Cybersecurity - Alfa Romeo Stelvio 2019 User Manual

Table of Contents

Advertisement

CYBERSECURITY

Your vehicle may be a connected vehicle
and may be equipped with both wired and
wireless networks. These networks allow
your vehicle to send and receive
information. This information allows
systems and features in your vehicle to
function properly.
Your vehicle may be equipped with
certain security features to reduce the
risk of unauthorized and unlawful access
to vehicle systems and wireless
communications. Vehicle software
technology continues to evolve over
time, and FCA US LLC, working with its
suppliers, evaluates and takes
appropriate steps as needed. Similar to a
computer or other devices, your vehicle
may require software updates to
improve the usability and performance of
your systems, or to reduce the potential
risk of unauthorized and unlawful access
to your vehicle systems.
The risk of unauthorized and unlawful
access to your vehicle systems may still
exist, even if the most recent version of
vehicle software is installed.
236
Warning!
It is not possible to know or to predict all
of the possible outcomes if your vehicle's
systems are breached. It may be possible
that vehicle systems, including safety
related systems, could be impaired or a loss
of vehicle control could occur that may
result in an accident involving serious injury
or death.
ONLY insert media (e.g., USB or SD card)
into your vehicle if it came from a trusted
source. Media of unknown origin could
possibly contain malicious software, and if
installed in your vehicle, it may increase the
possibility for vehicle systems to be
breached.
As always, if you experience unusual
vehicle behavior, take your vehicle to your
nearest authorized dealer immediately.
Note:
FCA US LLC or your dealer may
contact you directly regarding software
updates.
To help further improve vehicle
security and minimize the potential risk
of a security breach, vehicle owners
should:
Only connect and use trusted media
devices (e.g. personal mobile phones or
USBs).
Privacy of any wireless and wired
communications cannot be assured. Third
parties may unlawfully intercept
information and private communications
without your consent.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents