Sticking with the automobile theme, I am concerned about authorization to access data stored within a vehicles computer systems.
As autos become smarter and more of them have built-in navigation and emergency communications systems, the data accumulating in these systems becomes increasingly personal. The data is of value to many parties. At a minimum these include the following:
- the vehicle "owner"
- who may need emergency assistance
- who may want to look up some historical facts of his travel (distance traveled to a client site that may be reimbursable)
- who may want to update the information when he replaces parts or performs maintenance
- who may need to prove that he wasn't the driver when the car caused an accident or was used for criminal purposes
-
erase his personal driving data when the car is sold or junked
- the mechanic
- who may use the information for diagnostic purposes
- who may update the information with parts replaced, maintenance performed, or accident information
- the vehicle lessor (in case the vehicle is leased and not purchased)
- who may bill by mileage
- who may charge a premium for driving in certain areas (e.g., foreign countries)
- the insurance company who may charge lower rates for safe driving behavior
- a prospective second-hand buyer
- who want to know both the driving history
- the maintenance/repair history
- the accident history
- law enforcement
- who may use the information to investigate an accident
- who may use the information as evidence of negligent driving
- who may use the information to track a vehicle
- the auto manufacturer
- who may use it to detect flaws
- who may use it to improve future models
- wrongdoers
- who may use it to track down their victims.
- may attempt to falsify the history to avoid insurance liability (e.g., in an accident)
- may attempt to falsify the history to improve resale value
- may attempt to falsify various information to disguise auto theft.
Unlike Ingo's use case which appears only to require uniquely identifying a vehicle, this scenario requires selectively authorizing read and write access to a large amount of personal data by a variety of parties.