Mort numérique : votre guide complet (et comment la gérer)

Mort numérique : votre guide complet (et comment la gérer)

Mort numérique : votre guide complet (et comment la gérer)

Click here to view original web page at Mort numérique : votre guide complet (et comment la gérer)

Je pensais que t’étais mort mec !

C’est ce que Marvin, l’un de mes amis en ligne de longue date, m’a dit lorsque je me suis connecté à ma plate-forme de jeu préférée après une longue absence. Après avoir ri et échangé les dernières nouvelles, j’ai réfléchi une seconde – et si j’étais vraiment mort ?

J’ai alors réalisé que je ne m’étais pas absolument pas préparé à ma mort numérique. Je serais parti pour toujours, et personne ne serait en mesure de fermer mes profils de réseaux sociaux ou d’autres empreintes numériques, car je n’avais pas pris les mesures nécessaires.

Pire encore, mes amis en ligne ne sauraient même pas ce qui m’est arrivé. Ils penseraient probablement que j’ai cessé mes activités numériques pour de bon et que j’ai oublié tout le monde. Cette prise de conscience m’a mis mal à l’aise – pas pour moi, mais pour ceux qui auraient à reprendre les choses là où je les avais laissées.

En effet, ce n’est pas facile d’être confronté à ce type de situation. L’un de vos amis s’est-il déjà évaporé sur les réseaux sociaux ? Sans aucun message d’adieu, aucune activité sur son mur et aucune réponse à vos messages ?

Il ne vous reste plus qu’à vous demander ce qui s’est passé. A-t-il simplement changé de vie, ou s’agit-il de quelque chose de plus grave ?

Peut-être que tout cela vous amène à vous demander si vous pouvez faire quelque chose pour éviter ce genre de situation lorsque votre heure sera arrivée. Et la réponse est oui.

Si vous vous êtes fait de nombreux amis sur Internet, ou que vous souhaitez éviter que vos précieux actifs numériques ne soient perdus à jamais après votre décès, ce guide vous est destiné. Personne n’aime évoquer la mort. Toutefois, le fait d’en parler et de se préparer en conséquence peut aider vos proches d’une manière dont vous n’aviez peut-être pas conscience.

Commençons.

Sommaire

Nous voyons des gens qui sont morts – et ça pose problème

La vie et la mort numérique – Vos actifs numériques après votre mort

Qu’advient-il de vos comptes de réseaux sociaux à votre mort ?

En quoi la planification de votre mort numérique est-elle difficile ?

Prévoir votre vie numérique après la mort

Préparer sa mort numérique

Derniers mots

Nous voyons des gens qui sont morts – et ça pose problème

Bien que le concept de mort numérique soit relativement récent, sa sinistre présence se fait déjà sentir en ligne.

Elle est particulièrement courante sur les plateformes de réseaux sociaux, et même si les utilisateurs de réseaux sociaux vivants n’aiment pas y penser, les profils fantômes de leurs amis décédés risquent de dépasser le nombre de comptes actifs d’ici quelques décennies.

À lui seul, Facebook comptait 30 millions d’utilisateurs décédés en 2012. Ce nombre devrait augmenter de plus en plus rapidement dans les années à venir.

En tenant compte des centaines de milliers d’utilisateurs des autres plates-formes de réseaux sociaux, la réalité des « cimetières de réseaux sociaux » ne semble plus aussi saugrenue.

Pourtant, peu d’internautes se préparent à la mort numérique. Selon un sondage mené par la Digital Legacy Associationplus de 80% des participants n’auraient rien prévu pour leurs profils de réseaux sociaux ou comptes numériques en cas de décès.

La mort numérique est un sujet qui gagne en importance chaque année, mais les personnes qui ont recours aux paramètres de contact légataire et de commémoration pour leurs profils restent une minorité. D’ailleurs, rares sont les internautes qui se soucient de consigner leurs souhaits en matière de patrimoine numérique. À la question : « Avez-vous rédigé un testament réseaux sociaux », près de 96% des participants ont répondu par la négative.

Il est de plus en plus courant de recevoir un rappel de la date de l’anniversaire d’un ami décédé sur Facebook ou Google Calendar, ou une notification LinkedIn pour fêter l’anniversaire de travail d’une personne qui n’est plus en vie.

Parfois, vous ne savez même pas qu’une personne est décédée, ce qui peut conduire à des situations délicates vis-à-vis des amis ou parents en deuil. Toutefois, le problème va bien plus loin que les réseaux sociaux.

Qu’en est-il des actifs numériques ?

Les actifs et biens numériques peuvent avoir une valeur à la fois sentimentale et monétaire. Toutefois, la grande majorité des gens n’y pensent pas. En effet, seuls 2,3% des participants au sondage ont déclaré avoir fait le nécessaire pour leurs biens numériques après leur décès.

Si vous n’avez pas organisé votre mort numérique à l’avance, votre famille et vos amis risquent d’avoir beaucoup de mal à mettre de l’ordre dans tous vos comptes numériques.

L’accès à vos ordinateurs, disques durs, téléphones et autre peut être impossible sans mots de passe ou clés de cryptage.

En outre, comment une personne peut-elle savoir qu’elle est autorisée à accéder à vos actifs numériques sans votre accord explicite, même en étant certaine que vous souhaiteriez dire adieu à vos amis, proches et d’autres personnes qui ont compté pour vous ?

La mort numérique : parlons-en

La mort numérique n’est pas un sujet « tabou ». Dans l’ensemble, peu de gens s’opposent à ce que les comptes de réseaux sociaux informent du décès d’une personne et se convertissent en lieu de commémoration.

En outre, bon nombre de personnes trouvent également un certain réconfort en consultant les profils d’amis et de proches décédés, que ce soit pour faire leur deuil, se souvenir de quelqu’un ou encore lui rendre hommage.

Le plus compliqué est d’être informé et conscient du fait qu’il faut se préparer avant qu’il ne soit trop tard. Dans le cas contraire, vous risquez de n’avoir aucune influence sur le devenir de votre identité et de vos actifs numériques.

Ce guide vous fournit des informations utiles sur le patrimoine et les actifs numériques, ainsi que des conseils et instructions sur la manière de gérer votre « vie après la mort numérique » tout en aidant vos êtres chers.

Nous allons commencer par les aspects les plus courants de votre identité numérique, et le travail que vous pouvez effectuer en amont.

La vie et la mort numérique – Vos actifs numériques après votre mort

Le premier pas vers la préparation de votre mort numérique ?

Commencer par les bases.

Si vous passez beaucoup de temps en ligne, vous disposez probablement d’un vaste éventail d’actifs numériques, et il est fort probable que vous en ayez oublié certains. Vos comptes bancaires en ligne, vos réseaux sociaux, votre stockage sur le cloud, votre crypto-monnaie, le contenu numérique acheté et vos comptes de messagerie ne sont que quelques exemples.

À votre mort, vous quittez le monde réel. Toutefois, ce n’est pas le cas dans le monde virtuel. La plupart de ces « miroirs numériques » resteront actifs comme si rien ne s’était passé.

Afin que vos profils soient mis à jour (ou désactivés), vous devez déterminer le niveau de contrôle que vous avez et la façon dont chaque plate-forme gère vos comptes en cas de décès.

Autant vous dire que c’est plus facile à dire qu’à faire. Le principal problème est qu’il n’y a pas de politique universelle. En effet, chaque plate-forme en ligne a sa propre manière de gérer le décès d’un titulaire de compte.

En outre, étant donné qu’il s’agit d’un sujet plutôt sinistre, les procédures sont rarement faciles à trouver et il faut se plonger dans les conditions de service pour obtenir des réponses. Vos amis et proches devront peut-être même contacter l’assistance après votre décès pour fournir une preuve et/ou demander la désactivation de votre compte.

Et ce n’est pas tout. Dans la plupart des cas, le titulaire du compte ne possède rien. Les conditions d’utilisation et contrats d’abonnement vous indiqueront, dans un langage prêtant volontairement à confusion, que le réseau social ou service de streaming détient l’intégralité de votre contenu.

Même si c’est vous qui avez rédigé un message, chargé votre photo ou acheté vos chansons, ils ne vous appartiennent pas forcément. Les internautes qui sautent de joie à cette idée sont rares. Et ceux qui le savent sont encore plus rares, mais c’est comme ça. Après tout, vous avez accepté ces conditions.

