Let us be your IT department!
Call us Today! (703) 821-8200




Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

After a heavily partisan 215-to-205 vote in the House of Representatives and an equally partisan 50-to-48 Senate vote, the decision to allow ISPs to freely sell their customer’s browsing data passed, with President Trump signing it into law shortly afterwards. The previous set of rules that were in place did not bar ISPs from selling browsing data to advertisers, but they did require the ISP to secure permissions from users to do so. As a result, the rules previously implemented by the FCC were terminated, as many who opposed them argued that the Federal Trade Commission (FTC) should be the entity with jurisdiction. This is an opinion shared by the current FCC Chairman, Ajit Pai, who supported the strikedown of these rules.

However, the FTC is currently prohibited from regulating ISPs, and no action has been taken to enable them to do so.

Political opinions of this matter are heavily mixed. On the one hand, those opposed to this new rule said that the browsing history of the consumer was the consumer’s business, and that there was no reason to share that browsing history with the ISP. Issues of privacy were also brought up, in the argument that a user’s medical or financial history could easily be surmised by the searches they execute.

On the other side of the aisle, those in support stated that the rules as they were before gave an unfair advantage to search engines and social media by allowing them to collect data that informs their advertising. As a result, it can be said that the government would be interfering with the free market. These rules also required notifications to be dispersed to customers in the event of a data breach, potentially leading to “notification fatigue” in the consumer.

The issue essentially boiled down to whether a company whose service you pay for should be able to take the same liberties with browsing history as a company that offers their services for free with the implicit agreement that they can sell your browsing data in return. The other major difference: ISPs have access to a much wider swathe of data than the search engines do, and could therefore profit off the entire history of their customers, rather than just their searches and social activity.

As the ISPs have claimed, this information could presumably lead to a more individualized and convenient browsing experience that brings the products and services a user has shown interest in to the forefront. However, many who opposed this ruling are simply uncomfortable with the thought of that much of their personal life being available to a corporation.

There are also many concerns about the prospects of this collected data falling into the wrong hands, especially considering that these rules will allow data from even sensitive and private materials, like emails, to be harvested and sold. What’s scariest is that this data wouldn’t even need to be hacked anymore to be used by someone with less-than-noble intentions. They could simply buy it.

Many ISPs have said that they simply intend to switch the opt-in option to an opt-out option, but many areas in the United States have limited options when it comes to selecting an ISP with decent services. In many cases, this means a user could easily be stuck with a provider that doesn’t necessarily provide that option.

What do you think? Is this enough to be considered an invasion of your privacy, or is this move set to improve your browsing experience through targeted ad delivery? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 May 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Microsoft Business Management Workplace Tips Managed Service Provider Software Productivity Backup Business Computing Hackers Saving Money Hardware Business Data Malware Hosted Solutions IT Services Email IT Support Quick Tips Smartphones Gadgets Google Mobile Devices Small Business Mobile Office Disaster Recovery Business Continuity Efficiency Computer Virtualization Microsoft Office Network User Tips Miscellaneous Upgrade Social Media Server Windows 10 VoIP Mobile Device Management Network Security Unified Threat Management Windows Innovation BYOD Operating System Communication WiFi Passwords Smartphone Remote Computing Mobile Computing Apps Vendor Management Marketing The Internet of Things History Holiday Users Managed IT services Ransomware Android Firewall Apple Facebook Remote Monitoring Analytics IT Consultant Collaboration Alert Bring Your Own Device Automation Office Save Money Health Content Filtering Data Management Wireless Technology Big data Windows 8 Lithium-ion Battery Hard Drives Tech Support Best Practice Going Green Hiring/Firing Internet of Things Virus Gmail Search App Browser Employer-Employee Relationship Phone System Budget Printer Information Technology Outlook Spam IBM Phishing Running Cable Bandwidth Saving Time Humor Proactive IT Help Desk Customer Service Computers Data storage Education Save Time BDR Money Maintenance Computer Repair Government Intranet Recovery Black Market Encryption Update Risk Management Telephone Systems Networking Training Digital Payment Hacker Fax Server communications Outsourced IT Productivity Managed IT PowerPoint Social Networking Two-factor Authentication Wireless Avoiding Downtime Antivirus Solid State Drive Travel Twitter Website Flexibility Artificial Intelligence Legal Current Events iPhone Business Intelligence Hacking Office 365 Mobile Device Document Management Administration User Hosted Solution Robot Safety Social Statistics Network Congestion Compliance DDoS Public Cloud Streaming Media Cybersecurity Cybercrime Hard Drive Inbound Marketing Co-managed IT Business Growth Password Cortana Automobile Cost Management Chrome Downtime Router Processors Lifestyle Computer Accessories USB Tablet Comparison Customer Relationship Management Presentation End of Support Company Culture Politics Augmented Reality Virtual Desktop Taxes Law Enforcement Text Messaging Documents Programming VPN Heating/Cooling Pain Points Retail User Error Excel Experience Net Neutrality Paperless Office Office Tips Computing Cloud Computing Gaming Console Hack Sports IT service SaaS Webcam Microserver Supercomputer Social Engineering Specifications Scalability Debate Machine Learning Bluetooth Archive Worker Distributed Denial of Service Computing Infrastructure Digital Signature Music Entertainment Upgrades Point of Contact Turn Key Employer Employee Relationship Rental Service Licensing Trojan Memory LiFi Organize Botnet Wi-Fi Thin CLient Deep Learning Analytic Telephony IT Support Word Flash Visible Light Communication Computer Malfunction Public Speaking Leadership Monitors Mobility Managed IT Services Device Management Entrepreneur Settings Advertising Business Managemenet Motion Sickness Banking HIPAA Google Wallet Electronic Payment Displays YouTube Tracking File Sharing Harddrive Windows 10 How To Language Unified Communications online Currency Disaster Web Server IP Address Business Metrics Drones External Harddrive Workers Human Resources Start Menu Mouse Permissions Skype Securty Chromebook Get More Done Writing GPS switches Smart Phones Samsung Messenger Uninterrupted Power Supply Printer Server G Suite Work/Life Balance Teamwork Physical Security Download Storage Ebay PDF 3D Tablets Books Data Protection Recycling Sync Keyboard Best Available Cryptocurrency Product Reviews Laptop CCTV Domains Microchip Google Docs Pirating Information eWaste Regulations Adminstration Read IT consulting Google Maps Reading Upselling Corporate Profile Webinar In Internet of Things Shortcut Value Cleaning CIO Emails Hacks Troubleshooting Relocation Environment Windows XP Content Management Staffing Competition Identity Theft Society Micrsooft Meetings Notifications Business Owner Reliable Computing Video Surveillance Best Practives Private Cloud Cabling LinkedIn Trending Administrator Application Virtual Reality Saving ZTime

hp supplies medallionLarge2017