Skip to Content
WEVJWorld Electric Vehicle Journal
  • Article
  • Open Access

2 March 2025

A Legal Study: How Do China’s Top 10 Intelligent Connected Vehicle Companies Protect Consumer Rights?

,
,
and
1
China Gezhouba Group Cement Co., Ltd., Wuhan 430073, China
2
School of Law, Chongqing University, Chongqing 400044, China
3
The Faculty of Law and Justice, The University of New South Wales (UNSW), Sydney, NSW 2052, Australia
4
School of Law, Wuhan University, Wuhan 430072, China

Abstract

This paper presents a case study on intelligent connected vehicle data. Intelligent connected vehicles (ICVs) gather comprehensive road data throughout operation to facilitate vehicle automation and enhance user experiences. However, this technological innovation presents new concerns for data security and privacy. This study employs case study analysis to examine the data protection provisions of the top ten ICV companies in China and the governmental rules pertaining to data utilization. The findings indicate that these organizations do not completely adhere to the legal rights afforded to consumers, resulting in possible data security vulnerabilities. To improve this situation, the Chinese government ought to explicitly specify the regulatory responsibilities of the National Security Council (NSC) and the Ministry of Industry and Information Technology (MIIT) via regulations. Furthermore, the government should use media to educate the public about their data rights. These initiatives seek to aid the Chinese government in promptly updating legislation and efficiently controlling data breach threats as ICVs increase.

1. Introduction

The rapid advancement of ICVs, fueled by artificial intelligence and modern manufacturing, has outstripped the development of data security legislation [1]. ICVs depend significantly on comprehensive data that link persons, cars, highway information, and service providers. Throughout the data connection procedure, this information is sent to other organizations, resulting in vulnerabilities [2,3]. ICV companies’ data storage practices reveal significant flaws, including unclear ownership boundaries and weak protections for stakeholder rights. Additionally, there is a lack of sufficient regulatory oversight for cross-border data transfers [4,5,6].
At present, data governance of intelligent connected vehicles has become a global issue. The European Union has set strict standards for cross-border transmission of vehicle data and user privacy through the General Data Protection Regulation (GDPR), but its adaptability in dynamic data processing scenarios is still controversial [7]; although the California Consumer Privacy Act (CCPA) requires companies to actively compensate victims of data leaks, the implementation mechanism relies on corporate self-discipline and the effect is mixed [5]. On the technical level, if the real-time environmental perception and decision-making data relied on by autonomous driving systems are not fully encrypted or anonymized, they may be maliciously used to manipulate vehicle behavior or steal user trajectory information [3]. Although China promulgated the “Several Provisions on the Security Management of Automobile Data (Trial)” in 2021, proposing the principles of “in-vehicle processing” and “default non-collection”, the non-mandatory clauses have led to insufficient compliance willingness of companies [8]. Studies show that only 30% of users can accurately identify the core terms in the privacy policy. This cognitive gap has exacerbated the imbalance of rights and responsibilities between companies and users. Existing research focuses on a single dimension, such as technical protection solutions, legal framework improvement, or user behavior analysis, but there is insufficient cross-disciplinary integration and a lack of systematic empirical evaluation of China’s leading companies [9].
Despite the existence of several Chinese laws and regulations intended to govern ICV companies, the absence of comprehensive implementation guidelines diminishes their practical efficacy. Motivated by significant commercial interests, organizations often neglect to safeguard user data [10,11]. Some scholars suggest defining the responsibilities of all parties involved and establishing standards for vehicle network data security to protect user information [12]. Others advocate for the establishment of user rights and explicit criteria for assessing corporate reimbursement for damages to ensure data security [5]. However, current research lacks legal measures based on empirical studies. This study evaluates the data protection practices of China’s top ten ICV companies, identifying key barriers and deficiencies in enforcing existing regulations. By providing empirical evidence, it aims to refine policy and regulatory frameworks, enhancing ICV technology development and ensuring user data security.

3. Data Privacy Practices: A Deep Dive into China’s Top Ten ICV Companies

The fast progression of technology has seen the protection of user data become a fundamental concern for regulators, enterprises, and consumers. This chapter will examine the present condition of user data security among the top ten ICV companies in China. This will examine how these companies confer rights to users within the current legal framework and meet their legal responsibilities.

