E-scooter privacy and personal data protection engineering: cross-cutting privacy-preservation axis — GDPR Regulation (EU) 2016/679 + ePrivacy Directive 2002/58/EC + EU Data Act Regulation (EU) 2023/2854 + UK Data Protection Act 2018 + California CCPA/CPRA + ISO/IEC 27701:2019 PIMS + ISO/IEC 29100:2024 Privacy Framework + ISO/IEC 29134:2017 PIA + IEEE 7002-2022 + NIST Privacy Framework v1.0

In the engineering guide series we have described the lithium-ion battery with BMS and thermal runaway intro, brake system, motor + controller, suspension, tires, lighting + visibility, frame + fork, display + HMI, SMPS CC/CV charger, connector + wiring harness, IP-protection, bearings with ISO 281 L10, stem + folding mechanism, deck, handgrip + lever + throttle, wheel as an assembly, fastener engineering as joining axis, thermal management as heat-dissipation axis, EMC/EMI as interference-mitigation axis, cybersecurity as interconnect-trust axis, NVH as acoustic-vibration-emission axis, functional safety as safety-integrity axis, battery lifecycle engineering as sustainability axis, reparability as repairability axis and environmental robustness as environmental-conditioning axis. These 26 engineering axes described subsystems, joining methods, heat dissipation, electromagnetic coexistence, trust establishment between subsystems, acoustic-vibration emission, safety integrity, sustainability, reparability, and environmental conditioning — yet none of them described the protection of the user’s personal data accumulated by every ride, every BLE pairing, every cloud server call from the brand’s app.

Cybersecurity engineering (interconnect-trust axis DZ) describes system protection from unauthorised access: BLE Just Works → MITM, OTA without signature → firmware substitution, GPS without OSNMA → spoofing. That is device protection. Privacy is a separate axis that describes the protection of user data from misuse — and “misuse” includes not only external attackers but also the manufacturer itself, the fleet operator, third-party advertising SDKs, the state, and legal successors after bankruptcy or acquisition. The legal foundation is Regulation (EU) 2016/679 GDPR (in force since 25.05.2018, 99 articles + 173 recitals), Directive 2002/58/EC ePrivacy (cookie banners + BLE trackers), Regulation (EU) 2023/2854 EU Data Act (IoT data sharing, in force since 12.09.2025), and national equivalents in each jurisdiction — UK DPA 2018, California CCPA/CPRA, Brazil LGPD, China PIPL, Switzerland nFADP.

This is the twenty-seventh engineering-axis deep-dive in the guide series — and the tenth cross-cutting infrastructure axis (parallel to joining DT + heat-dissipation DV + interference-mitigation DX + interconnect-trust DZ + acoustic-vibration-emission EB + safety-integrity ED + sustainability EF + repairability EH + environmental-conditioning EJ, and now privacy-preservation EL). The privacy-preservation axis is distinct in that no purely technical fix solves it completely: this contour requires alignment of architectural decisions (privacy-by-design per Article 25 GDPR), legal (Article 6 lawful basis + DPA Article 28), process (Article 35 DPIA + Article 33 breach notification 72h), and user controls (Articles 12-22 data subject rights).

1. Privacy ≠ cybersecurity: a separate cross-cutting axis

Cybersecurity (DZ-axis) and privacy (EL-axis) often appear together but solve different problems:

DimensionCybersecurity (DZ)Privacy (EL)
Protects whatDevice from unauthorised accessUser from data misuse
From whomExternal attackerManufacturer, fleet operator, third-party SDK, state, successors
Legal foundationUNECE R155 CSMS + ETSI EN 303 645 + IEC 62443 + EU CRA 2024/2847GDPR 2016/679 + ePrivacy 2002/58 + Data Act 2023/2854 + UK DPA 2018
Foundational standardISO/SAE 21434:2021 TARAISO/IEC 27701:2019 PIMS + ISO/IEC 29100:2024 + ISO/IEC 29134:2017
Technical objectiveConfidentiality + Integrity + Availability (CIA triad)Lawful + Fair + Transparent processing
Manufacturer obligationSecure SDLC + signed firmware + secure bootPrivacy by design + DPIA + lawful basis + data minimisation
User control“Can’t be hacked — good”“Can request, correct, delete, transfer, object”

Classic example of the distinction: a fully secured telemetry channel of the e-scooter, encrypted via TLS 1.3 + mutual-TLS + certificate pinning, returns to the brand’s cloud server continuous GPS track with 1-Hz resolution alongside user_id. The cybersecurity axis is executed perfectly — an external attacker cannot intercept. The privacy axis at the same time is completely broken: there is no legitimate-interests justification for the collection, data minimisation is not honoured (1-Hz instead of 1-min aggregate), storage limitation is not honoured (retained 5 years without justification), transparent information is not provided (user notice without recipient disclosure), automated decision-making safeguards are not honoured (Article 22 — ML models profile the user without opt-out).

