reats and has issued regulations to exclude certain connected vehicle technologies of Chinese origin from its supply chain. While cybersecurity is being addressed as a national security issue in policy measures, discussions in academia remain predomin...
reats and has issued regulations to exclude certain connected vehicle technologies of Chinese origin from its supply chain. While cybersecurity is being addressed as a national security issue in policy measures, discussions in academia remain predominantly focused on technical cybersecurity measures and legal debates on data protection. This study examines the ongoing discussions in the U.S. and the EU concerning data and infrastructure protection issues arising from the import of automobiles and components, and explores potential policy responses for South Korea. The U.S. explicitly frames these regulations as national security measures, restricting and prohibiting access to its citizens' data and Information and Communications Technology and Services (ICTS) supply chains to prevent China and other foreign adversaries, as defined by the U.S., from supplying hardware, software, products, or services. This approach implicitly aims to restructure supply chains in a way that prioritizes U.S. interests. The EU faces constraints in directly imposing national security-driven restrictions on Chinese automotives. This is due not only to its dependence on Chinese products and investments, but also to the need for regulatory consistency in the single market based on international standards yet with some divergences among member states, and the necessity of aligning with other laws and overarching strategies. South Korea, meanwhile, lacks a robust legal framework to preemptively prevent or swiftly respond to foreign influences that may pose national security threats associated with modern vehicles. It is necessary to examine the need for a regulatory framework that integrates the perspectives of cybersecurity from technical and national security in cross-border data flows and apply it to vehicular data transfers.