Imagine being alive and well–and then getting a notification that you’re dead. It happened to one Texas woman, and it took months for her life to get back to normal.
Barbara Kleinschmidt was “killed” electronically. She says she lived for months without access to her bank accounts and credit.
“You’re telling me I can’t get my money, you closed my credit accounts, but I am alive?” recalls Kleinschmidt.
When she called the Social Security office, Kleinschmidt says she was told someone, possibly a coroner or funeral director, faxed in a document listing her as deceased. They would not give her any further information.
She even got a letter from her bank, addressed to “The estate of Barbara Kleinschmidt” that asked her family to accept condolences for their loss.
Kleinschmidt says she got depressed and confused.
“I didn’t want to live, because I just didn’t know where, because it was hard for me to know what was going on,” she remembers.
Kleinschmidt believes someone she knows may be behind her digital death.
When we called the Social Security office, we were told Kleinschmidt was listed as deceased for nearly a year.
A representative wouldn’t tell us how the mistake happened, only that it could be due to something as simple as a typing error by an employee or someone else with access to the Social Security Administration’s Death Master File. Coroners, doctors, even credit unions, have access to it.
“It’s very problematic,” said Shawn McCleskey, a retired Secret Service agent and Director of Organizational Education and Measurement at the University of Texas at Austin Center for Identity.
McCleskey says more needs to be done to determine who’s who.
“How much diligence do they, in fact, do to verify if that person is in fact the person who should be submitting the documents?” wondered McCleskey.
He says many agencies don’t have the time or money to be as thorough as they should be.
While Texas’ system seems pretty secure, so-called “master hacker” Chris Rock tells KEYE TV the system is only as strong as its weakest link.
Rock presented at hacker convention Def Con on the weakness of the electronic death registration system. He was able to get into the electronic death registration system in four states. A Texan could be declared dead in any of them.
According to Rock, people can easily pose as doctors or funeral directors. He calls it a fatal flaw in the system. In some states, all it takes to set up an account is a doctor’s name, address and medical license number. A basic internet search can often yield that information.
And McCleskey says Kleinschmidt’s theory about her “death” being a personal attack might ring true. He’s seen people steal identities not for financial gain, but for public humiliation.
“If you just want to cause someone some real grief, have them declared dead,” said McCleskey. “That would be. Talk about, what this woman is experiencing, a real nightmare.”
Kleinschmidt says her main concern now is making sure her nightmare doesn’t happen to someone else.
“People are looking at me like I’m still dead,” said Kleinschmidt.
A look at the phenomenon of digital memorials; repositories and time capsules of a life even after it’s ended in the real world
On the first death anniversary of his father-in-law last week, Pradip Mehta (36) decided to show the 120 relatives gathered at his home in Rajkot the digital memoriam he had created through Shradhanjali.com, India’s first and only memory portal. As he clicked on the page, the photograph of his father-in-law popped out to the accompaniment of the Mrityunjaya mantra. Curious relatives looked on as he showed them the photo album on the portal where all good moments with the deceased we’re captured for eternity. “There were two reasons why I chose this kind of memoriam,” he explains. “Instead of paying a fortune on print media for the announcement, this online profile will be up for 30-odd years. And by uploading all the pictures and videos, my wife and I are making sure that he will be ‘alive’ for our 12-year-old son in the future.” Mehta regrets that he grew up with practically no idea of his ancestors. “We don’t take efforts to know our lineage at all.”
That may not be the case with the millennial generation and the people who follow them. With an entire life online — selfies uploaded to Facebook, tweets, posts, Instagrams of their meals and dubsmashes — leaving behind a legacy is less a matter of choice and more a matter of inevitability. Everybody leaves behind a footprint on the Internet, but some of it can be controlled even after their death. Today, your loved ones have a ‘life’ beyond their death — on memorialised pages on Facebook, on webpages dedicated to their memory, and even on QR codes on their gravestones that will link to information about them online.