2. Regulation (EU) 2016/679 GDPR — the foundation of the entire axis

GDPR is Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. In force since 25.05.2018, 99 articles + 173 recitals, directly applicable in all 27 EU Member States (replaces Directive 95/46/EC). Structure:

ChapterArticlesContent
Chapter I1-4General provisions, definitions (Article 4)
Chapter II5-11Principles (Article 5) + lawful bases (Article 6) + special categories (Article 9)
Chapter III12-23Data subject rights (information, access, rectification, erasure, portability, object, automated decisions)
Chapter IV24-43Controller + processor obligations (privacy by design, DPIA, DPO, breach notification)
Chapter V44-50International transfers (adequacy, SCC, BCR, derogations)
Chapter VI51-59Independent supervisory authorities (DPAs)
Chapter VII60-76Cooperation + consistency mechanism (EDPB)
Chapter VIII77-84Remedies + liability + fines (up to €20M or 4% global turnover)
Chapter IX85-91Specific situations (employment, journalism, archiving)
Chapter X-XI92-99Final provisions

Material scope (Article 2): processing of personal data wholly/partly by automated means. Personal data (Article 4(1)) — any information that directly or indirectly identifies a natural person (‘data subject’). Recital 26: anonymous data (where re-identification is impossible) is out of scope; pseudonymous data (Article 4(5), where identifiers are replaced by a token) is in scope as personal data.

Territorial scope (Article 3): establishment in the EU OR offering goods/services to data subjects in the EU OR monitoring the behaviour of such subjects. Bird/Lime/Voi/Tier operating in Paris/Berlin/Stockholm are unambiguously in scope, regardless of HQ location.

3. Article 6 lawful bases applied to e-scooter telematics

Article 6(1) — processing is lawful only if and when at least one of six bases is satisfied. Not “pick whichever is most convenient” but documented and limited specifically to it.

BasisArticle 6(1)(x)E-scooter typical applicationAcceptance gate
Consent(a)App push notifications, marketing emails, optional analytics SDKArticle 7 freely given + specific + informed + unambiguous + withdrawable
Contract(b)Provisioning ride (start/end timestamp + cost calc + payment)Strictly necessary for the performance of the contract (Recital 44)
Legal obligation(c)Retention of trip data for police request under fleet operator licenceSpecific Member State legal text required
Vital interests(d)Emergency crash detection → automatic dispatchRare, only when data subject is incapable of consenting
Public task(e)Local authority fleet integration, GBFS aggregatorActual official authority + proportionality
Legitimate interests(f)Anti-theft GPS monitoring + fleet rebalancing + product analyticsArticle 6(1)(f) + LIA balancing test + Article 21 right to object honoured

The most frequent mistake consumer e-scooter manufacturers make is to roll everything up under consent while simultaneously rendering the app non-functional without opt-in. This violates Article 7(4) (“freely given” — if the app does not work without consent, the consent is not freely given) and Recital 43 (“imbalance of power”). Instead: provisioning a ride is contract (b); anti-theft GPS is legitimate interests (f) with documented LIA + opt-out; marketing is consent (a) opt-in tickbox.

Special category (Article 9) — racial/ethnic origin, political opinions, religion, trade-union membership, biometric data for unique identification (face unlock!), health, sex life, sexual orientation. Prohibited processing by default, with 10 exceptions (Article 9(2)). Display face unlock → explicit consent Article 9(2)(a) + DPIA mandatory Article 35(3)(b).

