ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Sharing Your Netflix Password Could Potentially Land You in the Slammer

How Sharing Your Netflix Password Could Potentially Land You in the Slammer

As a side effect of a recent federal ruling, loaning out your Netflix password to your pal so they can catch up on Orange is the New Black is now considered a federal offense.

Three judges from the Ninth Circuit of the United States Court of Appeals handed down their ruling after voting two-to-one that password sharing is a federal crime. This ruling is in response to former Korn Ferry employee David Nosal headhunting former colleagues specifically to obtain still-valid user credentials in order to steal Korn Ferry data for use in his new firm.

This action landed Nosal in court, charged with hacking under CFAA, or the Computer Fraud and Abuse Act. The CFAA has been widely panned as overreaching, especially as it empowers the Justice Department to go after anyone who violates any Terms of Service agreement that they “read.”

Nosal escaped legal repercussions when judges from the Ninth Circuit tossed out several of the charges against him in 2011, but was convicted of his remaining charges in 2013 due to a ruling by a federal jury, receiving a prison sentence of one year and one day (qualifying his crime as a felony).

However, not everyone is happy about the ruling, especially the dissenting judge - who has his eye on the bigger picture. Judge Stephen Reinhardt shared his thoughts on the subject in his post-ruling written remarks:

“This case is about password sharing. People frequently share their passwords, notwithstanding the fact that websites and employers have policies prohibiting it. In my view, the Computer Fraud and Abuse Act (“CFAA”) does not make the millions of people who engage in this ubiquitous, useful, and generally harmless conduct into unwitting federal criminals.”

This “generally harmless conduct” would include, under the law, Netflix viewing and other subscription-based streaming services, such as HBO Go. As a result of this ruling, Netflix (whose service allows a single “household” access to Netflix on six different devices, and streaming capability on two devices at a time) could crack down on users sharing their passwords without first asking the streaming service for permission.

If this interpretation of the CFAA continues, it is fairly easy to conclude that keeping your password safe will be of considerable importance, just as it is with other online services, such as banking or other sensitive operations.

While this is clearly an excessive approach to take in response to families and friends pooling their resources for some good old entertainment, the lessons to be learned here are valuable ones. Best practices clearly say to never share your password with anyone, as that’s just another person who could let your credentials slip into the wrong hands.

Have you shared your Netflix (or any other streaming service) password with a friend or family member? Do you think sharing that information should be illegal? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware Smartphone communications Microsoft Office Upgrade Small Business Smartphones Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery IT Support Browser Managed Service Windows 10 Apps Cloud Computing Outsourced IT Miscellaneous Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Networking Windows Artificial Intelligence Managed IT services Workplace Strategy Gadgets Blockchain App Virtualization Server Information Remote Spam WiFi Mobile Device Management Bandwidth Business Technology Encryption History Information Technology Gmail Office Two-factor Authentication Office 365 Employee/Employer Relationship Budget Apple Health Big Data Conferencing Access Control Analytics Data Security Wi-Fi BDR Cybercrime Employer-Employee Relationship Training Help Desk Document Management Hacking Remote Computing Save Money Patch Management Vendor Hacker Remote Monitoring Voice over Internet Protocol Compliance Cost Management IT Management IBM Website Retail Data loss Alert Legal Data storage Hiring/Firing Outlook Password Applications Money Project Management BYOD Vulnerabilities Customer Service Unified Threat Management Computing Firewall Vendor Management Hard Drive Mobile Office Augmented Reality Search... Word Best Practice Managed Services Scam Law Enforcement How To End of Support Router Printer VPN The Internet of Things Update User YouTube Travel Virtual Reality Laptop Data Breach Social Engineering Cryptocurrency Paperless Office Chrome Antivirus Black Market Maintenance Cleaning Robot Windows 11 Social Mobile Computing Monitoring Sports SaaS DDoS Healthcare Marketing Websites Remote Workers Mobility Meetings Running Cable iPhone Education Cortana Windows 7 Free Resource Content Filtering Storage Twitter Google Maps How To Current Events Microchip Processors Excel Solutions Flexibility Tech Terms Images 101 Integration HIPAA Hack Identity Theft Display Notifications Managed IT Digital Unified Communications Virtual Assistant Google Docs Employees Bluetooth Wireless Technology Taxes Avoiding Downtime eWaste Distributed Denial of Service Office Tips Holidays Private Cloud Processor Memory Downtime Safety Cooperation Video Conferencing Physical Security PowerPoint Virtual Machines Administration Politics Virtual Desktop Machine Learning Settings Computer Repair Experience Presentation Multi-factor Authentication Start Menu Professional Services Specifications Solid State Drive Downloads Computer Care IT Consultant Vulnerability Saving Time Disaster Customer Relationship Management Co-Managed IT Chromebook Software as a Service Drones Managed Services Provider Data Protection Computers Bitcoin Entertainment Automobile Virtual Private Network Lithium-ion battery Telephone LiFi Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Entrepreneur Relocation Browsers Smartwatch Comparison Google Play Work/Life Balance Google Drive Upload Procurement Documents Tech Support Software License Application Business Intelligence Social Network FinTech Corporate Profile Screen Reader IT Assessment Point of Sale Knowledge Data Analysis CES In Internet of Things Television Security Cameras Telephony Trends Supply Chain Management Securty Employer Employee Relationship Mobile Technology Value Domains Shortcuts Troubleshooting Hacks Customer Resource management Organization Network Congestion Cabling Devices Cyber security Reliable Computing Fileless Malware Writing Tablet Smart Devices G Suite Tip of the week Mouse VoIP Gamification Remote Working Tracking Company Culture Regulations Trend Micro Be Proactive Telephone System AI Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Administrator SharePoint Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Public Speaking Worker Accountants eCommerce Modem Workplace Strategies Business Owner Bring Your Own Device Electronic Medical Records Streaming Media Videos Access Database Surveillance Keyboard Time Management Music Public Cloud Managing Costs Hard Drives Equifax SSID intranet Health IT Audit Media Spyware Tactics Development Wireless Hard Drive Disposal Employer/Employee Relationships Shortcut Environment Botnet Username File Sharing Virtual Machine Heating/Cooling Micrsooft Startup Optimization Freedom of Information Smart Technology Inbound Marketing Social Networking Rental Service Redundancy Reviews Windows XP Navigation 2FA Flash Cache Addiction email scam Teamwork Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor Legislation News Medical IT User Tip Shopping Printing Evernote Paperless Network Management CCTV SQL Server Electronic Payment Banking Touchscreen PCI DSS Google Wallet Licensing Deep Learning Emails Humor Computer Malfunction Fake News Supply Chain Messenger Emergency Proxy Server Gig Economy Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Staffing Computing Infrastructure Azure Phone System IP Address Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Books Tech Human Resources Language Business Mangement Going Green Net Neutrality Society Business Cards Error Financial Data Tablets Monitors IT Visible Light Communication Scams Computer Accessories Reading Bookmark Risk Management Google Calendar Term Google Apps Download Recovery Windows 8 Supercomputer Piracy Competition Virus Telework HTML

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?