Indeed, the dead may soon outnumber the living, at least in the virtual space. A US statistician has calculated that Facebook’s dead will outnumber the living by 2098. And when that is the case, the rules must evolve.
Take the way social norms have evolved in the virtual space. When a death is announced on social media, online friends begin sharing thoughts and comments. Some may not have even met the deceased in the real world but their digital interactions had been extensive enough for them to suffer a sense of grief.
So, how does one mourn a loved one who has piled up an extensive amount of digital possessions? Do they deserve an online memorial? Facebook certainly thinks so. On the social networking website, families can get full access to profiles only if there’s documented instruction from the deceased. You can let the site know if a person has passed away, and Facebook will memorialise the account, which means that person’s Facebook account now appears with a ‘Remembering’ above their name. A legacy contact (someone you choose to look after your account if it’s memorialised) can then write posts, respond to new friend requests and such. There are many such accounts on the site — take the accounts (now memorialised pages) of actor Sanjit Bedi (of TV show Sanjeevani fame), Sheryl Sandberg’s late husband Dave Goldberg and late F1 driver Jules Bianchi. All this, if you don’t explicitly ask for your account to be deleted after your death.
In an earlier interview to The Huffington Post, Facebook spokesperson Fred Wolens had said: “When we receive a report that a person on Facebook is deceased, we put the account in a special memorialised state. Certain more sensitive information is removed, and privacy is restricted to friends only. The profile and wall are left up so that friends and loved ones can make posts in remembrance. If we’re contacted by a close family member with a request to remove the profile entirely, we will honor that request.”
Shradhanjali.com works a little differently. For Vivek Vyas, co-founder of Shradhanjali.com, the idea was born out of empathy rather than business opportunity. He says one particular incident prompted him to offer the memorial service online. He and his friend (now partner) Vimal Popat were eating samosas at a roadside restaurant off Rajkot in 2011. The paper in which the savouries were packed was the obituary page. “It was disturbing to see the photographs of the deceased wrapped around the samosas, oil-stained and later, discarded as rubbish.” The friends spoke of having an online memoriam which would be decorous to the memory of the departed.
Back home, the two researched similar sites and to their surprise, found no other site offering such a service in India. “Let’s do this,” Popat urged Vyas, and the two quit their jobs in an insurance company to start the memorial portal. The site went live in 2011, allowing you to relive memories of your loved ones.
First, one has to register by going online to this B2C website with a simple user interface. Once a payment of Rs 2,700 is made for a 30-year subscription, the subscriber can upload information, photographs and videos about their loved one. They are offered a choice of 10 languages (for friends and relatives to write their condolences) and a selection of music that they wish to be played whenever someone visits the profile page. The content is completely user-driven and once the page goes ‘live’ the link is sent to all the emails that have been uploaded.
Vyas maintains that their website is gaining traction — there are about 400 paid subscribers, many of them are agencies which partner with print media giving ‘packages’ to the client — and in spite of not marketing aggressively, the number is growing. “The concept connects with people in a rather intimate manner,” he says, “and some of the people to whom I have explained the site have shed copious tears, they are so moved by the concept of memoralising the departed.”
In fact, one of the subscribers initially wrote a cheque of Rs 27,000 insisting that the yeoman service needs better cash appreciation.
The founders maintain that their venture is not comparable with Facebook or a blog as Shradhanjali is free of any advertisements and even sends out reminders of birth and death anniversaries. “Besides, the others are not exclusive platforms for memorials,” Vyas stresses.
Clearly, the meaning of the memory of a loved one is different today. It exists beyond photo albums and physical memories of that person’s friends and family. Madhu Nataraj, choreographer and dancer, Natya Stem Dance Kampini, discusses what the community page dedicated to her late mother Maya Rao on Facebook means to her. Although the page was made when she was alive, as a way for her students to address her and to talk about her book, after her death in 2014, Nataraj says today it has become a sort of memorial page, where people post their remembrances of her mother.