3.1. User Rights: What Are Companies Offering?

By 2025, the size of China’s ICV market is anticipated to surpass CNY one trillion. The market is seeing tremendous expansion and is projected to maintain this trajectory in the next few years [16]. This article identifies the top ten ICV companies in China, selected based on their market share, to analyze the user rights delineated in their privacy policies available on official websites.
The analysis shows that these companies generally recognize and protect six basic rights of users. Specifically, the right to access, correct, delete, withdraw consent, cancel, and refuse. These rights are fundamental to the protection of user data, demonstrating the companies’ regard for personal privacy and their adherence to applicable laws and regulations [17]. The ICV enterprises just providing fundamental rights may be inadequate to address the increasing complexities of data security and the heightened desire for transparency from consumers.
To strengthen users’ sovereignty over their data, several companies have granted new rights. Baidu and BAIC provide its intelligent connected car users with the right to prior notification. Companies inform users of substantial changes to the services offered, including disruptions or discontinuations of service [18,19]. Several companies explicitly confer upon users the right to an explanation, guaranteeing timely notification of the processing of their personal information and the resultant effects [18,20,21,22]. Users possess the right to seek a suspension of data processing when they doubt the accuracy or fairness of their data handling until their concerns are resolved. This right permits them to temporarily halt the processing of their information. Furthermore, users may exercise data portability, allowing them to request the direct transfer of their personal data to another entity [18,23]. The implementation of data portability rights significantly increases users’ control over their data and safeguards them against the negative consequences of automated decision making.
Ultimately, several companies provide extensive safeguarding of consumer rights by explicitly stating in their privacy policies that consumers possess the right to file complaints [19,23,24]. If users are not satisfied after making a complaint, they can seek redress from judicial or government agencies, such as filing a lawsuit in court or lodging a complaint with a data protection authority. This not only offers users an expanded range of remedies but also reinforces the legal obligations companies have in managing user information (Table 1).
Table 1. Rights granted to users by China’s top ten ICV companies (Short Version).

3.2. Companies’ Rights and Duties: What Are Companies Entitled and Obligated to Do?

In the context of ICV driving, users unavoidably provide personal information to companies. These data, including diverse information both inside and external to the vehicle, underpin ICV services [28]. Once these critical data are obtained, companies may provide personalized intelligent services designed to meet user requirements [29]. During this data exchange procedure, companies not only implement data processing rights according to the user’s expressed preferences but also assume legal duty for safeguarding user privacy and data security.

3.2.1. Companies’ Rights

The top ten ICV companies in China possess the rights to share, transfer, and disclose information. Nevertheless, they exhibit considerable variation in the implementation of these rights. Most companies must obtain express permission from data subjects prior to processing personal data. This strategy adheres to legal mandates for data security while still honoring user privacy. By obtaining users’ express consent about the use of their data, firms may foster trust and mitigate legal concerns associated with privacy.
In some instances, companies may handle data without obtaining user authorization. This includes legally compelled exceptions, including those for public interest, legal requirements, or contractual fulfillment. These exclusions provide essential flexibility, enabling companies to function efficiently and deliver services in the public interest while safeguarding user privacy. The variation in how companies implement these rights may arise from inequalities in their business strategies. For instance, companies with robust data processing capabilities and advanced privacy measures may prefer processing data with user consent to demonstrate their commitment to data protection [30]. Conversely, some may depend on legal exemptions to optimize procedures and save expenses.
Moreover, several companies possess the authority to delegate processing in response to business growth requirements. ICVs depend significantly on intricate data analysis and processing, including real-time navigation, driving behavior assessment, and vehicle repair forecasting. These activities often need specialist technological assistance, and not all automotive companies have this ability. Consequently, numerous companies delegate these responsibilities to external enterprises with the requisite expertise and equipment, thereby guaranteeing superior data processing and service innovation (Table 2).
Table 2. Rights granted to users by China’s top ten ICV companies.

