Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

In a two-to-one ruling, three judges from the Ninth Circuit of the United States Court of Appeals declared that password sharing is a federal crime. The case in question included a former employee of Korn Ferry, David Nosal, who was headhunting his former colleagues with the intention of obtaining valid user credentials to steal data from Korn Ferry.

As expected, this landed Nosal in court, and he was charged with hacking in violation of the Computer Fraud and Abuse Act (CFAA). The CFAA has an extraordinarily wide reach, and allows the Justice Department to go after anyone who does something as meager as violating the Terms of Service agreement issued to the user of any end product (like, say, an online streaming service).

Though Nosal managed to get off the hook for his 2011 charges, he was convicted of his 2013 charges due to a ruling by a federal jury. His sentence was set for one year and one day, and earned him a felony. Yet, the one dissenting judge feels that this kind of sentence is harsh; Judge Stephen Reinhardt, who sees the larger implications of such a ruling:

“This case is about password sharing. People frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it. In my view, the Computer Fraud and Abuse Act (“CFAA”) does not make the millions of people who engage in this ubiquitous, useful, and generally harmless conduct into unwitting federal criminals.”

What this precedent sets is that even “generally harmless conduct,” like sharing your passwords for subscription-based streaming services like Netflix or HBO Go, can be penalized under law. Netflix only allows its service to be used in one “household,” on six different devices, with streaming capabilities on two devices at a time. The new ruling gives Netflix a reason to crack down on those who are sharing passwords without first asking them for permission to do so.

This particular interpretation of the CFAA makes it more important than ever to keep your passwords safe and secure from anyone besides yourself. After all, the more people who have access to a password, the more likely it is that the password will fall into the hands of hackers. Therefore, you should practice proper password security and keep sensitive information away from everyone who has no business accessing it.

For more trending tech news, tips, and tricks, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Upgrade Managed IT Services Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Saving Money Holiday Tech Term Chrome Gadgets Virtualization Social Media Managed Service Microsoft Office Managed IT Services Automation Operating System Facebook Computers Artificial Intelligence Cybercrime Mobile Device Management Networking IT Support Hacking Internet of Things Wi-Fi Health BYOD Information Spam Managed Service Provider Office 365 Telephone Systems Remote Information Technology Alert Covid-19 Bandwidth Router Social Engineering Mobility BDR Employer-Employee Relationship Recovery Encryption Remote Monitoring Applications Big Data Data Breach App Law Enforcement History Mobile Computing Human Resources Password Money Application Remote Computing Data Storage Mobile Office Patch Management Government Office Tips Training Private Cloud VPN Managed IT Blockchain How To Paperless Office Apps Mouse HaaS Infrastructure Voice over Internet Protocol Vulnerability Google Drive Windows 7 Word Avoiding Downtime Servers Wireless Flexibility Data Security Gmail Marketing WiFi Settings Bring Your Own Device IT solutions Entertainment Data Management Website Work/Life Balance Budget Two-factor Authentication Apple Connectivity Remote Work End of Support Employee/Employer Relationship Social Education Physical Security Conferencing RMM Safety User Error Sports Meetings Scam HIPAA Redundancy Keyboard Risk Management Vendor Management Hacker Data Protection The Internet of Things Lithium-ion battery Save Time Vendor Firewall Cleaning Managed Services Staff Software as a Service Display Telephone System USB Virtual Reality Machine Learning Hiring/Firing Update IT Consultant Battery Shadow IT Network Congestion Hard Drive Legal Google Docs eWaste Humor Identity Theft Internet Exlporer Computing Business Intelligence PDF Worker Wearable Technology Audit Augmented Reality IT Management Retail Hard Drives Fraud Proactive IT Instant Messaging Excel Digital Signage Botnet Robot Remote Worker Best Practice IT Plan YouTube Biometrics Cryptocurrency Black Market Virtual Desktop Unsupported Software Virus Procurement Workplace Strategy Charger Comparison Net Neutrality DDoS Document Management Unified Threat Management CES Computer Accessories Solid State Drive Help Desk Wireless Technology SharePoint Compliance Computer Care Printing How to Downtime OneNote Current Events Content Management Telephony Business Technology Customer Service Samsung Access Control Data storage Environment Automobile Managed Services Provider Printer Virtual Assistant Fax Server Bluetooth Value Authentication Database Computing Infrastructure Remote Workers Going Green Spam Blocking Electronic Medical Records SaaS Processor Digital Signature Managed IT Service Techology Security Cameras Laptop Mobile Windows 10s Computer Tips Cast Maintenance Warranty Virtual CIO OneDrive Biometric Security Customers IaaS Tip of the week webinar Bloatware HVAC Peripheral Emergency Audiobook Google Apps Employer Employee Relationship Analysis Using Data Touchpad Professional Services Public Cloud Digital Security Cameras Administrator Assessment Tablets Devices Copiers 5G Advertising Windows Server 2008 Entrepreneur Enterprise Content Management Quick Tip Politics Accountants Smartwatch Tools MSP Ergonomics Notifications Shortcut Microchip Television Thought Leadership Development Credit Cards OLED Cost Management Password Management Consultant PCI DSS Password Manager Virtual Machine 2FA Analytics Fiber Optics Multi-Factor Security Employee Social Networking Search Engine Public Computer Twitter Messaging Cabling Relocation Hypervisor Regulations NIST Best Available Policy Transportation Business Mangement WIndows 7 Dark mode Rootkit Smart Tech Trend Micro Video Games Trending Running Cable Computer Fan Memory Addiction SMS Worker Commute Amazon Default App Saving Time Workers Procedure Benefits Experience Recycling Wiring dark theme Practices Shopping Scalability Google Search FENG IBM Cache AI Business Owner Amazon Web Services IT Infrastructure Criminal Bing NarrowBand Flash Safe Mode FinTech Smart Technology GDPR User Science Hosted Computing PowerPoint Social Network Search Windows Media Player Software Tips Supercomputer Wireless Internet Online Shopping Investment iPhone Employee/Employer Relationships Sync Emails File Sharing Employees Camera Managing Stress Windows 365 Inventory Specifications ISP Distributed Denial of Service Customer Relationship Management Analyitcs Wire Video Conferencing Evernote ROI Files Cameras Bitcoin Travel Shortcuts Chromecast Netflix Programming Sales Two Factor Authentication Printers Point of Sale Personal Millennials Cryptomining Root Cause Analysis Uninterrupted Power Supply HBO Knowledge Smart Office Supply Chain Management Music Wireless Charging Colocation Batteries Skype Antivirus Monitoring Virtual Private Network Windows 8.1 Windows 8 Digitize Workforce Monitor Data loss Outlook IT service Leadership Troubleshooting Cables Windows Server 2008 R2 Printer Server Start Menu Customer relationships Streaming Media Screen Mirroring Project Management Email Best Practices Loyalty Tablet Nanotechnology IT Assessment Telecommuting Manufacturing Reputation Tech Support Frequently Asked Questions Domains Books Content Cortana

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code