4. Personal data inventory on a connected e-scooter

Before any privacy-engineering work can be performed, a personal data inventory must be made. Article 30 GDPR explicitly requires Records of Processing Activities (RoPA). 9 typical categories on a modern shared/personal e-scooter:

CategorySourceGDPR classificationTypical retentionLawful basis
GPS coordinatesGNSS receiver, telemetry to cloudPersonal data (location identifier)30 days raw + indefinite aggregated(b) for ride, (f) for anti-theft
IMU/telemetry (speed, accel, brake, lean)Sensor fusion, OTA logsPersonal data when linked to user_id90 days raw(b) for warranty, (f) for R&D
User identity (name, email, phone, DOB)Account registrationPersonal dataAccount lifetime + 90 days(b) for contract
BLE pairing data (Bluetooth MAC, IRK)Pairing handshakeIdentifier-class personal dataUntil unpair(b) for function
Biometrics (face unlock template)Mobile appSpecial category Article 9Locally stored, never transmittedExplicit consent (9)(2)(a)
Payment data (PAN, last-4, expiry)Payment processor pass-throughSpecial handling per PCI-DSSNever store full PAN(b) + PCI-DSS scope
IP addressCloud TLS termination logsPersonal data per Recital 3030 days security logs(f) for anti-fraud
Device identifier (IMEI, IDFA, AAID)Mobile app SDKPersonal data per Recital 30Until app uninstall(a) consent (because advertising)
App analytics (events, sessions, crashes)Telemetry SDK (Firebase/Mixpanel)Personal data when linked to device-ID14 months GA4 default(a) consent, (f) for crash-fix

The most frequent slip-up: once linked, all else becomes personal — even an “anonymous” telemetry event “brake_applied” with timestamp + lat/lon + battery_pct that returns to Firebase becomes personal data, because it is linked to a Firebase Installation ID that survives app reinstallation on the same device.

5. Article 5 — 7 principles of processing

Article 5(1) lists 7 principles (all 7 simultaneously — not “choose 3”):

#PrincipleArticle 5(1)(x)E-scooter implementation
1Lawfulness, fairness, transparency(a)Privacy notice in app first-launch + plain language explanation for GPS
2Purpose limitation(b)GPS for ride routing — a separate purpose; GPS for R&D — a separate purpose; each purpose has a separate ground
3Data minimisation(c)GPS sample 1-Hz → aggregated 30-s for billing; raw 1-Hz purged after session
4Accuracy(d)User-editable profile + automated correction triggers
5Storage limitation(e)90-day raw → 365-day aggregated → 5-year statistical → delete; documented retention schedule
6Integrity + confidentiality(f)TLS 1.3 in transit + AES-256-GCM at rest + access control + audit logs
7Accountability5(2)Article 30 RoPA + Article 35 DPIA + Article 37 DPO + DPA Article 28 with each processor

Data minimisation is the hardest principle for shared-fleet operators. Applied test: can ride end (charge calculation) be performed without continuous 1-Hz GPS? Yes — start + end timestamps + distance odometer are enough. Continuous 1-Hz GPS is justified only for (a) live fleet rebalancing, (b) crash detection, (c) anti-theft trail. Each of those 3 is a separate purpose with a separate lawful basis and a separate retention.

6. Article 25 — Privacy by Design + Default

Article 25(1) — Privacy by Design — a systemic obligation for the controller to implement “appropriate technical and organisational measures” at the time of the determination of the means and at the time of the processing itself. Article 25(2) — Privacy by Default — by default only personal data necessary for the specific purpose are processed.

The concept originates with Ann Cavoukian (Ontario Privacy Commissioner 1997-2014), Privacy by Design Foundation 1995. 7 foundational principles:

#PrincipleE-scooter application
1Proactive not reactiveThreat-modelling privacy attacks before launch, not post-incident
2Privacy as the default settingNew user → tracking opt-out by default; opt-in only after notice
3Privacy embedded into designDPIA Article 35 performed in Sprint Planning, not in QA
4Full functionality — positive-sumNot “privacy vs UX” — both at once (pseudonymous analytics → product insight + zero PII)
5End-to-end security — lifecycle protectionCradle-to-grave: account creation → account deletion → backup expiry
6Visibility and transparencyOpen privacy notice, accessible RoPA summary, regular transparency reports
7Respect for user privacyUser-first defaults, granular controls, easy-to-find privacy dashboard

EDPB Guidelines 4/2019 “Article 25 — Data Protection by Design and by Default” — conformance test: for each personal-data flow the controller documents (a) which Article 5 principles apply, (b) which technical measures (encryption, pseudonymisation, access control), (c) which organisational measures (training, contracts, audits), (d) which user-facing controls (privacy dashboard, consent manager, SAR portal).

