Abstract
This paper presents a case study on intelligent connected vehicle data. Intelligent connected vehicles (ICVs) gather comprehensive road data throughout operation to facilitate vehicle automation and enhance user experiences. However, this technological innovation presents new concerns for data security and privacy. This study employs case study analysis to examine the data protection provisions of the top ten ICV companies in China and the governmental rules pertaining to data utilization. The findings indicate that these organizations do not completely adhere to the legal rights afforded to consumers, resulting in possible data security vulnerabilities. To improve this situation, the Chinese government ought to explicitly specify the regulatory responsibilities of the National Security Council (NSC) and the Ministry of Industry and Information Technology (MIIT) via regulations. Furthermore, the government should use media to educate the public about their data rights. These initiatives seek to aid the Chinese government in promptly updating legislation and efficiently controlling data breach threats as ICVs increase.
1. Introduction
The rapid advancement of ICVs, fueled by artificial intelligence and modern manufacturing, has outstripped the development of data security legislation [1]. ICVs depend significantly on comprehensive data that link persons, cars, highway information, and service providers. Throughout the data connection procedure, this information is sent to other organizations, resulting in vulnerabilities [2,3]. ICV companies’ data storage practices reveal significant flaws, including unclear ownership boundaries and weak protections for stakeholder rights. Additionally, there is a lack of sufficient regulatory oversight for cross-border data transfers [4,5,6].
At present, data governance of intelligent connected vehicles has become a global issue. The European Union has set strict standards for cross-border transmission of vehicle data and user privacy through the General Data Protection Regulation (GDPR), but its adaptability in dynamic data processing scenarios is still controversial [7]; although the California Consumer Privacy Act (CCPA) requires companies to actively compensate victims of data leaks, the implementation mechanism relies on corporate self-discipline and the effect is mixed [5]. On the technical level, if the real-time environmental perception and decision-making data relied on by autonomous driving systems are not fully encrypted or anonymized, they may be maliciously used to manipulate vehicle behavior or steal user trajectory information [3]. Although China promulgated the “Several Provisions on the Security Management of Automobile Data (Trial)” in 2021, proposing the principles of “in-vehicle processing” and “default non-collection”, the non-mandatory clauses have led to insufficient compliance willingness of companies [8]. Studies show that only 30% of users can accurately identify the core terms in the privacy policy. This cognitive gap has exacerbated the imbalance of rights and responsibilities between companies and users. Existing research focuses on a single dimension, such as technical protection solutions, legal framework improvement, or user behavior analysis, but there is insufficient cross-disciplinary integration and a lack of systematic empirical evaluation of China’s leading companies [9].
Despite the existence of several Chinese laws and regulations intended to govern ICV companies, the absence of comprehensive implementation guidelines diminishes their practical efficacy. Motivated by significant commercial interests, organizations often neglect to safeguard user data [10,11]. Some scholars suggest defining the responsibilities of all parties involved and establishing standards for vehicle network data security to protect user information [12]. Others advocate for the establishment of user rights and explicit criteria for assessing corporate reimbursement for damages to ensure data security [5]. However, current research lacks legal measures based on empirical studies. This study evaluates the data protection practices of China’s top ten ICV companies, identifying key barriers and deficiencies in enforcing existing regulations. By providing empirical evidence, it aims to refine policy and regulatory frameworks, enhancing ICV technology development and ensuring user data security.
2. Legal Challenges for Data Protection in China’s ICV Industry
ICVs integrate vehicle networking and smart vehicle technology, transforming the conventional interaction among cars, infrastructure, and people. By integrating advanced data communication technologies, ICVs can collect, analyze, and apply vast amounts of data in real time, making fully autonomous driving possible [13,14]. However, this technological shift also introduces new challenges, particularly in personal data protection.
China’s laws and regulations lack comprehensive monitoring for data processing operations in ICVs. The Cybersecurity Law of the People’s Republic of China (CSL) established a fundamental legal framework by delineating the primary entities accountable for network data regulation (Article 8). However, it offers little guidance on how regulators should enforce cybersecurity protections [15]. The Data Security Law of the People’s Republic of China (DSL) establishes a framework for surveillance and proactive alerts (Article 22). Nonetheless, it lacks explicit directives for the implementation of this method. The Regulations on Network Data Security Management delineate the conduct of data handlers and define their responsibilities (Article 21–28). In any case, they provide little information about the precise activities and duties of regulators.