À présent, imaginez que vous avez des comptes sur Google, Facebook et Twitter. Il s’agit de trois des plates-formes sociales en ligne les plus populaires, et chacune d’elles a sa propre approche.

Qu’advient-il de vos comptes de réseaux sociaux à votre mort ?

Google

Google fait partie des plates-formes en ligne les mieux préparées en matière d’inactivité des comptes, que ce soit par choix ou en raison de circonstances tragiques.

Sa page Gestionnaire de compte inactif vous permet de choisir ce qu’il adviendra de votre compte, et qui peut y avoir accès en cas d’inactivité.

Vous devrez tout d’abord définir la durée de la période d’inactivité avant que Google ne vous considère comme un utilisateur inactif.

Ensuite, vous pourrez choisir jusqu’à 10 exécuteurs de votre compte, soit les personnes informées en cas d’inactivité. Vous pouvez préparer un e-mail à l’avance avec vos adieux et leur indiquer ce que vous souhaitez qu’elles fassent avec votre compte.

Vous pouvez également sélectionner ce que vous souhaitez partager avec les exécuteurs. N’importe lequel d’entre eux peut avoir un accès total, limité ou nul à votre compte Google, de vos e-mails et chats à d’autres services Google. La décision vous appartient.

Si vous préférez que votre compte soit supprimé une fois détecté comme inactif, c’est également possible.

Facebook

À votre mort, votre compte Facebook peut être supprimé définitivement ou utilisé comme lieu de commémoration.

Un profil Facebook de commémoration conserve l’intégralité de son contenu (photos, publications, etc.) mais n’apparaît pas dans des endroits tels que des suggestions d’amis ou publicités. En outre, les notifications d’anniversaire sont désactivées et le mot « En souvenir de » sera apposé au nom de la personne.

Si vous avez désigné un contact légataire pour votre compte, cette personne peut rédiger une publication qui restera épinglée sur votre profil en permanence. D’autres modifications peuvent être apportées, y compris la mise à jour des photos de profil et – selon vos paramètres de confidentialité – le partage de souvenirs sur votre mur.

Contrairement à Google, votre contact légataire n’aura jamais accès à votre compte, car Facebook interdit le partage de compte.

Un compte Facebook est « commémoré » après une demande valide d’un parent vérifié de la personne décédée. Il peut également être supprimé.

Par ailleurs, les pages Facebook dont le seul propriétaire est décédé seront également supprimées après avoir contacté l’assistance.

Twitter ne vous donne pas la possibilité d’organiser votre profil après votre décès. La plate-forme ne propose pas non plus de comptes de commémoration. Toutefois, vos proches peuvent quand même s’occuper de votre compte.

Si la plate-forme est informée du décès d’un utilisateur de Twitter, elle permet à « une personne autorisée à agir dans le cadre de la succession, ou avec une personne ayant prouvé qu’elle était membre de la famille proche », de demander la désactivation du compte en question.

De nombreuses preuves sont nécessaires : une copie d’identité, des informations sur la personne décédée et un certificat de décès. Bien que cela puisse être difficile sur le plan émotionnel, c’est tout à fait normal dans une telle situation, et nécessaire pour éviter les abus.

Twitter peut également désactiver un compte en cas d’incapacité du propriétaire. Le cas échéant, une copie de l’identité du titulaire du compte et une procuration valide sont également nécessaires. Twitter affirme que toutes les informations requises sont confidentielles et seront supprimées après avoir été examinées.

Autres plates-formes

Comme vous pouvez le constater, les géants des réseaux sociaux traitent les comptes des personnes décédées de manière complètement différente. Voici comment d’autres plates-formes majeures gèrent ce type de situation :

  • Instagram appartient peut-être à Facebook, mais votre contact légataire n’a aucun pouvoir sur l’appli de partage de photos. Cela dit, les comptes Instagram peuvent être « commémorés » en contactant l’assistance technique. Vous devrez fournir une preuve de décès, des certificats de naissance et de décès, ainsi que la preuve que vous êtes le représentant légal de la personne décédée. Le compte peut également être supprimé.
  • LinkedIn propose un simple formulaire de contact pour demander la suppression du profil d’un membre décédé.
    À l’avenir, la plate-forme pourrait proposer une fonctionnalité de « contact légataire » similaire à Facebook, ainsi que la commémoration de compte.
    Gardez à l’esprit que vous devrez fournir des informations relatives à la personne décédée dans le formulaire, par exemple son nom, son profil et le lien qui vous unit.
  • iTunes ne dit pas grand-chose sur la gestion des comptes des membres décédés. Toutefois, la plate-forme indique que la licence ne peut pas être transférée. En d’autres termes, les « biens » iTunes sont simplement « loués » par les utilisateurs et ne peuvent pas être transmis à des proches.
    Le partage de compte est une violation des conditions de service d’iTunes. Par conséquent, la bibliothèque musicale d’un défunt, quelle que soit sa valeur monétaire ou sentimentale, est perdue après sa mort.
  • Les comptes PayPal des utilisateurs décédés peuvent être clôturés par des proches et personnes autorisées en contactant l’assistance. Les exécuteurs doivent fournir une copie de leur pièce d’identité avec photo et du testament (ou toute autre documentation légale) contenant des informations sur le défunt.
    Une preuve du décès du titulaire du compte initial (certificat de décès) est également requise. Si tout est approuvé, le compte en question sera fermé et les fonds transférés.
  • La procédure à suivre pour les portefeuilles de crypto-monnaie varie selon celui que vous utilisez. Toutefois, la plupart d’entre eux requièrent une sorte d’authentification privée. Il appartient au titulaire du compte de s’assurer qu’une autre personne peut y accéder avec les clés et mots de passe nécessaires après sa mort.
    Vous pouvez par exemple inclure ces informations dans votre testament. Vous pouvez également faire appel à un service externe, ou configurer votre portefeuille pour autoriser un accès partagé (comme l’option multisignature de Bitcoin, par exemple).
  • Les fichiers Dropbox des utilisateurs décédés sont accessibles via le dossier Dropbox dédié de leur ordinateur. Si vous n’y avez pas accès, vous devrez contacter Dropbox pour obtenir une assistance directe.
    Préparez-vous à fournir la preuve que la personne en question est décédée et que vous êtes légalement autorisé à accéder à ses fichiers, ainsi que d’autres informations générales (noms, adresses, votre identité et les ordonnances judiciaires, le cas échéant).
  • Steam traite chaque demande associée au décès d’un utilisateur de manière différente, et encourage vivement les proches de l’utilisateur en question à contacter l’assistance pour résoudre le problème.
    Toutefois, même si vous avez accès au compte de votre être cher, les noms de compte utilisés pour la connexion sont rarement modifiés.
    Afin d’éviter d’avoir à saisir les informations de connexion, vous pouvez utiliser la fonctionnalité « Partage familial » pour configurer l’accès à la bibliothèque de jeux de la personne décédée à partir d’autres comptes.
  • Snapchat et Tumblr supprimeront le compte d’un utilisateur décédé, à condition que la demande provienne d’un membre de la famille vérifié. Un certificat de décès peut être demandé.
  • Microsoft, Yahoo, AOL et de nombreuses autres entreprises ont des mesures plus traditionnelles. Le compte d’une personne décédée sur ces plates-formes peut être supprimé s’il est prouvé que la demande est valide.

En quoi la planification de votre mort numérique est-elle difficile ?

À ce stade, vous pensez peut-être qu’il est très difficile d’être correctement informé des politiques des différentes plates-formes en matière de décès des membres.

Et vous avez raison.

Outre le processus émotionnellement difficile de planification de votre décès, cette tâche prend du temps car chaque étape est différente.

Toutefois, posez-vous la question suivante : serait-ce si difficile si vous n’aviez qu’un seul compte de réseau social ? Et la planification de votre mort numérique serait-elle si compliquée avec des informations actualisées et une liste organisée de vos actifs numériques ?