“She lives on through her art. Every time I dance or step on stage — and I’m sure this is true even of her students — I remember her. This is just another dimension of that remembering,” Nataraj says. In another case, the FB page of Dean D’Souza (a close friend of a writer who did not wish to be named), who died in a helicopter crash in 2013, “brings comfort and a smile”. He adds, “Friends are constantly posting on it, and his profile picture is changed regularly, reminding us of a happier time. I found it unnerving at first have FB remind me that “It’s Dean’s birthday”, but not anymore over the years.”
Nataraj however emphasises that for an artist of her mother’s stature, the legacy is through the memory of her art. Of course it feels good when people pay tribute to her online. But a virtual ‘memorial’ of her mother’s life isn’t the only legacy she has.
But the burgeoning number of such services makes it clear that for many others, a virtual repository of their loved one’s life is important. Take The Digital Beyond, a site that discusses how to plan digital legacy management — Facebook accounts, email, bank accounts etc — after death.
There are others. In a page straight out of the movie PS I Love You, a service called My Wonderful Life sends posthumous emails to loved ones. Then there’s MyDeathSpace.com, which tracks social media profiles of the dead and maintains an extensive message board and Facebook page.
Services such as Living Headstones allow you to emboss a QR code upon a loved one’s headstone. Scanning it connects to a website containing information you and friends add about your loved one, such as: an obituary, family heritage and history, photos, comments by friends and relatives and even links to share content on Facebook or Twitter. Another, Quiring Monuments, adds a link to the granite memorial through which smartphones can connect to your loved one’s personalised website.
There are those who might raise their eyebrows at such platforms, but Vyas will have none of it. “Just because you have a mandir (a prayer room) at home, the need for temples will not diminish, will it? There is a decorum given to the memory of the dead on our site.”
Do we forget?
But there is also a flipside. In the real world there is a period of mourning, people come to offer condolences and then, it is time to move on. Cyberspace may not allow this clean transition from grief and mourning to a semblance of routine. The thing about having such a digital memoriam is that grieving does not really end. This is a setback, according to clinical psychologist Dr Anand A Rao. “Grief has to be suffered immediately otherwise it will become a reaction later which will require clinical help,” he says. But reliving the memory each time someone posts a query or shares a memory does not help either. “Ultimately, grief has to stop and loved one’s routines have to continue. Typically I would recommend the presence of such a page for about 15 days, no more,” he says.
There is also the matter of insincere tributes. As Nataraj says, she was very hurt when people who “hardly knew” her mother had posted selfies captioned: ‘Maya didi’, “followed by five hearts”. “I found that callous,” she says. “There are so many so-called obits and condolence messages and everybody wants to claim that familiarity with her that I’m sometimes wary.”
But it doesn’t look like the digital memorial phenomenon is going away anytime soon. Rohini Lakshane, researcher at the Centre for Internet and Society, agrees with Dr Rao to an extent, saying that getting constant updates could thwart the process of grieving or healing. “But at the same time, I could see how reaching out to a larger community via public updates or photos could give them strength, moral support and empathy,” she says. She points out that if a person feels that their online persona or presence is an extension of themselves, it’s a perfectly “legitimate wish” to have. “Given the importance attached to details of events that we post online, I suppose the desire to create a time capsule of it will continue to exist.”
Most people know they need to have a will, and that it’s a good idea to pre-plan their funerals and make other arrangements because one day, every one of us will die.
But there’s another aspect of planning that needs attention also — your online life — the Federal Trade Commission said Friday
All the digital files, photos, posts and other accounts you leave behind might cause a lot of inconvenience – even fraud or identity theft – for your loved ones to clean up.
Do you really want your Facebook account to outlive you? What will happen with access to your online bank accounts?
Here are a few tips from the FTC to figure out a plan for your online life after death.
