Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Vizio Got Busted for Spying on Its Customers

How Vizio Got Busted for Spying on Its Customers

What have you watched on TV lately? Actually, never mind; if you don’t want to tell us, we can just ask Vizio. Relax--we’re not actually going through with this, but the fact remains that 11 million owners of Vizio televisions had their viewing habits tracked by the manufacturer. Were you one of them?

A fine by the Federal Trade Commission, totalling $2.2 million, was issued to Vizio following its actions of collecting data on users. This data included what the televisions were displaying, regardless of what the input was; whether it was smart TV apps, DVD players, air broadcasts, the TV’s IP addresses, or cable boxes. Whatever the TV had on it, Vizio could gather the data and do with it as it pleased. A federal court ordered Vizio to delete any data that they collected before March 2016 because their customers were not told of the company’s data sharing practices.

To remedy this, Vizio now makes its data collection practices available through the TV’s settings. Also part of their settlement, Vizio now sends notifications directly to the user’s screen. Jerry Huang, Vizio’s General Counsel, issued a statement regarding the incident: “Instead, as the complaint notes, the practices challenged by the government related only to the use of viewing data in the 'aggregate' to create summary reports measuring viewing audiences or behaviors. Today, the FTC has made clear that all smart TV makers should get people's consent before collecting and sharing television viewing information and Vizio now is leading the way.”

Of course, the question of what Vizio did with all of that data needs to be asked. Perhaps the company used the data to understand how customers were using its hardware, such as how frequently it was used and what kinds of devices were used in conjunction with it. This way, Vizio could use the data to better their products and make them more useful. Of course, that’s an optimistic view.

Another way that Vizio could have used this data is by collecting it to distribute to paying partners for marketing purposes. This type of data collection would be very lucrative for Vizio, a practice that could be difficult to ignore.

Was this collection of data a clear violation of generally-accepted ethics? That’s debatable, but the truth of the matter is that Vizio would have had a better time of it if they gave their customers the choice of being involved these data collection practices. If anything, it should make you consider how you’re using your own Internet-connected devices. You never know if and how they might be spying on you.

What are your thoughts on this development? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Windows Upgrade Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Chrome Virtualization Social Media Saving Money Holiday Tech Term Gadgets Automation Managed Service Managed IT Services Microsoft Office Artificial Intelligence Facebook Computers Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Health Networking IT Support Internet of Things Hacking Telephone Systems Information Information Technology Covid-19 Managed Service Provider Spam Remote Office 365 Alert Recovery Employer-Employee Relationship Bandwidth Router BDR Social Engineering Mobility App History Password Money Mobile Computing Encryption Applications Application Human Resources Data Breach Law Enforcement Remote Monitoring Big Data Managed IT Blockchain Office Tips How To Paperless Office Apps Training VPN Data Storage Patch Management Remote Computing Government Mobile Office Private Cloud Data Security Bring Your Own Device Data Management Work/Life Balance Flexibility Wireless Marketing WiFi Gmail IT solutions Entertainment Website Settings Budget Infrastructure Voice over Internet Protocol Google Drive Vulnerability Windows 7 Two-factor Authentication Word Avoiding Downtime Mouse HaaS Servers Risk Management Hacker Vendor Cleaning Staff Software as a Service Telephone System Managed Services The Internet of Things Display Machine Learning Lithium-ion battery Connectivity Remote Work End of Support Education Physical Security Employee/Employer Relationship Safety USB RMM Conferencing Firewall HIPAA Sports Redundancy Scam Virtual Reality Keyboard Apple Data Protection Social Vendor Management User Error Meetings Save Time Data storage Access Control Robot Current Events Excel Automobile Virus Telephony Biometrics Samsung Virtual Assistant Authentication Unified Threat Management Virtual Desktop Managed Services Provider Computing Infrastructure Computer Accessories Going Green Database Value DDoS Remote Workers Spam Blocking Electronic Medical Records SharePoint Update Battery Processor Hiring/Firing Printer Shadow IT Google Docs Bluetooth Legal Identity Theft Customer Service Hard Drive Environment Internet Exlporer Fax Server Computing PDF Business Intelligence IT Consultant Augmented Reality SaaS Fraud Audit Worker Proactive IT Remote Worker Humor IT Management Best Practice Botnet Network Congestion Digital Signage Cryptocurrency YouTube Black Market eWaste IT Plan Comparison Unsupported Software Procurement Document Management CES Workplace Strategy Net Neutrality Charger Solid State Drive Wireless Technology Downtime Wearable Technology How to Hard Drives Help Desk Compliance Retail Content Management Printing OneNote Instant Messaging Computer Care Business Technology Printers Running Cable Millennials Video Conferencing ROI Bitcoin Netflix Memory Shortcuts Two Factor Authentication Colocation Smart Office Uninterrupted Power Supply Wireless Charging Sales Point of Sale Windows Media Player Personal Root Cause Analysis Cryptomining User PowerPoint Virtual Private Network Music Monitor Workforce Supply Chain Management HBO Knowledge Batteries Cables Monitoring Skype Windows 8.1 Digitize Data loss Managing Stress Science Project Management Troubleshooting Reputation Nanotechnology Streaming Media Telecommuting Outlook Windows Server 2008 R2 Leadership Start Menu Content Cameras Tech Support Cortana Customer relationships Laptop Digital Signature Email Best Practices IT Assessment Screen Mirroring Manufacturing Loyalty Techology Warranty Books Customers Distributed Denial of Service Frequently Asked Questions Customer Relationship Management Mobile Managed IT Service Windows 10s Analyitcs Audiobook Security Cameras HVAC Google Apps Computer Tips Touchpad Analysis Virtual CIO OneDrive Cast Programming Biometric Security webinar Administrator Emergency Devices Peripheral Tip of the week Digital Security Cameras Professional Services Using Data Public Cloud Politics Employer Employee Relationship Advertising Enterprise Content Management Printer Server Accountants Antivirus Copiers 5G Assessment MSP Windows 8 Microchip Thought Leadership Notifications Credit Cards Quick Tip Windows Server 2008 Ergonomics Tools IT service Smartwatch Password Management Password Manager Multi-Factor Security Development OLED Television Virtual Machine Tablet Search Engine Relocation Twitter PCI DSS 2FA Domains Fiber Optics Employee NIST Business Mangement Smart Tech Trending Messaging Cabling Public Computer Video Games Hypervisor Worker Commute Transportation Addiction IaaS Amazon Policy Regulations Maintenance Recycling Dark mode Trend Micro Computer Fan Bloatware Experience Rootkit Wiring Practices SMS Default App Scalability Saving Time Workers Tablets Business Owner Benefits Consultant Cache Amazon Web Services Procedure Criminal dark theme Shopping FENG Entrepreneur Google Search Safe Mode Analytics NarrowBand GDPR Hosted Computing AI IT Infrastructure IBM Search Bing Smart Technology Best Available iPhone Wireless Internet Online Shopping FinTech Flash Shortcut Social Network Cost Management WIndows 7 File Sharing Camera Inventory Specifications Software Tips Social Networking Investment Supercomputer Employee/Employer Relationships Emails Files Wire Evernote Employees Sync Windows 365 Travel ISP Chromecast

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code