3.2.2. Companies’ Obligations

The obligations of the top ten smart connected car companies are classified into three categories: preservation, protection, and notification obligations. Concerning preservation obligations, each company adheres to the principle of requirements, maintaining personal user information just for the legally permissible and required period for business purposes.
Protection obligations are crucial in the data management of smart connected car enterprises, including data acquisition, surveillance, and post-incident remediation. During the data collection phase, companies such as Huawei and Baidu follow the principle of minimal requirements, gathering just the necessary information required to provide services [18,20]. While other companies may not explicitly express the same goal, they are nevertheless required to adhere to applicable legal criteria to validate the validity of their data collecting practices. During the monitoring phase, all companies prioritize enhancing the selection and training of technical personnel, establishing specific access rights to guarantee workers manage data only within required and allowed limits.
Furthermore, to mitigate future data security events, every company has created comprehensive emergency plans, including prompt risk evaluations, swift reaction protocols, and post-incident remediation procedures. The creation and execution of these strategies guarantee that companies may promptly enact actions to safeguard user information to the maximum degree feasible in the case of data breaches or other security concerns.
To further enhance the transparency and credibility of data handling, BYD also regularly publishes personal information security impact assessment reports [21]. These reports detail the measures and their effectiveness in data processing and protection, allowing users and the public to clearly understand the company’s efforts and achievements in maintaining personal information security.
As for companies fulfilling their notification duties, there are significant differences in the conditions that trigger these obligations. Some companies notice modifications to services and policy revisions as the primary basis for satisfying their notice responsibilities [20,23,25]. This method guarantees that consumers are completely informed of any alterations that may impact the use of their personal data throughout the service. Other companies activate their notification responsibilities primarily in the occurrence of a personal information security breach [18,19,21,22,24,26,27]. In such instances, the company informs users only upon the occurrence of a data breach or other security problem. This approach fulfills the basic legal standards; nonetheless, it may restrict consumers’ comprehension of the utilization and processing of their data in the absence of a security event (Table 3).
Table 3. The obligations of China’s top ten ICV companies.

6. Conclusions

As ICV technology becomes more integrated and prevalent, the systematic collecting, processing, and transfer of extensive personal data directly affect user rights and data security. Nonetheless, existing data protection legislation, often formulated for conventional data processing methods, inadequately governs the data management practices of ICV companies.
A study evaluating the management of user rights and duties by China’s top ten ICV companies revealed that these companies often do not comply with regulations. The absence of compliance has raised public skepticism over the efficacy of their self-regulatory measures in data management; according to the “2022 China Consumers’ Intelligent Connected Vehicle Data Security and Personal Privacy Awareness and Concerns Survey” report released by the US market research organization J.D. Power, the overall confidence index of the consumers surveyed was only 45.7 points (out of 100 points). Therefore, the Chinese government must promptly enhance laws and explicitly delineate the regulatory functions and authorities of the CAC, the NSC, and the MIIT. Specifically, the CAC should assume the responsibility of coordinating and directing the regulatory functions of other agencies engaged in the oversight of ICV. Simultaneously, the NSC needs to be endowed with the authority to examine and act in issues that might jeopardize national security or public interest. The MIIT should be given access and auditing powers to meticulously oversee and evaluate the data processing procedures of ICV enterprises. This systematic method will guarantee that each regulatory entity can efficiently execute its assigned duties in overseeing the intricacies of ICV operations.
Moreover, to enhance regulatory effectiveness, China’s government should provide explicit reporting requirements for companies and enforce severe penalties. It should also enhance legal education about user rights to ensure users are well aware of their entitlements and the remedies accessible to them.
However, this article only discusses compliance with rights and obligations from a legal perspective, not considering the corporate culture and technical challenges. A following study will investigate these non-legal elements, including company culture, technical competencies, and internal management frameworks, and their influence on data security. This will provide a more thorough perspective on the performance of smart connected car firms in data processing.

Author Contributions

Conceptualization, T.S. and Y.X.; methodology, T.S. and H.W.; validation, T.S. and Y.X.; formal analysis, H.W.; investigation, T.S. and H.W.; resources, Y.X; data curation, Y.X; writing—original draft preparation, T.S. and H.W.; writing—review and editing, T.S. and Y.X.; visualization, T.S.; supervision, Y.X.; project administration, Z.C.; funding acquisition. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Social Science Foundation of China (Project No. 21&ZD205) and the National Social Science Foundation of China (Project No. 22CFX018).

