Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

In a two-to-one ruling, three judges from the Ninth Circuit of the United States Court of Appeals declared that password sharing is a federal crime. The case in question included a former employee of Korn Ferry, David Nosal, who was headhunting his former colleagues with the intention of obtaining valid user credentials to steal data from Korn Ferry.

As expected, this landed Nosal in court, and he was charged with hacking in violation of the Computer Fraud and Abuse Act (CFAA). The CFAA has an extraordinarily wide reach, and allows the Justice Department to go after anyone who does something as meager as violating the Terms of Service agreement issued to the user of any end product (like, say, an online streaming service).

Though Nosal managed to get off the hook for his 2011 charges, he was convicted of his 2013 charges due to a ruling by a federal jury. His sentence was set for one year and one day, and earned him a felony. Yet, the one dissenting judge feels that this kind of sentence is harsh; Judge Stephen Reinhardt, who sees the larger implications of such a ruling:

“This case is about password sharing. People frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it. In my view, the Computer Fraud and Abuse Act (“CFAA”) does not make the millions of people who engage in this ubiquitous, useful, and generally harmless conduct into unwitting federal criminals.”

What this precedent sets is that even “generally harmless conduct,” like sharing your passwords for subscription-based streaming services like Netflix or HBO Go, can be penalized under law. Netflix only allows its service to be used in one “household,” on six different devices, with streaming capabilities on two devices at a time. The new ruling gives Netflix a reason to crack down on those who are sharing passwords without first asking them for permission to do so.

This particular interpretation of the CFAA makes it more important than ever to keep your passwords safe and secure from anyone besides yourself. After all, the more people who have access to a password, the more likely it is that the password will fall into the hands of hackers. Therefore, you should practice proper password security and keep sensitive information away from everyone who has no business accessing it.

For more trending tech news, tips, and tricks, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 25 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Phishing Windows Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Saving Money Holiday Gadgets Tech Term Social Media Chrome Virtualization Managed Service Managed IT Services Automation Microsoft Office Facebook Artificial Intelligence Operating System Cybercrime Computers BYOD Internet of Things Mobile Device Management Networking IT Support Wi-Fi Hacking Health Information Office 365 Covid-19 Telephone Systems Alert Information Technology Managed Service Provider Remote Spam BDR Bandwidth Social Engineering Recovery Employer-Employee Relationship Mobility Router Law Enforcement Application Data Breach App History Password Big Data Money Human Resources Encryption Applications Mobile Computing Remote Monitoring Private Cloud Office Tips Training Managed IT VPN How To Apps Remote Computing Data Storage Blockchain Patch Management Paperless Office Mobile Office Government Website Avoiding Downtime Budget Servers Infrastructure Voice over Internet Protocol Wireless Data Security Bring Your Own Device Data Management Work/Life Balance Gmail Settings Two-factor Authentication Flexibility Google Drive Marketing Mouse HaaS WiFi Vulnerability Windows 7 IT solutions Entertainment Word Vendor Meetings Connectivity Remote Work Managed Services USB Display Vendor Management Risk Management Hacker Save Time Employee/Employer Relationship RMM The Internet of Things Lithium-ion battery Cleaning Data Protection Firewall End of Support Physical Security Education Virtual Reality Apple Safety HIPAA Sports Social Conferencing Redundancy Telephone System Keyboard Staff Software as a Service User Error Scam Machine Learning IT Management Update YouTube Wearable Technology Database Black Market Retail Botnet Hard Drives Instant Messaging IT Plan Google Docs Remote Workers Identity Theft Robot Excel IT Consultant Document Management Processor Biometrics Unsupported Software Solid State Drive Wireless Technology Downtime Virtual Desktop How to Humor Charger Hard Drive Augmented Reality Compliance Fraud Data storage DDoS OneNote Automobile Computer Care SharePoint Computing Remote Worker Current Events Telephony Cryptocurrency Samsung Computing Infrastructure Going Green Customer Service Environment Value Digital Signage Comparison Electronic Medical Records Fax Server Spam Blocking Battery CES Shadow IT Legal Virus Hiring/Firing SaaS Business Technology Content Management Unified Threat Management Internet Exlporer Procurement Net Neutrality Access Control Workplace Strategy Computer Accessories Help Desk Virtual Assistant PDF Network Congestion eWaste Printing Authentication Business Intelligence Proactive IT Printer Worker Best Practice Managed Services Provider Bluetooth Audit Cost Management Experience Public Computer Digital Signature Monitoring Batteries Digitize Social Networking Regulations Warranty Scalability Windows 8.1 Printer Server Transportation Computer Fan HVAC Business Owner Rootkit Google Apps Windows Server 2008 R2 Analysis Customer relationships NarrowBand Benefits Running Cable IT Assessment Manufacturing Administrator Workers Devices Search Email Best Practices FENG Enterprise Content Management iPhone Memory Security Cameras MSP IBM Accountants Computer Tips Managed IT Service Virtual CIO Smart Technology Credit Cards OneDrive Biometric Security Flash Microchip Thought Leadership Password Management Password Manager Files Peripheral Using Data Software Tips Supercomputer Digital Security Cameras Multi-Factor Security Chromecast Copiers 5G Sync Search Engine Science Emails Twitter NIST Business Mangement Colocation Quick Tip Uninterrupted Power Supply Smartwatch Consultant Smart Tech Ergonomics Trending Analytics Two Factor Authentication Amazon Monitor Distributed Denial of Service Development Customer Relationship Management OLED Netflix Addiction Analyitcs Root Cause Analysis Recycling PCI DSS Virtual Machine Fiber Optics Programming Employee HBO Wiring Best Available Knowledge Practices 2FA Music Amazon Web Services Reputation Messaging Streaming Media Cabling Skype WIndows 7 Cache Data loss Safe Mode Content Criminal Policy Tech Support Hypervisor Antivirus Trend Micro Outlook GDPR Leadership Hosted Computing Techology Dark mode Troubleshooting Laptop Online Shopping Customers SMS Default App Start Menu Windows 8 Wireless Internet Screen Mirroring File Sharing Audiobook Loyalty Procedure IT service Saving Time Shopping Google Search Frequently Asked Questions Camera Inventory dark theme Books Specifications Touchpad PowerPoint Evernote AI Windows Media Player IT Infrastructure Mobile Tablet User Windows 10s Wire Bing Cast Politics Advertising FinTech Travel Domains Social Network Tip of the week Printers webinar Emergency Millennials Employer Employee Relationship Wireless Charging IaaS Notifications Maintenance Investment Professional Services Managing Stress Public Cloud Smart Office Bloatware Assessment Employees Employee/Employer Relationships ISP Windows Server 2008 Virtual Private Network Windows 365 Cameras Workforce Cables Relocation Video Conferencing ROI Tools Tablets Entrepreneur Shortcuts Television Sales Bitcoin Personal Cryptomining Project Management Nanotechnology Video Games Point of Sale Telecommuting Cortana Supply Chain Management Shortcut Worker Commute

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code