Passive control based on companies reporting themselves is not enough to prevent all data risks. Existing legislation mostly mandates that data processors or service providers must proactively disclose data threats or breaches to authorities (CSL Article 22, 25, 42, 47; DSL Article 29, 30). This strategy significantly depends on their diligence and punctuality. If these companies neglect their reporting obligations, they are subject merely to corrective orders, warnings, and very little penalties (CSL Article 59). The light legal penalties are inadequate for compelling companies to swiftly disclose data concerns or breaches. This may result in the personal data of users of ICVs being compromised prior to the implementation of adequate protective measures.
The lack of awareness about their rights among users of ICVs permits companies to avoid responsibility. The existing laws confer upon persons several rights, including the right to be notified, access, consent, delete, rectify, and reject (Personal Information Protection Law of the People’s Republic of China, PIPL Article 44–50). The implementation of these rights mostly relies on users’ initiative. This approach guarantees personal control over information. Nevertheless, it could impede the effective realization of these rights if people are uninformed or unable to exercise them. The PIPL mandates that large companies regularly publish reports on how they protect personal information (Article 58). This requirement aims to increase transparency and build public trust. While these reports help improve corporate accountability and public oversight, they do not solve the core issue. Individuals still face significant challenges in understanding and exercising their privacy rights.
3. Data Privacy Practices: A Deep Dive into China’s Top Ten ICV Companies
The fast progression of technology has seen the protection of user data become a fundamental concern for regulators, enterprises, and consumers. This chapter will examine the present condition of user data security among the top ten ICV companies in China. This will examine how these companies confer rights to users within the current legal framework and meet their legal responsibilities.
3.1. User Rights: What Are Companies Offering?
By 2025, the size of China’s ICV market is anticipated to surpass CNY one trillion. The market is seeing tremendous expansion and is projected to maintain this trajectory in the next few years [16]. This article identifies the top ten ICV companies in China, selected based on their market share, to analyze the user rights delineated in their privacy policies available on official websites.
The analysis shows that these companies generally recognize and protect six basic rights of users. Specifically, the right to access, correct, delete, withdraw consent, cancel, and refuse. These rights are fundamental to the protection of user data, demonstrating the companies’ regard for personal privacy and their adherence to applicable laws and regulations [17]. The ICV enterprises just providing fundamental rights may be inadequate to address the increasing complexities of data security and the heightened desire for transparency from consumers.
To strengthen users’ sovereignty over their data, several companies have granted new rights. Baidu and BAIC provide its intelligent connected car users with the right to prior notification. Companies inform users of substantial changes to the services offered, including disruptions or discontinuations of service [18,19]. Several companies explicitly confer upon users the right to an explanation, guaranteeing timely notification of the processing of their personal information and the resultant effects [18,20,21,22]. Users possess the right to seek a suspension of data processing when they doubt the accuracy or fairness of their data handling until their concerns are resolved. This right permits them to temporarily halt the processing of their information. Furthermore, users may exercise data portability, allowing them to request the direct transfer of their personal data to another entity [18,23]. The implementation of data portability rights significantly increases users’ control over their data and safeguards them against the negative consequences of automated decision making.
Ultimately, several companies provide extensive safeguarding of consumer rights by explicitly stating in their privacy policies that consumers possess the right to file complaints [19,23,24]. If users are not satisfied after making a complaint, they can seek redress from judicial or government agencies, such as filing a lawsuit in court or lodging a complaint with a data protection authority. This not only offers users an expanded range of remedies but also reinforces the legal obligations companies have in managing user information (Table 1).
Table 1.
Rights granted to users by China’s top ten ICV companies (Short Version).
3.2. Companies’ Rights and Duties: What Are Companies Entitled and Obligated to Do?
In the context of ICV driving, users unavoidably provide personal information to companies. These data, including diverse information both inside and external to the vehicle, underpin ICV services [28]. Once these critical data are obtained, companies may provide personalized intelligent services designed to meet user requirements [29]. During this data exchange procedure, companies not only implement data processing rights according to the user’s expressed preferences but also assume legal duty for safeguarding user privacy and data security.
