Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Vizio Got Busted for Spying on Its Customers

How Vizio Got Busted for Spying on Its Customers

What have you watched on TV lately? Actually, never mind; if you don’t want to tell us, we can just ask Vizio. Relax--we’re not actually going through with this, but the fact remains that 11 million owners of Vizio televisions had their viewing habits tracked by the manufacturer. Were you one of them?

A fine by the Federal Trade Commission, totalling $2.2 million, was issued to Vizio following its actions of collecting data on users. This data included what the televisions were displaying, regardless of what the input was; whether it was smart TV apps, DVD players, air broadcasts, the TV’s IP addresses, or cable boxes. Whatever the TV had on it, Vizio could gather the data and do with it as it pleased. A federal court ordered Vizio to delete any data that they collected before March 2016 because their customers were not told of the company’s data sharing practices.

To remedy this, Vizio now makes its data collection practices available through the TV’s settings. Also part of their settlement, Vizio now sends notifications directly to the user’s screen. Jerry Huang, Vizio’s General Counsel, issued a statement regarding the incident: “Instead, as the complaint notes, the practices challenged by the government related only to the use of viewing data in the 'aggregate' to create summary reports measuring viewing audiences or behaviors. Today, the FTC has made clear that all smart TV makers should get people's consent before collecting and sharing television viewing information and Vizio now is leading the way.”

Of course, the question of what Vizio did with all of that data needs to be asked. Perhaps the company used the data to understand how customers were using its hardware, such as how frequently it was used and what kinds of devices were used in conjunction with it. This way, Vizio could use the data to better their products and make them more useful. Of course, that’s an optimistic view.

Another way that Vizio could have used this data is by collecting it to distribute to paying partners for marketing purposes. This type of data collection would be very lucrative for Vizio, a practice that could be difficult to ignore.

Was this collection of data a clear violation of generally-accepted ethics? That’s debatable, but the truth of the matter is that Vizio would have had a better time of it if they gave their customers the choice of being involved these data collection practices. If anything, it should make you consider how you’re using your own Internet-connected devices. You never know if and how they might be spying on you.

What are your thoughts on this development? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones IT Support Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Chrome Virtualization Tech Term Saving Money Holiday Social Media Gadgets Microsoft Office Managed Service Automation Managed IT Services Computers Facebook Cybercrime Artificial Intelligence Operating System Hacking BYOD Mobile Device Management Internet of Things Networking IT Support Health Wi-Fi Information Spam Office 365 Telephone Systems Remote Information Technology Alert Covid-19 Managed Service Provider Mobility Router BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Money Remote Monitoring Encryption Applications Mobile Computing App History Data Breach Application Law Enforcement Human Resources Big Data Password Apps Mobile Office Data Storage Patch Management Office Tips Government Training Private Cloud VPN Blockchain Managed IT Paperless Office How To Remote Computing Mouse HaaS Infrastructure Voice over Internet Protocol Flexibility Marketing Google Drive Vulnerability WiFi Windows 7 IT solutions Entertainment Word Website Wireless Budget Avoiding Downtime Servers Gmail Settings Data Security Bring Your Own Device Two-factor Authentication Data Management Work/Life Balance RMM Connectivity Social Remote Work End of Support User Error Meetings Education Physical Security Safety Conferencing Sports HIPAA Redundancy Risk Management Scam Hacker Keyboard Data Protection USB The Internet of Things Lithium-ion battery Vendor Management Vendor Managed Services Save Time Firewall Display Telephone System Staff Virtual Reality Software as a Service Cleaning Apple Employee/Employer Relationship Machine Learning Network Congestion Update eWaste Spam Blocking Electronic Medical Records Computing Battery Google Docs Virus Shadow IT Hiring/Firing Identity Theft Legal Unified Threat Management Computer Accessories Internet Exlporer Wearable Technology Retail Digital Signage Hard Drives Augmented Reality Instant Messaging Excel PDF Robot Fraud Business Intelligence Remote Worker Biometrics Printer Proactive IT Procurement Audit Virtual Desktop Worker Bluetooth Net Neutrality Workplace Strategy IT Management Cryptocurrency Best Practice YouTube Botnet DDoS Help Desk Black Market Printing IT Plan SharePoint Comparison IT Consultant Unsupported Software CES Managed Services Provider Document Management Charger Solid State Drive Humor Wireless Technology Customer Service Business Technology Database Content Management Environment How to Downtime Access Control Compliance Computer Care Remote Workers OneNote Fax Server Virtual Assistant Current Events Data storage Telephony Processor Authentication Automobile Samsung SaaS Computing Infrastructure Hard Drive Value Going Green Streaming Media Copiers Outlook 5G Leadership Digital Signature Bloatware Troubleshooting Reputation Tech Support Quick Tip Start Menu Warranty Content Smartwatch Loyalty Google Apps Tablets Techology Laptop Ergonomics Screen Mirroring HVAC Development Frequently Asked Questions OLED Analysis Entrepreneur Books Customers PowerPoint PCI DSS Windows Media Player Mobile Administrator Virtual Machine Windows 10s Devices Audiobook User Employee Touchpad 2FA Fiber Optics Cast Enterprise Content Management Shortcut Messaging Tip of the week MSP Cabling webinar Accountants Cost Management Emergency Advertising Policy Professional Services Microchip Hypervisor Public Cloud Thought Leadership Social Networking Politics Employer Employee Relationship Credit Cards Managing Stress Assessment Password Manager Dark mode Trend Micro Password Management Notifications SMS Windows Server 2008 Default App Multi-Factor Security Cameras Procedure Tools Search Engine Running Cable Saving Time Twitter Google Search Television Business Mangement Memory dark theme Shopping NIST AI IT Infrastructure Smart Tech Trending Relocation FinTech Addiction Bing Amazon Public Computer Recycling Video Games Social Network Regulations Wiring Investment Practices Worker Commute Transportation Printer Server Science Employees Employee/Employer Relationships Computer Fan Cache Experience Rootkit Amazon Web Services ISP Criminal Scalability Windows 365 Safe Mode Video Conferencing GDPR ROI Workers Hosted Computing Business Owner Benefits NarrowBand Sales Distributed Denial of Service Bitcoin FENG Wireless Internet Customer Relationship Management Shortcuts Online Shopping File Sharing Cryptomining IBM Analyitcs Search Point of Sale Personal Supply Chain Management Flash Camera Inventory Programming Smart Technology Specifications iPhone Evernote Monitoring Batteries Wire Software Tips Supercomputer Travel Windows 8.1 Digitize Sync Printers Antivirus Windows Server 2008 R2 Emails Millennials Files Wireless Charging Windows 8 Chromecast Customer relationships Smart Office IT Assessment IT service Manufacturing Consultant Email Best Practices Analytics Uninterrupted Power Supply Virtual Private Network Netflix Two Factor Authentication Workforce Colocation Security Cameras Cables Tablet Computer Tips Managed IT Service Root Cause Analysis OneDrive HBO Domains Biometric Security Knowledge Music Best Available Monitor Virtual CIO Peripheral Skype Project Management Nanotechnology Telecommuting WIndows 7 Cortana Digital Security Cameras IaaS Using Data Data loss Maintenance

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code