Browse Definitions :
Definition

motor vehicle record (MVR)

Contributor(s): Matthew Haughn

A motor vehicle record (MVR) is the documentation of a person’s driving history. The information in an MVR includes information about the driver's traffic citations, vehicular crimes, accidents, driving under the influence (DUI) convictions and the number of points on the individual’s driver’s license. Additionally, these records may contain personally identifying information (PII) such as age, date of birth, gender, eye color, hair color, weight and height. While the PII on an MVR can be a security concern, it can also be used in two-factor authentication (2FA) to help prevent identity theft.

MVR may be used by insurance companies to determine insurance rates for drivers, with those with clean records getting lower rates. Generally, insurance companies can look back five years into an individual’s MVR.The records may also be used by employers to determine the viability of a prospective employee. These records are especially important in the case of jobs involving commercial motor vehicles (CMVs).

In the United States, the Drivers Privacy Protection Act (DPPA), was enacted in 1994 to protect the privacy of personal information assembled by State Department of Motor Vehicles (DMVs). The DPPA prohibits the release or use of personal information obtained in connection with a motor vehicle record. It sets penalties for violations and makes violators legally liable should PII be sold or released to third-party marketers without the driver's permission. Personal information as defined by the DPPA includes photographs, Social Security Numbers (SSNs), Client Identification Number (CIDs), name and address, telephone number and medical or disability information. It does not include traffic accidents, traffic violations or status of the driver's license.

This was last updated in March 2017

Continue Reading About motor vehicle record (MVR)

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close