Connected Cars - What Does Your Car Know About You?

Today’s connected cars have extraordinary capabilities, packed with a range of buttons, switches and apps which are driven by data. But have you ever wondered how much your car knows about you?  A brand new report by Confused.com can reveal which car manufacturers know the most about you, with the brand leader of intelligence Tesla taking the top spot.

Taking fifteen of the top car manufacturers across the globe, the experts have delved into their privacy policies to reveal which one tells us the most about the data they collect. 

Here are the results:

Being one of the most intelligent cars on the market today, Tesla coming first place is no surprise, as their personalised driving experience needs copious amounts of data to function at full capacity. Scoring a 20 out of 28, Tesla is a leader in innovation and their clever cars even send alerts when the driver is not paying attention during self-driving mode. 

Following close second is Audi, with a score of 19 out of 20, the data absorbed from the infotainment system in an Audi scored second highest in the whole study. Audi drivers will be asked to download the myAudi App, allowing improved route guidance with the latest traffic information from the Internet, read aloud function for Twitter messages, online news, and emails and the charging status if in an e-Tron.

In most technology-driven vehicles, personal details such as name, phone number and address are the most common data points taken by a manufacturer. However, as manufacturers are constantly improving their vehicle tech, more driver data is becoming available. The study also reveals:

  •     Where your data is the safest
  •     Connectivity costs
  •     Whether connected cars make you drive safer

For Dacia drivers, the manufacturer comes in last for the amount of data listed in its privacy policy, with a low score of five out of 28. As the experts scored the brands on 28 different data points commonly collected on drivers, Dacia scored a zero in the infotainment, video and images and emissions categories.

Chris Clark an automotive software security expert at Synopsis  commented on how drivers can make sure their data is safe. “The first thing would be removing all of your Bluetooth data.  The next thing that you can do, which is probably the most pervasive and most available to consumers of today, is to take the vehicle to the dealership and have them reflash the entire vehicle. Because:

1. It will update the vehicle to the latest software that's available to them. This helps to keep the car secure but also updates things like maps to get safer navigation settings.

2. Also ensure that all the information about driver habits, location, paired devices, etc. is removed from the vehicle because it’s been electronically updated. That's the best thing consumers who are really concerned about their personally identifiable information can do.

“Unfortunately, the way that the vehicle systems are designed you lose a lot of the capabilities that you typically would buy that new car for if you don’t connect your phone.  New car purchases don't tend to be about how much horsepower, how the vehicle handles, how comfortable the vehicle is anymore. It's more about the features the vehicle brings e.g. lane detection, safety, security, works with a smartphone. So in terms of disabling or not utilising some features in the vehicle, I wouldn't necessarily recommend it. It's more about being cautious of where that information may go and when you sell the vehicle, you remove the data.” 

If you want to know more about how your personal data is used according to the data protection regulation, all manufacturers will have a data protection information page. 

Confused.com

You Might Also Read:

Hacked Vehicle Owner Database For Sale

« Treason: Top Cyber Security Executive Arrested
Incident Response In The AWS Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

SEEK

SEEK

SEEK create world-class technology solutions to address the needs of job seekers and hirers across multiple sectors including cybersecurity.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Cegeka

Cegeka

Cegeka is a family-owned IT company providing end-to-end IT solutions, services & consultancy.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

Fivecast

Fivecast

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.

Cyex

Cyex

Cyex helps people to become cyber wise. We enable our clients to find, track and improve cyber awareness in one place.