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

Author Tian Sun was employed by the company China Gezhouba Group Cement Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Zheng, Z. Privacy Protection in the Era of Artificial Intelligence. Sci. Law Northwest Univ. Polit. Law 2019, 37, 51–60. [Google Scholar] [CrossRef]
  2. Maeng, K.; Kim, W.; Cho, Y. Consumers’ Attitudes Toward Information Security Threats Against Connected and Autonomous Vehicles. Telemat. Inf. 2021, 63, 101646. [Google Scholar] [CrossRef]
  3. Long, C.; Liu, K.; Zhou, B.; Li, Q. Key Technologies of Multi-Agent Collaborative High Definition Map Construction. Acta Geod. Cartogr. Sin. 2021, 50, 1447. [Google Scholar] [CrossRef]
  4. Chen, M. Intelligent Vehicle Data Sharing Dilemmas and Legal Regulations. Times Automot. 2024, 7, 7–9. [Google Scholar]
  5. Aisker, M.M. On the Dilemmas and Solutions of Protecting Personal Information of End Users of Intelligent Connected Vehicles. Karamay Acad. J. 2024, 2, 68–76. [Google Scholar]
  6. Zheng, G. Data Rule of Law and Future Transportation—Preliminary Discussion on Autonomous Vehicle Data Governance. China Leg. Rev. 2022, 1, 202–214. [Google Scholar]
  7. Daniel, N.F. EU Data Governance: Preserving Global Privacy in the Age of Surveillance. Doctoral Dissertation, Johns Hopkins University, Baltimore, MD, USA, 2022. [Google Scholar]
  8. Zhao, M.; Lu, R.; Zhou, B.; Kang, T. Review of Research on the Commercialization of China’s Intelligent and Connected Vehicles Industry. In Society of Automotive Engineers (SAE)-China Congress; Springer Nature Singapore: Singapore, 2024; pp. 836–848. [Google Scholar]
  9. Verma, S.K.; Verma, R.; Singh, B.K.; Sinha, R.S. Management of intelligent transportation systems and advanced technology. In Intelligent Transportation System and Advanced Technology; Springer Nature Singapore: Singapore, 2024; pp. 159–175. [Google Scholar]
  10. Brell, T.; Biermann, H.; Philipsen, R.; Ziefle, M. Conditional Privacy: Users’ Perception of Data Privacy in Autonomous Driving. In Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, Heraklion, Greece, 3–5 May 2019; Volume 1, pp. 352–359. [Google Scholar] [CrossRef]
  11. Cai, K.; Yu, Z. Research on the Antecedents of Data Privacy Concern Toward Intelligent Connected Vehicles. Int. J. Hum.-Comput. Interact. 2024, 1, 2376302. [Google Scholar] [CrossRef]
  12. Qin, Q.L.; Xie, L.J. Analysis of Security Risks in Internet of Vehicles Data and Related Recommendations. Inf. Commun. Technol. Policy 2020, 8, 37–40. [Google Scholar]
  13. Xie, Y.S. Management Regulations for the Use of 5905–5925 MHz Frequency Band for Direct Communication in Internet of Vehicles (Intelligent Connected Vehicles). Intell. Connect. Veh. 2019, 1, 89–90. [Google Scholar]
  14. Sadaf, M.; Iqbal, Z.; Javed, A.R.; Saba, I.; Krichen, M.; Majeed, S.; Raza, A. Connected and Automated Vehicles: Infrastructure, Applications, Security, Critical Challenges, and Future Aspects. Technologies 2023, 11, 117. [Google Scholar] [CrossRef]
  15. Yang, Y.L. Implementation Challenges and Solutions of the Cybersecurity Law. Netw. Secur. Technol. Appl. 2022, 11, 78. [Google Scholar]
  16. China Industry Research Institute. 2024 Intelligent Vehicle (Intelligent Connected Vehicle) Industry In-Depth Research and Investment Prospect Forecast Report; Shenzhen Zhongshang Industry Research Institute Co., Ltd.: Shenzhen, China, 2024; p. 70. [Google Scholar]
  17. Feng, S.M. Analysis and Critique of WDPB’s “Guidelines for Personal Data Protection in the Internet of Vehicles”. Commer. Veh. 2024, 2, 92–95. [Google Scholar]
  18. Baidu CarLife+ Privacy Policy. Available online: https://carlife.baidu.com/static/carlifemis/duty/secretright_new.html (accessed on 13 February 2025).
  19. Extreme Fox (GitLab) Privacy Protection Policy. Available online: https://gitlab.cn/terms/20220728/privacy/ (accessed on 13 February 2025).
  20. AITO Car Privacy Policy. Available online: https://aito.auto/privacy/ (accessed on 13 February 2025).
  21. BYD CarDiLink System Privacy Policy. Available online: https://profilesys.bydauto.com.cn/dilinkapp/dilink/pad/privacy.html (accessed on 13 February 2025).
  22. SAIC Motor Car Privacy Policy. Available online: https://www.saicmg.com/policies/car-privacy-policy-2023.html (accessed on 13 February 2025).
  23. Changan Kaicheng APP Privacy Policy. Available online: https://appkc.changan.com.cn/followup/privacy (accessed on 13 February 2025).
