kate Upton

Kate Upton is the IT Government Compliance Team Lead at OCD-Tech. Kate has been with the firm since May 2019. Before joining the firm, Kate received her Bachelor’s degree in Political Science & Legal Studies from the University of Maine and went on to earn a Master’s degree from Northeastern University in Strategic Intelligence. She dedicates her time at the firm to meeting the unique compliance needs of clients in the Defense Industrial Base with projects including CMMC, NIST 800-171, NIST 800-53, and DFARS rules. Kate lives in Portland, Maine with her dog Lucy.

You also might be interested in

Laptop Encryption Best Practices

Dec 14, 2012

In this O’Connor & Drew P.C. Two Minute Tip, IT[...]

password access in will

Where do your Passwords go when you Die?

Feb 27, 2018

Where do your Passwords go when you Die? Christopher J.[...]

Cybersecurity Risks on Home Devices

Cybersecurity Risks on Home Devices

Jul 25, 2023

The Hidden Threat In today’s digital age, it’s not just[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next