3.2.1. Companies’ Rights
The top ten ICV companies in China possess the rights to share, transfer, and disclose information. Nevertheless, they exhibit considerable variation in the implementation of these rights. Most companies must obtain express permission from data subjects prior to processing personal data. This strategy adheres to legal mandates for data security while still honoring user privacy. By obtaining users’ express consent about the use of their data, firms may foster trust and mitigate legal concerns associated with privacy.
In some instances, companies may handle data without obtaining user authorization. This includes legally compelled exceptions, including those for public interest, legal requirements, or contractual fulfillment. These exclusions provide essential flexibility, enabling companies to function efficiently and deliver services in the public interest while safeguarding user privacy. The variation in how companies implement these rights may arise from inequalities in their business strategies. For instance, companies with robust data processing capabilities and advanced privacy measures may prefer processing data with user consent to demonstrate their commitment to data protection [30]. Conversely, some may depend on legal exemptions to optimize procedures and save expenses.
Moreover, several companies possess the authority to delegate processing in response to business growth requirements. ICVs depend significantly on intricate data analysis and processing, including real-time navigation, driving behavior assessment, and vehicle repair forecasting. These activities often need specialist technological assistance, and not all automotive companies have this ability. Consequently, numerous companies delegate these responsibilities to external enterprises with the requisite expertise and equipment, thereby guaranteeing superior data processing and service innovation (Table 2).
Table 2.
Rights granted to users by China’s top ten ICV companies.
3.2.2. Companies’ Obligations
The obligations of the top ten smart connected car companies are classified into three categories: preservation, protection, and notification obligations. Concerning preservation obligations, each company adheres to the principle of requirements, maintaining personal user information just for the legally permissible and required period for business purposes.
Protection obligations are crucial in the data management of smart connected car enterprises, including data acquisition, surveillance, and post-incident remediation. During the data collection phase, companies such as Huawei and Baidu follow the principle of minimal requirements, gathering just the necessary information required to provide services [18,20]. While other companies may not explicitly express the same goal, they are nevertheless required to adhere to applicable legal criteria to validate the validity of their data collecting practices. During the monitoring phase, all companies prioritize enhancing the selection and training of technical personnel, establishing specific access rights to guarantee workers manage data only within required and allowed limits.
Furthermore, to mitigate future data security events, every company has created comprehensive emergency plans, including prompt risk evaluations, swift reaction protocols, and post-incident remediation procedures. The creation and execution of these strategies guarantee that companies may promptly enact actions to safeguard user information to the maximum degree feasible in the case of data breaches or other security concerns.
To further enhance the transparency and credibility of data handling, BYD also regularly publishes personal information security impact assessment reports [21]. These reports detail the measures and their effectiveness in data processing and protection, allowing users and the public to clearly understand the company’s efforts and achievements in maintaining personal information security.
As for companies fulfilling their notification duties, there are significant differences in the conditions that trigger these obligations. Some companies notice modifications to services and policy revisions as the primary basis for satisfying their notice responsibilities [20,23,25]. This method guarantees that consumers are completely informed of any alterations that may impact the use of their personal data throughout the service. Other companies activate their notification responsibilities primarily in the occurrence of a personal information security breach [18,19,21,22,24,26,27]. In such instances, the company informs users only upon the occurrence of a data breach or other security problem. This approach fulfills the basic legal standards; nonetheless, it may restrict consumers’ comprehension of the utilization and processing of their data in the absence of a security event (Table 3).
Table 3.
The obligations of China’s top ten ICV companies.
5. Legal Tactics: Advancing Regulatory Oversight of ICV Companies
As ICV technology advances and the market grows, it is essential for the legal framework to adapt accordingly to effectively tackle emerging challenges. This chapter will delve into strategies for fostering the sustainable growth of the smart connected vehicle industry and safeguarding user rights.
5.1. Crafting Comprehensive Regulatory Guidelines for ICVs
5.1.1. Refining China’s Legal Regulatory Framework
In comparison to the EU’s broad legislative framework for data subject protection, China’s structure seems less extensive. The EU employs a singular directive and seven regulations to regulate corporate data processing and safeguard the rights of data subjects. The General Data Protection Regulation (GDPR) is an essential component of EU data protection legislation, standardizing privacy rules throughout member states and providing enhanced protections and rights for data subjects [40]. The European Data Protection Board (EDPB) has established a set of recommendations for the implementation of personal data protection, delineating the specific obligations of all entities engaged in data processing (Figure 2). The rules thoroughly clarify the rights of data subjects to data portability and consent and specify requirements for privacy protection. They delineate the rights and obligations of regulatory organizations, data processors, and service providers, including the processes for reporting infractions.