  24. Audi Privacy Policy. Available online: https://www.audi.cn/zh/privacy.html (accessed on 13 February 2025).
  25. Li Auto User Privacy Policy. Available online: https://www.lixiang.com/agreement/privacy.html (accessed on 13 February 2025).
  26. NIO Privacy Policy. Available online: https://www.nio.cn/policies/privacy-policy (accessed on 13 February 2025).
  27. Xpeng Motors Privacy Policy. Available online: https://www.xiaopeng.com/content/4209.html (accessed on 13 February 2025).
  28. How Real-Time Data Shapes the Infrastructure Powering Connected Cars. Available online: https://www.forbes.com/councils/forbestechcouncil/2024/11/08/how-real-time-data-shapes-the-infrastructure-powering-connected-cars/ (accessed on 13 February 2025).
  29. Making Connected Car Data Matter. Available online: https://www.automotive-iq.com/autonomous-drive/articles/making-connected-car-data-matter (accessed on 13 February 2025).
  30. Kemp, K. Concealed Data Practices and Competition Law: Why Privacy Matters. Eur. Compet. J. 2020, 16, 628–672. [Google Scholar] [CrossRef]
  31. Chen, B. Analysis of Network Security and Data Security Risks in China’s Internet of Vehicles. Cyberspace Secur. 2024, 15, 115–119. [Google Scholar]
  32. New Guidelines for Data Compliance of Multinational Banks and Financial Institutions—Interpretation of the “Regulations on the Administration of Network Data Security”. Available online: https://business.sohu.com/a/848957856_120942243 (accessed on 31 January 2025).
  33. Annual Insights on Data Security of Intelligent Connected Vehicles (2023)—Building Enterprise Immunity. Available online: https://www.ev100online.com/research/detail/615/report (accessed on 13 February 2025).
  34. Lin, X.M. Xiaopeng Motors Fined, Unveiling the Tip of the Iceberg: Data Security Governance Still Faces Bottlenecks. China Bus. Circ. 2022, Z1, 113–119. [Google Scholar]
  35. NIO Deeply Involved in User Data ‘Leakage Gate’! Excessive Information Collection Leads to Privacy Protection Difficulties. Available online: https://baijiahao.baidu.com/s?id=1753336021792708966&wfr=spider&for=pc (accessed on 1 February 2024).
  36. Your Car Might Be ‘Spying’ on You: XPeng, Changan, BYD, Nissan, and Other Automakers Ban Remote Observation Function Products. Available online: https://www.sohu.com/a/560171592_121019331 (accessed on 1 February 2024).
  37. Joint Laboratory for Internet of Vehicles Security. Annual Report on the Development of Intelligent Connected Vehicle Network Security and Data Security; Social Sciences Academic Press (China): Beijing, China, 2023. [Google Scholar]
  38. Binns, R. Data protection impact assessments: A meta-regulatory approach. Int. Data Priv. Law 2017, 7, 22–35. [Google Scholar] [CrossRef]
  39. Pasquale, F. The Black Box Society: The Secret Algorithms That Control Money and Information; Harvard University Press: Cambridge, MA, USA, 2015. [Google Scholar]
  40. Matt Burgess. What is GDPR? The Summary Guide to GDPR Compliance in the UK. Available online: https://www.wired.co.uk/article/what-is-gdpr-uk-eu-legislation-compliance-summary-fines-2018 (accessed on 13 February 2025).
  41. The People’s Republic of China. Cyber Data Security Management Regulations, Chapter VII, Articles 47–54; National Laws and Regulations Database: Beijing, China, 2021.
  42. The 14th Five-Year Plan for National Road Traffic Safety. Available online: https://www.gov.cn/zhengce/zhengceku/2022-07/29/content_5703363.htm (accessed on 13 February 2025).
  43. Administrative Measures for Data Security in the Field of Industry and Information Technology (Trial), Chapter IV, Articles 26–29. Available online: https://www.gov.cn/zhengce/zhengceku/2022-12/14/content_5731918.htm (accessed on 13 February 2025).
  44. Liu, J. On Institutional Innovation of Corporate Social Responsibility. Comp. Law Rev. 2021, 4, 17–37. [Google Scholar]
  45. Liu, J.; Xu, J.; Ding, J.; Heng, X. An Exploration of Public Service Advertising. Mod. Commun. J. Commun. Univ. China 1991, 4, 54–58. [Google Scholar]
  46. How Should Traditional Legal Media Develop from the ‘New’ Perspective? Available online: https://www.xinhuanet.com/zgjx/2018-06/12/c_137248006.htm (accessed on 13 February 2025).
  47. Transformation of Legal Communication Models by New Media Technologies. Available online: https://www.cssn.cn/fx/xr/202403/t20240301_5736139.shtml (accessed on 13 February 2025).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.