Connected Cars - What Does Your Car Know About You?

Today’s connected cars have extraordinary capabilities, packed with a range of buttons, switches and apps which are driven by data. But have you ever wondered how much your car knows about you?  A brand new report by Confused.com can reveal which car manufacturers know the most about you, with the brand leader of intelligence Tesla taking the top spot.

Taking fifteen of the top car manufacturers across the globe, the experts have delved into their privacy policies to reveal which one tells us the most about the data they collect. 

Here are the results:

Being one of the most intelligent cars on the market today, Tesla coming first place is no surprise, as their personalised driving experience needs copious amounts of data to function at full capacity. Scoring a 20 out of 28, Tesla is a leader in innovation and their clever cars even send alerts when the driver is not paying attention during self-driving mode. 

Following close second is Audi, with a score of 19 out of 20, the data absorbed from the infotainment system in an Audi scored second highest in the whole study. Audi drivers will be asked to download the myAudi App, allowing improved route guidance with the latest traffic information from the Internet, read aloud function for Twitter messages, online news, and emails and the charging status if in an e-Tron.

In most technology-driven vehicles, personal details such as name, phone number and address are the most common data points taken by a manufacturer. However, as manufacturers are constantly improving their vehicle tech, more driver data is becoming available. The study also reveals:

  •     Where your data is the safest
  •     Connectivity costs
  •     Whether connected cars make you drive safer

For Dacia drivers, the manufacturer comes in last for the amount of data listed in its privacy policy, with a low score of five out of 28. As the experts scored the brands on 28 different data points commonly collected on drivers, Dacia scored a zero in the infotainment, video and images and emissions categories.

Chris Clark an automotive software security expert at Synopsis  commented on how drivers can make sure their data is safe. “The first thing would be removing all of your Bluetooth data.  The next thing that you can do, which is probably the most pervasive and most available to consumers of today, is to take the vehicle to the dealership and have them reflash the entire vehicle. Because:

1. It will update the vehicle to the latest software that's available to them. This helps to keep the car secure but also updates things like maps to get safer navigation settings.

2. Also ensure that all the information about driver habits, location, paired devices, etc. is removed from the vehicle because it’s been electronically updated. That's the best thing consumers who are really concerned about their personally identifiable information can do.

“Unfortunately, the way that the vehicle systems are designed you lose a lot of the capabilities that you typically would buy that new car for if you don’t connect your phone.  New car purchases don't tend to be about how much horsepower, how the vehicle handles, how comfortable the vehicle is anymore. It's more about the features the vehicle brings e.g. lane detection, safety, security, works with a smartphone. So in terms of disabling or not utilising some features in the vehicle, I wouldn't necessarily recommend it. It's more about being cautious of where that information may go and when you sell the vehicle, you remove the data.” 

If you want to know more about how your personal data is used according to the data protection regulation, all manufacturers will have a data protection information page. 

Confused.com

You Might Also Read:

Hacked Vehicle Owner Database For Sale

« Treason: Top Cyber Security Executive Arrested
Incident Response In The AWS Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Military Cyber Professionals Association (MCPA)

Military Cyber Professionals Association (MCPA)

MCPA are a team of Soldiers, Sailors, Airmen, Marines, Veterans and others interested in the development of the American military cyber profession.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Davinsi Labs

Davinsi Labs

Davinsi Labs helps companies achieve Digital Service Excellence with specialized Security Intelligence and Service Intelligence solutions.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.