crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Do You Feel About ISPs Selling Your Internet Browsing History?

In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission before they harvested their browsing histories to sell to advertisers. This proposal is now moot with the establishment of a new law that passed through Congress and was signed by President Trump in April 2017.

The huge levels of dissent surrounding this issue boil down to concerns over privacy. While the proposed rules didn’t necessarily prevent ISPs from selling your data for monetary gain, they would have required the ISP to secure permissions from you before they did so. The relationship between ISPs, the Federal Communications Commission (the FCC), and the Federal Trade Commission (the FTC) also played a major role. Many politicians who were opposed to these new rules felt that the FCC had no business determining rules for ISPs, as they felt that responsibility for that was better managed by the FTC.

This opinion was shared by the current chairman of the FCC, Ajit Pai. However, while the FCC no longer has the authority to forbid ISPs from selling their user’s browsing data to advertisers, no power has been given to the FTC to prevent such activity, either.

The government’s actions have provided ISPs with the same abilities as search engines and social media sites, with a few changes. First of all, search engines and social media do not require any sort of purchase, which leads to an implied agreement that in exchange for their free services, they may use your browsing data to personalize the results they show you (although this personalization does allow marketers to target specific demographics of users, which is a very powerful tool for businesses that many users feel is invasive). ISPs, on the other hand, do charge for their services, meaning that this ruling effectively allows ISPs from making twice the profit from you. Furthermore, instead of just tracking your history on select sites and services, an ISP has access to analyze your entire surfing history and profit off of it.

So what does this all mean to you?
Well, that depends. It is possible that ISPs will target online advertisements based on your individual browsing history, emphasizing products and services that you have shown some interest in before. This isn’t new. Amazon, for example, has mastered this through the use of remarketing. While this could presumably lead to an improved browsing experience for many, there is considerable pushback coming from many advocates for privacy.

This is largely due to the fact that your ISP could harvest this data from almost anywhere, including your personal email accounts and any other online activity, in order to sell it, or at least allow marketers to capitalize on it. Depending on the data collected, this could potentially include personally identifiable information or sensitive account credentials--which could then be up for sale to whomever wanted to buy them from the ISP. Even if we weren’t worried about ISPs selling this type of sensitive data, it opens up another potential way for hackers to gather that data, if the ISP is lax on security.

This isn’t the only advantage the ISP gains, either. Under the rules that were scrapped, an ISP would have been required to alert their customers of a data breach. Arguing that this would only lead to ‘notification fatigue,’ the ISPs were also able to remove these rules, meaning that they are no longer obligated to inform you should your data be at risk.

So, how can you prevent your sensitive information from being collected?
Unfortunately, that may be easier said than done. While ISPs still have free reign to collect your browsing data as they please, they are not able to do so if you opt out. This is not to say that all ISPs have made opting out easy, so you may have to make a phone call, and you have to take them at their word that they are no longer tracking you.

There are also some ISPs who are opposed to the privacy repeal, but around 80 percent of Americans have only one or two options for broadband in their area.

Utilizing a virtual private network is another option available to you, but this approach isn’t without its drawbacks, either. Just as an ISP can, a third-party VPN can access and sell your browsing data, if they so choose. For a personal user, a VPN can be costly and cumbersome, however businesses do benefit from them every day. Tor browsing is another option, although it is more complicated, slower, and can potentially be unsecure.