Count your accounts. Make an inventory of your digital life, including accounts for email, social media, blogging, gaming, and cloud storage. Set up a spreadsheet or other file to keep track of each site’s name, URL, your user name, password, your wishes for each, and other information that might be necessary for access. Some of your accounts may involve money – either real-world or online currencies – and may require additional attention. Don’t attach your inventory to your will which becomes a public document after your death.
Get in the know – now. Many accounts will let you make arrangements now or name someone to manage the account after your death. Research your options.
Who can help? You might want to name a digital executor to handle all these tasks after your death, preferably someone who has experience with online accounts and will understand how to carry out your instructions – or make decisions about issues that you might not have foreseen. You can select a friend or family member to be your digital executor or you can hire a third-party service to help you.
Search “online life after death” or “digital” and “afterlife” or “legacy” or “executor” to learn more.
“I leave my MP3 collection, Apps library, e-books and Facebook content to…”
When we think about our assets, we usually think about our bank accounts, reals property, retirement accounts, and personal property and so on. But in this age of digital information, most people have sizable portfolio of digital assets. These can include our MP3 collections, iTunes and Apps libraries, e-books, photos as well as and other digital media. It may also include things like our Facebook, Twitter, and Instagram posts and online blogs. What happens to these things after we die? Who gets to access our emails and Twitter accounts? Can we leave our e-book and app collections to our family member or friend? These are not issues that we can really look to history and precedence for guidance. The idea of digital assets did not even exist until the last few years!
Most states and the federal government are still struggling with this issue. In July of this year, the Uniform Law Commission approved the draft of the Uniform Fiduciary Access to Digital Assets Act. The Uniform Act is not a law, and it is up to states to decide if they wish to adopt the Uniform Act or their own version of it. The Uniform Act greatly increases access to a deceased person’s digital assets, including emails, unless there are contrary instructions in the deceased person’s will. Moreover the Uniform law supersedes any provisions contained the terms of service or other end-user agreement.
Recently, Delaware became the first state to pass legislation related to how digital assets are dealt with after a person’s death. The Delaware Fiduciary Access to Digital Assets and Digital Accounts Act is modeled after the Uniform Act. It allows personal representatives of the estate of a deceased person the same access to the accounts and digital assets of the deceased account holder as the account holder had him/herself. While this statute may raise many privacy concerns, it does greatly increase access to the digital assets of a deceased person and increases ease of estate administration.
In Pennsylvania, a bill was introduced in 2012 that would allow the personal representative of an estate the power to “take control of, conduct, continue or terminate” a deceased person’s social media account. This act was never passed and currently there is no guidance in the Pennsylvania legislature on how a person’s digital assets can be effectively disposed of after their death.
In the absence of legislative guidance, user agreements will determine who may access to digital assets after the death of an account holder. This may prevent the family members and loved ones from being able to access valuable information held by the deceased. Moreover, there may also be confusion if a person will or other testamentary document leaves instructions that are contrary or in conflict with the end-user agreement with the service provider. This, in the absence of further guidance is received from lawmakers, it is very important to have estate plans that allow the personal representative of the estate to have fullest flexibility to communicate with the service providers and have access to your digital assets in the event of death or incapacity.
As Web-based engagement for business and personal reasons becomes more prevalent, the risk for a breach to your privacy and data security increases. Not a month goes by without us hearing about a privacy breach compromising people’s financial identity, and the Federal Trade Commission estimates that at least 11 million people are the victims of identity theft every single year. More and more, identity theft is happening in a virtual realm as a result of careless personal habits as it relates to data security. Every minute of the day, thousands of Americans are exposed to phishing, spyware, malware, and other types of malicious Internet activity aimed at stealing their identity to use mainly for financial fraud. It just takes one moment of carelessness to place you or your loved ones in a vulnerable position that may take years and many hours of hard work to correct.
