Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Do You Feel About ISPs Selling Your Internet Browsing History?

How Do You Feel About ISPs Selling Your Internet Browsing History?

In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission before they harvested their browsing histories to sell to advertisers. This proposal is now moot with the establishment of a new law that passed through Congress and was signed by President Trump in April 2017.

The huge levels of dissent surrounding this issue boil down to concerns over privacy. While the proposed rules didn’t necessarily prevent ISPs from selling your data for monetary gain, they would have required the ISP to secure permissions from you before they did so. The relationship between ISPs, the Federal Communications Commission (the FCC), and the Federal Trade Commission (the FTC) also played a major role. Many politicians who were opposed to these new rules felt that the FCC had no business determining rules for ISPs, as they felt that responsibility for that was better managed by the FTC.

This opinion was shared by the current chairman of the FCC, Ajit Pai. However, while the FCC no longer has the authority to forbid ISPs from selling their user’s browsing data to advertisers, no power has been given to the FTC to prevent such activity, either.

The government’s actions have provided ISPs with the same abilities as search engines and social media sites, with a few changes. First of all, search engines and social media do not require any sort of purchase, which leads to an implied agreement that in exchange for their free services, they may use your browsing data to personalize the results they show you (although this personalization does allow marketers to target specific demographics of users, which is a very powerful tool for businesses that many users feel is invasive). ISPs, on the other hand, do charge for their services, meaning that this ruling effectively allows ISPs from making twice the profit from you. Furthermore, instead of just tracking your history on select sites and services, an ISP has access to analyze your entire surfing history and profit off of it.

So what does this all mean to you?
Well, that depends. It is possible that ISPs will target online advertisements based on your individual browsing history, emphasizing products and services that you have shown some interest in before. This isn’t new. Amazon, for example, has mastered this through the use of remarketing. While this could presumably lead to an improved browsing experience for many, there is considerable pushback coming from many advocates for privacy.

This is largely due to the fact that your ISP could harvest this data from almost anywhere, including your personal email accounts and any other online activity, in order to sell it, or at least allow marketers to capitalize on it. Depending on the data collected, this could potentially include personally identifiable information or sensitive account credentials--which could then be up for sale to whomever wanted to buy them from the ISP. Even if we weren’t worried about ISPs selling this type of sensitive data, it opens up another potential way for hackers to gather that data, if the ISP is lax on security.

This isn’t the only advantage the ISP gains, either. Under the rules that were scrapped, an ISP would have been required to alert their customers of a data breach. Arguing that this would only lead to ‘notification fatigue,’ the ISPs were also able to remove these rules, meaning that they are no longer obligated to inform you should your data be at risk.

So, how can you prevent your sensitive information from being collected?
Unfortunately, that may be easier said than done. While ISPs still have free reign to collect your browsing data as they please, they are not able to do so if you opt out. This is not to say that all ISPs have made opting out easy, so you may have to make a phone call, and you have to take them at their word that they are no longer tracking you.

There are also some ISPs who are opposed to the privacy repeal, but around 80 percent of Americans have only one or two options for broadband in their area.

Utilizing a virtual private network is another option available to you, but this approach isn’t without its drawbacks, either. Just as an ISP can, a third-party VPN can access and sell your browsing data, if they so choose. For a personal user, a VPN can be costly and cumbersome, however businesses do benefit from them every day. Tor browsing is another option, although it is more complicated, slower, and can potentially be unsecure.

