
Information Security Program

Program Objectives
Through our Information
Security Program, Borgman Ford safeguards
the personal non-public information we collect from customers.Â
Our
Information Security Program is designed to do insure the
confidentiality and security of customer information, protect against
any anticipated threats to the security and /or, integrity of the
Dealership's customer information, and protect against unauthorized
access to or use of this customer
information.
The objectives of this Information Security Program ("Program") are as follows:Â Â Â
- Insure the security and confidentiality of the Dealership's customer information.
- Protect against any anticipated threats or hazards to the security and/or integrity of the Dealership's customer information.
- Protect against unauthorized access to or use of the Dealership's customer information that could result in substantial harm or inconvenience to any customer.
For purposes of the Program, "customer information" means any information about a customer of the Dealership, or information the Dealership receives about the customer of another financial institution that can be directly or indirectly attributed to the customer. This Program, in and of itself, does not create a contract between the Dealership and any person or entity.
Program Coordinator(s)
This Program and the safeguards it contemplates shall be implemented and maintained by an employee or employees ("Program Coordinator") designated by the Dealership President. The Program Coordinator shall design, implement, and maintain new safeguards as he or she determines to be necessary from time to time. The Program Coordinator shall report to the Dealership President. The Program Coordinator may delegate or outsource the performance of any function under the Information Security Program as he or she deems necessary from time to time.
In the event the Program Coordinator leaves the employment of the Dealership, the Dealership President shall take over the responsibilities of the Program Coordinator until a new Program Coordinator is designated.
Risk Assessment
The Program Coordinator shall conduct a risk assessment to identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in its unauthorized disclosure, misuse, alteration, destruction, or other compromise, and assess the sufficiency of any safeguards in place to control these risks.
The risk assessment shall cover all relevant
areas of the Dealership's operations, as determined by the Program
Coordinator. At a minimum, the risk assessment shall cover the
following:Â Â Â
- Employee training and
management;Â Â Â
- Information systems, including network
and software design, as well as information processing, storage,
transmission, and disposal; and  Â
- Detecting, preventing, and responding to attacks, intrusions, or other systems failures.
Once the Program Coordinator has identified the reasonably foreseeable risks to the Dealership's customer information, the Program Coordinator will determine whether the Dealership's current policies and procedures in these areas sufficiently mitigate the potential risks identified. If not, the Program Coordinator shall design new policies and procedures that meet the objectives of the Program. Final policies and procedures that meet the objectives of the Program shall be made part of the Program.
Audit
The Program Coordinator shall regularly test or audit the effectiveness of the Dealership's safeguards' key controls, systems, and procedures, to ensure that all safeguards implemented as a result of the risk assessment are effective to control the risks identified in the risk assessment. The Program Coordinator .shall revise current safeguards and/or implement new safeguards as necessary to ensure the continued viability of the Program.
Overseeing Service Providers
 The Program Coordinator shall be responsible for overseeing the Dealership's service providers who handle or have access to customer information. The Program Coordinator shall take reasonable steps to select and retain service providers that are capable of maintaining safeguards to protect the specific customer information handled or accessed by each service provider that are consistent with the level of safeguards employed by the Dealership for such information.The Program Coordinator shall review and approve each service provider contract prior to its execution by the Dealership to ensure that each contract contains appropriate obligations of the service provider to comply with the Dealership's safeguarding requirements.
Periodic Reevaluation of the Program
The Program
Coordinator shall reevaluate and modify the Program from time to time as
the Program Coordinator deems appropriate. The Program Coordinator
shall base such reevaluation and modification on the
following:Â Â
- The results of the Program Coordinator's testing and
monitoring efforts;Â Â Â
- Any material changes to the Dealership's
operations, business, or information technology arrangements;
or  Â
- Any other circumstances that the Program Coordinator knows, or has reason to know, may have a material impact on the Program.
In order to assist the Program Coordinator in this regard, the Dealership shall keep the Program Coordinator apprised of the nature and extent of all third party relationships and any operational changes or other matters that may impact the security or integrity of the Dealership's customer information.
Information Security Policies and Procedures - Employee Training and Management
In keeping with the
objectives of the Program, the Dealership shall implement, maintain, and
enforce the following employee management and training
safeguards:Â Â Â
- All employees and independent contractors are
responsible for complying with the Dealership's
Program.
