Trust & Assurance

Security & Compliance
Built Into Every Layer.

AutoVizerz was designed with enterprise-grade security from day one — not bolted on after the fact. Every dealership that runs on our platform inherits a security posture that meets the highest standards in automotive, financial services, and data privacy.

🔒SOC 2 Type II
🛡256-bit AES Encryption
🌐GDPR & CCPA Ready
🏛GLBA Compliant
📋50-State Regulatory
99.99% SLA Uptime
Security at a Glance

The Numbers Behind Our Security Posture

Measurable commitments, not marketing language. Every metric below is contractually backed.

99.99%
Guaranteed Uptime SLA
≤ 52 minutes downtime per year
< 4 hrs
RTO / RPO
Recovery Time & Point Objectives
256-bit
AES Encryption
At rest and in transit
100%
Audit Trail Coverage
Every data action logged
Annual
Penetration Testing
Third-party certified testers
Zero
Data Sold to Third Parties
Your data is yours. Always.
Certifications & Standards

Independently Verified. Continuously Maintained.

Third-party audits and independent certifications validate what we promise. Our compliance posture is not self-reported — it is externally verified.

🏆
SOC 2 Type II
AICPA — Continuous Audit
Active

AutoVizerz undergoes annual SOC 2 Type II audits covering all five Trust Service Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Reports available to enterprise customers under NDA.

SecurityAvailabilityProcessing IntegrityConfidentialityPrivacy
🏛
GLBA Compliance
Gramm-Leach-Bliley Act — Financial Data
Active

As a platform handling consumer financial data in F&I transactions, AutoVizerz fully complies with GLBA Safeguards Rule requirements — including administrative, technical, and physical safeguards for nonpublic personal financial information.

NPI ProtectionSafeguards RulePrivacy NoticesVendor Oversight
🌐
GDPR & CCPA Ready
EU & California Privacy Frameworks
Active

Full data subject rights management — access, deletion, portability, and opt-out — built into the platform architecture. Data Processing Agreements (DPAs) available for all customers. Cross-border transfer mechanisms documented.

Data Subject RightsConsent ManagementDPA AvailableBreach Notification
💳
PCI DSS Alignment
Payment Card Industry Data Security Standard
Active

Payment processing flows within AutoVizerz are scoped and isolated per PCI DSS requirements. Cardholder data never touches the AutoVizerz application layer — all payment tokenization is handled by certified PCI DSS Level 1 processors.

TokenizationNetwork SegmentationScoped EnvironmentSAQ Eligible
📋
50-State Automotive Compliance
State DMV, Title & Registration Regulations
Active

AutoVizerz maintains a continuously updated regulatory matrix covering all 50 states — titling requirements, dealer licensing rules, Red Flag Rule compliance, OFAC screening, and state-specific F&I disclosure requirements are embedded natively in every transaction.

OFAC ScreeningRed Flag RuleTitle & RegF&I DisclosuresDealer Licensing
🔍
Annual Penetration Testing
Independent Third-Party Security Firms
Active

External penetration tests are conducted at minimum annually by certified third-party firms using OWASP, PTES, and NIST frameworks. Critical and high findings are remediated within 30 days. Summaries available to enterprise customers.

OWASP Top 10PTES FrameworkAPI Security30-Day Remediation SLA
Data Security

Your Data. Protected at Every Layer.

Security is not a single feature — it is an architectural discipline. AutoVizerz enforces protection at every level of the data lifecycle.

🔐

Encryption — At Rest & In Transit

All data stored within AutoVizerz is encrypted using AES-256 at rest. All data transmitted between your browser, mobile devices, and our infrastructure uses TLS 1.3 — the most current and secure transport protocol available. Older TLS versions (1.0, 1.1) and all SSL variants are disabled and rejected at the load balancer level.

AES-256 at Rest TLS 1.3 in Transit HSTS Enforced Certificate Pinning Key Rotation — Automated
🏗

Multi-Tenant Isolation Architecture

Every dealership and dealer group operates in a logically isolated tenant environment. Database schemas, storage buckets, and API access are scoped per tenant by design — not by access control rules alone. A misconfiguration in one tenant's permissions cannot expose another tenant's data.

Schema-Level Isolation Row-Level Security Isolated Storage Buckets Scoped API Tokens
💾

Backup, Replication & Disaster Recovery

Automated backups run continuously with point-in-time recovery (PITR) available for up to 35 days. All critical data is replicated synchronously across two geographically separate availability zones. Full disaster recovery tests are conducted quarterly with documented RTO of < 4 hours and RPO of < 4 hours.