Data security crimes are so common and so disruptive that many companies offer insurance to protect individuals from the aftermath of having their identity or other important documents stolen digitally. Protecting your online data goes beyond protecting your identity. Many people store a myriad of personal documents on the cloud and maintain ongoing conversations via text or email that may contain information that should be kept private. If you are concerned about online data safety, then take into account the following best practices to help you keep your personal and professional data from falling into the wrong hands.
According to David Perera, a journalist focused on tech and trends, much of what we are told about password security is difficult to implement and not necessarily aligned with the way we operate in our daily lives. For most of us, having a different password for each account is unrealistic, given that the average person interacts with over 100 password-secured websites. It absolutely makes sense, in theory, to have complex passwords with no association with our names, addresses, or commonly known personal information. We should also refrain from the most common and most damaging mistake of using standard passwords such as “123456” and “password.” (Take a look at this article on CBS, highlighting the 25 most popular passwords for 2013.) But how can you keep track of so many passwords while relying on memory and making sure your passwords are secure? A great alternative is to think about passwords in tiers. That is, the security level needed for each website or environment determines the type of password you are likely to use. On sensitive environments such as bank accounts or trading accounts, you may want to go all the way, and refrain from patterns or reusing common words or passwords. As for other less important websites that require a password, you can tier it by resorting to passwords that are still complex and unique, and make use of special characters that you are still able to recall.
Mobile-device use is on the rise, and with it comes the increased risk of having a data-security breach. When it comes to your mobile devices, caution and mindfulness are essential to keep your personal information safe. Let’s start with the basics. More than 50 percent of data-connected cell phone users don’t use a password on their device, making it extremely vulnerable should the device be lost or stolen. Another habit that puts your personal data at risk is having your cell phone or mobile device set to auto-connect when it finds an open wireless network. Finally, if you are engaging with a variety of websites and apps, then it is very important that you verify the authenticity of a website and make sure the portal is secure (the URL should read https instead of http). When downloading apps, carefully review the data each app wishes to have permissions for. Many apps are highly intrusive of your privacy, asking for ongoing access to all manner of communications taking place from your device, and even taking the liberty to post on your behalf on many social platforms, such as Facebook.
Free WiFi Could Prove Costly
If you are constantly on the road or in a remote office (some call it Starbucks), then you need to always be on the alert and make careful decisions when logging into networks outside your home or office. Hot spots are well known sources of cybercrime. There are several ways hackers can steal your information from a hot spot, from installing a free rogue hot spot served directly from their computer where they have full access and visibility to all your data, to using special software to see all your activity, even when you are in a “trusted” public Wi-Fi spot. If you are using a hot spot for work, then always use a layer of encryption by using a VPN. In general, public hot spots provided by companies such as AT&T are not encrypted, putting all your communications at risk.
Two-Factor Password Authentication Matters
With thousands of passwords being compromised every day by hackers and cybercriminals stealing, cracking, phishing, guessing, buying, keylogging, sniffing, and capturing, not having two-factor authentication with your most sensitive accounts is literally a crime against yourself. Two-factor authentication combines something you know with something you have, disarming anybody that attempts to access your information by having only your password but not your authentication device. Two-factor authentication can be managed by a FOB or digital token that provides the user a one-time password, or via a message sent to a mobile device. Virtual Private Network access, personal and company emails and bank accounts, as well as access to your mobile computer can benefit greatly from two-factor authentication. Many free email providers, such as Gmail, already provide free two-factor authentication via your mobile. If you have not yet activated yours, then don’t delay. Data breaches where identity is compromised ends up costing Americans an average of $365 to resolve.
Consider a Digital Safe
With so many passwords to keep, which are likely to constantly change, having a means of centralization of your most important passwords and documents is no longer a nice- to-have. Data access should not be just secure; it should also be transferable to those you trust the most when you are unable to access it, due to illness or after you pass away. A well-designed digital safe gives you the convenience of centralization, the peace of mind of transferability, and the confidence that all the documents that really matter are secured in a cloud-based environment where they are unlikely to he hacked or lost due to device failure.