Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

In a two-to-one ruling, three judges from the Ninth Circuit of the United States Court of Appeals declared that password sharing is a federal crime. The case in question included a former employee of Korn Ferry, David Nosal, who was headhunting his former colleagues with the intention of obtaining valid user credentials to steal data from Korn Ferry.

As expected, this landed Nosal in court, and he was charged with hacking in violation of the Computer Fraud and Abuse Act (CFAA). The CFAA has an extraordinarily wide reach, and allows the Justice Department to go after anyone who does something as meager as violating the Terms of Service agreement issued to the user of any end product (like, say, an online streaming service).

Though Nosal managed to get off the hook for his 2011 charges, he was convicted of his 2013 charges due to a ruling by a federal jury. His sentence was set for one year and one day, and earned him a felony. Yet, the one dissenting judge feels that this kind of sentence is harsh; Judge Stephen Reinhardt, who sees the larger implications of such a ruling:

“This case is about password sharing. People frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it. In my view, the Computer Fraud and Abuse Act (“CFAA”) does not make the millions of people who engage in this ubiquitous, useful, and generally harmless conduct into unwitting federal criminals.”

What this precedent sets is that even “generally harmless conduct,” like sharing your passwords for subscription-based streaming services like Netflix or HBO Go, can be penalized under law. Netflix only allows its service to be used in one “household,” on six different devices, with streaming capabilities on two devices at a time. The new ruling gives Netflix a reason to crack down on those who are sharing passwords without first asking them for permission to do so.

This particular interpretation of the CFAA makes it more important than ever to keep your passwords safe and secure from anyone besides yourself. After all, the more people who have access to a password, the more likely it is that the password will fall into the hands of hackers. Therefore, you should practice proper password security and keep sensitive information away from everyone who has no business accessing it.

For more trending tech news, tips, and tricks, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Communication Business Continuity Smartphones Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Virtualization Gadgets Social Media Saving Money Holiday Chrome Tech Term Automation Microsoft Office Managed Service Managed IT Services Computers Facebook Artificial Intelligence Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Health Networking IT Support Hacking Internet of Things Telephone Systems Alert Information Technology Remote Managed Service Provider Information Spam Office 365 Covid-19 Recovery Bandwidth Employer-Employee Relationship Social Engineering Router Mobility BDR App History Mobile Computing Data Breach Password Application Money Human Resources Encryption Applications Big Data Remote Monitoring Law Enforcement Office Tips Managed IT Training VPN Apps Blockchain How To Remote Computing Paperless Office Mobile Office Government Data Storage Patch Management Private Cloud Marketing Windows 7 Word WiFi Wireless IT solutions Entertainment Website Bring Your Own Device Servers Data Management Budget Work/Life Balance Gmail Settings Data Security Two-factor Authentication Google Drive Mouse HaaS Avoiding Downtime Infrastructure Voice over Internet Protocol Vulnerability Flexibility Risk Management Scam Hacker Employee/Employer Relationship Save Time RMM The Internet of Things Data Protection Lithium-ion battery Vendor Management USB Cleaning Firewall End of Support Education Physical Security Virtual Reality Apple Safety Staff Software as a Service Telephone System Sports HIPAA Social Machine Learning Redundancy Connectivity Remote Work Keyboard User Error Vendor Meetings Managed Services Display Conferencing Solid State Drive Biometrics Hard Drive Wireless Technology Fraud Audit How to Virtual Desktop Worker Downtime IT Management Remote Worker Botnet DDoS Computing Cryptocurrency Data storage Printer IT Plan Automobile Bluetooth SharePoint Computing Infrastructure Comparison Unsupported Software Going Green Customer Service Charger Digital Signage CES IT Consultant Environment Compliance Content Management OneNote Battery Fax Server Computer Care Business Technology Access Control Humor Shadow IT Current Events Legal Procurement Telephony Net Neutrality SaaS Workplace Strategy Samsung Virtual Assistant Authentication Internet Exlporer Help Desk Value Printing PDF Network Congestion eWaste Spam Blocking Electronic Medical Records Update Managed Services Provider Proactive IT Hiring/Firing Database Best Practice Google Docs YouTube Identity Theft Wearable Technology Remote Workers Black Market Virus Hard Drives Retail Instant Messaging Processor Unified Threat Management Robot Excel Computer Accessories Business Intelligence Document Management Augmented Reality Peripheral Search Engine Twitter Digital Security Cameras Using Data NIST Business Mangement Cameras Files 5G Smart Tech Trending Public Computer Copiers Quick Tip Transportation Addiction Chromecast Amazon Regulations Computer Fan Ergonomics Rootkit Science Smartwatch Recycling Colocation OLED Practices Uninterrupted Power Supply Development Wiring Workers PCI DSS Benefits Virtual Machine Cache Amazon Web Services Distributed Denial of Service FENG 2FA Customer Relationship Management Fiber Optics Safe Mode Monitor Employee Criminal Printer Server Analyitcs Cabling Hosted Computing IBM Messaging GDPR Policy Programming Smart Technology Hypervisor Wireless Internet Online Shopping Flash Streaming Media Dark mode Trend Micro File Sharing Reputation Camera Default App Inventory Tech Support Specifications Software Tips Content Supercomputer SMS Antivirus Emails Procedure Techology Saving Time Wire Laptop Evernote Sync Travel dark theme Shopping Customers Windows 8 Google Search AI Printers IT Infrastructure Millennials Audiobook IT service Netflix FinTech Two Factor Authentication Smart Office Touchpad Bing Wireless Charging Root Cause Analysis Social Network Tablet Virtual Private Network Advertising Music Investment Workforce HBO Politics Domains Knowledge Skype Employees Employee/Employer Relationships Consultant Cables ISP Analytics Notifications IaaS Data loss Windows 365 Maintenance Leadership Video Conferencing Project Management Bloatware Troubleshooting ROI Nanotechnology Telecommuting Outlook Start Menu Sales Bitcoin Best Available Shortcuts Cortana Cryptomining Digital Signature Screen Mirroring Point of Sale Loyalty Personal WIndows 7 Relocation Tablets Supply Chain Management Warranty Entrepreneur Books Frequently Asked Questions Mobile Windows 10s Monitoring Video Games Batteries HVAC Google Apps Analysis Cast Windows 8.1 Worker Commute Shortcut Digitize webinar Administrator Cost Management Emergency Windows Server 2008 R2 Devices Tip of the week Experience Professional Services Public Cloud Customer relationships Scalability Social Networking Employer Employee Relationship Enterprise Content Management Manufacturing Accountants PowerPoint Windows Media Player Email Best Practices Business Owner Assessment IT Assessment MSP User Microchip Thought Leadership NarrowBand Credit Cards Windows Server 2008 Tools Running Cable Computer Tips Search Managed IT Service Password Management Security Cameras Password Manager Memory Biometric Security Multi-Factor Security Virtual CIO Television OneDrive Managing Stress iPhone

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code