7. ePrivacy Directive 2002/58/EC — BLE beacon, cookie, push

Directive 2002/58/EC (“ePrivacy”) is lex specialis to the GDPR for electronic communications. Article 5(3) — mandatory opt-in consent before storing or accessing information stored on the user’s terminal equipment (laptop, phone, e-scooter). Originally the “cookie directive” (hence the 2009/136/EC amendment): website cookies → consent banner.

Technology-neutral: the same rule applies to ANY technology that reads/writes terminal-equipment storage. For an e-scooter this means:

TechnologyePrivacy Article 5(3) application
App local storage (preferences, cache)Consent needed unless strictly necessary for the service requested
BLE beacon scanning (proximity advertising)Consent — beacon reads a device identifier
Push notification token (FCM/APNs)Consent — token stored on the device
Cross-app advertising ID (IDFA/AAID)Consent — this identifier is read
GPS background accessConsent — geolocation from the terminal device
Persistent app analytics SDKConsent — persistent identifier in app storage

EDPB Guidelines 2/2023 + ICO update 2024-Q3: consent-OR-pay banner (“accept tracking OR pay €5/month”) is per se invalid per Recital 32 GDPR + Article 7(4) — consent must be freely given. The ban was recently confirmed in EDPB Opinion 08/2024 on Pay or Consent (17.04.2024).

ePrivacy Regulation (proposed replacement of Directive 2002/58/EC) — in the legislative pipeline since 2017-Q1, still not finalised as of 2026-Q2 (EU Council trilogue stalled on retained-data provisions).

8. Regulation (EU) 2023/2854 EU Data Act — IoT data sharing

EU Data Act (Regulation (EU) 2023/2854) — in force since 12.09.2025 after a 20-month transition (publication 22.12.2023). Its essence: the user of a connected product (including an e-scooter) has the right to:

  1. Access raw and pre-processed data the device generates (Article 4) — for example, the full GPS track, battery cycle log, motor temperature curve.
  2. Share with a third party of the user’s choosing (Article 5) — for example, with an independent repair shop, with a third-party warranty, with an academic researcher.
  3. Switch from one fleet operator to another, carrying their data with them (Articles 23-31).

Article 33 Data Act — technical specifications the vendor is obliged to support: a harmonised standard (not yet finalised) OR common data formats (for now — Open Mobility Foundation MDS + GBFS + ISO 22095:2024 for chain-of-custody).

For e-scooters: the Data Act applies after 12.09.2025 to all new model segments operating on the EU market. Existing models predating 11.09.2025 fall in scope 12 months after placing-on-market (12.09.2026 effective enforcement).

9. International privacy frameworks (non-EU)

E-scooter operators currently operate in more than 40 jurisdictions with their own privacy framework. Key ones:

JurisdictionFrameworkIn forceKey distinctive
United KingdomUK GDPR + Data Protection Act 20182018-05-25 (Brexit transitioned)ICO regulator + Schedule 1 conditions for special categories
CaliforniaCCPA 2018 + CPRA 20202020-01-01 + 2023-01-01“Sale of personal info” + “Sensitive personal info” + Cal Privacy Protection Agency CPPA
Other USPatchwork: VCDPA, CPA, CTDPA, UCPA, TDPSA, OCPA, MCDPA, INCDPA, ICDPA, MTDPA, DPDPA, NHPA, NJDPA2023-2025 state lawsNo federal — state by state
BrazilLei Geral de Proteção de Dados (LGPD) Lei 13.709/20182020-09-18ANPD authority + closely modelled on GDPR
ChinaPersonal Information Protection Law (PIPL)2021-11-01Cyberspace Administration of China (CAC) + cross-border transfer assessment Article 38
Switzerlandnew Federal Act on Data Protection (nFADP)2023-09-01FDPIC + stronger penalties + privacy-by-default
CanadaPIPEDA + Quebec Law 25 + Bill C-27 CPPA (proposed)2001-01-01 + 2023-09-22Quebec PIPEDA-exempt, Quebec Law 25 obligations
JapanAPPI (Act on the Protection of Personal Information)2003-05-30 (amended 2022)PPC + comparable adequacy with EU 2019
South KoreaPIPA (Personal Information Protection Act)2011-09-30PIPC + cross-border data localisation
IndiaDigital Personal Data Protection Act 20232023-08-11 + phasedDPB India + ‘Significant Data Fiduciary’ tier
AustraliaPrivacy Act 1988 + APP1988 + amendmentsOAIC + Australian Privacy Principles