Certes, se renseigner sur des politiques extrêmement différentes demande beaucoup de travail. Toutefois, deux autres facteurs compliquent encore plus l’organisation de vos biens numériques :

  • La législation sur la mort numérique en est encore à ses débuts.
    Il y a seulement trois décennies, la planification de la mort numérique n’existait pas. Cependant, la technologie évolue rapidement et la législation a souvent du mal à suivre le rythme.
    Prenons l’exemple des États-Unis, où plus de 30 États n’ont encore présenté aucune loi sur la planification des biens ou actifs numériques. Les autres pays sont dans la même situation. L’absence de lois établies signifie que les entreprises sont libres de fonctionner selon leurs propres règles.
    Malgré les progrès considérables accomplis au cours de la dernière décennie, la mort numérique est encore un sujet relativement inconnu, en grande partie à cause de l’absence générale de législation.
  • Vous possédez une pléiade d’actifs numériques, et c’est normal.
    De nos jours, il est habituel de posséder et d’utiliser régulièrement au moins trois dispositifs : un ordinateur, une tablette et un smartphone.
    En outre, il est fort probable que chaque périphérique stocke une grande partie de vos expériences dans la vie « réelle ». Qu’il s’agisse de photos, de vidéos, de documents, de jeux ou de tous types de comptes, ces fragments de votre vie sont précieusement conservés sur votre disque dur ou en ligne. Et qui dit biens numériques, dit mots de passe. Combien de mots de passe avez-vous notés, ou oubliés ?
    Sans organisation, il est facile de se laisser submerger par les efforts considérables que vous devrez déployer une fois que vous aurez décidé de vous préparer.
    Et ce sentiment est justifié, car il s’agit d’une tâche colossale. C’est d’ailleurs la raison pour laquelle de nombreux internautes abandonnent avant même de commencer.

Bien que la planification de votre mort numérique puisse être pénible et fastidieuse, vous êtes le seul à pouvoir vous en occuper et vous vous rendrez service, ainsi qu’à vos proches. Vous pouvez bien sûr vous faire aider, mais personne d’autre ne peut réellement le faire à votre place.

Ne baissez pas les bras ! Même si n’est pas toujours facile, il est tout à fait possible de mettre de l’ordre dans vos biens numériques et de préserver votre mémoire avec un plan solide et le bon état d’esprit.

Prenez une profonde inspiration et concentrez-vous : vous assumez la responsabilité de votre vie numérique après la mort, et vous savez que c’est une bonne chose.

Prévoir votre vie numérique après la mort

Chaque plan qui se respecte a un objectif clair. La préparation de votre mort numérique comporte quatre aspects principaux :

1. Gérer votre patrimoine numérique maintenant pour que ce soit plus simple plus tard.

Mettre de l’ordre dans vos actifs numériques et veiller à ce que les amis ou proches choisis aient les moyens d’accéder à ce que vous considérez comme important pour eux constituent le principal facteur de motivation pour la planification de votre mort numérique.

Si vous possédez de nombreux biens en ligne à la valeur monétaire ou sentimentale élevée, vous souhaitez probablement qu’ils soient accessibles aux personnes qui comptent le plus pour vous.

Une liste organisée et à jour de votre patrimoine numérique vous permettra de préserver votre « vous » numérique. Il sera également plus facile pour vos êtres chers de conserver un souvenir immortel de vous.

2. Prendre le contrôle du destin de vos biens numériques à votre mort.

Dans de nombreux cas, le patrimoine numérique d’une personne devient inaccessible après son décès.

Certes, la décision de conserver ses biens numériques de valeur sous clé est parfois délibérée. Toutefois, il s’agit généralement du malencontreux résultat d’un manque de préparation, affectant toutes les personnes impliquées.

Si vous souhaitez éviter que votre empreinte numérique ne soit perdue à jamais, vous devez en prendre le contrôle pendant qu’il est encore temps. La décision du destin de vos biens numériques vous appartient, et, en faisant un petit effort, vous aurez l’esprit tranquille en sachant que vous avez laissé des instructions claires sur la gestion de vos biens en ligne à votre mort.

3. Aider vos proches.

La perte d’un proche est toujours une expérience traumatisante et douloureuse. Et c’est encore plus pénible si elle s’accompagne d’une pléiade de dispositifs et données en ligne à trier sans instructions claires.

Essayer de comprendre comment accéder à vos comptes et à vos médias peut être un lourd fardeau pour votre famille, en particulier pendant un processus de deuil intense. Par conséquent, la planification de votre vie numérique vous concerne vous, mais également vos proches.

En organisant les aspects numériques de votre vie et en fournissant des instructions à vos proches, vous leur épargnerez beaucoup de peine en cette période déjà difficile.

4. Aider vos collaborateurs.

Si votre travail est en étroite relation avec le monde numérique, la responsabilité de vous préparer au pire vous revient. Vous devez vous assurer que vos collaborateurs peuvent accéder facilement aux documents que vous jugez importants pour l’entreprise.

Entre la législation peu fournie sur la mort numérique et le paysage juridique en constante évolution, vous aurez probablement besoin d’une assistance professionnelle.

Le recours à un spécialiste dans ce domaine, ainsi qu’une préparation adéquate à la mort numérique dans un cadre professionnel, seront utiles à la fois pour vous et vos collaborateurs.

Préparer sa mort numérique

Chacun des quatre objectifs mentionnés ci-dessus est crucial pour un plan complet et réfléchi. Selon votre situation, l’un aura peut-être la priorité sur les autres.

Ces aspects essentiels de la planification de la mort numérique visent à vous fournir une meilleure idée des choses à traiter et de la façon de les présenter de manière simple et compréhensible. Voici les étapes à suivre afin de préparer votre mort numérique.

1. Identifier et organiser vos actifs numériques

La première étape des préparatifs de votre vie numérique après la mort est également la plus importante et la plus fastidieuse.

Si vous êtes déjà organisé, cela ne devrait pas être trop difficile. Toutefois, si vos actifs numériques sont dispersés, leur identification et leur recueil peuvent représenter une tâche colossale. Mais pas de panique, car les choses vont bientôt changer !

Faire un inventaire

Cela inclut vos comptes bancaires en ligne, mots de passe, réseaux sociaux, dispositifs numériques, documents et tout ce que vous considérez comme important. Inutile de vous souciez des détails pour l’instant : il s’agit simplement d’avoir un aperçu de vos actifs numériques les plus précieux.

Il est judicieux d’avoir recours à la bonne vieille méthode, à savoir un stylo et une feuille de papier. En effet, à moins d’être absolument certain que votre dispositif est protégé, mieux vaut ne courir aucun risque. Nous y reviendrons ci-dessous dans le paragraphe consacré à la sécurité.

Vous ne souhaitez pas conserver toutes vos informations au même endroit ? N’hésitez pas à faire des listes séparées pour chaque type d’actifs : professionnels, médias ou encore réseaux sociaux.

Gardez à l’esprit que la liste risque d’être longue si vous posséder de nombreux actifs numériques, qu’il s’agisse d’un inventaire global ou divisé en plusieurs catégories. D’ailleurs, un inventaire organisé par catégories peut être très utile par la suite, lorsque vous déterminerez les personnes qui auront accès aux différentes catégories de données.

S’informer

Une fois que vous aurez une idée globale des choses à préparer, il est temps de vous familiariser avec les politiques en matière de patrimoine numérique des plates-formes de réseaux sociaux pertinentes.

Nous avons précédemment évoqué la manière dont les réseaux sociaux les plus populaires traitent les comptes d’utilisateurs décédés. À ce stade, nous vous encourageons à creuser un peu plus pour voir ce que vous pouvez faire vous-même, au lieu de vous contenter de désigner des contacts légataires ou exécuteurs de compte.

Par exemple, saviez-vous que vous pouvez télécharger gratuitement une copie de vos données Facebook ? Il vous suffit de vous rendre dans les paramètres et de cliquer sur la boîte d’information en haut de la page :

Vous pourrez ainsi facilement transmettre des photos, des vidéos et d’autres souvenirs aux personnes qui comptent pour vous.

Vous pouvez également télécharger une archive de vos publications Twitter et effectuer une sauvegarde de votre compte Instagram via un logiciel tiers comme Instaport.

Fournir des informations détaillées

À présent, retournez à votre inventaire. Établissez une liste de noms d’utilisateur et de mots de passe pour les comptes que vous avez inclus.

Si vous ne parvenez pas à vous souvenir de toutes les informations de vos comptes, tirez parti de la fonctionnalité de récupération de mot de passe sur les sites en question.

