skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: The Vehicle Monitoring and Collection Technology Era
ABSTRACT: Vehicle monitoring and collection (“VMC”) technology, including starter interrupt devices that remotely disable vehicles, and other GPS tracking devices are used in consumer vehicle agreements in subprime transactions. Subscription-based models supported by VMC features, such as over-the-air software updates that remotely disable or enable vehicular functions, have also appeared in the non-subprime automobile context as well. This Article contends that the rise in VMC technology and features raises several alarming privacy, electronic subjugation, and cybersecurity risks. The Article makes an express link between the consumer risks and harms associated with the use of VMC technology in subprime lending transactions and the broader technological shift towards a subscription-based service model supported by VMC features in non-subprime vehicle transactions. The Article’s evaluation and critique of VMC technology and features is conducted simultaneously through the lens of commercial law, state VMC technology statutes, state privacy laws, such as the California Consumer Privacy Act (“CCPA”), and federal frameworks governing transactions involving consumer vehicles. I argue that these legal regimes do not consistently protect consumer interests and are insufficient to comprehensively meet the challenges associated with the VMC age. The Article concludes by offering a detailed path forward.  more » « less
Award ID(s):
2245373
PAR ID:
10610640
Author(s) / Creator(s):
Publisher / Repository:
Iowa law Review
Date Published:
Journal Name:
Iowa law review
Volume:
110
Issue:
43
ISSN:
0021-0552
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. The integration of connected autonomous vehicles (CAVs) has significantly enhanced driving convenience, but it has also raised serious privacy concerns, particularly regarding the personal identifiable information (PII) stored on infotainment systems. Recent advances in connected and autonomous vehicle control, such as multi-agent system (MAS)-based hierarchical architectures and privacy-preserving strategies for mixed-autonomy platoon control, underscore the increasing complexity of privacy management within these environments. Rental cars with infotainment systems pose substantial challenges, as renters often fail to delete their data, leaving it accessible to subsequent renters. This study investigates the risks associated with PII in connected vehicles and emphasizes the necessity of automated solutions to ensure data privacy. We introduce the Vehicle Inactive Profile Remover (VIPR), an innovative automated solution designed to identify and delete PII left on infotainment systems. The efficacy of VIPR is evaluated through surveys, hands-on experiments with rental vehicles, and a controlled laboratory environment. VIPR achieved a 99.5% success rate in removing user profiles, with an average deletion time of 4.8 s or less, demonstrating its effectiveness in mitigating privacy risks. This solution highlights VIPR as a critical tool for enhancing privacy in connected vehicle environments, promoting a safer, more responsible use of connected vehicle technology in society. 
    more » « less
  2. In the current automotive ecosystem, the trend of pairing mobile devices to connected vehicles is gaining momentum, providing a vast number of benefits such as hands-free driving and remote vehicle control. However, along with these conveniences arises the issue of data accumulation, ranging from vehicle diagnostics to personal identifiable information (PII). The problem emerges when a consumer rents a vehicle, pairs their mobile device to the infotainment system, and neglects to remove their device prior to returning the vehicle. This oversight can potentially expose vulnerabilities with the current renter’s PII for subsequent renters to exploit. Research indicates that renters often overlook the deletion process prior to returning the rental vehicle and are unaware of whose responsibility it is to perform this task. In this survey, we investigated the experiences and perceptions of a group of consumers who have previously rented vehicles. We wanted to know if the participants were aware they were responsible for deleting their mobile device from the rental vehicle before returning it, the renters’ importance and tolerance for risk if they overlooked the deletion process leaving their shared data on the infotainment system for subsequent users, and if they were aware who was responsible for deleting their shared data. Lastly, we explored if the participants supported an automated solution to perform this manual deletion process. The goal of this paper is to demonstrate the significance of safeguarding PII in connected vehicles and advocate for the adoption of an automated solution to mitigate this privacy risk. 
    more » « less
  3. Fully autonomous or “self-driving” vehicles are an emerging mobility technology with a host of potential benefits over conventional motor vehicles. Proponents argue that widespread adoption of self-driving vehicles may save countless lives and millions of dollars annually by minimizing the likelihood of deadly vehicle crashes. However, for such benefits to be realized, widespread consumer adoption of self-driving technologies is a prerequisite. Prior research suggests that while consumers are broadly optimistic about the potential of vehicle automation, there are significant concerns that may undermine consumer adoption, such as the transparency of vehicle operation. There is insufficient research into consumers’ desire to understand a self-driving vehicle’s intent and decision-making process and its impact on their willingness to adopt. We conducted a study using a 63-question internet-based survey distributed in the United States to licensed drivers 18 years of age and older (n= 996) to examine consumer preferences of the information transparency of self-driving vehicles. Our findings suggest that middle-aged and older consumers of high household income were generally optimistic about the information sharing behavior and transparency of self-driving vehicles upon availability. 
    more » « less
  4. Fully autonomous or “self-driving” vehicles are emerging mobility technology with potential benefits over conventional motor vehicles. Proponents argue that the widespread adoption of autonomous vehicles may save countless lives and millions of dollars annually by minimizing the likelihood of deadly vehicle crashes. However, widespread adoption of automated-driving technologies is required to realize such benefits, which research suggests, may be undermined by consumer concerns about vehicle operation transparency. Further, there is insufficient research into consumer perceptions of an autonomous vehicle’s communication and information-sharing behavior, which may impact their likelihood of purchasing one. We conducted a study using a 63-question internet-based survey distributed in the United States to licensed drivers 18 years of age and older (n=996) to examine consumer perceptions of autonomous vehicles across accountability, communication, information sharing, and concerns. Our findings show that consumer perceptions of the four dimensions vary significantly across race, gender, and ability. 
    more » « less
  5. Consumer Internet of Things (IoT) devices are increasingly common, from smart speakers to security cameras, in homes. Along with their benefits come potential privacy and security threats. To limit these threats a number of commercial services have become available (IoT safeguards). The safeguards claim to provide protection against IoT privacy risks and security threats. However, the effectiveness and the associated privacy risks of these safeguards remains a key open question. In this paper, we investigate the threat detection capabilities of IoT safeguards for the first time. We develop and release an approach for automated safeguards experimentation to reveal their response to common security threats and privacy risks. We perform thousands of automated experiments using popular commercial IoT safeguards when deployed in a large IoT testbed. Our results indicate not only that these devices may be ineffective in preventing risks, but also their cloud interactions and data collection operations may introduce privacy risks for the households that adopt them. 
    more » « less