Among canonical e-scooter brands: Lime/Bird/Voi/Tier/Dott operate in EU + UK + Switzerland + presumably California → they need parallel GDPR + UK GDPR + nFADP + CCPA/CPRA compliance programmes; Niu/Yadea/NIU from China — additionally PIPL with Cyberspace Administration cross-border transfer assessment.

10. ISO/IEC 27701, 29100, 29134, IEEE 7002, NIST Privacy Framework

GDPR says what to do (legal obligation); standards say how (operational framework):

StandardYearRole
ISO/IEC 27701:20192019-08Privacy Information Management System (PIMS) — extension of ISO/IEC 27001 ISMS for PII processors+controllers. Article 28 GDPR processor evidence.
ISO/IEC 29100:20242024-Q1Privacy framework — 11 privacy principles (consent + purpose + minimisation + use limitation + accuracy + openness + individual participation + accountability + information security + privacy compliance)
ISO/IEC 29134:20172017-06Privacy Impact Assessment (PIA) guidelines — practical methodology for Article 35 GDPR DPIA
ISO/IEC 29151:20172017-08Code of practice for PII protection — controls catalogue
ISO/IEC 27018:20192019-01Code of practice for protection of PII in public clouds
IEEE 7002-20222022-09Data Privacy Process — engineering process for embedding privacy into the product development lifecycle
NIST Privacy Framework v1.02020-01-16US federal voluntary — 5 Functions (Identify-P + Govern-P + Control-P + Communicate-P + Protect-P) — paired with NIST Cybersecurity Framework
NIST SP 800-53 Rev. 52020-09Privacy controls Appendix J (deprecated → merged into core) — federal baseline
NIST SP 800-1222010-04Guide to Protecting Confidentiality of PII

ISO/IEC 27701:2019 is the single most cited certification for GDPR Article 28 processor evidence: shared-fleet operator → cloud provider → telemetry SDK chain, each link with PIMS certification → evidence stack for controller accountability per Article 5(2).

11. Article 12-22 — data subject rights

Articles 12-22 — 8 separate rights the data subject can exercise against the controller in relation to their own data. The controller is obliged to respond within 1 month (Article 12(3), extendable to 3 months for exceptional complexity).

#ArticleRightE-scooter typical SAR scope
112Transparent informationPrivacy notice prominent in app + multilingual + plain language
213Information to be provided (data collected from data subject)App onboarding privacy notice
314Information indirectly obtained (e.g. from third party)Notice when fleet acquires the account via partnership
415Right of accessCopy of GPS history + ride log + payment history + analytics events + cookie list + DPO contact
516Right to rectificationCorrect name, email, address in profile
617Right to erasure (“right to be forgotten”)Account deletion + ride history purged + backups within retention schedule
718Restriction of processingPause processing while accuracy dispute is pending
820Data portabilityStructured machine-readable export (JSON/CSV) of all personal data
921Right to objectOpt-out of legitimate-interests processing (anti-theft monitoring)
1022Automated decision-making + profilingRight to human review of ML-driven account-suspension decisions

The hardest is Article 20 data portability (right to transmit data to another controller in a structured machine-readable format). EU Data Act 2023/2854 Articles 23-31 strengthen this for IoT specifically — the vendor is obliged to provide an interoperable export, not merely machine-readable.

EDPB Guidelines 8/2020 on Article 14 + EDPB 2/2023 on SAR scope + ICO “Subject Access Requests” guidance 2023-Q4 are canonical implementation references.