Et si vous avez tout oublié, même votre adresse e-mail de récupération ou vos questions/réponses secrètes, évaluez l’importance de ce compte pour vous. Ensuite, contactez l’assistance pour récupérer les informations nécessaires.

Rappel : Il vous sera probablement demandé de prouver que vous êtes bien le titulaire du compte.

Officialiser les choses

Dernière chose, mais non des moindres : rédigez un testament et établissez une procuration si nécessaire. Cela vous permettra de traduire vos souhaits par écrit et de fournir des instructions claires sur la manière dont vous souhaitez que votre identité en ligne soit gérée.

Les testaments de réseaux sociaux sont en train de gagner du terrain en tant que document juridique valable. Ils remplissent exactement la même fonction qu’un testament traditionnel, mais pour votre présence en ligne.

Une fois que vous aurez pris connaissance des politiques en matière de patrimoine numérique des plates-formes de réseaux sociaux que vous utilisez, vous pourrez facilement rédiger un testament de réseaux sociaux. De nombreux modèles gratuits sont disponibles en ligne, et la rédaction ne vous prendra que quelques minutes.

DeadSocial met à votre disposition un modèle simple et gratuit pour les réseaux sociaux. Si vous recherchez un testament plus traditionnel, DoYourOwnWill propose un excellent modèle. Il ne vous faudra pas plus de 20 minutes après avoir complété un court questionnaire.

IMPORTANT : N’oubliez pas de signer votre testament ! Selon les exigences légales de votre pays, vous aurez peut-être également besoin d’une signature supplémentaire de témoins. En règle générale, nous vous conseillons vivement d’imprimer votre testament si vous l’avez rédigé en ligne, de le signer et de le conserver dans un endroit sûr.

Si vous n’êtes pas un expert en matière de testaments, de réseaux sociaux et de gestion de patrimoine numérique, il peut être judicieux de faire appel à un conseiller juridique pour éclaircir votre situation.

2. Sécuriser et autoriser

Une fois que vous en aurez terminé avec le gros du travail de préparation, vous devrez vous poser quatre questions cruciales :

  • Qui recevra vos actifs numériques ?
  • Comment y auront-ils accès ?
  • À quoi ressembleront vos instructions ?
  • Où conserverez-vous ces instructions ?

En d’autres termes, il vous faudra choisir des proches et/ou amis en qui vous avez confiance pour gérer vos différentes données, y compris votre contact légataire Facebook, les exécuteurs de votre compte Google et autres. Vous devrez ensuite leur fournir les instructions ou données nécessaires.

Vous souhaiterez peut-être également leur donner un accès direct. C’est encore plus complexe, car vous devrez gérer des dizaines de mots de passe, et parfois même le cryptage et l’authentification à deux facteurs.

Toutefois, l’accessibilité n’est qu’une partie du problème, l’autre étant la sécurité. À moins d’avoir tout noté, vous devrez copier/coller de nombreuses données confidentielles. Si votre ordinateur est infecté par un virus « keylogging » (enregistreur de frappe) ou un malware similaire, tous les noms et mots de passe que vous manipulerez seront susceptibles d’être facilement dérobés.

Alors, comment vous assurez-vous de pouvoir terminer ce processus en toute sécurité ? Voici les étapes les plus importantes :

S’assurer que votre PC n’est pas infecté.

Exécutez des analyses antivirus, des vérifications anti-malware et, si besoin, faites appel à un expert. Si vous n’êtes pas certain que votre ordinateur soit sécurisé, évitez d’établir une liste complète de vos informations d’identification importantes.

Utiliser un gestionnaire de mots de passe.

Si vous n’avez jamais entendu parler d’un gestionnaire de mot de passe, c’est le bon moment pour envisager d’un utiliser un. En effet, cet outil mémorise tous vos mots de passe à votre place, avec une sécurité renforcée en prime. Et cerise sur le gâteau, la plupart sont gratuits.

Les gestionnaires de mots de passe s’accompagnent d’une pléiade de fonctionnalités. Non seulement ils conservent tous vos mots de passe au même endroit, mais ils garantissent également un accès facile et des niveaux de sécurité plus élevés. Il vous suffit de vous souvenir de votre mot de passe principal (ou mot de passe maître) pour accéder à la base de données.

Les extras intéressants comprennent la synchronisation pour tous vos dispositifs et des mots de passe uniques pour le cryptage, ainsi que des sauvegardes locales, une protection anti-phishing et même une authentification à deux facteurs.

Si un stockage plus efficace et plus sûr de vos mots de passe vous intéresse mais que vous ne savez pas quel logiciel utiliser, nous vous invitons à jeter un œil aux meilleurs gestionnaires de mots de passe du marché.

Penser aux mesures de sécurité avancées actuellement en place (le cas échéant).

Si vos comptes ou gestionnaires de mots de passe sont protégés par des clés de cryptage ou une authentification à deux facteurs, les mandataires que vous choisirez risquent d’être dans l’impossibilité d’y accéder sans instructions.

Pour éviter ce type de situation, recherchez les mesures de sécurité actuellement activées. Notez-les et expliquez clairement la marche à suivre pour y accéder.

En cas de cryptage, vous devrez fournir des clés d’accès. Les entreprises de services sur le cloud (et autres fournisseurs de stockage crypté) ne seront généralement pas en mesure d’aider vos amis ou proches si vous ne leur avez pas communiqué les clés d’accès, car vous êtes le seul à les connaître. Cela risque d’entraîner la perte définitive de vos données cryptées.

En ce qui concerne l’authentification à deux facteurs, envisagez d’utiliser des clés de sécurité USB au lieu des traditionnelles notifications par SMS. C’est une option relativement récente, mais qui s’avère déjà bien plus sécurisée que les textos.

Google et Twitter ont déjà ajouté la prise en charge des clés USB dans leur authentification à deux facteurs, et d’autres plates-formes suivront certainement.

Si vous utilisez des clés de cryptage ou authentificateurs USB, vos données confidentielles sont bien plus sécurisées. Toutefois, vous devez prendre vos responsabilités concernant leur stockage.

En effet, les mandataires choisis accèderont bien plus facilement à vos actifs numériques s’ils ont ces clés à portée de main à votre mort. Malheureusement, si elles sont trop bien cachées, l’accès à ces mesures de sécurité risque d’être impossible. Nous vous conseillons donc de garder cela à l’esprit.

Il va sans dire que vos clés de sécurité doivent être conservées dans un endroit sûr, de préférence avec tous les autres documents relatifs à votre mort numérique.

Envisager une aide professionnelle.

Si vous vous sentez dépassé par toutes ces informations ou que vous avez du mal à vous organiser, vous pouvez toujours faire appel à des experts, par exemple un avocat ou un service Web, voire les deux.

C’est une chose de consulter un avocat concernant la documentation et la stratégie à adopter, et c’en est une autre de lui transmettre des informations extrêmement confidentielles. Par conséquent, nous vous conseillons vivement de bien vous renseigner avant de faire appel à une aide externe !

En effet, les faux « avocats » ou services suspects profitant des personnes vulnérables qui n’ont pas conscience de leur sécurité numérique foisonnent. C’est une autre raison pour laquelle il est important de vous renseigner sur les droits de vos actifs numériques. Plus vous êtes préparé, moins vous risquerez de vous faire avoir.

3. Communiquer

Vous avez identifié vos biens numériques, dressé une liste et abordé toutes les questions importantes relatives à la sécurité et aux autorisations ? Il est maintenant temps de réfléchir aux instructions.

La communication est une partie cruciale de la préparation de votre mort numérique. À ce stade, vous êtes probablement très bien renseigné sur le sujet et vous en comprenez parfaitement les tenants et les aboutissants.

Toutefois, ne présumez pas qu’il en est de même pour les personnes que vous avez choisies comme légataires et exécuteurs. En effet, elles ne sont peut-être pas au même niveau que vous, en particulier si la technologie n’est pas l’un de leurs points forts.

Vous devrez donc créer un guide pour bien préparer vos amis et proches de confiance.

Ainsi, vous aiderez vos êtres chers lorsqu’ils en auront le plus besoin en leur indiquant clairement les étapes à suivre et en regroupant les informations importantes en un seul endroit. Cela leur évitera du stress supplémentaire et une logistique dont ils pourraient bien se passer. Vous leur rendez service en les aidant à préserver votre mémoire.