Figure 2.
The framework of the EU’s data protection.
China regulates corporate data processing with just three laws and two regulations (Figure 1). These legal measures provide a framework for data security management but may lack sufficient detail for implementation and operation. For instance, specifics on data classification and the measures for processing and protecting data by different parties are not thoroughly explained, making practical application challenging.
To improve the efficacy and comprehensiveness of data protection in the nation, China could contemplate using the EU’s expertise in optimizing legislative frameworks for data protection. The Chinese government needs to accelerate the formulation of more comprehensive subsidiary rules and implementation guidance. This would guarantee that privacy regulations are not just extensive in theory but actually effectively protect the rights of data subjects in reality, while harmonizing technological progress and economic development.
5.1.2. Defining the Enforcement Rights and Responsibilities of Regulatory Agencies
The legislation explicitly confers on the relevant agencies the right and obligation to implement rules, emphasizing the joint oversight of ICV companies by many bodies. China has established many regulatory agencies for the regulation of ICV data processing, including the Cyberspace Administration of China (CAC), the National Security Commission (NSC), and the Ministry of Industry and Information Technology (MIIT). These entities are responsible for guaranteeing the secure functioning of networks and information systems, as well as supervising business data processing. Each regional cyberspace office is tasked with supervising network data security within its jurisdiction, guaranteeing the safe functioning of all networks and information systems. Other departments are responsible for supervising the data processing operations of organizations [41].
5.1.3. Rights and Obligations of the NSC
The NSC must establish explicit criteria for using its investigative and intervention rights in relation to ICV companies. The exercise of these rights is aimed at fulfilling the NSC’s primary mission: the protection of national security [42].
The NSC is empowered to examine ICV companies upon reasonable suspicion of unlawful management or transfer of sensitive information. The investigations rely on the company’s self-reports and concerns uncovered during security assessments conducted by the MIIT. Through these inquiries, the NSC evaluates probable breaches of national security legislation, the characteristics of these breaches, and their possible significance. If the investigation confirms actions that directly threaten national security, the NSC should then exercise its intervention rights.
Specifically, actions that directly threaten national security include significant data breaches at ICV companies, transferring over 100,000 pieces of data abroad, or 10,000 pieces of sensitive personal information without proper data certification (Provisions on Promoting and Regulating Cross-border Data Flows, Article 8). Moreover, the NSC has the jurisdiction to mandate the prompt termination of unlawful activities, enforce supplementary security protocols, and suspend or limit the company’s operations.
5.1.4. Rights and Obligations of the MIIT
The MIIT must be specifically authorized to access and audit ICV companies. This encompasses access to the whole data processing infrastructure of a corporation, including data collection, processing, storage, and dissemination. During inspections, the MIIT has the authority to review the technical configurations and data flows to ensure compliance with legal standards.
The MIIT should possess the ability to require detailed reports and records about a company’s data management practices. Furthermore, it must have the capability to retrieve essential data and documents for inquiries into any infractions or data breaches. To guarantee the proper execution of these rights, comprehensive rules must delineate explicit responsibilities for the MIIT, including the performance of both regular and unscheduled inspections [43].
Additionally, the MIIT should provide technical and policy support to ICV companies to enhance their data protection standards, which includes arranging training sessions, providing guidance manuals, and disseminating best practice examples. The MIIT also must provide openness in the regulatory process by disseminating the results of oversight and notable data security events to enhance public confidence and comprehension of data protection initiatives (Figure 3).
Figure 3.
Division of government functions in regulating ICV.
5.2. Boosting the Impact of External Regulation for ICV Companies
5.2.1. Tightening Control with Strict Reporting Deadlines
The government needs to set definitive reporting dates rather than commencing reports only in response to emerging dangers. The existing paradigm, which initiates reporting only upon the manifestation of a danger, often acts as a pretext for firms to shirk accountability and neglect reporting obligations [44]. Therefore, the government needs to enforce regular routine reporting on a monthly or quarterly schedule, along with immediate reporting during emergencies.