12. Article 35 DPIA — when mandatory

Article 35 GDPR — the controller must perform a Data Protection Impact Assessment before launching processing “likely to result in a high risk to the rights and freedoms of natural persons”. Article 35(3) — three explicit triggers + EDPB list:

TriggerArticle 35(3)E-scooter scenario
Systematic + extensive evaluation, including profiling, with significant effects(a)ML-based “risk score” for account suspension or insurance pricing
Large-scale processing of special categories (Article 9) or criminal data (Article 10)(b)Face unlock + driver-fitness verification + accident-related criminal data
Systematic monitoring of a publicly accessible area on a large scale(c)Continuous GPS fleet tracking + dashcam recordings + microphone activation

EDPB Guidelines WP248 rev.01 + national DPA lists (CNIL France 2018-list, ICO UK 2023-list, BSI Germany 2021-list) — DPIA is also mandatory when: there is innovative use of technology (BLE proximity + face unlock + voice command combined), there is denial of service based on automated decision, datasets from separate purposes are combined/matched, data of vulnerable subjects is processed (minors with shared e-scooter). ICO research 2024: ~60% of complaints to the ICO involve cases where a DPIA should have been done but wasn’t.

Methodology: ISO/IEC 29134:2017 — 5-step (initiation → identification of stakeholders + data flow → assessment of risks to data subjects + organisation → identification of measures → monitoring + review). Final output — document signed by the DPO + accountable executive, retained for the lifetime of processing + 5 years after end.

13. Article 33-34 — breach notification 72h

Article 33 — the controller must notify the supervisory authority of a personal data breach without undue delay and, where feasible, not later than 72 hours after having become aware of it. If later — a reasoned justification.

TriggerArticle 33 application
Unauthorised accessDB SQL injection + access through compromised vendor API
Accidental lossLost laptop with telematics data + lost backup tape
Unauthorised disclosureMisconfigured S3 bucket + accidental email to wrong recipient
Alteration without authorisationCorrupted backup overwriting real data

Article 34 — if the breach is likely to result in a high risk to the data subjects, the controller must notify the data subjects themselves — “without undue delay”. Exceptions: data was already encrypted with a strong key (still under controller’s control) + risk has materialised through subsequent measures + disproportionate effort (then public communication suffices).

Real timeline pattern (per ENISA Threat Landscape 2023-2024 incident analysis):

  • T+0h — internal detection
  • T+1h — incident response activation, scope assessment
  • T+24h — preliminary scope determined
  • T+48h — DPO + legal counsel + executive briefing
  • T+72h — Article 33 notification to the lead supervisory authority (one-stop-shop Article 56)
  • T+5d — public statement + Article 34 notice if high risk
  • T+30d — preliminary post-incident review + DPA follow-up response
  • T+90d — final post-incident report + supervisory dialogue closure

14. International transfer — SCC + DPF + Schrems II

Chapter V (Articles 44-50) — transfer of personal data outside the EEA. Three legal mechanisms:

MechanismArticleApplication
Adequacy Decision45Country/territory deemed adequate by the European Commission
Appropriate safeguards46SCC, BCR, certification, code of conduct
Derogations49Explicit consent, contract necessity, public interest

As of 2026-Q2 adequacy decisions exist for: Andorra, Argentina, Canada (commercial only), Faroe Islands, Guernsey, Israel, Isle of Man, Japan, Jersey, New Zealand, Republic of Korea (2021), Switzerland (2024 update), United Kingdom (post-Brexit 2021), Uruguay, United States (EU-US Data Privacy Framework DPF 2023-07-10 commercial-only).

Schrems I + Schrems II — landmark CJEU cases (C-362/14 + C-311/18) that successively invalidated Safe Harbor (2015) and Privacy Shield (2020), putting continual jeopardy on adequacy with the US. Schrems III action against DPF — pending CJEU 2026-Q4 expected ruling.

Standard Contractual Clauses — modular contractual safeguards published by Commission Decision (EU) 2021/914 of 4 June 2021 (4 modules: C2C, C2P, P2P, P2C). Combined with a Transfer Impact Assessment (TIA) + supplementary measures (encryption with an EEA-based key, pseudonymisation, contractual + organisational safeguards).

For an e-scooter operator using US-based cloud (AWS/GCP/Azure) + US-based telemetry SDK (Firebase/Mixpanel/Sentry), SCC + TIA + DPF reliance is the standard stack, but fragile (depends on the Schrems III outcome).