Le guide devra être facile à suivre, avec des explications simples. Pas besoin de langage technique complexe. Les étapes devront être claires, et les informations nécessaires facilement disponibles. Dans le cas contraire, vous devrez indiquer clairement où les trouver, ainsi que tous les détails supplémentaires requis pour un accès facile.

Si vous confiez les différents aspects de votre identité numérique à des personnes différentes, envisagez de créer des guides personnalisés.

Par exemple, si vous savez que votre conjoint se débrouille bien en informatique, vous pouvez lui fournir des explications un peu plus poussées. Cependant, dans tous les cas, essayez de présenter les informations de manière concise.

Juste au cas où, prévoyez plusieurs exemplaires du/des guide(s). Conservez-les tous au même endroit, de préférence avec d’autres documents relatifs à votre mort numérique.

Petit conseil : évitez de conserver ces documents chez vous. Même si vous avez un coffre-fort et que vous faites preuve de prudence, le risque de cambriolage n’est jamais exclu. Si possible, optez pour un coffre-fort dans une banque ou un service de stockage sécurisé sur le cloud.

4. Faire ses adieux numériques

Vous avez travaillé d’arrache-pied pour organiser vos actifs numériques, mettre à jour votre liste de mots de passe, rédiger votre testament et laisser des instructions à vos êtres chers.

Et nous vous en félicitons ! Vous êtes maintenant prêt pour votre mort numérique. Toutefois, il y a encore une petite chose que vous pouvez faire.

À mesure que le monde évolue vers le numérique, notre réseau d’amis et de connaissances se développe. Et comme dans le monde réel, ces relations peuvent prendre de l’importance. Le deuil numérique d’un être cher est tout aussi triste et douloureux, mais il procure également un certain réconfort aux vivants.

C’est pourquoi, au fil des ans, de nombreuses applis et services ont été créés pour vous permettre de pré-enregistrer un message d’adieu qui sera publié lorsque votre heure sera venue. Certains vous offrent même la possibilité d’envoyer des salutations et vœux pour les occasions spéciales.

Si vous souhaitez dire adieu aux personnes de votre entourage virtuel qui comptent pour vous, l’un de ces sites peut vous aider :

  • SafeBeyond vous permet de créer et programmer des futurs messages pour vos êtres chers et futurs descendants. Vous pouvez envoyer des messages vidéo, audio ou écrits pour des événements importants tels que des anniversaires, etc.
  • GoneNotGone est un autre site permettant d’envoyer des messages à vos amis et proches après votre mort. Vous pouvez également préparer des vœux d’anniversaire, réciter des comptines ou simplement faire part de vos pensées.
  • MiLegacy propose un site Web et une appli qui vous permettent de raconter votre histoire. La fonctionnalité « classeur » conserve les principales réalisations de votre vie. Une alternative sympa si vous souhaitez laisser autre chose que des messages ou vidéos.
  • AfterNote peut enregistrer vos dernières volontés, ce qui peut être utile pour gérer votre patrimoine numérique. Vous pouvez également laisser des messages à vos êtres chers, créer une chronologie de souvenirs mémorables et même associer des mandataires à votre compte afin que vos informations puissent être consultées après votre départ.

Bien sûr, la décision de faire vos « adieux numériques » vous revient. Une chose est sûre : ces messages sont parfois suffisamment puissants pour adoucir un peu le processus de deuil.

Derniers mots

Certes, personne n’aime y penser ou l’évoquer, mais la mort numérique est un sujet sérieux qui mérite plus d’attention. Plus important encore, nous nous devons, à nous-même et à nos proches, de nous préparer au pire, même si nous n’avons aucune intention de quitter ce monde de sitôt.

La planification de la mort numérique est-elle complexe ? Oui. S’agit-il d’un processus long et fastidieux ? Parfois. Cela mérite-t-il d’y investir du temps et des efforts ? Absolument.

Chez vpnMentor, nous espérons sincèrement que ce guide vous aidera à mieux saisir les aspects importants de la mort numérique et à faire vos premiers pas vers la prise en charge de votre « reflet numérique ». Nous vous félicitions pour ce choix responsable et vous souhaitons bonne chance !

Si ce guide vous a paru utile, n’hésitez pas à le partager pour aider d’autres personnes à se familiariser avec la mort numérique et savoir comment s’y préparer.

Images

Is Technology Destroying Our Memory?

Is Technology Destroying Our Memory?

Brain waves
Brain waves

Without looking at your phone, how many numbers do you know by heart? What about your calendar commitments a week from now? Off-loading these bits of information to our devices is convenient, but has it changed our brains, or the way we understand and store memories?

That’s what cognitive scientist Dr. Jason R. Finley, Assistant Professor of Psychology at Fontbonne University, wants to find out. He’s researched whether technology is erasing our memories and wrote about it in his book, Memory and Technology: How We Use Information in the Brain and the World. We spoke to him about how 21st century habits affect our brain and why many researchers have been “asleep at the wheel” when it comes to this subject. Here are edited and condensed excerpts from our conversation.

Dr. Finley, how did you first become interested in human learning and memory?
As a college senior at UCLA I took a class on human learning and memory, and halfway through the course I was amazed to realize that the professor’s name was the same as the author of many of the classic journal articles we were reading: Dr. Robert A. Bjork. From him I learned that memory is all that we are, but memory is not necessarily reality. I also learned the joy of carefully crafting clever research to chip away at the mysteries of the mind.

Is memory and technology a growing field?
We humans have always been the species that extends itself into the environment, making and using tools to augment or event supplant our own abilities. But sadly, mainstream psychology research has long been asleep at the wheel with regard to studying how humans use technology to support everyday cognition. With a handful of early exceptions, hardly any psychologists have done any research on the interplay between technology (external memory, stored outside your brain) and human memory (internal memory, stored inside your brain). In my opinion, this incredibly obvious and important topic has just fallen through the cracks between adjacent fields of research, including psychology, human factors, philosophy of mind, anthropology, library and information science, personal information management and so on.

Dr. Jason R. Finley, Assistant Professor of Psychology at Fontbonne University
Dr. Jason R. Finley, Assistant Professor of Psychology at Fontbonne University

(Dr. Jason R. Finley)

Tell us about your own study. How does technology affect our memory?
When Dr. Farah Naaz and I were post-doctoral researchers at Washington University in St. Louis, a powerhouse of memory research, we ran a large online survey, using Google Forms and recruiting 476 participants from Mechanical Turk, asking people about how they use technology for memory purposes.

Over the course of your career you’ve received funding from Microsoft Research and NEH, but this study was crowdfunded, right?
Yes, that’s because our idea didn’t fit in the funded research plans of the professors we worked for, so we had to get creative, via crowdfunding on Experiment.com and with the help of the SciFund Challenge.

What did you find out in the course of your research?
We found a growing symbiosis between internal and external memory. Some people are concerned about relying on external memory too much, or losing internal memory abilities. Many others see it as an enhancement, allowing them to strategically distribute their memory efforts between their brains and their environments, and enabling them to do more both intellectually and socially.

Explain the difference between external and internal memory.
To put it broadly, external memory is augmenting internal memory for episodic purposes (i.e. specific episodes: first kiss, what you ate for lunch yesterday), and supplanting internal memory for semantic (i.e. passwords, trivia) and prospective (i.e. remembering to do something in the future – prompts, alarms, calendar entries) purposes.

Did your participants report any shifting patterns of behavior in these memory types?
One thing we did find in our survey was people reporting that external memory allowed them to devote less time and energy to remembering some things (e.g., appointments, phone numbers). Some said that they’ve been able to use their brains for more creative and big-picture purposes, which is something we’re still better at than machines. In that way I think we are using our brains more appropriately. There is more knowledge available to us now than ever before in human history, so it makes sense that we would be learning how to use our brains in ways that are different from how, say, Socrates did.

That’s interesting. So, when people bemoan tech is ruining our memories, that’s not exactly true.
What we can say is that technology is making memory different. We are offloading semantic and prospective information onto external memory, and we are using external memory to augment episodic internal memory.

So creating more space in our brains?
The human brain doesn’t fill up and run out of space like a hard drive; the capacity of human long-term memory is essentially unlimited. Rather, counterintuitively, the more knowledge you gain, the better your ability to learn even more, and that information is distributed as patterns across a vast network of neurons all over the cerebral cortex.

