(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Sharing Your Netflix Password Could Potentially Land You in the Slammer

How Sharing Your Netflix Password Could Potentially Land You in the Slammer

As a side effect of a recent federal ruling, loaning out your Netflix password to your pal so they can catch up on Orange is the New Black is now considered a federal offense.

Three judges from the Ninth Circuit of the United States Court of Appeals handed down their ruling after voting two-to-one that password sharing is a federal crime. This ruling is in response to former Korn Ferry employee David Nosal headhunting former colleagues specifically to obtain still-valid user credentials in order to steal Korn Ferry data for use in his new firm.

This action landed Nosal in court, charged with hacking under CFAA, or the Computer Fraud and Abuse Act. The CFAA has been widely panned as overreaching, especially as it empowers the Justice Department to go after anyone who violates any Terms of Service agreement that they “read.”

Nosal escaped legal repercussions when judges from the Ninth Circuit tossed out several of the charges against him in 2011, but was convicted of his remaining charges in 2013 due to a ruling by a federal jury, receiving a prison sentence of one year and one day (qualifying his crime as a felony).

However, not everyone is happy about the ruling, especially the dissenting judge - who has his eye on the bigger picture. Judge Stephen Reinhardt shared his thoughts on the subject in his post-ruling written remarks:

“This case is about password sharing. People frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it. In my view, the Computer Fraud and Abuse Act (“CFAA”) does not make the millions of people who engage in this ubiquitous, useful, and generally harmless conduct into unwitting federal criminals.”

This “generally harmless conduct” would include, under the law, Netflix viewing and other subscription-based streaming services, such as HBO Go. As a result of this ruling, Netflix (whose service allows a single “household” access to Netflix on six different devices, and streaming capability on two devices at a time) could crack down on users sharing their passwords without first asking the streaming service for permission.

If this interpretation of the CFAA continues, it is fairly easy to conclude that keeping your password safe will be of considerable importance, just as it is with other online services, such as banking or other sensitive operations.

While this is clearly an excessive approach to take in response to families and friends pooling their resources for some good old entertainment, the lessons to be learned here are valuable ones. Best practices clearly say to never share your password with anyone, as that’s just another person who could let your credentials slip into the wrong hands.

Have you shared your Netflix (or any other streaming service) password with a friend or family member? Do you think sharing that information should be illegal? Let us know in the comments, and be sure to subscribe to our blog.


No comments yet
Already Registered? Login Here
Saturday, 01 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Microsoft Tip of the Week Business Management Managed Service Provider Software Workplace Tips Cloud Backup Saving Money Hardware Data Small Business Productivity Gadgets Hackers Mobile Office Business Computing Business Email Hosted Solutions Google IT Services Quick Tips Malware Social Media IT Support Virtualization Upgrade Mobile Devices Business Continuity Passwords Users Smartphones Windows Disaster Recovery Microsoft Office Network WiFi Server VoIP Miscellaneous Innovation Computer User Tips Vendor Management Efficiency Mobile Computing Communication Windows 10 Mobile Device Management Unified Threat Management Operating System Smartphone Remote Computing Marketing BYOD Apps The Internet of Things Holiday Analytics History Health IT Consultant Android Facebook Ransomware Going Green Wireless Technology Apple Windows 8 Bring Your Own Device Alert Saving Time Big data Tech Support Hard Drives Lithium-ion Battery Network Security Outlook Office Printer Content Filtering Information Technology Spam Data Management Save Money Phishing Employer-Employee Relationship Gmail Firewall Collaboration Remote Monitoring Hiring/Firing Smart Phones Automation Best Practice Computer Repair Maintenance Proactive IT Tutorials Computers Browser Search Bandwidth Save Time Antivirus Humor iPhone Administration Document Management Managed IT services Hacking Excel Phone System User App Current Events Fax Server Mobile Device PowerPoint Help Desk Internet of Things User Error Education Sports Budget Avoiding Downtime Intranet Router Business Intelligence Two-factor Authentication Money Wireless Running Cable Artificial Intelligence Virtual Desktop Gaming Console IBM Network Congestion Legal Experience Data storage Heating/Cooling Thin Client Statistics Streaming Media Flexibility Net Neutrality Office Tips Computing Safety Company Culture Cost Management Social Customer Service Downtime USB Social Networking Digital Payment Customer Relationship Management Hosted Solution Government Recovery Bluetooth Laptop Computer Accessories Cybercrime SaaS Password Programming Comparison Augmented Reality Cortana Black Market Text Messaging Inbound Marketing Compliance Presentation Risk Management VPN Processors Business Growth communications Encryption Comanaged IT Virus Documents Networking Retail Chrome Pain Points End of Support Website Printer Server Update organize Work/Life Balance Law Enforcement Twitter Video Surveillance Writing Domains Outsourced IT Business Owner Webinar Online currency Trending Unified Communications eWaste Staffing Co-Managed IT Point of Sale Download Debate switches Specifications Paperless Office Permissions Environment Google Docs Competition GPS Disaster Microchip Lifestyle Regulations Office 365 Entertainment Analytic Riske Management Microserver Identity Theft Leadership Solid State Drive Application 3D Securty Digital Signature IT consulting BDR Turn Key Virtual Reality Society Micrsooft File Sharing Touchscreen IT service DDoS Windows XP Computing Infrastructure Robot CIO Tablet Memory Music Word Harddrive LinkedIn Adminstration Wi-Fi Upgrades Public Speaking HIPAA Skype Wearable Technology Mouse Flash Electronic Payment Entrepreneur Teamwork Operating Systerm Telephone Systems Deep Learning Hacker Settings LiFi Best Available Banking Ebay Monitors IP Address Storage Display Read Language Human Resources Visible Light Communication Google Wallet Keyboard Value Business Metrics Efeciency Pirating Information Displays Content Management External Harddrive Recycling Managed IT Advertising PDF Drones Shortcut Adroid Chromebook YouTube Troubleshooting Archive

Mobile? Grab this Article!


Recent Comments

No comments yet.

Blog Archive