Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

In a two-to-one ruling, three judges from the Ninth Circuit of the United States Court of Appeals declared that password sharing is a federal crime. The case in question included a former employee of Korn Ferry, David Nosal, who was headhunting his former colleagues with the intention of obtaining valid user credentials to steal data from Korn Ferry.

As expected, this landed Nosal in court, and he was charged with hacking in violation of the Computer Fraud and Abuse Act (CFAA). The CFAA has an extraordinarily wide reach, and allows the Justice Department to go after anyone who does something as meager as violating the Terms of Service agreement issued to the user of any end product (like, say, an online streaming service).

Though Nosal managed to get off the hook for his 2011 charges, he was convicted of his 2013 charges due to a ruling by a federal jury. His sentence was set for one year and one day, and earned him a felony. Yet, the one dissenting judge feels that this kind of sentence is harsh; Judge Stephen Reinhardt, who sees the larger implications of such a ruling:

“This case is about password sharing. People frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it. In my view, the Computer Fraud and Abuse Act (“CFAA”) does not make the millions of people who engage in this ubiquitous, useful, and generally harmless conduct into unwitting federal criminals.”

What this precedent sets is that even “generally harmless conduct,” like sharing your passwords for subscription-based streaming services like Netflix or HBO Go, can be penalized under law. Netflix only allows its service to be used in one “household,” on six different devices, with streaming capabilities on two devices at a time. The new ruling gives Netflix a reason to crack down on those who are sharing passwords without first asking them for permission to do so.

This particular interpretation of the CFAA makes it more important than ever to keep your passwords safe and secure from anyone besides yourself. After all, the more people who have access to a password, the more likely it is that the password will fall into the hands of hackers. Therefore, you should practice proper password security and keep sensitive information away from everyone who has no business accessing it.

For more trending tech news, tips, and tricks, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Windows Upgrade Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Cloud Computing Data Recovery Office Passwords Windows 10 Gadgets Tech Term Chrome Social Media Virtualization Saving Money Holiday Managed Service Microsoft Office Automation Managed IT Services Operating System Artificial Intelligence Facebook Computers Cybercrime Hacking Wi-Fi Health BYOD Mobile Device Management Networking Internet of Things IT Support Office 365 Managed Service Provider Alert Telephone Systems Remote Information Technology Covid-19 Spam Information Social Engineering Mobility Employer-Employee Relationship Recovery Router Bandwidth BDR Big Data App History Password Money Encryption Data Breach Mobile Computing Applications Human Resources Application Remote Monitoring Law Enforcement Managed IT Office Tips Training Data Storage Patch Management Apps VPN Remote Computing Blockchain Government Paperless Office Mobile Office How To Private Cloud Infrastructure Voice over Internet Protocol Bring Your Own Device Data Management Wireless Work/Life Balance Vulnerability Windows 7 Gmail Flexibility Word Marketing Settings WiFi Servers IT solutions Google Drive Entertainment Two-factor Authentication Website Budget Mouse Avoiding Downtime HaaS Data Security Save Time Risk Management Hacker Cleaning Conferencing The Internet of Things Lithium-ion battery Scam Data Protection End of Support Vendor Education Physical Security Managed Services Display Firewall Safety Vendor Management HIPAA Sports Redundancy Virtual Reality Apple USB Keyboard Employee/Employer Relationship RMM Social Telephone System Staff Software as a Service User Error Machine Learning Meetings Connectivity Remote Work Retail Hard Drives Solid State Drive Digital Signage Wireless Technology Downtime Spam Blocking Instant Messaging Electronic Medical Records Google Docs How to Identity Theft Excel Robot Data storage Biometrics Hiring/Firing Virtual Desktop Automobile Procurement Workplace Strategy Net Neutrality Augmented Reality Fraud Computing Infrastructure Help Desk DDoS Printing Virus Going Green Remote Worker SharePoint Unified Threat Management Business Intelligence Cryptocurrency Computer Accessories Managed Services Provider Audit Worker Battery Customer Service Shadow IT IT Management Environment Legal Database Botnet Comparison Fax Server Remote Workers Internet Exlporer IT Plan CES Printer Processor Bluetooth PDF SaaS Unsupported Software Business Technology Content Management Hard Drive Access Control Charger Proactive IT Virtual Assistant Network Congestion Compliance Best Practice eWaste OneNote Authentication Computer Care IT Consultant Current Events Computing YouTube Black Market Telephony Humor Samsung Update Document Management Wearable Technology Value HVAC Leadership Google Apps Dark mode Troubleshooting Consultant Trend Micro Outlook Default App Start Menu Analysis SMS Analytics Procedure Saving Time Files Administrator Running Cable Screen Mirroring Devices Loyalty Frequently Asked Questions Enterprise Content Management dark theme Memory Books Best Available Shopping Google Search Chromecast IT Infrastructure Mobile MSP Windows 10s Accountants WIndows 7 AI Credit Cards FinTech Colocation Microchip Bing Uninterrupted Power Supply Cast Thought Leadership Tip of the week Password Management webinar Password Manager Emergency Social Network Investment Monitor Professional Services Public Cloud Employer Employee Relationship Multi-Factor Security Assessment Employees Science Employee/Employer Relationships Search Engine Twitter Windows Server 2008 NIST Business Mangement Windows 365 ISP PowerPoint ROI Reputation Windows Media Player Tools Streaming Media Smart Tech Trending User Video Conferencing Customer Relationship Management Television Amazon Sales Content Bitcoin Shortcuts Tech Support Distributed Denial of Service Addiction Recycling Point of Sale Analyitcs Personal Techology Cryptomining Laptop Customers Wiring Practices Programming Managing Stress Supply Chain Management Public Computer Amazon Web Services Monitoring Audiobook Batteries Cache Regulations Safe Mode Criminal Windows 8.1 Transportation Digitize Cameras Touchpad Windows Server 2008 R2 GDPR Antivirus Computer Fan Hosted Computing Rootkit Online Shopping Customer relationships Politics Windows 8 Advertising Wireless Internet File Sharing IT service Workers Email Best Practices Benefits IT Assessment Manufacturing Camera Notifications FENG Inventory Specifications IBM Evernote Computer Tips Tablet Managed IT Service Security Cameras Wire Biometric Security Flash Domains Virtual CIO Smart Technology Travel OneDrive Printer Server Peripheral Relocation Printers Millennials Maintenance Supercomputer Wireless Charging Digital Security Cameras Using Data IaaS Software Tips Smart Office 5G Sync Emails Bloatware Copiers Video Games Quick Tip Worker Commute Virtual Private Network Workforce Cables Ergonomics Experience Tablets Smartwatch OLED Netflix Entrepreneur Two Factor Authentication Development Scalability PCI DSS Business Owner Virtual Machine Project Management Root Cause Analysis Nanotechnology Telecommuting Shortcut Knowledge Cortana 2FA Music Fiber Optics Employee NarrowBand HBO Cabling Skype Digital Signature Cost Management Messaging Search Policy Hypervisor iPhone Warranty Data loss Social Networking

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code