Info Advantage Blog

Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

What the Cancellation of the FCC Online Privacy Rules Means for You

What the Cancellation of the FCC Online Privacy Rules Means for You

Congress recently voted to do away with Obama-era regulations that were intended to protect consumer data from being sold to advertisers without the user’s consent. As of April 4th, President Trump has officially signed the legislation that will dismantle the internet protection that had originally been approved in October 2016.

What Was Voted On?

Congress voted on whether or not to keep a set of Internet privacy rules approved back in October during the end of the Obama administration. The measure, which was passed by a 215-205 vote according to NBC News, blocks the FCC from being able to enforce new privacy rules that had been passed last year by the Obama administration last year before the election. The legislation, which was recently signed by the President, also bans the FCC from issuing any similar online protections in the future.

What Information Can Be Bought?

The original policy would have banned Internet providers from collecting, storing, sharing and selling user information. They would be allowed to collect and sell information such as your web history and app usage, according to The Washington Post. The rules also required Internet providers to use stronger security safeguards to protect customer data against hackers. Now that the policies have been brought down, providers are able to monitor their customer’s online activity and use the data they’ve collected to create highly targeted ads. It also allows them to sell the information to advertisers, financial firms, and other for-profit companies.

How Can I Protect My Data?

As of now, there are no real changes being made to the Internet security policy, so not much is expected to change right away. However, experts suggest a few methods that users can use to keep their data to themselves. First, security experts suggest that you use a virtual private network, or VPN. VPNs will hide your location so they cannot verify your identity, and hides your Internet traffic so that no one will be able to see your browsing history. Security professionals also suggest that users make use of HTTPS sites, which ensure users that their data is secure and will not be shared.

Contact Info Advantage today at (585) 857-2644 to learn more ways you can protect your personal data from being shared or sold.

Business Continuity and the Cloud
4 Steps to Troubleshoot a Weak Wi-Fi Signal
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Privacy Best Practices Current Events technology solutions Productivity Hackers malware backup cloud Software Business Management Ransomware cyber attacks Business practice Network Security Business Continuity Mobility Disaster Recovery Microsoft Innovation Hardware Windows 10 Efficiency Computer Avoiding Downtime Internet Mobile Devices business Quick Tips hardware solutions Office tips Business Computing data breach Social Operating System Laptop Health Law Enforcement Education cyber criminals Wi-Fi voip email Flexibility Identity Theft Small Business IT Upgrade Antivirus Communication Risk Management servers Passwords IT Support Miscellaneous Humor Office 365 Application data Personal Information internet user Mobile Computing Money Information Technology Saving Money Automation IT Services cloud capabilities Smartphone Facebook History phone systems Artificial Intelligence Managed IT Services Internet Protocol Scalability Workplace Tips Server Encryption Gadgets Data recovery spam Update Router Net worth emails iPhone hardware refreshes How To ecommerce Government Microsoft Office intel time Managing Stress threats Google Cybercrime HaaS Reputation virtualized servers Marketing Video Games Search Windows Recovery Alert Battery Hosted Solutions holiday business continuity plan Remote Computing ATMs Point of Sale Apps Wireless downtime Password content Virtualization Automobile Text Messaging Software-based phone systems Legal Employer-Employee Relationship BDR byod cars Virtual Reality Advertising Hosted Solution Worker Commute Relocation VoIP right Smartphones Instant Messaging Private Cloud Work/Life Balance Users Social Media VPN Touchpad PDF computer network Google Drive Telephone Systems Black Market User Tips Telephony End of Support Entertainment USB Internet Exlporer Robot

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name