Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

What the Cancellation of the FCC Online Privacy Rules Means for You

What the Cancellation of the FCC Online Privacy Rules Means for You

Congress recently voted to do away with Obama-era regulations that were intended to protect consumer data from being sold to advertisers without the user’s consent. As of April 4th, President Trump has officially signed the legislation that will dismantle the internet protection that had originally been approved in October 2016.

What Was Voted On?

Congress voted on whether or not to keep a set of Internet privacy rules approved back in October during the end of the Obama administration. The measure, which was passed by a 215-205 vote according to NBC News, blocks the FCC from being able to enforce new privacy rules that had been passed last year by the Obama administration last year before the election. The legislation, which was recently signed by the President, also bans the FCC from issuing any similar online protections in the future.

What Information Can Be Bought?

The original policy would have banned Internet providers from collecting, storing, sharing and selling user information. They would be allowed to collect and sell information such as your web history and app usage, according to The Washington Post. The rules also required Internet providers to use stronger security safeguards to protect customer data against hackers. Now that the policies have been brought down, providers are able to monitor their customer’s online activity and use the data they’ve collected to create highly targeted ads. It also allows them to sell the information to advertisers, financial firms, and other for-profit companies.

How Can I Protect My Data?

As of now, there are no real changes being made to the Internet security policy, so not much is expected to change right away. However, experts suggest a few methods that users can use to keep their data to themselves. First, security experts suggest that you use a virtual private network, or VPN. VPNs will hide your location so they cannot verify your identity, and hides your Internet traffic so that no one will be able to see your browsing history. Security professionals also suggest that users make use of HTTPS sites, which ensure users that their data is secure and will not be shared.

Contact Info Advantage today at (585) 857-2644 to learn more ways you can protect your personal data from being shared or sold.

Business Continuity and the Cloud
4 Steps to Troubleshoot a Weak Wi-Fi Signal
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 20 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events Hackers malware backup technology solutions Productivity Business practice Software cloud Business Management Computer Business Continuity Disaster Recovery Ransomware cyber attacks Innovation Microsoft Hardware Mobility Quick Tips business hardware solutions Internet Efficiency Office tips Business Computing Network Security Mobile Devices Windows 10 Avoiding Downtime Laptop data breach Flexibility Social Saving Money Health email Operating System Law Enforcement data Small Business cloud capabilities Identity Theft Facebook Communication Information Technology Risk Management Personal Information Passwords IT Smartphone Humor Wi-Fi Mobile Computing voip Education IT Services History Application cyber criminals Antivirus internet user Miscellaneous Upgrade IT Support Office 365 Money servers Virtualization Video Games Recovery virtualized servers holiday Virtual Reality Remote Computing Gadgets byod Microsoft Office HaaS Encryption Password Touchpad ATMs Alert Legal Hosted Solutions spam content Marketing Data recovery Managing Stress Apps Windows Wireless Net worth Scalability Text Messaging Software-based phone systems cars ecommerce Update iPhone Automation phone systems Workplace Tips Battery How To Artificial Intelligence Server Internet Protocol Managed IT Services Government Point of Sale hardware refreshes business continuity plan Automobile Cybercrime Search Router time threats Reputation downtime BDR

Blog Archive

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name