ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

After a heavily partisan 215-to-205 vote in the House of Representatives and an equally partisan 50-to-48 Senate vote, the decision to allow ISPs to freely sell their customer’s browsing data passed, with President Trump signing it into law shortly afterwards. The previous set of rules that were in place did not bar ISPs from selling browsing data to advertisers, but they did require the ISP to secure permissions from users to do so. As a result, the rules previously implemented by the FCC were terminated, as many who opposed them argued that the Federal Trade Commission (FTC) should be the entity with jurisdiction. This is an opinion shared by the current FCC Chairman, Ajit Pai, who supported the strikedown of these rules.

However, the FTC is currently prohibited from regulating ISPs, and no action has been taken to enable them to do so.

Political opinions of this matter are heavily mixed. On the one hand, those opposed to this new rule said that the browsing history of the consumer was the consumer’s business, and that there was no reason to share that browsing history with the ISP. Issues of privacy were also brought up, in the argument that a user’s medical or financial history could easily be surmised by the searches they execute.

On the other side of the aisle, those in support stated that the rules as they were before gave an unfair advantage to search engines and social media by allowing them to collect data that informs their advertising. As a result, it can be said that the government would be interfering with the free market. These rules also required notifications to be dispersed to customers in the event of a data breach, potentially leading to “notification fatigue” in the consumer.

The issue essentially boiled down to whether a company whose service you pay for should be able to take the same liberties with browsing history as a company that offers their services for free with the implicit agreement that they can sell your browsing data in return. The other major difference: ISPs have access to a much wider swathe of data than the search engines do, and could therefore profit off the entire history of their customers, rather than just their searches and social activity.

As the ISPs have claimed, this information could presumably lead to a more individualized and convenient browsing experience that brings the products and services a user has shown interest in to the forefront. However, many who opposed this ruling are simply uncomfortable with the thought of that much of their personal life being available to a corporation.

There are also many concerns about the prospects of this collected data falling into the wrong hands, especially considering that these rules will allow data from even sensitive and private materials, like emails, to be harvested and sold. What’s scariest is that this data wouldn’t even need to be hacked anymore to be used by someone with less-than-noble intentions. They could simply buy it.

Many ISPs have said that they simply intend to switch the opt-in option to an opt-out option, but many areas in the United States have limited options when it comes to selecting an ISP with decent services. In many cases, this means a user could easily be stuck with a provider that doesn’t necessarily provide that option.

