Connected Cars - What Does Your Car Know About You?

Today’s connected cars have extraordinary capabilities, packed with a range of buttons, switches and apps which are driven by data. But have you ever wondered how much your car knows about you?  A brand new report by Confused.com can reveal which car manufacturers know the most about you, with the brand leader of intelligence Tesla taking the top spot.

Taking fifteen of the top car manufacturers across the globe, the experts have delved into their privacy policies to reveal which one tells us the most about the data they collect. 

Here are the results:

Being one of the most intelligent cars on the market today, Tesla coming first place is no surprise, as their personalised driving experience needs copious amounts of data to function at full capacity. Scoring a 20 out of 28, Tesla is a leader in innovation and their clever cars even send alerts when the driver is not paying attention during self-driving mode. 

Following close second is Audi, with a score of 19 out of 20, the data absorbed from the infotainment system in an Audi scored second highest in the whole study. Audi drivers will be asked to download the myAudi App, allowing improved route guidance with the latest traffic information from the Internet, read aloud function for Twitter messages, online news, and emails and the charging status if in an e-Tron.

In most technology-driven vehicles, personal details such as name, phone number and address are the most common data points taken by a manufacturer. However, as manufacturers are constantly improving their vehicle tech, more driver data is becoming available. The study also reveals:

  •     Where your data is the safest
  •     Connectivity costs
  •     Whether connected cars make you drive safer

For Dacia drivers, the manufacturer comes in last for the amount of data listed in its privacy policy, with a low score of five out of 28. As the experts scored the brands on 28 different data points commonly collected on drivers, Dacia scored a zero in the infotainment, video and images and emissions categories.

Chris Clark an automotive software security expert at Synopsis  commented on how drivers can make sure their data is safe. “The first thing would be removing all of your Bluetooth data.  The next thing that you can do, which is probably the most pervasive and most available to consumers of today, is to take the vehicle to the dealership and have them reflash the entire vehicle. Because:

1. It will update the vehicle to the latest software that's available to them. This helps to keep the car secure but also updates things like maps to get safer navigation settings.

2. Also ensure that all the information about driver habits, location, paired devices, etc. is removed from the vehicle because it’s been electronically updated. That's the best thing consumers who are really concerned about their personally identifiable information can do.

“Unfortunately, the way that the vehicle systems are designed you lose a lot of the capabilities that you typically would buy that new car for if you don’t connect your phone.  New car purchases don't tend to be about how much horsepower, how the vehicle handles, how comfortable the vehicle is anymore. It's more about the features the vehicle brings e.g. lane detection, safety, security, works with a smartphone. So in terms of disabling or not utilising some features in the vehicle, I wouldn't necessarily recommend it. It's more about being cautious of where that information may go and when you sell the vehicle, you remove the data.” 

If you want to know more about how your personal data is used according to the data protection regulation, all manufacturers will have a data protection information page. 

Confused.com

You Might Also Read:

Hacked Vehicle Owner Database For Sale

« Treason: Top Cyber Security Executive Arrested
Incident Response In The AWS Cloud »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Voyager Networks

Voyager Networks

Voyager Networks is an IT solutions business with a focus on Enterprise Networks, Security and Collaborative Communications.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

South East Cyber Resilience Centre (SECRC)

South East Cyber Resilience Centre (SECRC)

The South East Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Oasis Security

Oasis Security

Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.