Under standard management settings, rules should require corporations to notify quickly upon identifying particular risks or security events. Furthermore, they are required to consistently produce reports about their data management and security procedures to guarantee ongoing scrutiny. These regular reports must include security audit results, discovered vulnerabilities, assessments of the efficacy of current security protocols, and any proposed improvements.
However, in emergency situations, such as data breaches or the exploitation of security vulnerabilities, organizations must disclose to the appropriate regulatory authorities within 24 h. This mandate would require that companies swiftly address critical security incidents and immediately tell authorities, therefore reducing the potential for information delays. Furthermore, definitive reporting timelines are created to mandate companies to disclose all data security vulnerabilities within a certain period.
5.2.2. Designing a Structured Penalty System for Enhanced Accountability
A structured system of penalties should be established to enhance penalties. Existing disciplinary measures, like rectification orders, warnings, and nominal penalties, have little deterrent influence on enterprises. The government needs to correlate penalty levels directly with a company’s annual revenue and modify them according to the extent, length, and particular harm resulting from the infraction. For example, data breaches involving substantial quantities of user information or national security may result in penalties of up to 5% of the company’s annual revenue. This multilayered penalty system more precisely represents the gravity and possible damage of the violation.
Moreover, the government might implement a graduated penalties system. Companies that consistently breach data protection standards should face escalating fines and penalties. This should include not just financial penalties but also the possible suspension or limitation of company activities until remedial actions are implemented. However, if a company fails to report a data security incident within the required timeframe, penalties should increase with the length of the delay. The severity of these penalties should be determined based on the type of report delayed and the duration of the delay (Table 4).
Table 4.
The structured penalty system.
According to the California Consumer Privacy Act (CCPA, Article 1798.150), data processors must proactively compensate victims in the event of data breaches or violations of data subject rights. This differs from prevailing norms in China, where data subjects are required to pursue compensation independently via complaints, negotiations, or litigation. This procedure not only burdens the victims but also results in many breaches being unresolved. China should amend its existing laws to include an “automatic compensation mechanism for data violations” to enhance legal effectiveness and protect data subjects’ rights more effectively. This reform would streamline the process of securing reparations for data breaches, ensuring more reliable protection for individuals’ privacy.
5.3. Empowering ICV Users: Spreading Awareness of Rights
Legal education is a fundamental technique for increasing awareness of ICV users’ rights. While legislation provides eight rights to ICV users (Table 5), the top ten ICV companies in China often provide just six. Consequently, the government needs to extensively disseminate these eight legislative rights via several methods.
Table 5.
Rights granted to ICV users by law.
5.3.1. Traditional Legal Education: Television and Community Engagement
Television, as a conventional media for legal instruction, has a distinct advantage owing to its extensive audience reach. The broadcasting authorities might effectively use this platform by including public service messages on people’s data rights during prime time, particularly inside popular television programs. These advertisements may be created as engaging mini dramas that illustrate real-life situations, emphasizing the significance and practical approaches to personal data security. This method allows audiences to obtain essential legal insights while engaging in their amusement [45].
Furthermore, television producers may partner with legal specialists to create a series focused on examining different facets of data security. These seminars may include dialogues with specialists from legal, technological, and social domains on the most recent data protection legislation and privacy technology. They would investigate the social implications of these technologies, improving public comprehension and proficiency in data security. These initiatives use case studies and expert dialogues to enhance public comprehension of data protection legislation. On top of that, the broadcasting authority should facilitate frequent public forums or live call-in programs, allowing viewers to pose direct inquiries to legal experts. This participatory method swiftly responds to public apprehensions, thus improving the efficacy and involvement of legal teaching.
5.3.2. Modernizing Legal Education: Internet and Social Media
New media is especially favored by youth as a novel approach to legal education due to its provision of quick, interactive, and visually engaging material [46]. New media platforms not only speed up and broaden the dissemination of legal information but also enhance interactivity.
Regulatory authorities are essential in safeguarding the rights of ICV users. Regulatory authorities should implement effective actions against companies that do not properly uphold statutory rights for their customers. These measures may include engaging in dialogues with the companies, issuing official admonitions, and disclosing the identities of non-compliant entities.