What do you think? Is this enough to be considered an invasion of your privacy, or is this move set to improve your browsing experience through targeted ad delivery? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media VoIP Users Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Managed Service Windows 10 IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Windows Workplace Strategy Artificial Intelligence Managed IT services Gadgets Networking Remote App Virtualization Mobile Device Management Spam Business Technology WiFi Blockchain Bandwidth Server Encryption Information History Gmail Budget Employee/Employer Relationship Office Two-factor Authentication Office 365 Apple Information Technology Wi-Fi Big Data Health BDR Analytics Conferencing Cybercrime Access Control Data Security Employer-Employee Relationship Vendor Help Desk Hacking Remote Monitoring Remote Computing Voice over Internet Protocol Cost Management IT Management Hacker Training Document Management Compliance Save Money Patch Management Applications Retail Alert Project Management BYOD Vulnerabilities Computing Hiring/Firing Vendor Management Outlook Hard Drive Password Money Mobile Office Data loss Customer Service Unified Threat Management Managed Services Firewall Legal Data storage Augmented Reality Word Search... IBM Best Practice Website Antivirus Black Market Maintenance Cleaning The Internet of Things Robot YouTube Monitoring Windows 11 Healthcare User Laptop Websites Mobility Meetings Remote Workers Chrome Twitter Google Maps Scam Windows 7 Law Enforcement Sports Free Resource Social End of Support SaaS DDoS Printer VPN How To Mobile Computing Update iPhone Marketing Education Cortana Running Cable Content Filtering Travel Virtual Reality Data Breach Social Engineering Router Cryptocurrency Paperless Office Storage Avoiding Downtime Physical Security Holidays Politics Cooperation Machine Learning Settings Video Conferencing Multi-factor Authentication Start Menu HIPAA Wireless Technology Solid State Drive Downloads Computer Care Virtual Machines Computer Repair eWaste Vulnerability Saving Time Professional Services Downtime Chromebook Software as a Service Drones Data Protection Computers Bitcoin Safety Automobile Telephone Virtual Desktop Managed Services Provider Experience How To Virtual Private Network Microchip Flexibility Excel PowerPoint Administration Current Events Tech Terms Presentation Disaster Solutions Hack Identity Theft Specifications IT Consultant Notifications Managed IT Digital Unified Communications Virtual Assistant Integration Images 101 Google Docs Customer Relationship Management Display Lithium-ion battery Bluetooth Taxes Co-Managed IT Distributed Denial of Service Entertainment Office Tips Private Cloud Processor Memory Employees Processors Securty Botnet Username Videos File Sharing Surveillance Micrsooft Startup Freedom of Information Managing Costs Domains Rental Service Redundancy Navigation Flash Cache Addiction email scam SSID Development Employer/Employee Relationships Telephone Systems Unified Threat Management Media Business Growth Workers Mobile Security Legislation News Virtual Machine User Tip Smart Technology Printing Evernote Network Management Reviews CCTV Troubleshooting Optimization Teamwork Public Speaking Banking Touchscreen 2FA Google Wallet Deep Learning Emails Data Storage Computer Malfunction Fake News Streaming Media Hypervisor Messenger Emergency Proxy Server Medical IT Keyboard Vendor Mangement Service Level Agreement Shopping Computing Infrastructure SQL Server Hard Drives Business Metrics Management Paperless Hosted Solution Samsung Device security intranet Uninterrupted Power Supply Wireless Headphones PCI DSS Webcam Microsoft Excel Licensing Books Wireless Supply Chain Tech Shortcut Language Business Mangement Going Green Gig Economy Society Business Cards Business Owner Humor Internet Service Provider Azure Heating/Cooling Error Environment Business Communications Tablets Social Networking Monitors Regulations Compliance Visible Light Communication Windows XP Managed IT Service Reading Bookmark Workplace Google Calendar Term Download Windows 8 Supercomputer Piracy Memes Net Neutrality Virus Human Resources HTML Relocation Browsers Displays Nanotechnology Financial Data Advertising Motion Sickness Scams Comparison Google Play Work/Life Balance Google Drive Upload Risk Management Tech Support Software License Inbound Marketing IT Social Network Google Apps Knowledge Data Analysis Corporate Profile Screen Reader Telework Staffing Microsoft 365 Cables In Internet of Things Television Security Cameras Telephony Trends Smartwatch Employer Employee Relationship Mobile Technology Communitications Network Congestion Cabling Devices Electronic Payment Procurement IP Address Hacks Customer Resource management Reliable Computing Fileless Malware Writing Tablet FinTech G Suite Tip of the week Point of Sale Mouse VoIP Gamification CES Tracking Company Culture IT Assessment Regulations Supply Chain Management Phone System Value Telephone System Scalability Directions Backup and Disaster Recovery Organization Web Server Cyber security Shortcuts Recovery Administrator SharePoint Competition Text Messaging Content Proactive IT Digital Payment Desktop Smart Devices Worker Accountants Remote Working Bring Your Own Device Electronic Medical Records Entrepreneur Access Database AI LiFi Trend Micro Be Proactive Computer Accessories Documents Transportation Application Time Management Digital Security Cameras Music Public Cloud Electronic Health Records Equifax Wasting Time Health IT Business Intelligence Audit Spyware Tactics Hard Drive Disposal eCommerce Modem Workplace Strategies

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?