Musk: All China data exists in China.
On September 26th, Tesla CEO elon musk appeared at the opening ceremony of Wuzhen Summit in world internet conference in 2021. Musk has conducted in-depth exchanges with nearly 100 world-class industry experts at home and abroad on the theme of "Towards a new era of digital civilization–working together to build a community of cyberspace destiny", discussing global Internet governance and sharing global Internet development experience.
Musk made a video speech.
Musk gave a high degree of recognition to the data security problem that has been paid special attention to in the whole pan-Internet field in recent years, including smart cars. He said: "Data security is the key to the success of intelligent connected cars, which is not only closely related to personal interests, but also closely related to the interests of the whole society." At the same time, Musk stated that "Tesla is happy to see the introduction of relevant laws and regulations and strengthen data management."
At the Wuzhen Summit in world internet conference, Tesla also fully demonstrated its data architecture and data security settings to the participants, which triggered frequent punching of guests, especially elites and followers in the field of smart cars.
The picture in this article is provided by Tesla.
As can be seen from Tesla’s display, Tesla Motors will generate the following four types of data:
Vehicle data related to vehicle use, operation and condition: such as vehicle speed, mileage, motor speed, steering wheel torque, software version, etc. In general, the vehicle data is not associated with the customer’s account or frame number, unless it is triggered by specific events, such as the customer’s request for remote maintenance, collision and other security incidents.
The infotainment system data used by the car touch screen: including the summary count of customers’ functions or applications, radio listening time and channels, etc. This information is stored locally in the vehicle or shared anonymously with Tesla, and the car browser history and login credentials are not shared with Tesla.
Diagnostic data: including detailed information of vehicle configuration, firmware, energy use and electronic system status, as well as data transmitted between different systems for identifying errors and conducting technical evaluation. The principle of "minimum necessary" collection aims to ensure the reliability, safety and normal operation of customers’ vehicles.
Autopilot auto-assisted driving data: including the data required for vehicles to use cameras to provide advanced functions such as auto-assisted driving, intelligent summoning and automatic parking. The function of the camera is embedded with the concept of privacy protection at the beginning of the design, and the vehicle will not capture continuous video recordings, nor does it have the function of real-time viewing. By default, data can be processed directly without leaving the car depending on the related functions of the external camera.
Tesla adopts the collection principle of "legal compliance, minimum necessity, openness and transparency" for customers’ personal information and vehicle data, which has also become recognized as the most rigorous data collection method in the field of smart cars.
Musk said that Tesla has set up a data center in China, and all the data generated by its China business, including production data, sales data, service data and charging data, are completely stored in China, and the storage security is ensured by technical means such as data encryption, authentication and access control. Musk emphasized that "all the personally identifiable information of Tesla owners is safely stored in China and will not be transferred overseas. Only in rare cases such as purchasing imported parts, some data will be transmitted across borders after obtaining relevant approval."
Musk said, "I think data protection is not just a company’s business, but should be completed by the joint efforts of the whole industry. We are working with regulators to find the best solution for data security. "