- The Dealership will
check references of each potential employee prior to the commencement of
the applicant's employment.
- The
Dealership will obtain a consumer report and criminal background check
of each applicant prior to the commencement of the applicant's
employment.
- All offers of
employment shall be subject to satisfactory references and
consumer/criminal report
investigations.
- All new
employees, and independent contractors who perform services in the
Dealership, that have access to customer information will participate in
the Dealership's information security training. Each person shall sign
and acknowledge his or her agreement to abide by the Dealership's
Program. Training will recur at least once each year, or sooner, as
determined by Dealership management and as required by changes to the
Program.
- Such training program
shall include, at a minimum, basic steps to maintain the security,
confidentiality, and integrity of customer information, such as:
 Â
     Â
   Â
- Â Â Â Â Â
   Â
- Identifying for
employees and independent contractors the types of customer information
subject to protection under the Information Security
Program.    Â
   Â
- Locking rooms and file cabinets where
paper records are kept. Â
      Â
- Using password-activated computer
software, systems, applications, or terminals, or an automatic log-off
function that terminates access after a short period of
inactivity.    Â
   Â
- Using strong passwords (at least eight
characters long and alpha-numeric). Â
      Â
- Changing passwords periodically, and
maintaining the security of passwords. Â
      Â
- Sending electronic information over
secure channels only.    Â
   Â
- Appropriately disposing of paper and
electronic records.    Â
   Â
- Other training as determined by
management from time to time.
   - Identifying for
employees and independent contractors the types of customer information
subject to protection under the Information Security
Program.    Â
   Â
- The Dealership will take
appropriate steps to encourage awareness of, and compliance with, the
Program.
- All employees and
independent contractors will be permitted to access customer information
on a "need-to-know" basis as determined by Dealership
Management.
- Personnel shall nor
be permitted to access, use, or reproduce customer information, whether
electronic or non-electronic, for their own use or for any use not
authorized by the
Dealership.
- All persons who fail to comply with the Dealership's Program shall be subject to disciplinary measures, up to and including termination of employment for employees or contract termination for independent contractors that perform services in the Dealership. This remedy shall be expressly provided for in Dealer's agreements with such independent contractors.
Information Security Policies and Procedures - Information Systems
In keeping with the objectives
of the Program, the Dealership shall implement, maintain, and enforce
the following information systems
safeguards:Â Â Â
- All records containing customer information shall be
stored and maintained in a secure
area.   Â
- Â Â Â Â Â
   Â
- Paper records shall
be stored in a room, cabinet, or other container that is locked when
unattended.    Â
   Â
- Electronic customer information shall be
stored on secure servers. Access to such information shall be password
controlled, and the Program Coordinator shall control access to such
servers.    Â
   Â
- Customer information consisting of
financial or other similar information (e.g., social security numbers,
etc.) shall not be stored on any computer system with a direct Internet
connection.    Â
   Â
- All customer information shall be backed
up on a periodic basis. Such back up data shall be stored in a secure
location as determined by the Program
Coordinator.  Â
 Â
 - Paper records shall
be stored in a room, cabinet, or other container that is locked when
unattended.    Â
   Â
- All electronic transmissions of customer
information, whether inbound or outbound, shall be performed on a secure
basis. Â Â Â Â Â
- Â Â Â Â Â
   Â
- Inbound credit card
information, credit applications, or other sensitive financial data
transmitted by the Dealership directly from consumers shall use a secure
connection, such as a Secure Sockets Layer (SSL) or other currently
accepted standard, so that the security of such information is protected
in transit. Such secure transmission shall be automatic. Consumers
shall be advised against transmitting sensitive data, like account
numbers, via electronic mail. Â
      Â
- The Dealership shall require by contract
that inbound transmission of customer information delivered to the
Dealership via other sources be encrypted or otherwise
secured.    Â
   Â
- All outbound transmissions of customer
information shall be secured in a manner acceptable to the Program
Coordinator.    Â
   Â
- To the extent sensitive data must be
transmitted to the Dealership by electronic mail, such transmissions
shall be password controlled or otherwise protected from theft or
unauthorized access at the discretion of the Program
Coordinator.    Â
   Â
- The Program Coordinator shall review all
vendor applications to ensure an appropriate level of security both
within the Dealership and with the Dealership's business partners and
vendors.     Â
   - Inbound credit card
information, credit applications, or other sensitive financial data
transmitted by the Dealership directly from consumers shall use a secure
connection, such as a Secure Sockets Layer (SSL) or other currently
accepted standard, so that the security of such information is protected
in transit. Such secure transmission shall be automatic. Consumers
shall be advised against transmitting sensitive data, like account
numbers, via electronic mail. Â
      Â
- All paper
transmissions of customer information by the Dealership shall be
performed on a secure
basis.      Â
- Â Â Â Â Â
   Â
- Sensitive customer
information shall be properly secured at all times. Â
      Â
- Customer information delivered by the
Dealership to third parties shall be kept sealed at all
times.    Â
   Â
- Paper-based customer information shall
not be left unattended at any time it is in an unsecured area.Â
   Â
   - Sensitive customer
information shall be properly secured at all times. Â
      Â
- All
customer information shall be disposed of in a secure manner.