Furthermore, authorities must contemplate the imposition of significant fines and other administrative sanctions to ensure compliance. Regulators should mandate that companies submit comprehensive rectification plans and provide explicit timelines for their implementation when assessing penalties. New media presents unique instruments such as augmented reality (AR) and virtual reality (VR), which replicate legal circumstances, enabling users to study and engage with legal ideas immersively. This immersive learning substantially improves users’ comprehension and recall of legal material. Finally, the swift reactivity of new media promptly disseminates the newest advancements in law and technology to the public [47]. This feature is crucial for helping users quickly understand the current legal environment, which is essential for protecting their legal rights.
6. Conclusions
As ICV technology becomes more integrated and prevalent, the systematic collecting, processing, and transfer of extensive personal data directly affect user rights and data security. Nonetheless, existing data protection legislation, often formulated for conventional data processing methods, inadequately governs the data management practices of ICV companies.
A study evaluating the management of user rights and duties by China’s top ten ICV companies revealed that these companies often do not comply with regulations. The absence of compliance has raised public skepticism over the efficacy of their self-regulatory measures in data management; according to the “2022 China Consumers’ Intelligent Connected Vehicle Data Security and Personal Privacy Awareness and Concerns Survey” report released by the US market research organization J.D. Power, the overall confidence index of the consumers surveyed was only 45.7 points (out of 100 points). Therefore, the Chinese government must promptly enhance laws and explicitly delineate the regulatory functions and authorities of the CAC, the NSC, and the MIIT. Specifically, the CAC should assume the responsibility of coordinating and directing the regulatory functions of other agencies engaged in the oversight of ICV. Simultaneously, the NSC needs to be endowed with the authority to examine and act in issues that might jeopardize national security or public interest. The MIIT should be given access and auditing powers to meticulously oversee and evaluate the data processing procedures of ICV enterprises. This systematic method will guarantee that each regulatory entity can efficiently execute its assigned duties in overseeing the intricacies of ICV operations.
Moreover, to enhance regulatory effectiveness, China’s government should provide explicit reporting requirements for companies and enforce severe penalties. It should also enhance legal education about user rights to ensure users are well aware of their entitlements and the remedies accessible to them.
However, this article only discusses compliance with rights and obligations from a legal perspective, not considering the corporate culture and technical challenges. A following study will investigate these non-legal elements, including company culture, technical competencies, and internal management frameworks, and their influence on data security. This will provide a more thorough perspective on the performance of smart connected car firms in data processing.
Author Contributions
Conceptualization, T.S. and Y.X.; methodology, T.S. and H.W.; validation, T.S. and Y.X.; formal analysis, H.W.; investigation, T.S. and H.W.; resources, Y.X; data curation, Y.X; writing—original draft preparation, T.S. and H.W.; writing—review and editing, T.S. and Y.X.; visualization, T.S.; supervision, Y.X.; project administration, Z.C.; funding acquisition. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the National Social Science Foundation of China (Project No. 21&ZD205) and the National Social Science Foundation of China (Project No. 22CFX018).
Data Availability Statement
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.
Conflicts of Interest
Author Tian Sun was employed by the company China Gezhouba Group Cement Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
References
- Zheng, Z. Privacy Protection in the Era of Artificial Intelligence. Sci. Law Northwest Univ. Polit. Law 2019, 37, 51–60. [Google Scholar] [CrossRef]