15. Real incidents timeline 2018-2026

DateEventJurisdiction + DPAOutcome
2018-12Lime data leak — internal employee misuse + unauthorised accessUS California Attorney GeneralInquiry closed without fine, internal policy update
2019-04Xiaomi M365 BLE pwd “000000” + telemetry exfiltrationInternal Zimperium disclosureFirmware patch v1.4.6
2020-06Bird accidental disclosure of 300k user records via misconfigured GraphQLUS Federal Trade CommissionSettlement + privacy programme
2021-08Voi GDPR action (Sweden IMY) — over-retention of ride dataSweden IMYSEK 75M fine (~€7M) reduced on appeal
2022-02Lime/Bird MDS data sharing with LA city — privacy advocacy backlash + court actionCalifornia Superior CourtLADOT ruling — MDS schema reduced to anonymised aggregates
2022-09Helbiz S-1 disclosure — inadequate privacy disclosures pre-IPOUS SECRestatement + delisting
2023-04Spin SOC 2 Type II achieved post-Ford acquisition + post-breachUS private auditSOC 2 attestation + Type II re-cert
2023-11Bolt Texas data breach — 600k accounts exposedUS Texas Attorney GeneralSettlement undisclosed + 2 years monitoring
2024-07DJI Avata III geofence app PRC PIPL action (similar applicable to PRC e-scooter apps)China CACCross-border data transfer assessment Article 38
2025-03Tier consent withdrawal — bulk SAR campaign + class actionGermany BfDI€350k fine + privacy notice rewrite
2025-09EU Data Act 2023/2854 effective 12.09.2025 — first IoT data-portability requestsEU-wideIndustry response — standardised export schema
2026-Q1Apollo SDK telemetry — Onavo-style behavioural collectionMultiple DPA inquiriesOngoing

16. Industry shift 2020→2026, DIY user privacy audit, recap

Industry shift 2020 → 2026 (8 metrics):

Metric2020 baseline2026 norm
Default app analyticsPersistent + opt-outOpt-in only, granular toggle
GPS retentionIndefinite30 days raw + statistical aggregates
Privacy notice length8000 words legalese1500 words plain language + layered detail
SAR turnaround30 days “best effort”30 days enforced + self-service portal
DPO contactHidden in footerProminent in app + privacy dashboard
DPA Article 28Annex generic boilerplateModule-specific safeguards + TIA
DPIAOften skippedMandatory for ML, biometrics, fleet GPS
Breach notificationInconsistent, often delayed72h DPA + 5d public, drilled quarterly

8-step DIY user privacy audit before buying an e-scooter (personally or via a fleet):

  1. Privacy notice readable in app first-launch? If it says “see website” — already a red flag.
  2. Lawful bases listed per purpose in privacy notice? GDPR Article 13(1)(c) requires this.
  3. GPS toggle granular (background vs foreground; trip vs anti-theft)? If all-or-nothing — bad.
  4. Analytics SDKs disclosed by name? GA4, Firebase, Mixpanel, Sentry, Amplitude — each one separately.
  5. Data portability export available? EU Data Act Article 23+. A working “Download my data” button.
  6. Account deletion fully purges or just soft-deletes? Right to erasure Article 17.
  7. DPO contact (email + position) prominent? Articles 37+38.
  8. International transfers disclosed with SCC reference? Article 13(1)(f) + Chapter V.

Recap 10 points:

  1. Privacy = a separate cross-cutting infrastructure axis #10, not a subset of cybersecurity.
  2. GDPR 2016/679 — foundation; 99 articles + 173 recitals; €20M / 4% turnover fines.
  3. Article 6 — 6 lawful bases, each purpose a separate basis with documentation.
  4. Article 25 — privacy by design + default; ISO/IEC 29100:2024 framework.
  5. Article 5 — 7 principles, all at once; data minimisation is the hardest.
  6. Article 33 — 72-hour breach notification; Article 34 — communication to data subjects.
  7. Articles 12-22 — 8 data subject rights; SAR within 1 month.
  8. Article 35 DPIA — mandatory for ML, biometrics, large-scale GPS monitoring.
  9. International transfer — SCC + TIA + adequacy + DPF (post-Schrems II).
  10. EU Data Act 2023/2854 — IoT data sharing + portability + repair-shop access (effective 12.09.2025).

Privacy does not end at specifications and does not start with a legal notice. It is an architectural axis that runs through all 26 preceding engineering axes — from BMS telemetry returning to the cloud, to the face-unlock biometric template in display + HMI, to geolocation history in the anti-theft system. If one axis is missing — privacy compliance cannot be assembled from documentation alone. The system must be built with privacy in its foundation — per Cavoukian’s “embedded into design, not bolted on” principle.