Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

In a two-to-one ruling, three judges from the Ninth Circuit of the United States Court of Appeals declared that password sharing is a federal crime. The case in question included a former employee of Korn Ferry, David Nosal, who was headhunting his former colleagues with the intention of obtaining valid user credentials to steal data from Korn Ferry.

As expected, this landed Nosal in court, and he was charged with hacking in violation of the Computer Fraud and Abuse Act (CFAA). The CFAA has an extraordinarily wide reach, and allows the Justice Department to go after anyone who does something as meager as violating the Terms of Service agreement issued to the user of any end product (like, say, an online streaming service).

Though Nosal managed to get off the hook for his 2011 charges, he was convicted of his 2013 charges due to a ruling by a federal jury. His sentence was set for one year and one day, and earned him a felony. Yet, the one dissenting judge feels that this kind of sentence is harsh; Judge Stephen Reinhardt, who sees the larger implications of such a ruling:

“This case is about password sharing. People frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it. In my view, the Computer Fraud and Abuse Act (“CFAA”) does not make the millions of people who engage in this ubiquitous, useful, and generally harmless conduct into unwitting federal criminals.”

What this precedent sets is that even “generally harmless conduct,” like sharing your passwords for subscription-based streaming services like Netflix or HBO Go, can be penalized under law. Netflix only allows its service to be used in one “household,” on six different devices, with streaming capabilities on two devices at a time. The new ruling gives Netflix a reason to crack down on those who are sharing passwords without first asking them for permission to do so.

This particular interpretation of the CFAA makes it more important than ever to keep your passwords safe and secure from anyone besides yourself. After all, the more people who have access to a password, the more likely it is that the password will fall into the hands of hackers. Therefore, you should practice proper password security and keep sensitive information away from everyone who has no business accessing it.

For more trending tech news, tips, and tricks, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Windows Upgrade Phishing Ransomware Data Backup Outsourced IT Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Social Media Saving Money Holiday Gadgets Tech Term Chrome Virtualization Automation Managed IT Services Managed Service Microsoft Office Computers Cybercrime Artificial Intelligence Operating System Facebook BYOD Internet of Things Mobile Device Management Health Networking Wi-Fi IT Support Hacking Information Technology Remote Alert Information Covid-19 Spam Managed Service Provider Office 365 Telephone Systems BDR Employer-Employee Relationship Recovery Bandwidth Social Engineering Mobility Router Mobile Computing Law Enforcement Application Human Resources Data Breach Password Remote Monitoring Money Big Data Encryption Applications App History Data Storage Patch Management Government VPN Blockchain Private Cloud Paperless Office Managed IT Remote Computing Mobile Office Apps How To Office Tips Training WiFi IT solutions Vulnerability Gmail Avoiding Downtime Entertainment Website Windows 7 Word Budget Settings Two-factor Authentication Servers Bring Your Own Device Mouse Data Management HaaS Work/Life Balance Infrastructure Voice over Internet Protocol Data Security Google Drive Flexibility Wireless Marketing Lithium-ion battery Conferencing Scam USB Firewall Vendor Software as a Service Telephone System Staff Save Time Managed Services Machine Learning Vendor Management Display Virtual Reality Apple Connectivity Remote Work Social Cleaning Employee/Employer Relationship User Error RMM Meetings End of Support Education Physical Security Safety Risk Management Data Protection Hacker HIPAA Sports Redundancy Keyboard The Internet of Things Workplace Strategy SharePoint CES Net Neutrality Best Practice Printer Help Desk YouTube Black Market Bluetooth Business Intelligence Business Technology Printing Content Management Access Control Customer Service Audit Worker Environment IT Management Virtual Assistant Authentication Managed Services Provider Fax Server Document Management Wireless Technology Botnet Solid State Drive How to Downtime IT Consultant IT Plan Database SaaS Remote Workers Update Data storage Unsupported Software Humor Processor Automobile Network Congestion Charger Google Docs eWaste Hard Drive Compliance Identity Theft Computing Infrastructure Going Green OneNote Computer Care Current Events Telephony Computing Samsung Battery Augmented Reality Wearable Technology Retail Fraud Hard Drives Shadow IT Value Instant Messaging Legal Robot Excel Remote Worker Spam Blocking Virus Electronic Medical Records Internet Exlporer Cryptocurrency Digital Signage Biometrics Virtual Desktop Unified Threat Management Computer Accessories Hiring/Firing PDF Comparison DDoS Procurement Proactive IT File Sharing Social Network Assessment Video Games Inventory Investment Customer Relationship Management Worker Commute Specifications Windows Server 2008 Camera Distributed Denial of Service Tools Employees Wire Employee/Employer Relationships Experience Evernote Analyitcs Travel Windows 365 Television ISP Programming Scalability ROI Business Owner Millennials Printers Video Conferencing Sales Smart Office Bitcoin Printer Server Wireless Charging Shortcuts NarrowBand Search Point of Sale Personal Antivirus Public Computer Cryptomining Transportation Workforce Windows 8 iPhone Regulations Virtual Private Network Supply Chain Management Monitoring Computer Fan Batteries IT service Rootkit Cables Windows 8.1 Digitize Workers Nanotechnology Windows Server 2008 R2 Benefits Telecommuting Tablet Files Project Management Chromecast Customer relationships FENG Domains Cortana Email Best Practices IT Assessment IBM Digital Signature Manufacturing IaaS Maintenance Smart Technology Colocation Uninterrupted Power Supply Flash Warranty Computer Tips HVAC Managed IT Service Google Apps Security Cameras Bloatware Biometric Security Monitor Virtual CIO Software Tips OneDrive Supercomputer Analysis Peripheral Consultant Emails Devices Tablets Sync Administrator Digital Security Cameras Enterprise Content Management Using Data Analytics Entrepreneur 5G Reputation Streaming Media MSP Copiers Accountants Quick Tip Best Available Netflix Thought Leadership Shortcut Content Two Factor Authentication Credit Cards Tech Support Microchip Laptop Ergonomics WIndows 7 Root Cause Analysis Password Management Password Manager Smartwatch Cost Management Techology OLED Social Networking Music Multi-Factor Security Customers HBO Development Knowledge PCI DSS Twitter Virtual Machine Audiobook Skype Search Engine Touchpad 2FA Data loss NIST Fiber Optics Business Mangement Employee Cabling Troubleshooting Trending Outlook Messaging Running Cable Leadership Smart Tech Policy Addiction Hypervisor Politics Amazon Memory Advertising Start Menu Dark mode User Screen Mirroring Trend Micro PowerPoint Loyalty Recycling Windows Media Player Practices Default App Books Notifications Frequently Asked Questions Wiring SMS Mobile Procedure Windows 10s Cache Saving Time Amazon Web Services dark theme Managing Stress Cast Safe Mode Shopping Criminal Google Search webinar Hosted Computing IT Infrastructure Emergency Science Relocation Tip of the week GDPR AI Professional Services FinTech Public Cloud Wireless Internet Cameras Employer Employee Relationship Online Shopping Bing

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code