Let us be your IT department!
Call us Today! (703) 821-8200




Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

After a heavily partisan 215-to-205 vote in the House of Representatives and an equally partisan 50-to-48 Senate vote, the decision to allow ISPs to freely sell their customer’s browsing data passed, with President Trump signing it into law shortly afterwards. The previous set of rules that were in place did not bar ISPs from selling browsing data to advertisers, but they did require the ISP to secure permissions from users to do so. As a result, the rules previously implemented by the FCC were terminated, as many who opposed them argued that the Federal Trade Commission (FTC) should be the entity with jurisdiction. This is an opinion shared by the current FCC Chairman, Ajit Pai, who supported the strikedown of these rules.

However, the FTC is currently prohibited from regulating ISPs, and no action has been taken to enable them to do so.

Political opinions of this matter are heavily mixed. On the one hand, those opposed to this new rule said that the browsing history of the consumer was the consumer’s business, and that there was no reason to share that browsing history with the ISP. Issues of privacy were also brought up, in the argument that a user’s medical or financial history could easily be surmised by the searches they execute.

On the other side of the aisle, those in support stated that the rules as they were before gave an unfair advantage to search engines and social media by allowing them to collect data that informs their advertising. As a result, it can be said that the government would be interfering with the free market. These rules also required notifications to be dispersed to customers in the event of a data breach, potentially leading to “notification fatigue” in the consumer.

The issue essentially boiled down to whether a company whose service you pay for should be able to take the same liberties with browsing history as a company that offers their services for free with the implicit agreement that they can sell your browsing data in return. The other major difference: ISPs have access to a much wider swathe of data than the search engines do, and could therefore profit off the entire history of their customers, rather than just their searches and social activity.

As the ISPs have claimed, this information could presumably lead to a more individualized and convenient browsing experience that brings the products and services a user has shown interest in to the forefront. However, many who opposed this ruling are simply uncomfortable with the thought of that much of their personal life being available to a corporation.

There are also many concerns about the prospects of this collected data falling into the wrong hands, especially considering that these rules will allow data from even sensitive and private materials, like emails, to be harvested and sold. What’s scariest is that this data wouldn’t even need to be hacked anymore to be used by someone with less-than-noble intentions. They could simply buy it.

Many ISPs have said that they simply intend to switch the opt-in option to an opt-out option, but many areas in the United States have limited options when it comes to selecting an ISP with decent services. In many cases, this means a user could easily be stuck with a provider that doesn’t necessarily provide that option.

What do you think? Is this enough to be considered an invasion of your privacy, or is this move set to improve your browsing experience through targeted ad delivery? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 19 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Productivity Software Business Computing Backup Hackers Saving Money Hardware Data Business Malware IT Support Hosted Solutions Email IT Services Google Quick Tips Efficiency Gadgets Smartphones Small Business Mobile Devices Mobile Office Disaster Recovery Business Continuity Virtualization Computer Network Microsoft Office User Tips Server Miscellaneous Upgrade VoIP Social Media Network Security Windows 10 Unified Threat Management Windows Mobile Device Management Smartphone Innovation Ransomware WiFi Vendor Management Operating System Remote Computing Passwords BYOD Communication Apps The Internet of Things Mobile Computing Marketing Android Facebook Users History Holiday Managed IT services Firewall Remote Monitoring Analytics Apple Collaboration Data Management Save Money Alert IT Consultant Content Filtering Bring Your Own Device Health Office Automation Big data Windows 8 Best Practice Going Green BDR Spam Tech Support Wireless Technology Outsourced IT Phishing Hiring/Firing Search Lithium-ion Battery Managed IT Services Hard Drives Virus App Information Technology IBM Printer Gmail Outlook Recovery Browser Employer-Employee Relationship Help Desk Antivirus Productivity Internet of Things Budget Phone System Encryption Education Humor Save Time Saving Time Money Running Cable Data storage Administration Maintenance Proactive IT Computers SaaS communications Bandwidth Customer Service Travel Business Intelligence Website Fax Server Networking Document Management Mobile Device Telephone Systems Training Computer Repair Hacking Avoiding Downtime Office 365 Intranet Securty User Update Managed IT Current Events Solid State Drive Flexibility It Management Government IT Support Hard Drive Digital Payment Legal Risk Management Password PowerPoint Social Networking Hacker Hosted Solution Twitter Tablet Artificial Intelligence Two-factor Authentication Wireless iPhone Black Market Lifestyle Business Growth Telephony Monitors Retail Cloud Computing Experience Hack YouTube Settings Statistics End of Support Data Backup Law Enforcement Politics Pain Points Streaming Media Safety Inbound Marketing Social Public Cloud Excel User Error Cybersecurity Network Congestion DDoS Chrome Laptop Gaming Console Router Cybercrime Word Automobile Computer Accessories Webcam Comparison Office Tips Customer Relationship Management Augmented Reality Cortana Cost Management Paperless Office How To Sports Downtime Computing Text Messaging Processors USB VPN Robot Presentation Taxes Company Culture IT service Virtual Desktop Uninterrupted Power Supply Compliance Documents Programming Co-managed IT Heating/Cooling Net Neutrality Deep Learning cache Storage Rental Service CCTV PDF Google Maps Content Management Memory Visible Light Communication Keyboard Corporate Profile Best Available Wi-Fi In Internet of Things Emails Product Reviews Harddrive Domains Assessment eWaste Read Flash Scalability Video Surveillance Advertising Google Wallet Saving ZTime Shortcut VoIP Value LinkedIn External Harddrive Trending Meetings Displays Consultation Troubleshooting Environment Cabling Archive Private Cloud Debate Unified Communications Staffing Drones Get More Done Disaster Competition Banking Administrator Smart Phones File Sharing Supercomputer Point of Contact Printer Server Business Owner Worker Language Machine Learning Permissions Thin CLient Application Business Metrics Distributed Denial of Service Employer Employee Relationship Writing switches Google Drive Specifications Licensing Leadership Electricity Digital Signature Chromebook Botnet Messenger Upselling Webinar Entertainment Work/Life Balance Device Management Cryptocurrency Google Docs WannaCry Download Computer Malfunction Books Mobility Analytic IT consulting Time Management online Currency Cleaning Best Practives CIO Public Speaking Microchip Motion Sickness Reading Tracking Regulations Windows XP Touchscreen Entrepreneur Windows 10 Microserver Mouse Society Micrsooft Digital HIPAA Hacks Web Server Business Managemenet Relocation Workers GPS Websites Electronic Payment Start Menu Identity Theft Turn Key Trojan IP Address Access Notifications Reliable Computing Samsung Organize Ebay Human Resources 3D Software as a Service Virtual Reality G Suite Recycling Music Skype Upgrades Spyware Social Engineering Physical Security Tablets Bluetooth Pirating Information LiFi Adminstration Data Protection Teamwork Computing Infrastructure Sync Capital Productuvuty 3D Printing CrashOverride Data Recovery

hp supplies medallionLarge2017