Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

In a two-to-one ruling, three judges from the Ninth Circuit of the United States Court of Appeals declared that password sharing is a federal crime. The case in question included a former employee of Korn Ferry, David Nosal, who was headhunting his former colleagues with the intention of obtaining valid user credentials to steal data from Korn Ferry.

As expected, this landed Nosal in court, and he was charged with hacking in violation of the Computer Fraud and Abuse Act (CFAA). The CFAA has an extraordinarily wide reach, and allows the Justice Department to go after anyone who does something as meager as violating the Terms of Service agreement issued to the user of any end product (like, say, an online streaming service).

Though Nosal managed to get off the hook for his 2011 charges, he was convicted of his 2013 charges due to a ruling by a federal jury. His sentence was set for one year and one day, and earned him a felony. Yet, the one dissenting judge feels that this kind of sentence is harsh; Judge Stephen Reinhardt, who sees the larger implications of such a ruling:

“This case is about password sharing. People frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it. In my view, the Computer Fraud and Abuse Act (“CFAA”) does not make the millions of people who engage in this ubiquitous, useful, and generally harmless conduct into unwitting federal criminals.”

What this precedent sets is that even “generally harmless conduct,” like sharing your passwords for subscription-based streaming services like Netflix or HBO Go, can be penalized under law. Netflix only allows its service to be used in one “household,” on six different devices, with streaming capabilities on two devices at a time. The new ruling gives Netflix a reason to crack down on those who are sharing passwords without first asking them for permission to do so.

This particular interpretation of the CFAA makes it more important than ever to keep your passwords safe and secure from anyone besides yourself. After all, the more people who have access to a password, the more likely it is that the password will fall into the hands of hackers. Therefore, you should practice proper password security and keep sensitive information away from everyone who has no business accessing it.

For more trending tech news, tips, and tricks, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Phishing Windows Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Server Data Recovery Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Social Media Gadgets Chrome Virtualization Tech Term Automation Managed IT Services Microsoft Office Managed Service Facebook Operating System Cybercrime Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi Office 365 Telephone Systems Information Technology Managed Service Provider Remote Alert Information Covid-19 Spam Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Encryption Applications Application App History Law Enforcement Big Data Human Resources Password Money Mobile Computing Remote Monitoring Data Breach Office Tips Government Training How To Blockchain Private Cloud VPN Paperless Office Managed IT Data Storage Patch Management Remote Computing Apps Mobile Office Servers Website Budget Google Drive Data Security Wireless Avoiding Downtime Gmail Settings Two-factor Authentication Bring Your Own Device Data Management Flexibility Work/Life Balance Vulnerability Infrastructure Windows 7 Marketing Voice over Internet Protocol Word Mouse HaaS WiFi IT solutions Entertainment Education Physical Security Meetings Employee/Employer Relationship Vendor Management Safety USB RMM Data Protection HIPAA Sports Redundancy Risk Management Keyboard Hacker The Internet of Things Lithium-ion battery Staff Software as a Service Telephone System Save Time Firewall Machine Learning Connectivity Remote Work Virtual Reality Conferencing Apple Vendor Cleaning Managed Services Scam Social Display User Error End of Support Hard Drive Remote Worker Wearable Technology Internet Exlporer Retail Cryptocurrency Hard Drives Unsupported Software Instant Messaging Robot Computing PDF Excel Charger IT Consultant Biometrics Comparison Compliance Virtual Desktop OneNote Proactive IT Computer Care Current Events Humor CES Telephony Best Practice DDoS Digital Signage YouTube Samsung Black Market Business Technology Content Management Access Control SharePoint Value Virtual Assistant Document Management Authentication Procurement Spam Blocking Electronic Medical Records Workplace Strategy Customer Service Solid State Drive Net Neutrality Wireless Technology Downtime How to Environment Help Desk Hiring/Firing Fax Server Printing Data storage Update Automobile Virus SaaS Unified Threat Management Managed Services Provider Google Docs Computer Accessories Computing Infrastructure Identity Theft Business Intelligence Database Going Green Network Congestion eWaste Remote Workers Audit Worker IT Management Battery Processor Augmented Reality Botnet Printer Fraud Shadow IT Bluetooth Legal IT Plan Peripheral Cost Management Smart Tech Workers Trending Benefits Digital Security Cameras Politics Social Networking Addiction Printer Server Using Data Advertising FENG Amazon 5G IBM Copiers Recycling Quick Tip Flash Practices Notifications Smart Technology Wiring Running Cable Ergonomics Cache Amazon Web Services Smartwatch OLED Supercomputer Safe Mode Development Memory Software Tips Criminal PCI DSS Sync Hosted Computing Virtual Machine Relocation Emails GDPR 2FA Wireless Internet Fiber Optics Online Shopping Employee Cabling File Sharing Messaging Video Games Policy Worker Commute Inventory Hypervisor Netflix Specifications Two Factor Authentication Camera Dark mode Experience Wire Trend Micro Science Root Cause Analysis Evernote Default App Knowledge Travel Music SMS Scalability HBO Printers Consultant Procedure Business Owner Skype Saving Time Millennials Distributed Denial of Service dark theme Customer Relationship Management Smart Office Analytics Shopping Data loss Wireless Charging Google Search NarrowBand Outlook IT Infrastructure Leadership Troubleshooting AI Search Analyitcs Virtual Private Network Best Available FinTech Programming Start Menu iPhone Workforce Bing Loyalty WIndows 7 Social Network Screen Mirroring Cables Frequently Asked Questions Investment Books Project Management Employees Mobile Nanotechnology Employee/Employer Relationships Files Windows 10s Telecommuting Antivirus Windows 365 Windows 8 Cast Cortana ISP Chromecast Tip of the week Digital Signature ROI webinar Emergency IT service Video Conferencing Warranty Sales Professional Services Bitcoin Colocation Public Cloud Shortcuts Uninterrupted Power Supply Employer Employee Relationship Assessment User Point of Sale HVAC PowerPoint Personal Tablet Google Apps Windows Media Player Cryptomining Windows Server 2008 Analysis Monitor Domains Supply Chain Management Administrator Monitoring Tools Devices Batteries Television IaaS Managing Stress Windows 8.1 Maintenance Enterprise Content Management Digitize Bloatware Accountants Windows Server 2008 R2 Reputation Streaming Media MSP Microchip Customer relationships Content Thought Leadership Cameras Credit Cards Tech Support Manufacturing Laptop Public Computer Email Best Practices Password Management IT Assessment Techology Tablets Password Manager Entrepreneur Regulations Customers Multi-Factor Security Transportation Search Engine Computer Tips Audiobook Twitter Managed IT Service Computer Fan Security Cameras Rootkit Biometric Security Touchpad Virtual CIO Shortcut NIST OneDrive Business Mangement

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code