Automobile Dealerships – IT Audit & Security
With dealership management pressures on the rise, margins tightening, data privacy regulations changing, and technology advancing rapidly, the demands on auto dealers are at an all- time high. As each day passes, it becomes more difficult for you to stay on top of the day-to-day servicing of your clients. Therefore, it is imperative that you not only have strong management in place, but also have established and implemented accurate internal controls and operational processes to avoid mishandling of sensitive customer data, meet the requirements of new data privacy laws, and reduce the risk of control deficiencies.
Our dedicated team of IT Audit & Security specialists can help.
Rhode Island Dealers, read here.
On June 30, 2015 Rhode Island amended Chapter 49.3, also known as the Rhode Island Identity Theft Protection Act of 2015. As part of this act, any person who that stores, collects, processes, maintains, acquires, uses, owns, or licenses personal information about a Rhode Island resident shall implement and maintain a risk-based information security program that contains reasonable security procedures and practices appropriate to the size and scope of the organization. The amendment calls for firms to implement data security measures for personal information of Rhode Island residents by June 26, 2016. Each reckless violation of this chapter is a civil violation for which a penalty of not more than $100 per record may be adjudged. Each knowing and willful violation can levy a violation of up to $200 per record. In addition to performing the services above, OCD Tech has developed a comprehensive audit program to identify any gaps in accordance with this State regulation.
Connecticut Dealers, read here.
Connecticut Senate Bill No. 949, also known as “An Act Improving Data Security And Agency Effectiveness” requires businesses to create a privacy policy detailing the ways in which they will protect the personal identifying information of their customers and other parties whose data they possess. This policy must detail the ways data is contained on a secure server; on secure drives; behind firewall protections and monitored by intrusion detection software; and in a manner where access is restricted to authorized employees and their authorized agents. Additionally, each company shall update such security program as often as necessary and practicable but at least annually. In addition to performing the services above, OCD Tech has developed a comprehensive audit program to identify any gaps in accordance with this new recommendation.Connect