- Maeng, K.; Kim, W.; Cho, Y. Consumers’ Attitudes Toward Information Security Threats Against Connected and Autonomous Vehicles. Telemat. Inf. 2021, 63, 101646. [Google Scholar] [CrossRef]
- Long, C.; Liu, K.; Zhou, B.; Li, Q. Key Technologies of Multi-Agent Collaborative High Definition Map Construction. Acta Geod. Cartogr. Sin. 2021, 50, 1447. [Google Scholar] [CrossRef]
- Chen, M. Intelligent Vehicle Data Sharing Dilemmas and Legal Regulations. Times Automot. 2024, 7, 7–9. [Google Scholar]
- Aisker, M.M. On the Dilemmas and Solutions of Protecting Personal Information of End Users of Intelligent Connected Vehicles. Karamay Acad. J. 2024, 2, 68–76. [Google Scholar]
- Zheng, G. Data Rule of Law and Future Transportation—Preliminary Discussion on Autonomous Vehicle Data Governance. China Leg. Rev. 2022, 1, 202–214. [Google Scholar]
- Daniel, N.F. EU Data Governance: Preserving Global Privacy in the Age of Surveillance. Doctoral Dissertation, Johns Hopkins University, Baltimore, MD, USA, 2022. [Google Scholar]
- Zhao, M.; Lu, R.; Zhou, B.; Kang, T. Review of Research on the Commercialization of China’s Intelligent and Connected Vehicles Industry. In Society of Automotive Engineers (SAE)-China Congress; Springer Nature Singapore: Singapore, 2024; pp. 836–848. [Google Scholar]
- Verma, S.K.; Verma, R.; Singh, B.K.; Sinha, R.S. Management of intelligent transportation systems and advanced technology. In Intelligent Transportation System and Advanced Technology; Springer Nature Singapore: Singapore, 2024; pp. 159–175. [Google Scholar]
- Brell, T.; Biermann, H.; Philipsen, R.; Ziefle, M. Conditional Privacy: Users’ Perception of Data Privacy in Autonomous Driving. In Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, Heraklion, Greece, 3–5 May 2019; Volume 1, pp. 352–359. [Google Scholar] [CrossRef]
- Cai, K.; Yu, Z. Research on the Antecedents of Data Privacy Concern Toward Intelligent Connected Vehicles. Int. J. Hum.-Comput. Interact. 2024, 1, 2376302. [Google Scholar] [CrossRef]
- Qin, Q.L.; Xie, L.J. Analysis of Security Risks in Internet of Vehicles Data and Related Recommendations. Inf. Commun. Technol. Policy 2020, 8, 37–40. [Google Scholar]
- Xie, Y.S. Management Regulations for the Use of 5905–5925 MHz Frequency Band for Direct Communication in Internet of Vehicles (Intelligent Connected Vehicles). Intell. Connect. Veh. 2019, 1, 89–90. [Google Scholar]
- Sadaf, M.; Iqbal, Z.; Javed, A.R.; Saba, I.; Krichen, M.; Majeed, S.; Raza, A. Connected and Automated Vehicles: Infrastructure, Applications, Security, Critical Challenges, and Future Aspects. Technologies 2023, 11, 117. [Google Scholar] [CrossRef]
- Yang, Y.L. Implementation Challenges and Solutions of the Cybersecurity Law. Netw. Secur. Technol. Appl. 2022, 11, 78. [Google Scholar]
- China Industry Research Institute. 2024 Intelligent Vehicle (Intelligent Connected Vehicle) Industry In-Depth Research and Investment Prospect Forecast Report; Shenzhen Zhongshang Industry Research Institute Co., Ltd.: Shenzhen, China, 2024; p. 70. [Google Scholar]
- Feng, S.M. Analysis and Critique of WDPB’s “Guidelines for Personal Data Protection in the Internet of Vehicles”. Commer. Veh. 2024, 2, 92–95. [Google Scholar]
- Baidu CarLife+ Privacy Policy. Available online: https://carlife.baidu.com/static/carlifemis/duty/secretright_new.html (accessed on 13 February 2025).
- Extreme Fox (GitLab) Privacy Protection Policy. Available online: https://gitlab.cn/terms/20220728/privacy/ (accessed on 13 February 2025).
- AITO Car Privacy Policy. Available online: https://aito.auto/privacy/ (accessed on 13 February 2025).
- BYD CarDiLink System Privacy Policy. Available online: https://profilesys.bydauto.com.cn/dilinkapp/dilink/pad/privacy.html (accessed on 13 February 2025).
- SAIC Motor Car Privacy Policy. Available online: https://www.saicmg.com/policies/car-privacy-policy-2023.html (accessed on 13 February 2025).
- Changan Kaicheng APP Privacy Policy. Available online: https://appkc.changan.com.cn/followup/privacy (accessed on 13 February 2025).
- Audi Privacy Policy. Available online: https://www.audi.cn/zh/privacy.html (accessed on 13 February 2025).
- Li Auto User Privacy Policy. Available online: https://www.lixiang.com/agreement/privacy.html (accessed on 13 February 2025).
- NIO Privacy Policy. Available online: https://www.nio.cn/policies/privacy-policy (accessed on 13 February 2025).
- Xpeng Motors Privacy Policy. Available online: https://www.xiaopeng.com/content/4209.html (accessed on 13 February 2025).