In short, there really isn’t an easy, guaranteed way to secure your browsing history against the peeping eyes of your ISP. All you can do is implement some of these methods to defend yourself to the best of your ability.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Backup Hackers Hosted Solutions Malware Email Mobile Devices IT Support Business Software Small Business Hardware Network Server Smartphones Data Communication Upgrade Business Continuity Windows Mobile Device Management VoIP Microsoft Office Disaster Recovery Google Virtualization Computer Efficiency Miscellaneous Mobile Office Vendor Management Holiday Innovation Gadgets Social Media Quick Tips Passwords Mobile Computing BYOD Android Smartphone Outsourced IT User Tips Browser WiFi Data Backup Windows 10 The Internet of Things Remote Monitoring Network Security Ransomware Bring Your Own Device Spam Best Practice Internet of Things Data Management Managed IT services Trending Wireless Technology Operating System Apple Remote Computing Alert Users Content Filtering Data Recovery Going Green Artificial Intelligence History Firewall IT Solutions Unified Threat Management Lithium-ion Battery Save Money IT Consultant Printer Tech Support Gmail Information Technology Current Events Managed IT Big Data App Office Analytics Facebook Encryption Windows 8 Cloud Computing Router Antivirus Tech Term Humor Saving Time Avoiding Downtime Maintenance Hard Drives Customer Relationship Management Collaboration Cybersecurity Two-factor Authentication Marketing Automation Excel Office Tips Retail Phishing Applications Document Management IT service Mobile Device Digital Payment Business Growth VPN Apps Risk Management Application Managed IT Services Virus Employer-Employee Relationship Website Customer Service Hacking Computers Fax Server Phone System Outlook Health Administration Presentation Augmented Reality Data Security Budget Compliance Computer Repair Proactive IT Regulations Recovery Inbound Marketing Mouse Money Bandwidth Running Cable Social Net Neutrality Licensing Infrastructure Chrome Paperless Office PowerPoint Social Networking Wi-Fi Training Tablet Office 365 Project Management iPhone User Error Password Co-Managed IT Government Search Files Virtual Desktop USB Piracy Mobility Business Owner Sports Hacker User Point of Sale Programming Tip of the week Scam Twitter Analyitcs Education Safety Specifications Hosted Solution IBM Settings Flexibility Cost Management Wireless Data storage Cybercrime File Sharing Save Time Vulnerability Wearable Technology Robot Unified Communications Hiring/Firing HIPAA Productivity Printing Display Alerts End of Support LiFi Redundancy Computing Statistics Data loss Help Desk Intranet Business Intelligence Internet Exlporer Competition Network Congestion Smart Technology Downtime Mobile Security Identities Networking Migration Telephony Downloads IoT Distributed Denial of Service Backups Adminstration Network Management Hotspot Knowledge Environment CIO Multi-Factor Security Solid State Drive Bluetooth 3D Chatbots Star Wars Managed IT Service Legal Online Currency Samsung Debate Windows 10 Language Experience Troubleshooting Machine Learning Google Calendar Heating/Cooling Alt Codes Computer Accessories Techology Identity Utility Computing Break Fix Consumers Crowdfunding YouTube Computing Infrastructure Private Cloud Legislation Typing Disaster Resistance Healthcare Scheduling Software Tips Dark Web IP Address Google Drive Company Culture Server Management Cooperation How To Public Cloud Refrigeration Cryptocurrency Disaster Touchscreen IT Consulting Motherboard Hard Drive Data Warehousing Google Docs Staff Sync Software as a Service Bitcoin Digital Signature Data Breach Modem Memory Cache Microsoft Excel communications Operations Laptop Mobile Device Managment Technology Tips Hacks Cookies Conferencing IT Support Blockchain Documents Entrepreneur Virtual Private Network Halloween Technology Laws PC Care Comparison Undo Nanotechnology Macro Value People Permissions 5G PDF eBay IT Technicians Scary Stories Virtual Reality Unified Threat Management Leadership Travel Black Friday Remote Support Screen Reader Streaming Media New Additions Fraud Monitors Skype Deep Learning Print Server Gaming Console Text Messaging Mirgation SaaS Access Control BDR Cyber Monday Domains Google Wallet Work Station Smart Tech Congratulations Assessment Fun Writing LinkedIn Word Law Firm IT Video Surveillance Business Technology Storage SharePoint Identity Theft Public Speaking Drones Windows 8.1 Update Recycling Connectivity IT Management Cortana Social Engineering Best Available eWaste Buisness

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...