Is there evidence to suggest we now think in ‘keywords’?
That’s a very interesting question. No research has been done yet that I know of, but it does seem plausible, to the extent that we’re shaping our thoughts to be compatible with how our external memories are organized. Sometimes knowing the right keyword to use in a computer search makes all the difference. But this is also why I encourage students to use multiple synonyms when saving files for easier retrieval later.

Technology gives us the ability to store memories for future generations. Can you speak about this?
Yes. I just taught a new class I made called “Memory and the Human Experience” and this is an issue we covered. Digital legacy is a new and growing issue for humanity. When your body dies, all of the memories in your brain die too. But what happens to all of your external memories (diaries, essays, photos, emails, texts, social media posts, browser history, game saves, etc.)? This is worth thinking through ahead of time. To many of us, our memories may be more valuable than our material possessions. And there’s also the perspective of collective memory. So much information about our everyday existences is being recorded now, and that could be passed into the future for posterity. Think of the value to future anthropologists to have insights into the thoughts and feelings of people that lived in the 21st century.

How do you think memory retention and learning will change as we transition from handheld devices to wearables and then to intangibles, like AR and insideables?
Wearables make external memory capture more passive, so there’s less of a trade-off between capturing versus experiencing the moment. That is a good thing. There has been research showing that people, unsurprisingly, put less effort into memorizing material for a test when they expect to have an external record of the material when needed. But a broader open question is whether our very ability to internally memorize new information will atrophy with disuse in the long term. As the technology of external memory becomes more closely integrated with our bodies and especially our nervous system, it will be easier to rely on it instead of our biological memory. As you pointed out in another article, we’re all cyborgs already.

Most kind, thanks for the plug. In your book, you quote Proust: ‘The greater part of our memory exists outside us.’
Proust explored the subjective experience of memory, and how it connects us to who we used to be, in beautifully expressive ways that complement what science can tell us. In that quote, Proust was referring to the power of environmental cues to unlock troves of memory in our own brains. Such reminding is indeed one way that external memory interacts with internal memory. But I co-opted Proust’s words to imply a greater meaning: not just that cues to memory exist outside us, but that memories themselves can exist outside us too.

As corporations shrink, institutional memory becomes lost. I interviewed the team at 8i, who are building holograms for international training programs to ‘store’ what’s known even when the people recorded are gone.
Wow, that sounds like an exciting idea. If we can clearly delineate all of an outgoing team member’s institutionally relevant knowledge, and offload that onto some kind of external memory, that would be great. A challenge is that so much institutional knowledge is implicit, and it’s hard to know what we know that other people don’t.

With the rise in AI assistants, are we not just offloading cognition onto the environment, but also training amanuensis who can help us remember (what we will not) as we age?
As we develop AI that has some agency and can to some extent understand what the human user does and doesn’t know, or is likely to forget, then yes, that would be an instance of external memory that could act as a transactive partner. I think there could very well be potential for an AI to help a person with declining memory ability, especially if the AI has been with that person for a long time. However, the history of AI has shown that it’s really hard to make them for anything but the most specific purposes. I’m not saying it’s impossible, just that it always seems to take much longer than we think.

Good point. Finally, what’s next for you?
I’ll be speaking at the conference of the Society for Applied Research in Memory and Cognition in Cape Cod, scheduled for June 6-9 about my work to date.

What happens to our online identities when we die?

What happens to our online identities when we die?

What happens to our online identities when we die?

Click here to view original web page at What happens to our online identities when we die?

Hayley Atwell in the Black Mirror episode Be Right Back.

Esther Earl never meant to tweet after she died. On 25 August 2010, the 16-year-old internet vlogger died after a four-year battle with thyroid cancer. In her early teens, Esther had gained a loyal following online, where she posted about her love of Harry Potter, and her illness. Then, on 18 February 2011 – six months after her death – Esther posted a message on her Twitter account, @crazycrayon.

“It’s currently Friday, January 14 of the year 2010. just wanted to say: I seriously hope that I’m alive when this posts,” she wrote, adding an emoji of a smiling face in sunglasses. Her mother, Lori Earl from Massachusetts, tells me Esther’s online friends were “freaked out” by the tweet.

“I’d say they found her tweet jarring because it was unexpected,” she says. Earl doesn’t know which service her daughter used to schedule the tweet a year in advance, but believes it was intended for herself, not for loved ones after her death. “She hoped she would receive her own messages … [it showed] her hopes and longings to still be living, to hold on to life.”

Although Esther did not intend her tweet to be a posthumous message for her family, a host of services now encourage people to plan their online afterlives. Want to post on social media and communicate with your friends after death? There are lots of apps for that! Replika and Eternime are artificially intelligent chatbots that can imitate your speech for loved ones after you die; GoneNotGone enables you to send emails from the grave; and DeadSocial’s “goodbye tool” allows you to “tell your friends and family that you have died”. In season two, episode one of Black Mirror, a young woman recreates her dead boyfriend as an artificial intelligence – what was once the subject of a dystopian 44-minute fantasy is nearing reality.

Esther Earl at home in 2010 … before she died, she arranged for emails to be sent to her imagined future self.
Esther Earl at home in 2010 … before she died, she arranged for emails to be sent to her imagined future self. Photograph: Boston Globe via Getty Images

But although Charlie Brooker portrayed the digital afterlife as something twisted, in reality online legacies can be comforting for the bereaved. Esther Earl used a service called FutureMe to send emails to herself, stating that her parents should read them if she died. Three months after Esther’s death, her mother received one of these emails. “They were seismically powerful,” she says. “That letter made us weep, but also brought us great comfort – I think because of its intentionality, the fact that she was thinking about her future, the clarity with which she accepted who she was and who she hoped to become.”

Because of the power of Esther’s messages, Earl knows that if she were dying, she would also schedule emails for her husband and children. “I think I would be very clear about how many messages I had written and when to expect them,” she adds, noting they could cause anxiety for relatives and friends otherwise.

Yet while the terminally ill ponder their digital legacies, the majority of us do not. In November 2018, a YouGov survey found that only 7% of people want their social media accounts to remain online after they die, yet it is estimated that by 2100, there could be 4.9bn dead users on Facebook alone. Planning your digital death is not really about scheduling status updates for loved ones or building an AI avatar. In practice, it is a series of unglamorous decisions about deleting your Facebook, Twitter and Netflix accounts; protecting your email against hackers; bestowing your music library to your friends; allowing your family to download photos from your cloud; and ensuring that your online secrets remain hidden in their digital alcoves.

In Be Right Back, a young woman recreates her dead boyfriend as an artificial intelligence.
In Be Right Back, a young woman recreates her dead boyfriend as an artificial intelligence. Photograph: Channel 4

“We should think really carefully about anything we’re entrusting or storing on any digital platform,” says Dr Elaine Kasket, a psychologist and author of All the Ghosts in the Machine: Illusions of Immortality in the Digital Age. “If our digital stuff were like our material stuff, we would all look like extreme hoarders.” Kasket says it is naive to assume that our online lives die with us. In practice, your hoard of digital data can cause endless complications for loved ones, particularly when they don’t have access to your passwords.

“I cursed my father every step of the way,” says Richard, a 34-year-old engineer from Ontario who was made executor of his father’s estate four years ago. Although Richard’s father left him a list of passwords, not one remained valid by the time of his death. Richard couldn’t access his father’s online government accounts, his email (to inform his contacts about the funeral), or even log on to his computer. For privacy reasons, Microsoft refused to help Richard access his father’s computer. “Because of that experience I will never call Microsoft again,” he says.

Our devices capture so much stuff, we don’t think about the consequences for when we’re not here

Compare this with the experience of Jan-Ole Lincke, a 24-year-old pharmaceutical worker from Hamburg whose father left up-to-date passwords behind on a sheet of paper when he died two years ago. “Getting access was thankfully very easy,” says Lincke, who was able to download pictures from his father’s Google profile, shut down his email to prevent hacking, and delete credit card details from his Amazon account. “It definitely made me think about my own [digital legacy],” says Lincke, who has now written his passwords down.