- How Real-Time Data Shapes the Infrastructure Powering Connected Cars. Available online: https://www.forbes.com/councils/forbestechcouncil/2024/11/08/how-real-time-data-shapes-the-infrastructure-powering-connected-cars/ (accessed on 13 February 2025).
- Making Connected Car Data Matter. Available online: https://www.automotive-iq.com/autonomous-drive/articles/making-connected-car-data-matter (accessed on 13 February 2025).
- Kemp, K. Concealed Data Practices and Competition Law: Why Privacy Matters. Eur. Compet. J. 2020, 16, 628–672. [Google Scholar] [CrossRef]
- Chen, B. Analysis of Network Security and Data Security Risks in China’s Internet of Vehicles. Cyberspace Secur. 2024, 15, 115–119. [Google Scholar]
- New Guidelines for Data Compliance of Multinational Banks and Financial Institutions—Interpretation of the “Regulations on the Administration of Network Data Security”. Available online: https://business.sohu.com/a/848957856_120942243 (accessed on 31 January 2025).
- Annual Insights on Data Security of Intelligent Connected Vehicles (2023)—Building Enterprise Immunity. Available online: https://www.ev100online.com/research/detail/615/report (accessed on 13 February 2025).
- Lin, X.M. Xiaopeng Motors Fined, Unveiling the Tip of the Iceberg: Data Security Governance Still Faces Bottlenecks. China Bus. Circ. 2022, Z1, 113–119. [Google Scholar]
- NIO Deeply Involved in User Data ‘Leakage Gate’! Excessive Information Collection Leads to Privacy Protection Difficulties. Available online: https://baijiahao.baidu.com/s?id=1753336021792708966&wfr=spider&for=pc (accessed on 1 February 2024).
- Your Car Might Be ‘Spying’ on You: XPeng, Changan, BYD, Nissan, and Other Automakers Ban Remote Observation Function Products. Available online: https://www.sohu.com/a/560171592_121019331 (accessed on 1 February 2024).
- Joint Laboratory for Internet of Vehicles Security. Annual Report on the Development of Intelligent Connected Vehicle Network Security and Data Security; Social Sciences Academic Press (China): Beijing, China, 2023. [Google Scholar]
- Binns, R. Data protection impact assessments: A meta-regulatory approach. Int. Data Priv. Law 2017, 7, 22–35. [Google Scholar] [CrossRef]
- Pasquale, F. The Black Box Society: The Secret Algorithms That Control Money and Information; Harvard University Press: Cambridge, MA, USA, 2015. [Google Scholar]
- Matt Burgess. What is GDPR? The Summary Guide to GDPR Compliance in the UK. Available online: https://www.wired.co.uk/article/what-is-gdpr-uk-eu-legislation-compliance-summary-fines-2018 (accessed on 13 February 2025).
- The People’s Republic of China. Cyber Data Security Management Regulations, Chapter VII, Articles 47–54; National Laws and Regulations Database: Beijing, China, 2021.
- The 14th Five-Year Plan for National Road Traffic Safety. Available online: https://www.gov.cn/zhengce/zhengceku/2022-07/29/content_5703363.htm (accessed on 13 February 2025).
- Administrative Measures for Data Security in the Field of Industry and Information Technology (Trial), Chapter IV, Articles 26–29. Available online: https://www.gov.cn/zhengce/zhengceku/2022-12/14/content_5731918.htm (accessed on 13 February 2025).
- Liu, J. On Institutional Innovation of Corporate Social Responsibility. Comp. Law Rev. 2021, 4, 17–37. [Google Scholar]
- Liu, J.; Xu, J.; Ding, J.; Heng, X. An Exploration of Public Service Advertising. Mod. Commun. J. Commun. Univ. China 1991, 4, 54–58. [Google Scholar]
- How Should Traditional Legal Media Develop from the ‘New’ Perspective? Available online: https://www.xinhuanet.com/zgjx/2018-06/12/c_137248006.htm (accessed on 13 February 2025).
- Transformation of Legal Communication Models by New Media Technologies. Available online: https://www.cssn.cn/fx/xr/202403/t20240301_5736139.shtml (accessed on 13 February 2025).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Published by MDPI on behalf of the World Electric Vehicle Association. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).


