Tennessee login law

Last updated

On June 1, 2011, lawmakers in the US state of Tennessee passed a bill that makes sharing login information for sites that provide music and movies, such as Netflix and Napster, illegal. [1] The law, pushed for by recording industry professionals, is the first of its kind in that it is actually an update for a bill originally existing to punish cable theft now targeting the Internet.

Contents

While the law punishes people for sharing passwords, it is really aimed at those sharing and selling their passwords in large quantities – up to $500 in theft resulting in a misdemeanor, and anything else after that a felony. [2]

Reaction

Initial reaction to the law was negative from social network users. Many see the issue in the same light as with music piracy, the main idea being "I bought it, so I can do whatever I want with it."[ citation needed ]

Related Research Articles

<span class="mw-page-title-main">Password</span> Used for user authentication to prove identity or access approval

A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.

<span class="mw-page-title-main">Identity theft</span> Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been legally defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

The Protecting Intellectual Rights Against Theft and Expropriation Act of 2004, better known as the Pirate Act, was a bill in the United States Congress that would have let federal prosecutors file civil lawsuits against suspected copyright infringers. Prior to the introduction of this act, only criminal lawsuits could be filed against suspected infringers.

<span class="mw-page-title-main">One-time password</span> Password that can only be used once

A one-time password (OTP), also known as a one-time PIN, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid several shortcomings that are associated with traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has as well as something a person knows.

Crimeware is a class of malware designed specifically to automate cybercrime.

<span class="mw-page-title-main">Keychain (software)</span> Password management system in macOS

Keychain is the password management system in macOS, developed by Apple. It was introduced with Mac OS 8.6, and has been included in all subsequent versions of the operating system, now known as macOS. A Keychain can contain various types of data: passwords, private keys, certificates, and secure notes.

Laws regarding "unauthorized access of a computer network" exist in many legal codes, though the wording and meaning differs from one to the next. However, the interpretation of terms like "access" and "authorization" is not clear, and there is no general agreement on whether piggybacking falls under this classification. Some jurisdictions prohibit it, some permit it, and others are not well-defined.

<span class="mw-page-title-main">You Wouldn't Steal a Car</span> Anti–copyright infringement campaign

"You Wouldn't Steal a Car" is the first sentence of a public service announcement that debuted on July 27, 2004, which was part of the anti-copyright infringement campaign "Piracy. It's a crime." It was created by the Federation Against Copyright Theft and the Motion Picture Association of America in cooperation with the Intellectual Property Office of Singapore, and appeared in theaters internationally from 2004 until 2007, and on many commercial DVDs during the same period as a clip before the main menu or other previews appear, as either an unskippable or skippable video.

<span class="mw-page-title-main">Copyright infringement</span> Illegal usage of copyrighted works

Copyright infringement is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works. The copyright holder is typically the work's creator, or a publisher or other business to whom copyright has been assigned. Copyright holders routinely invoke legal and technological measures to prevent and penalize copyright infringement.

<span class="mw-page-title-main">Multi-factor authentication</span> Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.

<span class="mw-page-title-main">Partial password</span>

A partial password is a mode of password authentication intended to make keystroke logging and shoulder surfing less effective.

File sharing in the United Kingdom relates to the distribution of digital media in that country. In 2010, there were over 18.3 million households connected to the Internet in the United Kingdom, with 63% of these having a broadband connection. There are also many public Internet access points such as public libraries and Internet cafes.

<span class="mw-page-title-main">Sarah Palin email hack</span> Email hack

The Sarah Palin email hack occurred on September 16, 2008, during the 2008 United States presidential election campaign when vice presidential candidate Sarah Palin's personal Yahoo! email account was subjected to unauthorized access. The hacker, David Kernell, obtained access to Palin's account by looking up biographical details, such as her high school and birthdate, and using Yahoo!'s account recovery for forgotten passwords. Kernell then posted several pages of Palin's email on 4chan's /b/ board. Kernell, who at the time of the offense was a 20-year-old college student, was the son of longtime Democratic state representative Mike Kernell of Memphis.

The 2011 PlayStation Network outage was the result of an "external intrusion" on Sony's PlayStation Network and Qriocity services, in which personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service. The attack occurred between April 17 and April 19, 2011, forcing Sony to deactivate the PlayStation Network servers on April 20. The outage lasted 23 days.

<span class="mw-page-title-main">Wage theft</span> Denial of wages or employee benefits rightfully owed to an employee

Wage theft is the failing to pay wages or provide employee benefits owed to an employee by contract or law. It can be conducted by employers in various ways, among them failing to pay overtime; violating minimum-wage laws; the misclassification of employees as independent contractors; illegal deductions in pay; forcing employees to work "off the clock", not paying annual leave or holiday entitlements, or simply not paying an employee at all.

<span class="mw-page-title-main">Google Authenticator</span> Two-step verification app

Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password and HMAC-based one-time password, for authenticating users of software applications.

The 2012 LinkedIn hack refers to the computer hacking of LinkedIn on June 5, 2012. Passwords for nearly 6.5 million user accounts were stolen. Yevgeniy Nikulin was convicted of the crime and sentenced to 88 months in prison.

<span class="mw-page-title-main">Bitwarden</span> Open-source password manager

Bitwarden is a freemium open-source password management service that stores sensitive information, such as website credentials, in an encrypted vault. The platform offers a variety of client applications, including a web interface, desktop applications, browser extensions, mobile apps, and a command-line interface. Bitwarden offers a free US or European cloud-hosted service as well as the ability to self-host.

Account sharing, also known as credential sharing, is the process of sharing login information with multiple users to access online accounts or services. This can include sharing information like e-mail addresses, usernames and passwords for social media accounts, subscription services, gaming platforms or other online services.

References

  1. "Sharing Netflix or Other Streaming Media Login Info Is Now Illegal in Tennessee". Hometheater.about.com. July 1, 2011. Archived from the original on July 9, 2011. Retrieved March 20, 2024.
  2. Voorhees, Josh (June 2, 2011). "Tennessee Netflix law: New measure makes it illegal to share login for online entertainment services like Netflix, Rhapsody". Slatest.slate.com. Retrieved July 15, 2011.