In short, there really isn’t an easy, guaranteed way to secure your browsing history against the peeping eyes of your ISP. All you can do is implement some of these methods to defend yourself to the best of your ability.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Sunday, 22 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Internet Windows 10 Hosted Solutions Backup Software Computer Ransomware IT Services Managed Service Provider Network Security Mobile Devices Android Smartphone User Tips Workplace Tips Managed IT services Google IT Support Social Media Hardware Browser Communication Disaster Recovery Outsourced IT Business Continuity Efficiency Data Management App Smartphones Innovation Holiday Small Business Office Business Management Upgrade Data Cloud Computing Windows Microsoft Office Data Backup Facebook Remote Monitoring Server Miscellaneous Office 365 WiFi Artificial Intelligence Gmail Big Data Network Internet of Things Encryption Spam Firewall Apps Password Robot Phishing Hosted Solution Data Recovery Recovery Unified Threat Management Apple Word Avoiding Downtime Hacker Customer Service Mobile Device Management How To Content Filtering Government Save Money Paperless Office Money Saving Money Infrastructure Remote Computing Work/Life Balance Office Tips Tip of the week Employer-Employee Relationship Productivity Risk Management Chrome Passwords Cybersecurity IT Support Computers Alert Health Managed IT Services Data storage Bandwidth Computing Hacking Mobile Computing IT Management Education Tech Support Cybercrime Antivirus Virtual Reality Mobile Device Operating System Managed IT Data loss SaaS BYOD Social VoIP Website Presentation Business Growth Wi-Fi Tech Term Windows 10 Customer Relationship Management Outlook Telephone Systems Two-factor Authentication Document Management Settings Analytics Vendor Management Data Security The Internet of Things Applications Physical Security Augmented Reality Going Green Best Practice Virtual Private Network Taxes Lithium-ion battery IBM Business Owner HIPAA Running Cable Server Management Botnet Printing Mobile Security Samsung Marketing Licensing Maintenance Bring Your Own Device Search Digital Payment Sports Storage IT service Cortana Competition Virtualization Computer Care Administration Information Technology Project Management Training IT solutions Safety Humor Business Technology Wireless Technology Tablet Upgrades Wireless Analyitcs Automobile Budget Downtime End of Support communications Mouse YouTube Unified Communications Specifications Collaboration Scam Legal LiFi Vulnerability File Sharing Twitter User Politics Monitors Travel VPN Retail Identity Theft Google Drive Automation Websites Motion Sickness Motherboard Smart Technology Refrigeration Techology Internet Exlporer Assessment Supercomputer Halloween Google Docs Writing data services Software as a Service Help Desk Deep Learning Personal Information Fun Router Mail Merge Distributed Denial of Service Disaster Resistance IT Consultant Consultation IT Budget Scary Stories Social Engineering User Error IT Technicians Statistics Technology Tips Machine Learning Meetings Computer Repair Modem PowerPoint Address Managed IT Service Undo Proactive IT Hotspot Cleaning Notifications IP Address Consumers Mirgation Bluetooth Comparison Relocation Software Tips Webcam Corporate Profile Alt Codes Electronic Medical Records Google Wallet Cookies Redundancy Break Fix IT Consulting Language Quick Tips Printer Crowdsourcing Dark Data Mobile Office Migration Black Friday Private Cloud Point of Sale WannaCry Typing Drones eWaste Nanotechnology Dark Web Data Breach Computing Infrastructure IT Sevices Time Management Access Control Buisness Chatbots Cyber Monday Error Cabling Cryptocurrency Knowledge Environment Data Warehousing Technology Laws Alerts Network Management SharePoint Identity flu season Web Server VoIP Bitcoin Update Staffing Experience Troubleshooting Lenovo Microsoft Excel Unified Threat Management Cooperation Touchscreen Downloads BDR 3D Printing Shortcut Fort Worth Administrator Disaster Blockchain Cameras Digital Windows 8 Chromebook GPS Phone System Superfish Domains business communications systems Staff Multi-Factor Security Law Enforcement Google Maps Network Congestion Unsupported Software 5G Compliance Entrepreneur Patch Management flu shot Uninterrupted Power Supply Permissions CCTV Spyware Emoji Tracking Application Public Speaking Internet Protocol Flexibility Google Calendar Gadget Users Display Solid State Drive Mobile Data Hacks Regulations Fort Worth IT Networking Fraud How To VoIP streamlines Operations Heating/Cooling Legislation Hard Disk Drive Current Events Social Networking DFW IT Service Net Neutrality G Suite Firefox Processors Laptop iPhone Hard Drives Virtual Desktop business network infrastructure Wearable Technology Servers

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code