PITR — 35 Days Multi-AZ Replication Quarterly DR Tests RTO / RPO < 4 hrs Automated Failover
🗑

Data Retention & Secure Deletion

Retention policies are configurable per data type within regulatory minimums. Upon contract termination, customer data is cryptographically erased within 30 days using NIST 800-88 compliant methods. A signed Certificate of Destruction is provided upon request. AutoVizerz never retains dealership operational data beyond contractual terms.

Configurable Retention NIST 800-88 Erasure Certificate of Destruction 30-Day Offboarding Window
Access Control & Identity

The Right People See the Right Data. Nothing More.

AutoVizerz enforces a zero-trust, least-privilege access model across every role, department, and dealership location.

👤

Role-Based Access Control (RBAC)

Granular permissions are defined by role — not by individual user configuration. A service technician cannot see F&I gross profit. A salesperson cannot view customer credit applications. Finance managers cannot modify service repair orders. Permissions are enforced at the API layer, not just the UI.

🔑

Multi-Factor Authentication (MFA)

MFA is enforced for all user accounts — it cannot be disabled by dealership administrators. Supported second factors include TOTP authenticator apps (Google Authenticator, Authy), hardware security keys (FIDO2/WebAuthn), and SMS as a fallback for non-sensitive roles.

🚪

Single Sign-On (SSO) Support

Enterprise customers can federate identity via SAML 2.0 or OpenID Connect (OIDC) — connecting AutoVizerz to their existing identity provider (Microsoft Entra ID, Okta, Google Workspace). Employee offboarding in your IdP immediately revokes all AutoVizerz access.

🌍

IP Allowlisting & Geo-Restrictions

Administrator accounts can optionally restrict access to approved IP ranges or geographic regions. Suspicious login attempts from unrecognized devices or locations trigger step-up authentication challenges and security team alerts automatically.

Session Management

Sessions are time-limited with configurable idle timeouts (default: 30 minutes). All sessions are cryptographically signed with short-lived JWT tokens. Concurrent session limits are enforced per role. Administrative sessions require re-authentication for sensitive operations.

🔒

Privileged Access Management

AutoVizerz internal engineers access production systems only through a dedicated privileged access workstation (PAW) environment with just-in-time (JIT) provisioning. Zero standing admin access to production data. All privileged sessions are recorded and reviewed.

Infrastructure Security

Cloud-Native. Hardened by Design.

AutoVizerz runs on enterprise-grade cloud infrastructure with defense-in-depth implemented at the network, compute, and application levels.

01 Network Perimeter
Web Application Firewall (WAF) — blocks OWASP Top 10 attack patterns including SQLi, XSS, CSRF, and path traversal at the edge before traffic reaches the application.
DDoS Protection — always-on volumetric and application-layer DDoS mitigation absorbs attacks up to 1 Tbps without impacting dealer operations.
Private VPC with Zero Public Endpoints — all databases, internal services, and administrative interfaces reside in private subnets with no direct internet exposure.
02 Compute & Containers
Immutable Infrastructure — servers are never patched in place. All deployments replace infrastructure from a known-good, hardened base image. Configuration drift is architecturally impossible.
Container Image Scanning — every container image is scanned for CVEs before deployment. Images with critical vulnerabilities are blocked from reaching production automatically.
Runtime Security — anomalous process behavior inside containers is detected and terminated in real-time using eBPF-based runtime security monitoring.
03 Application Security
Secure SDLC — security requirements are defined at the design phase. SAST and DAST tools run in every CI/CD pipeline. Code is reviewed for security implications before merge to main.
Dependency Vulnerability Scanning — all third-party packages are continuously monitored for known CVEs using automated SCA tools. Critical vulnerabilities trigger immediate patching workflows.
Secret Management — no credentials, API keys, or connection strings exist in source code or environment variables. All secrets are stored in a dedicated vault with automatic rotation and audit logging.
04 Monitoring & Detection
24/7 Security Operations — a dedicated SIEM aggregates logs from all infrastructure layers. Behavioral anomaly detection alerts the security team in real-time to suspicious patterns.
Threat Intelligence Feeds — real-time integration with industry threat intelligence enables proactive blocking of known malicious IPs, domains, and attack signatures.
Immutable Audit Logs — all security-relevant events are written to append-only, tamper-evident log stores. Log integrity is cryptographically verifiable. Retention: 12 months online, 7 years archival.
Automotive-Specific Compliance

Every Regulation. Every State. Every Transaction.

AutoVizerz is the only DMS built by someone who ran a dealership and lived through compliance failures firsthand. Every regulatory requirement is embedded as a workflow constraint — not a checklist to remember.

