Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Vizio Got Busted for Spying on Its Customers

How Vizio Got Busted for Spying on Its Customers

What have you watched on TV lately? Actually, never mind; if you don’t want to tell us, we can just ask Vizio. Relax--we’re not actually going through with this, but the fact remains that 11 million owners of Vizio televisions had their viewing habits tracked by the manufacturer. Were you one of them?

A fine by the Federal Trade Commission, totalling $2.2 million, was issued to Vizio following its actions of collecting data on users. This data included what the televisions were displaying, regardless of what the input was; whether it was smart TV apps, DVD players, air broadcasts, the TV’s IP addresses, or cable boxes. Whatever the TV had on it, Vizio could gather the data and do with it as it pleased. A federal court ordered Vizio to delete any data that they collected before March 2016 because their customers were not told of the company’s data sharing practices.

To remedy this, Vizio now makes its data collection practices available through the TV’s settings. Also part of their settlement, Vizio now sends notifications directly to the user’s screen. Jerry Huang, Vizio’s General Counsel, issued a statement regarding the incident: “Instead, as the complaint notes, the practices challenged by the government related only to the use of viewing data in the 'aggregate' to create summary reports measuring viewing audiences or behaviors. Today, the FTC has made clear that all smart TV makers should get people's consent before collecting and sharing television viewing information and Vizio now is leading the way.”

Of course, the question of what Vizio did with all of that data needs to be asked. Perhaps the company used the data to understand how customers were using its hardware, such as how frequently it was used and what kinds of devices were used in conjunction with it. This way, Vizio could use the data to better their products and make them more useful. Of course, that’s an optimistic view.

Another way that Vizio could have used this data is by collecting it to distribute to paying partners for marketing purposes. This type of data collection would be very lucrative for Vizio, a practice that could be difficult to ignore.

Was this collection of data a clear violation of generally-accepted ethics? That’s debatable, but the truth of the matter is that Vizio would have had a better time of it if they gave their customers the choice of being involved these data collection practices. If anything, it should make you consider how you’re using your own Internet-connected devices. You never know if and how they might be spying on you.

What are your thoughts on this development? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Cloud Computing Office Data Recovery Passwords Windows 10 Gadgets Chrome Tech Term Virtualization Social Media Saving Money Holiday Managed IT Services Managed Service Microsoft Office Automation Operating System Artificial Intelligence Computers Facebook Cybercrime IT Support Internet of Things Hacking Wi-Fi BYOD Mobile Device Management Networking Health Remote Information Managed Service Provider Spam Alert Covid-19 Office 365 Telephone Systems Information Technology BDR Social Engineering Mobility Employer-Employee Relationship Bandwidth Recovery Router Law Enforcement Big Data Remote Monitoring Password Money App Mobile Computing Data Breach History Encryption Application Applications Human Resources How To Remote Computing Private Cloud Mobile Office Data Storage Managed IT Patch Management Apps Office Tips Training VPN Blockchain Paperless Office Government Two-factor Authentication Avoiding Downtime Mouse HaaS Infrastructure Voice over Internet Protocol Vulnerability Bring Your Own Device Data Management Flexibility Windows 7 Work/Life Balance Word Marketing WiFi Wireless IT solutions Servers Entertainment Website Budget Gmail Google Drive Settings Data Security Machine Learning Virtual Reality Apple Connectivity Remote Work Social Vendor User Error Save Time Managed Services Meetings Display Conferencing Scam Cleaning Risk Management Data Protection Employee/Employer Relationship Hacker RMM End of Support Vendor Management The Internet of Things Lithium-ion battery Education Physical Security Safety USB Sports HIPAA Redundancy Firewall Keyboard Telephone System Staff Software as a Service Net Neutrality YouTube Workplace Strategy SaaS Value Black Market Update Help Desk Spam Blocking Printing Electronic Medical Records Network Congestion Google Docs eWaste Document Management Solid State Drive Hiring/Firing Identity Theft Wireless Technology How to Managed Services Provider Downtime Database Data storage Augmented Reality Virus Wearable Technology Automobile Remote Workers Retail Fraud Hard Drives Business Intelligence Unified Threat Management Processor Instant Messaging Robot Computing Infrastructure Excel Remote Worker Computer Accessories Audit Worker Going Green IT Management Cryptocurrency Hard Drive Biometrics Virtual Desktop Botnet IT Plan Battery Computing Comparison Shadow IT Printer DDoS Legal Bluetooth Unsupported Software SharePoint CES Internet Exlporer Charger Business Technology Content Management Customer Service PDF Compliance Digital Signage Access Control OneNote Computer Care Environment IT Consultant Virtual Assistant Current Events Fax Server Proactive IT Telephony Authentication Humor Samsung Best Practice Procurement Nanotechnology Social Network Telecommuting Tablet Skype Project Management Experience Data loss Domains Scalability Cortana Investment Troubleshooting Consultant Outlook Employees Business Owner Leadership Digital Signature Employee/Employer Relationships Maintenance ISP NarrowBand Start Menu Warranty Analytics Windows 365 IaaS Screen Mirroring HVAC Video Conferencing Search Loyalty Google Apps ROI Bloatware Books Shortcuts Best Available Frequently Asked Questions Sales Analysis Bitcoin iPhone Windows 10s Devices Personal Cryptomining Tablets WIndows 7 Mobile Administrator Point of Sale Cast Enterprise Content Management Supply Chain Management Entrepreneur Files Emergency Tip of the week MSP Monitoring webinar Accountants Batteries Public Cloud Thought Leadership Digitize Shortcut Employer Employee Relationship Credit Cards Chromecast Professional Services Microchip Windows 8.1 Password Management Assessment Password Manager Windows Server 2008 R2 Cost Management Social Networking Colocation Multi-Factor Security Uninterrupted Power Supply Windows Server 2008 Customer relationships Twitter Windows Media Player IT Assessment Manufacturing User Tools Search Engine PowerPoint Email Best Practices NIST Television Business Mangement Monitor Trending Security Cameras Computer Tips Running Cable Smart Tech Managed IT Service Virtual CIO Addiction OneDrive Amazon Biometric Security Memory Managing Stress Streaming Media Peripheral Public Computer Recycling Reputation Using Data Transportation Tech Support Regulations Wiring Cameras Digital Security Cameras Content Practices Computer Fan Cache Copiers Techology Rootkit Amazon Web Services 5G Laptop Safe Mode Quick Tip Criminal Customers Benefits Smartwatch Science GDPR Ergonomics Audiobook Workers Hosted Computing FENG Wireless Internet Development Online Shopping OLED Touchpad File Sharing PCI DSS IBM Virtual Machine Fiber Optics Customer Relationship Management Advertising Smart Technology Specifications Employee Flash Camera Printer Server 2FA Distributed Denial of Service Politics Inventory Wire Messaging Evernote Cabling Analyitcs Notifications Software Tips Policy Supercomputer Hypervisor Programming Travel Trend Micro Millennials Sync Printers Dark mode Emails Smart Office SMS Wireless Charging Default App Procedure Antivirus Saving Time Relocation Shopping Two Factor Authentication Workforce Google Search Windows 8 Virtual Private Network dark theme Netflix Root Cause Analysis AI IT service Video Games Cables IT Infrastructure Bing HBO FinTech Worker Commute Knowledge Music

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code