Connected Cars - What Does Your Car Know About You?

Today’s connected cars have extraordinary capabilities, packed with a range of buttons, switches and apps which are driven by data. But have you ever wondered how much your car knows about you?  A brand new report by Confused.com can reveal which car manufacturers know the most about you, with the brand leader of intelligence Tesla taking the top spot.

Taking fifteen of the top car manufacturers across the globe, the experts have delved into their privacy policies to reveal which one tells us the most about the data they collect. 

Here are the results:

Being one of the most intelligent cars on the market today, Tesla coming first place is no surprise, as their personalised driving experience needs copious amounts of data to function at full capacity. Scoring a 20 out of 28, Tesla is a leader in innovation and their clever cars even send alerts when the driver is not paying attention during self-driving mode. 

Following close second is Audi, with a score of 19 out of 20, the data absorbed from the infotainment system in an Audi scored second highest in the whole study. Audi drivers will be asked to download the myAudi App, allowing improved route guidance with the latest traffic information from the Internet, read aloud function for Twitter messages, online news, and emails and the charging status if in an e-Tron.

In most technology-driven vehicles, personal details such as name, phone number and address are the most common data points taken by a manufacturer. However, as manufacturers are constantly improving their vehicle tech, more driver data is becoming available. The study also reveals:

  •     Where your data is the safest
  •     Connectivity costs
  •     Whether connected cars make you drive safer

For Dacia drivers, the manufacturer comes in last for the amount of data listed in its privacy policy, with a low score of five out of 28. As the experts scored the brands on 28 different data points commonly collected on drivers, Dacia scored a zero in the infotainment, video and images and emissions categories.

Chris Clark an automotive software security expert at Synopsis  commented on how drivers can make sure their data is safe. “The first thing would be removing all of your Bluetooth data.  The next thing that you can do, which is probably the most pervasive and most available to consumers of today, is to take the vehicle to the dealership and have them reflash the entire vehicle. Because:

1. It will update the vehicle to the latest software that's available to them. This helps to keep the car secure but also updates things like maps to get safer navigation settings.

2. Also ensure that all the information about driver habits, location, paired devices, etc. is removed from the vehicle because it’s been electronically updated. That's the best thing consumers who are really concerned about their personally identifiable information can do.

“Unfortunately, the way that the vehicle systems are designed you lose a lot of the capabilities that you typically would buy that new car for if you don’t connect your phone.  New car purchases don't tend to be about how much horsepower, how the vehicle handles, how comfortable the vehicle is anymore. It's more about the features the vehicle brings e.g. lane detection, safety, security, works with a smartphone. So in terms of disabling or not utilising some features in the vehicle, I wouldn't necessarily recommend it. It's more about being cautious of where that information may go and when you sell the vehicle, you remove the data.” 

If you want to know more about how your personal data is used according to the data protection regulation, all manufacturers will have a data protection information page. 

Confused.com

You Might Also Read:

Hacked Vehicle Owner Database For Sale

« Treason: Top Cyber Security Executive Arrested
Incident Response In The AWS Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Quantropi

Quantropi

Quantropi is bound to be the standard for quantum-secure data communications – forever unbreakable, no matter what.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.

Camms

Camms

Camms are a team of experienced professionals dedicated to providing innovative GRC software solutions that help organizations manage risk, make informed decisions, and drive positive change.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.