Federal

Federal Regulatory Compliance

OFAC / BSA Screening
Every customer and counterparty is screened against the OFAC Specially Designated Nationals (SDN) list and applicable BSA watchlists at every transaction point — not just at deal inception.
✅ Automated
Red Flag Rules (FACTA)
Identity verification and fraud detection procedures required under the FTC's Red Flag Rules are built into the customer intake workflow. Identity anomalies are flagged and escalated before a deal can proceed.
✅ Automated
FTC Safeguards Rule (GLBA)
The updated FTC Safeguards Rule (effective 2023) requires dealers to implement comprehensive information security programs. AutoVizerz provides all required technical and administrative controls, including encryption, access controls, and incident response documentation.
✅ Compliant
FCRA / ECOA Credit Compliance
Adverse action notices, equal credit opportunity disclosures, and credit application handling procedures are automated per FCRA and ECOA requirements. No manual step can inadvertently skip a required disclosure.
✅ Automated
FTC Privacy Notices
Annual privacy notices and opt-out rights required under GLBA are tracked, distributed, and documented automatically for every customer with nonpublic personal financial information.
✅ Automated
50-State

State-Level Regulatory Matrix

Title & Registration — All 50 States
State-specific titling deadlines, electronic lien and title (ELT) requirements, and DMV submission formats are maintained in a continuously updated regulatory database. The correct form, the correct deadline, the correct submission channel — automatically.
✅ All 50 States
F&I Disclosure Requirements
Finance and insurance disclosure requirements vary significantly by state. AutoVizerz serves the correct state-specific disclosures, cancellation rights, and product descriptions based on the customer's state of residence — not the dealer's state.
✅ State-Aware
Sales Tax & Doc Fee Compliance
Sales tax calculations, documentation fee caps, and dealer-specific surcharge rules are calculated in real-time based on current state and county tax tables. Rate tables are updated within 48 hours of any regulatory change.
✅ Real-Time
Dealer Licensing Tracking
State dealer licenses, salesperson licenses, and F&I producer licenses are tracked with automated renewal reminders. Transactions cannot be completed by unlicensed personnel — the system enforces it.
✅ Enforced
Audit Trail & Accountability

Every Action. Every User. Every Moment.

AutoVizerz maintains a complete, tamper-evident record of every action taken within the platform — providing the accountability layer that regulators, auditors, and owners demand.

📝

Immutable Activity Log

Every create, read, update, and delete operation — including who performed it, from what IP address and device, and the exact timestamp — is recorded in an append-only log that cannot be altered, even by system administrators.

🔍

Deal-Level Audit Trail

Every vehicle deal has a complete chain-of-custody log from first contact through title transfer and funding. Every number change, every signature, every approval — attributed to a specific employee with a timestamp. Perfect for audits, disputes, and compliance reviews.

🚨

Anomaly Alerting

Unusual patterns — large data exports, bulk record access outside normal hours, repeated failed authentications, permission escalation attempts — trigger real-time alerts to dealership administrators and the AutoVizerz security team simultaneously.

📤

Exportable Compliance Reports

Audit reports can be generated and exported in multiple formats (PDF, CSV, JSON) for any time period, department, or user. Reports meet the format requirements of federal and state regulatory examination procedures.

7-Year Log Retention

Online audit logs are retained for 12 months for immediate access. Archival retention extends to 7 years to meet automotive industry regulatory requirements. All archived logs remain searchable and exportable.

🔗

Cryptographic Integrity Verification

Each audit log entry is cryptographically chained to the previous entry using hash-linking. Any tampering with a historical log entry is immediately detectable by verifying the chain — providing forensic-grade evidence integrity.

Live Audit Stream — Sample
09:14:32 j.williams CREATE Deal #DL-2024-8847 initiated — VIN 1HGCM82633A004352
09:15:01 system READ OFAC SDN screening — Customer ID 44291 — CLEAR
09:22:17 m.johnson UPDATE Deal #DL-2024-8847 — Trade value adjusted $18,500 → $19,200
09:31:44 system CREATE Credit app routed to 4 lenders — RouteOne batch #CR-88471
09:47:09 r.patel READ Credit decisions received — Approval: TD Auto, 6.9% / 72mo
10:02:33 m.johnson CREATE Retail Installment Contract generated — State: Ohio — Form OH-RIC-2024
10:18:55 customer SIGN E-signature completed — 14 documents — IP: 98.104.xx.xx
10:19:02 system CREATE Funding package submitted — Lender: TD Auto Finance — ACH routing confirmed
Incident Response

Prepared. Practiced. Transparent.

Security incidents happen to every organization. What separates trustworthy vendors from untrustworthy ones is whether they have a practiced, transparent response process.

01

Detection & Triage

Automated alerting from SIEM, WAF, runtime security, and anomaly detection notifies the security team in real-time. On-call security engineers are paged within 5 minutes of a P1 alert 24/7/365.

