Let us be your IT department!
Call us Today! (703) 821-8200

 

 

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

After a heavily partisan 215-to-205 vote in the House of Representatives and an equally partisan 50-to-48 Senate vote, the decision to allow ISPs to freely sell their customer’s browsing data passed, with President Trump signing it into law shortly afterwards. The previous set of rules that were in place did not bar ISPs from selling browsing data to advertisers, but they did require the ISP to secure permissions from users to do so. As a result, the rules previously implemented by the FCC were terminated, as many who opposed them argued that the Federal Trade Commission (FTC) should be the entity with jurisdiction. This is an opinion shared by the current FCC Chairman, Ajit Pai, who supported the strikedown of these rules.

However, the FTC is currently prohibited from regulating ISPs, and no action has been taken to enable them to do so.

Political opinions of this matter are heavily mixed. On the one hand, those opposed to this new rule said that the browsing history of the consumer was the consumer’s business, and that there was no reason to share that browsing history with the ISP. Issues of privacy were also brought up, in the argument that a user’s medical or financial history could easily be surmised by the searches they execute.

On the other side of the aisle, those in support stated that the rules as they were before gave an unfair advantage to search engines and social media by allowing them to collect data that informs their advertising. As a result, it can be said that the government would be interfering with the free market. These rules also required notifications to be dispersed to customers in the event of a data breach, potentially leading to “notification fatigue” in the consumer.

The issue essentially boiled down to whether a company whose service you pay for should be able to take the same liberties with browsing history as a company that offers their services for free with the implicit agreement that they can sell your browsing data in return. The other major difference: ISPs have access to a much wider swathe of data than the search engines do, and could therefore profit off the entire history of their customers, rather than just their searches and social activity.

As the ISPs have claimed, this information could presumably lead to a more individualized and convenient browsing experience that brings the products and services a user has shown interest in to the forefront. However, many who opposed this ruling are simply uncomfortable with the thought of that much of their personal life being available to a corporation.

There are also many concerns about the prospects of this collected data falling into the wrong hands, especially considering that these rules will allow data from even sensitive and private materials, like emails, to be harvested and sold. What’s scariest is that this data wouldn’t even need to be hacked anymore to be used by someone with less-than-noble intentions. They could simply buy it.

Many ISPs have said that they simply intend to switch the opt-in option to an opt-out option, but many areas in the United States have limited options when it comes to selecting an ISP with decent services. In many cases, this means a user could easily be stuck with a provider that doesn’t necessarily provide that option.

What do you think? Is this enough to be considered an invasion of your privacy, or is this move set to improve your browsing experience through targeted ad delivery? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Software Productivity Business Computing Backup Hackers Saving Money Hardware Data Business Malware Hosted Solutions IT Services IT Support Email Quick Tips Smartphones Gadgets Google Efficiency Mobile Devices Small Business Mobile Office Disaster Recovery Business Continuity Virtualization Microsoft Office Computer Network Miscellaneous Upgrade Social Media User Tips Server Network Security Windows 10 VoIP Mobile Device Management Unified Threat Management Innovation Windows BYOD Smartphone Communication WiFi Operating System Passwords Apps The Internet of Things Vendor Management Remote Computing Mobile Computing Marketing Ransomware Android Managed IT services Users History Holiday Firewall Remote Monitoring Facebook Analytics Apple Collaboration Alert IT Consultant Save Money Data Management Automation Content Filtering Big data Bring Your Own Device Health Office App Hiring/Firing Windows 8 Best Practice Going Green Tech Support Wireless Technology Lithium-ion Battery Hard Drives Virus Phishing Phone System Outsourced IT Gmail Information Technology BDR Spam IBM Browser Employer-Employee Relationship Printer Productivity Search Budget Internet of Things Outlook Proactive IT Help Desk Computers Save Time Money Running Cable Managed IT Services Data storage Humor Saving Time Customer Service Bandwidth Education Administration Maintenance Encryption PowerPoint Social Networking Telephone Systems Hacking Networking Antivirus Training Twitter Office 365 Artificial Intelligence User IT Support Hard Drive iPhone Managed IT Business Intelligence Government Fax Server Recovery Solid State Drive Document Management Mobile Device Flexibility Risk Management Legal Computer Repair Hacker Avoiding Downtime Intranet communications Tablet Update Current Events SaaS Two-factor Authentication Hosted Solution Wireless Digital Payment Travel Website Black Market Experience Text Messaging Business Growth Monitors VPN Settings Public Cloud YouTube Co-managed IT Cybersecurity Safety Politics End of Support Net Neutrality Social Law Enforcement Network Congestion DDoS Automobile Lifestyle Cybercrime How To Word Cortana Password Laptop Statistics Cost Management Paperless Office Taxes Processors Office Tips Downtime Uninterrupted Power Supply Computing USB Pain Points Presentation Streaming Media Sports Company Culture Inbound Marketing User Error IT service Virtual Desktop Excel Robot Chrome Documents Programming Heating/Cooling Gaming Console Router Compliance Computer Accessories Cloud Computing Hack Comparison Webcam Customer Relationship Management Retail Augmented Reality Deep Learning Private Cloud eWaste Mouse Microserver Read Telephony Cabling Electricity Flash Administrator Shortcut Visible Light Communication Value Troubleshooting GPS Supercomputer Staffing Machine Learning Environment Turn Key Worker Trojan WannaCry Distributed Denial of Service Competition Advertising Business Owner Ebay Organize 3D Banking Employer Employee Relationship Google Wallet Licensing Displays Recycling File Sharing Digital Language Botnet Application Unified Communications Specifications Disaster Pirating Information Adminstration Business Metrics Drones Access Computer Malfunction Permissions Digital Signature Content Management Entertainment Securty Chromebook Mobility Messenger Writing switches Spyware Work/Life Balance Motion Sickness Harddrive Video Surveillance Analytic Download Tracking Books Windows 10 LinkedIn Trending External Harddrive Saving ZTime Web Server Public Speaking Cryptocurrency Google Docs Archive Debate Microchip Workers Reading Start Menu Regulations Entrepreneur IT consulting Smart Phones Get More Done HIPAA Printer Server Business Managemenet Cleaning Point of Contact Electronic Payment CIO Hacks Samsung Relocation G Suite Windows XP Thin CLient Identity Theft Physical Security IP Address Society Human Resources Micrsooft Notifications Tablets Reliable Computing Data Protection Sync Leadership Upselling Webinar Skype Virtual Reality CCTV Device Management Social Engineering Google Maps Scalability Corporate Profile Bluetooth In Internet of Things Teamwork Storage Computing Infrastructure Emails Music Upgrades online Currency PDF Rental Service Best Practives VoIP Memory Keyboard LiFi Best Available Product Reviews Wi-Fi Meetings Domains

hp supplies medallionLarge2017