Yet despite growing awareness about the data we leave behind, very few of us are doing anything about it. In 2013, a Brighton-based company called Cirrus Legacy made headlines after it began allowing people to securely leave behind passwords for a nominated loved one. Yet the Cirrus website is now defunct, and the Guardian was unable to reach its founder for comment. Clarkson Wright & Jakes Solicitors, a Kent-based law firm that offered the Cirrus service to its clients, says the option was never popular.

“We’ve been aware for quite a period now that the big issue for the next generation is digital footprints,” says Jeremy Wilson, head of the wills and estates team at CWJ. “Cirrus made sense and ticked a lot of boxes but, to be honest, not one client has taken us up on it.”

Wilson also notes that people don’t know about the laws surrounding digital assets such as the music, movies and games they have downloaded. While many of us assume we own our iTunes library or collection of PlayStation games, in fact, most digital downloads are only licensed to us, and this licence ends when we die.

What we want to do and what the law allows us to do with our digital legacy can therefore be very different things. Yet at present it is not the law that dominates our decisions about digital death. “Regulation is always really slow to keep up with technology,” says Kasket. “That means that platforms and corporations like Facebook end up writing the rules.”

Andrew Scott stars in the new Black Mirror episode Smithereens, which explores our digital dependency.
Andrew Scott stars in the new Black Mirror episode Smithereens, which explores our digital dependency. Photograph: Netflix / Black Mirror

In 2012, a 15-year-old German girl died after being hit by a subway train in Berlin. Although the girl had given her parents her online passwords, they were unable to access her Facebook account because it had been “memorialised” by the social network. Since October 2009, Facebook has allowed profiles to be transformed into “memorial pages” that exist in perpetuity. No one can then log into the account or update it, and it remains frozen as a place for loved ones to share their grief.

The girl’s parents sued Facebook for access to her account – they hoped to use it to determine whether her death was suicide. They originally lost the case, although a German court later granted the parents permission to get into her account, six years after her death.

“I find it concerning that any big tech company that hasn’t really shown itself to be the most honest, transparent or ethical organisation is writing the rulebook for how we should grieve, and making moral judgments about who should or shouldn’t have access to sensitive personal data,” says Kasket. The author is concerned with how Facebook uses the data of the dead for profit, arguing that living users keep their Facebook accounts because they don’t want to be “locked out of the cemetery” and lose access to relatives’ memorialised pages. As a psychologist, she is also concerned that Facebook is dictating our grief.

“Facebook created memorial profiles to prevent what they called ‘pain points’, like getting birthday reminders for a deceased person,” she says. “But one of the mothers I spoke to for my book was upset when her daughter’s profile was memorialised and she stopped getting these reminders. She was like, ‘This is my daughter, I gave birth to her, it’s still her birthday’.”

While Facebook users now have the option to appoint a “legacy contact” who can manage or delete their profile after death, Kasket is concerned that there are very few personalisation options when it comes to things like birthday reminders, or whether strangers can post on your wall. “The individuality and the idiosyncrasy of grief will flummox Facebook every time in its attempts to find a one-size-fits-all solution,” she says.

Pain points … should we allow loved ones to curate our legacy, or create ‘memorial pages’?
Pain points … should we allow loved ones to curate our legacy, or create ‘memorial pages’? Photograph: Yui Mok/PA

Matthew Helm, a 27-year-old technical analyst from Minnesota, says his mother’s Facebook profile compounded his grief after she died four years ago. “The first year was the most difficult,” says Helm, who felt some relatives posted about their grief on his mother’s wall in order to get attention. “In the beginning I definitely wished I could just wipe it all.” Helm hoped to delete the profile but was unable to access his mother’s account. He did not ask the tech giant to delete the profile because he didn’t want to give it his mother’s death certificate.

Conversely, Stephanie Nimmo, a 50-year-old writer from Wimbledon, embraced the chance to become her husband’s legacy contact after he died of bowel cancer in December 2015. “My husband and I shared a lot of information on Facebook. It almost became a bit of an online diary,” she says. “I didn’t want to lose that.” She is pleased people continue to post on her husband’s wall, and enjoys tagging him in posts about their children’s achievements. “I’m not being maudlin or creating a shrine, just acknowledging that their dad lived and he played a role in their lives,” she explains.

Nimmo is now passionate about encouraging people to plan their digital legacies. Her husband also left her passwords for his Reddit, Twitter, Google and online banking accounts. He also deleted Facebook messages he didn’t want his wife to see. “Even in a marriage there are certain things you wouldn’t want your other half to see because it’s private,” says Nimmo. “It worries me a little that if something happened to me, there are things I wouldn’t want my kids to see.”

When it comes to the choice between allowing relatives access to your accounts or letting a social media corporation use your data indefinitely after your death, privacy is a fundamental issue. Although the former makes us sweat, the latter is arguably more dystopian. Dr Edina Harbinja is a law lecturer at Aston University, who argues that we should all legally be entitled to postmortem privacy.

If we don’t start making decisions about our digital deaths, then someone else will be making them for us

“The deceased should have the right to control what happens to their personal data and online identities when they die,” she says, explaining that the Data Protection Act 2018 defines “personal data” as relating only to living people. Harbinja says this is problematic because rules such as the EU’s General Data Protection Regulation don’t apply to the dead, and because there are no provisions that allow us to pass on our online data in wills. “There can be many issues because we don’t know what would happen if someone is a legacy contact on Facebook, but the next of kin want access.” For example, if you decide you want your friend to delete your Facebook pictures after you die, your husband could legally challenge this. “There could be potential court cases.”

Kasket says people “don’t realise how much preparation they need to do in order to make plans that are actually able to be carried out”. It is clear that if we don’t start making decisions about our digital deaths, then someone else will be making them for us. “What one person craves is what another person is horrified about,” says Kasket.

How close are we to a Black Mirror-style digital afterlife?

Read more

Esther Earl continued to tweet for another year after her death. Automated posts from the music website Last.fm updated her followers about the music she enjoyed. There is no way to predict the problems we will leave online when we die; Lori Earl would never have thought of revoking Last.fm’s permissions to post on her daughter’s page before she died. “We would have turned off the posts if we had been able to,” she says.

Kasket says “the fundamental message” is to think about how much you store digitally. “Our devices, without us even having to try, capture so much stuff,” she says. “We don’t think about the consequences for when we’re not here any more.”

• Black Mirror season 5 launches on Netflix on 5 June.

Images

Data protection and privacy in France

Data protection and privacy in France

Data protection and privacy in France

Click here to view original web page at Data protection and privacy in France

Law and the regulatory authority

Legislative framework

Summarise the legislative framework for the protection of personally identifiable information (PII). Does your jurisdiction have a dedicated data protection law? Is the data protection law in your jurisdiction based on any international instruments on privacy or data protection?

The legislative framework for the protection of PII in France is one of the oldest in Europe as it is based on the Law on Computer Technology and Freedom dated 6 January 1978 (Loi Informatique et Liberté, or LIL). This law has been amended several times since then, and especially by:

  • Law No. 2004-801 dated 6 August 2004 to implement the provisions of Directive 95/46/CE;
  • Law No. 2016-1321 dated 7 October 2016, which anticipates the implementation of certain provisions of the EU General Data Protection Regulation 2016/679 (GDPR);
  • Law No. 2018-493 of 20 June 2018 , which implements the GDPR in France and further amend the LIL;
  • Ordinance No. 2018-1125 of 12 December 2018 and Decree No. 2019-536 of 29 May 2019, which complete at the legislative level the compliance of the national law with the GDPR and redraft the LIL for a better readability and urderstanding of the law.

As a regulation, the GDPR has been directly effective in France since 25 May 2018.

Furthermore, the following international instruments on privacy and data protection also apply in France:

  • the Council of Europe Convention 108 on the Protection of Privacy and Trans-Border Flows of Personal Data;
  • the European Convention on Human Rights and Fundamental Freedoms (article 8 on the right to respect for private and family life); and
  • the Charter for Fundamental Rights of the European Union (article 7 on the right to respect for private and family life and article 8 on the right to the protection of personal data).

Data protection authority

Which authority is responsible for overseeing the data protection law? Describe the investigative powers of the authority.

The data protection authority in France is the National Commission for Data Protection and Liberties (CNIL). The CNIL is an independent public body entrusted with the following powers.

Powers of sanction

The maximum threshold of penalties that the CNIL can pronounce has been increased from €150,000 to €20 million or 4 per cent of world turnover for companies since the GDPR.