Detection SLA< 15 min
02

Containment

Affected systems are isolated immediately. Compromised credentials are revoked. Traffic from suspicious sources is blocked. The scope of the incident is bounded before investigation begins.

Containment SLA< 1 hour
03

Customer Notification

If a security incident has the potential to affect customer data, affected dealerships are notified within 72 hours per GDPR requirements — and typically within 24 hours in practice. Notifications include scope, potential impact, and steps taken.

Notification SLA< 72 hours
04

Eradication & Recovery

Root cause is identified and eliminated. Systems are restored from known-good state. All restoration steps are documented. Customers are updated throughout the process via a dedicated status page.

Recovery TargetRTO < 4 hours
05

Post-Incident Review

Every P1 and P2 incident is followed by a formal post-mortem within 5 business days. Findings and remediation steps are shared with affected customers. Systemic fixes are tracked to completion.

Post-Mortem< 5 business days
Data Privacy

Your Customers' Data Is Not Our Product.

AutoVizerz has a clear and absolute position on data privacy: dealership data and consumer data processed through our platform belongs exclusively to our customers.

🚫

We Never Sell Your Data

AutoVizerz does not sell, rent, license, or provide dealership operational data or consumer personally identifiable information (PII) to any third party for commercial purposes. This is a contractual commitment, not a policy that can change without notice.

🔬

We Never Train AI on Your Data Without Consent

AutoVizerz AI models that serve your dealership are trained on aggregated, de-identified operational data only when explicitly permitted by the customer. Your deal structures, customer lists, and pricing strategies are never used to train shared models.

📋

Data Processing Agreement (DPA)

A comprehensive DPA is available and executed with every customer. The DPA defines the categories of data processed, the purposes of processing, sub-processor relationships, and the rights and obligations of both parties under GDPR and CCPA.

🙋

Consumer Data Subject Rights

AutoVizerz provides built-in tools for dealers to respond to consumer DSR requests — access, deletion, portability, and correction — within the regulatory timeframes required by CCPA (45 days) and GDPR (30 days).

📜

Sub-Processor Transparency

A complete list of all third-party sub-processors (cloud providers, analytics tools, communication services) is maintained and provided to customers. Changes to the sub-processor list are communicated 30 days in advance.

🌍

Cross-Border Transfer Controls

Data residency options are available for customers with geographic data sovereignty requirements. Standard Contractual Clauses (SCCs) are in place for any cross-border transfers. Data is not transferred to jurisdictions without adequate protection.

People & Processes

Security Culture Is Not Optional.

Technical controls only go so far. AutoVizerz invests as heavily in security culture, training, and process discipline as it does in technology.

🎓

Security Awareness Training

All AutoVizerz employees complete security awareness training upon hire and annually thereafter. Phishing simulation exercises are conducted quarterly. Employees who fail phishing tests receive immediate remediation training.

🔍

Background Screening

All employees with access to production systems or customer data undergo background screening prior to hire. Contractors with data access are subject to the same screening requirements and sign comprehensive data handling agreements.

📏

Security Policies & Standards

A comprehensive security policy library — including acceptable use, data classification, incident response, change management, and vendor risk management — is maintained, reviewed annually, and acknowledged by all employees.

⚖️

Separation of Duties

Critical operational tasks require separation of duties. No single engineer can independently deploy code to production, access production data, and modify audit logs. Four-eyes principles are enforced for all sensitive operations.

Shared Responsibility

What We Secure. What You Control.

Security is a partnership. AutoVizerz handles the infrastructure, platform, and application layer. Dealers retain control over their user administration and operational practices.

Security Domain AutoVizerz Responsibility Dealer Responsibility
Physical Infrastructure Security ✅ Fully Managed — Not Applicable
Network & Perimeter Security ✅ Fully Managed — Not Applicable
Application Security & Patching ✅ Fully Managed — Not Applicable
Data Encryption ✅ Fully Managed — Not Applicable
Backup & Disaster Recovery ✅ Fully Managed — Not Applicable
User Account Creation & Deactivation ⚙️ Tools Provided ✅ Dealer Manages Promptly
Role Assignment & Permissions ⚙️ Framework Provided ✅ Dealer Configures Appropriately
Device Security (Computers / Tablets) — Not Applicable ✅ Dealer Responsibility
Physical Dealership Security — Not Applicable ✅ Dealer Responsibility
Employee Security Training ⚙️ Resources Provided ✅ Dealer Conducts

Have Security Questions Before You Evaluate?

Our security team is available to answer detailed questions, provide our SOC 2 Type II report (under NDA), review architecture diagrams, and participate in your vendor security assessment process.