‪(480) 285-8227 dave@dealercomply360.com

Risk Assessment Checklist

Purpose:
This checklist is designed to guide the identification, evaluation, and management of risks to sensitive data, systems, and operations at [Your Dealership Name]. It helps ensure compliance with regulatory requirements (e.g., FTC Safeguards Rule) and promotes proactive risk management.


1. Administrative Risks

  • Policies and Procedures:

    • Are written information security policies in place and up to date?
    • Are there clear procedures for handling sensitive data (e.g., customer information, financial records)?
  • Employee Training:

    • Is there regular cybersecurity training for all employees?
    • Are employees aware of how to identify phishing attempts and report incidents?
  • Access Controls:

    • Are employee roles clearly defined, with access to sensitive data restricted based on job responsibilities?
    • Are user accounts regularly reviewed for appropriateness?
  • Incident Response Plan:

    • Is there a documented plan for responding to data breaches or cybersecurity incidents?
    • Are incident response procedures tested regularly?

2. Technical Risks

  • Network Security:

    • Are firewalls and intrusion detection/prevention systems in place and functioning properly?
    • Is Wi-Fi secured with strong encryption (e.g., WPA3) and access controls?
  • Data Encryption:

    • Is sensitive data encrypted both in transit and at rest?
    • Are encryption methods up to date with current standards?
  • Authentication and Authorization:

    • Is multi-factor authentication (MFA) enabled for access to critical systems?
    • Are strong password policies enforced and regularly updated?
  • Endpoint Security:

    • Are all devices (e.g., computers, mobile devices) protected by up-to-date antivirus and anti-malware software?
    • Are systems patched and updated regularly to address vulnerabilities?
  • Backup Systems:

    • Are backups performed regularly, and are they tested for integrity and recoverability?
    • Are backups stored securely in an offsite or cloud location?

3. Physical Risks

  • Facility Security:

    • Are access controls (e.g., key cards, biometric systems) in place for sensitive areas?
    • Are physical security measures (e.g., cameras, alarms) operational?
  • Document Storage:

    • Are sensitive physical documents stored in locked, access-controlled areas?
    • Are shredders or secure disposal methods used for documents containing sensitive information?
  • Device Security:

    • Are workstations, laptops, and mobile devices secured when not in use?
    • Are lost or stolen devices promptly reported and remotely wiped if necessary?

4. Vendor and Third-Party Risks

  • Vendor Assessments:

    • Are third-party vendors evaluated for their data security practices before engagement?
    • Do vendor agreements include clauses that require compliance with data protection standards?
  • Monitoring and Audits:

    • Are vendors’ security practices reviewed periodically?
    • Is there a process for terminating access for vendors no longer providing services?

5. Legal and Regulatory Risks

  • Compliance:

    • Are data protection and security practices compliant with FTC Safeguards Rule, state laws, and other applicable regulations?
    • Is a process in place to stay updated on regulatory changes?
  • Privacy Notices:

    • Are customers provided with clear, accurate privacy notices as required by law?
    • Are procedures in place for handling customer requests related to their data (e.g., access, correction, deletion)?
  • Incident Reporting:

    • Are processes in place to notify affected parties, regulators, or law enforcement of a data breach as required by law?

6. Operational Risks

  • Processes and Workflows:

    • Are there standard operating procedures for handling sensitive customer data during sales, financing, and service?
    • Are processes in place to monitor and minimize human errors?
  • Data Retention and Disposal:

    • Are records retained for the legally required period (e.g., 3–7 years)?
    • Is sensitive data securely destroyed after the retention period expires?
  • Continuity Planning:

    • Is there a business continuity plan in place for recovering from cybersecurity incidents or natural disasters?
    • Are business continuity and disaster recovery plans tested regularly?

7. Monitoring and Reporting Risks

  • Threat Monitoring:

    • Are systems monitored for unauthorized access or unusual activity?
    • Are threat intelligence feeds or services used to stay aware of emerging risks?
  • Audit Logs:

    • Are logs of system access, modifications, and transactions maintained and reviewed regularly?
    • Are audit logs stored securely and protected from tampering?
  • Metrics and Reporting:

    • Are key performance indicators (KPIs) or metrics used to measure security effectiveness (e.g., phishing simulation success rates, incident response times)?
    • Are risks and incidents reported to senior management regularly?

8. Risk Prioritization

  • Risk Severity:
    • Have identified risks been ranked based on potential impact (e.g., high, medium, low)?
  • Mitigation Plans:
    • Are high-priority risks addressed with specific mitigation plans and deadlines?
  • Accountability:
    • Are clear responsibilities assigned for implementing risk mitigation strategies?

Completion Date:
[Insert Date]

Auditor Name and Title:
[Insert Name and Title]

Signatures:
Program Coordinator: ________________________ Date: ___________
Manager Approval: _________________________ Date: ___________


This checklist ensures a thorough evaluation of potential risks and provides a structured approach to safeguarding your dealership’s sensitive information and systems. Let me know if you’d like templates or further guidance on implementing specific sections!