     Â
- Â Â Â Â Â
   Â
- The Program
Coordinator shall supervise the disposal of all records containing
customer information.    Â
   Â
- Paper based customer information shall be
shredded and stored in a secure area until a disposal recycling service
picks it up.    Â
   Â
- All hard drives, diskettes, magnetic
tapes, or any other electronic media containing customer information
shall be erased and/or destroyed prior to disposing of computers or
other hardware.    Â
   Â
- All hardware shall be effectively
destroyed.    Â
   Â
- All customer information shall be
disposed of in a secure manner after any applicable retention
period.
 Â
 - The Program
Coordinator shall supervise the disposal of all records containing
customer information.    Â
   Â
- The Program Coordinator shall maintain an inventory
of Dealership computers, including any handheld devices or PDAs, on or
through which customer information may be stored, accessed, or
transmitted.
- The Program Coordinator shall develop and maintain appropriate oversight or audit procedures to detect the improper disclosure or theft of customer information.
Information Security Policies and Procedures -Detecting, Preventing, and Responding to Attacks, Intrusions, or Other Systems Failures
In keeping with the objectives
of the Program, the Dealership shall implement, maintain, and enforce
the following attack and intrusion
safeguards:Â Â Â
- The Program Coordinator shall ensure the Dealership
has adequate procedures to address any breaches of the Dealership's
information safeguards that would materially impact the confidentiality
and security of customer information. The procedures shall address the
appropriate response to specific types of breaches, including hackers,
general security compromises, denial of access to database and computer
systems, etc.
- The Program
Coordinator shall utilize and maintain a working knowledge of widely
available technology for the protection of customer
information.
- The Program
Coordinator shall communicate with the Dealership's computer vendors
from time to time to ensure that the Dealership has installed the most
recent patches that resolve software
vulnerabilities.
- The Dealership
shall utilize anti-virus software that updates
automatically.
- The Dealership
shall maintain up-to-date
firewalls.
- The Program
Coordinator shall manage the Dealership's information security tools for
employees and pass along updates about any security risks or
breaches.
- The Program
Coordinator shall establish procedures to preserve the security,
confidentiality, and integrity of customer information in the event of a
computer or other technical
failure.
- The Program Coordinator
shall ensure that access to customer information is granted only to
legitimate and valid users.
- The Program Coordinator shall notify customers promptly if their customer information is subject to loss, damage, or unauthorized access.
Contact
Borgman Ford
3150 28th St SW
Grand Rapids, MI 49418
- Sales: (616) 534-7651
- Service: (616) 249-8850
- Parts: (616) 249-8846
Hours
- Monday9:00 am - 8:00 pm
- Tuesday9:00 am - 6:00 pm
- Wednesday9:00 am - 8:00 pm
- Thursday9:00 am - 6:00 pm
- Friday9:00 am - 6:00 pm
- Saturday10:00 am - 3:00 pm
- SundayClosed
How can we help?
* Indicates a required field
-
Borgman Ford
3150 28th St SW
Grand Rapids, MI 49418
- Sales: (616) 534-7651