MMOG/LE Assessment Tip | Corporate Administrators

All organizations should have at least two Corporate Administrators (C-Admins), but no more than four, assigned in the web portal to manage access to the MMOG/LE Assessments.

If the C-Admin has left the organization and there is not another one assigned, to get the C-Admin reassigned, you will need to contact Odette to update the primary contact on the account. To update the contact, forward the name and email address of the primary contact currently assigned to This person is usually the employee who initially registered the account. You also need to include the name and address of the new primary contact. Odette will assign the new contact the C-Admin role, at which point they can use the Forgot login option on the login page to reset the password.

Once the new C-Admin is assigned, don’t forget to assign at least one additional C-Admin within the organization.

Please review MMOG/LE 2.2 to ensure that your organization has identified and documented the roles and responsibilities for primary and backup administrators for the web portal for the corresponding job descriptions, work instructions, and training matrices.

Contact the MMOG/LE Help Desk using the BASICS Contact Form if you need additional support with setting up, completing, or submitting your MMOG/LE Assessment.

Disclaimer:  Any MMOG/LE information published by B.A.S.I.C.S. is superseded by information published by Odette, AIAG, and customers, as applicable.  Please contact your customer to resolve any conflicts.

Featured Post | ISO 9001 A Key to Cybersecurity? (Part 1)

Periodically, you will see me give a nod to someone else’s blog post.  October is cybersecurity awareness month, so today BASICS is featuring  a blog, ISO 9001 A Key to Cybersecurity? (Part 1), posted by the Michigan Manufacturing Technology Center (MMTC), written by Andy Nichols (10/9/20).   

Not a day goes by without our news feeds sharing details of yet another cybersecurity breach. It seems large businesses tend to be the main victims, with Target, Equifax, Marriott and even the UK’s National Health System patient data recently being affected by cyberattacks. However, we rarely learn about the impact of information security attacks made on small to medium-sized businesses, partly because they aren’t given as much prominence in the media. Yet, attacks against these smaller companies can and do happen, often with disastrous consequences.

In fact, FEMA concluded that between 40 and 60% of small businesses fail within a year of any type of disaster – including cyberattacks – unless some type of continuity/resiliency plan is put in place. These business failures occur not only from the penalties of paying the ransom, but from the “hidden” costs associated with losing access to information regarding sales pipelines, accounts payable/receivable, as well as intellectual property. A simple “hack” could even change an organization’s bank account details and divert customer payments somewhere else.

So, what is needed to protect small and medium-sized businesses from such an attack? How can an organization become “cyber-resilient”?  Read more…


Click here to learn more about MMTC

Click here to meet the author:  Andy Nichols, CQP MCQI

MMOG/LE v5 New Cybersecurity Requirement

The Materials Management Operations Guideline / Logistics Evaluation (MMOG/LE), developed by the Automotive Industry Action Group (AIAG) and Odette International, is a tool to assess supply chain operations that has been adopted by multiple OEMs within the automotive industry for use with their multi-tiered supply base.  In 2020, MMOG/LE version 5 was released and included a new criterion ( in section 2.5, Risk Assessment and Management, requiring organizations to develop policies regarding supply chain cybersecurity threats. This addition encourages more teamwork between all functional areas of the automotive industry and wants to ensure cybersecurity is addressed within the supply chain operations with the same diligence as other automotive safety issues. The combined expertise is required to ensure that the safety issues introduced by the ever-evolving computer technologies and digital solutions.

October is the month to unite in a joint commitment to raise awareness about the importance of cyber security and ensure all tiers of the supply chain are committed to staying safe and secure online while increasing our resilience against cyber threats.

A hallmark of the automotive industry is extraordinary innovation in the face of market needs. The auto industry has been a leader, steadily driving advances in safety features, safety engineering, and supply chain management in ways that software and cybersecurity disciplines must emulate.

Now the automotive industry faces a new challenge. Modern vehicles are computers on wheels and are increasingly connected and controlled by software and embedded devices. These newer technologies enable innovations designed to increase vehicle safety and bring other positive features. Vehicle-to-vehicle communication, driverless cars, automated traffic flow, and remote control functions are just a few of the evolutions under active development.

New technology and digital solutions introduce new classes of accidents and adversaries that must be anticipated and addressed proactively. Malicious attackers, software flaws, and privacy concerns are the potential unintended consequences of computer technologies driving this latest round of innovation. The once distinct worlds of automobiles and cybersecurity have collided, leading to the automotive industry and the security community to connect and collaborate toward a common goal.

When the technology we depend on affects public safety and human life, it commands our utmost attention and diligence. Our cars command this level of care. Every day, we entrust our lives and the lives of those we love to our automobiles. 

Ensuring all tiers of the supply chain are well protected is now one of the critical cybersecurity strategy features because our industry’s defenses rely on suppliers further down the chain. Cybercriminals take advantage of smaller vendors’ poor security to gain access to the networks of large organizations. Consequently, More than 80% of organizations have experienced a data breach due to security vulnerabilities in their supply chains.

On this journey, the challenges will be many, and they will be significant, but together and through collaboration, we can rise to meet them. We look forward to having suppliers in all tiers of the automotive industry join in this endeavor.

To learn more about MMOG/LE you can visit the Odette or AIAG websites.

B.A.S.I.C.S., LLC is the official MMOG/LE Help Desk for the North American Market