Mosaic’s F&I Manager learning path is designed to cover the regulations that apply to dealership F&I personnel. This includes lessons on each of the rules and laws that a typical F&I Manager would need to follow in the course of their duties. The F&I Manager path includes lessons on F&I menus, products, and services so managers can gain a better understanding of the products they sell.
Estimated Time to Complete:
Vehicle Service Contracts
Introduction to VSCs | VSC Administrators | Insurance Requirements | The Obligor | Bona Fide Insurance Companies | Underwriting Arrangements | What does a VSC Cover? | Deductibles | Eligibility Requirements | Eligibility Restrictions | Used Vehicles | Purchase After Delivery | Scope of Coverage | Exclusionary Coverage | Non-Covered Components | Exclusions | Time and Mileage Requirements | Common Features of VSCs | Rental Car Reimbursement | Roadside Assistance | Trip-Interruption | Prepaid Maintenance | Transferability | Customer Responsibilities | Cancellations | Refunds | Repossession | Total Loss | Pro-Rata Refunds | Calculating Refunds | Dealer Responsibility
FTC Red Flags Rule: Advanced
Developing an Identity Theft Prevention Program | “Covered Accounts” | Alerts and Notifications | Suspicious Documents & Information | Notices of Identity Theft | Identity Theft Prevention Program | Suspicious Activity and Documentation | Detecting Discrepancies | Responding to Red Flags | Clearing Red Flags | Unresolved Red Flags | Mitigating Identity Theft | Data Breach Incident Response | Who to Notify | What to Include in Your Notice | Identity Theft Recovery Services | Service Provider Oversight | Effective Oversight | Service Provider Contracts | Training and Periodical Updates | Elements of a Program Review
FTC Safeguards Rule: Advanced
Security Risk Assessment | Risk Assessment Worksheet | Internet Sales | Phone Sales | Storing NPI | Network Vulnerability Assessments | NVA Vendors | Employee Education | Physical Safeguards | Technical Safeguards | Administrative Safeguards | Overseeing Service Providers | Identifying Service Providers | Ensuring Service Providers Comply | Testing for Effectiveness | Reviewing Your Program | NVAs | Audits | Reacting to Data Breaches | Employees and Customers After a Data Breach | Learning from a Data Breach