The CNIL can now compel sanctioned entities to inform each data subject individually of this sanction at their own expense.

It may also impose financial penalties without prior formal notification by the bodies where the failure to fulfil obligations cannot be brought into conformity.

It can also limit temporarily or definitively a specific processing.

Control and investigation powers

The CNIL is vested with investigation and control powers that allow its staff to have access to all professional premises and to request, on the spot, all necessary documents and to take a copy of any useful information. CNIL staff can also access any computer programs linked to the processing of PII and to recorded information. The CNIL can also conduct a documentary control where a letter accompanied by a questionnaire is sent to a PII controller and/or processor to assess the conformity of processing operations carried out by them or an online investigation, in particular by consulting data that are freely accessible or made directly accessible online, including under a fake identity.

In 2019, the CNIL will focus its supervisory action on three main themes, directly resulting from the entry into force of the GDPR:

  • respect of the rights of the data subjects;
  • the processing of minors’ data; and
  • the sharing of responsibilities between controllers and processors.

Regulatory powers

The powers of the CNIL have recently been extended, as it will have to be consulted for every bill or decree related to data protection and processing. Opinions will automatically be published.

The CNIL is also entrusted with the power to certify, approve and publish standards or general methodologies to certify the compliance of personal data anonymisation processes with the GDPR, notably for the reuse of public information available online.

Legal obligations of data protection authority

Are there legal obligations on the data protection authority to cooperate with data protection authorities, or is there a mechanism to resolve different approaches?

If the owner or processor of PII carries out cross-border processing either through multiple establishments in the EU or with only a single establishment, the supervisory authority for the main or single establishment acts as lead authority in respect of that cross-border processing.

As lead authority, the CNIL must cooperate with the data protection authorities in other member states where the owner or the processor is established, or where data subjects are substantially affected, or authorities to whom a complaint has been made. Specifically, the CNIL has to provide information to other data protection authorities and can seek mutual assistance from them and conduct joint investigations with them on their territories.

More generally, the CNIL is required to provide assistance to other data protection authorities in the form of information or carrying out ‘prior authorisations and consultations, inspections and investigations’. The European Commission can specify forms and procedures for mutual assistance. The CNIL could also participate in joint investigation and enforcement operations with other data protection authorities, particularly when a controller has an establishment on its territory or a significant number of its data subjects are likely to be substantially affected.

Breaches of data protection

Can breaches of data protection law lead to administrative sanctions or orders, or criminal penalties? How would such breaches be handled?

Failure to comply with data protection laws can result in complaints, data authority investigations and audits, administrative fines, penalties or sanctions, seizure of equipment or data, civil actions (including class actions that have been introduced by Law No. 2016-1547 dated 18 November 2016 for the Modernisation of the 21st Century Justice), criminal proceedings and private rights of action.

Proceedings

When the CNIL finds a PII owner to be in breach of its obligations under the LIL, as a preliminary step the CNIL chairman may issue a formal notice for the PII owner to remedy the breach within a limited period of time. In cases of extreme urgency, this period may be reduced to 24 hours.

When the breach cannot be remedied in the context of a formal notice, the CNIL may impose one of the following sanctions without prior formal notice of adversarial procedure:

  • a formal warning notification;
  • a financial penalty; or
  • the withdrawal of the authorisation to operate the data processing.

When the PII owner complies with the terms of the formal notice, the CNIL chairman shall declare the proceedings closed. Otherwise, the competent committee of CNIL may, after a contradictory procedure, pronounce one of the following penalties:

  • a warning notification;
  • a financial penalty, except when the PII owner is a public authority;
  • an injunction to cease treatment; or
  • the withdrawal of the authorisation granted by the CNIL for the data processing concerned.

In case of emergency and infringement to civil rights and freedoms, the CNIL may, after an adversarial procedure, take the following measures:

  • the suspension of the operation of data processing;
  • a formal warning;
  • the lockdown of PII for a maximum of three months (except for certain processing carried out on behalf of the French Administration); or
  • for certain sensitive files of the French Administration, the Prime Minister is given information in order for him to take the necessary measures to remedy the breaches.

In the event of a serious and immediate violation of rights and freedoms, the chairman of the CNIL may request, by summary application, the competent judge to order any necessary security measures.

The CNIL may also inform the public prosecutor that it has found infringements of data protection law that are criminally sanctionable.

Publicity of the penalties

The CNIL can make public the financial penalties that it pronounces. The inclusion of these sanctions in publications or newspapers is no longer subject to the condition of bad faith of the entity concerned.

Criminal sanctions

Infringements to data protection law may be punished by imprisonment for a maximum period of five years and a criminal fine up to €300,000 (articles 226-16 to 226-22-1 of the Criminal Code). However, criminal sanctions are hardly ever pronounced.

Scope

Exempt sectors and institutions

Does the data protection law cover all sectors and types of organisation or are some areas of activity outside its scope?

The LIL is generally applicable to all public bodies and all non-public entities that process PII and intends to cover all sectors. However, certain processing carried out by public authorities is subject to specific obligations that differ from the general obligations imposed upon private entities, for example:

  • processing of PII by public bodies for reasons of national security is subject to a specific regime supervised by the executive power; and
  • processing of PII managed by judicial authorities related to offences, convictions and security measures is subject to a specific regime supervised by the executive power.

The following categories of data processing fall outside the scope of the LIL:

  • processing of PII solely for journalistic or artistic purposes; and
  • processing of PII by a natural person in the course of a purely personal or household activity.

Communications, marketing and surveillance laws

Does the data protection law cover interception of communications, electronic marketing or monitoring and surveillance of individuals? If not, list other relevant laws in this regard.

The LIL does not cover the interception of communications nor surveillance of individuals when implemented for public interest purposes.

This is subject to the authority of a dedicated public authority, the National Commission for Monitoring Intelligence Techniques. This field is regulated by several laws, mainly Law No. 91-646 of 10 July 1991 and Law No. 2015-912 of 24 July 2015.

Electronic marketing is subject to the Postal and Electronic Communication Code (article L. 34-5 et seq) and to the Consumer Code (article L. 121-20-5 et seq).

Other laws

Identify any further laws or regulations that provide specific data protection rules for related areas.

Processing of health PII is subject to the provisions of the Public Health Code as well as to the LIL.

The solicitation by automatic calling machines, email or fax, and the sale or transfer of PII for prospecting purposes using these, is subject to the provisions of the Postal and Electronic Communications Code.

PII formats

What forms of PII are covered by the law?

The LIL is aimed at covering all forms of PII, which means any information relating to an individual who is identified or who could be directly or indirectly identified, by reference to an identification number or to the combination of one or several elements.

In addition, the LIL applies to automatic processing and to non-automatic processing of PII that forms part of a filing system (or is intended to form part of a filing system), with the exception of processing carried out for personal purposes. Accordingly, even records of PII in paper form may be subject to the LIL.

Extraterritoriality

Is the reach of the law limited to PII owners and processors of PII established or operating in the jurisdiction?

The LIL applies to processing of PII carried out by a PII owner:

  • who is established in France, whether or not the processing takes place in France. In this context, ‘establishment’ is broadly interpreted as it refers to all sorts of ‘installation’, regardless of its legal form; or
  • who is not established in France, but who uses a means of processing located in French territory, for instance, hosting data, internet service provider, cloud services, among others.

Covered uses of PII

Is all processing or use of PII covered? Is a distinction made between those who control or own PII and those who provide PII processing services to owners? Do owners’, controllers’ and processors’ duties differ?

In principle, the LIL applies to all processing of PII, with the exception of that carried out for purely personal purposes. The controller determines the purposes for which and the means by which PII is processed, whereas the processor processes PII only on behalf of the controller. The duties of the processor towards the controller must be specified in a contract or another legal act.

In principle, the PII controller is the principal party for responsibilities such as collecting consent, enabling the right to access or managing consent-revoking. However, the GDPR introduces direct obligations for PII processors (including security, international transfers, record keeping, etc) and thus they can be held directly liable by data protection authorities for breaches of the GDPR and the LIL.

Controllers and processors are also jointly and severally liable where they are both responsible for damage caused by a breach.

Legitimate processing of PII

Legitimate processing – grounds

Does the law require that the holding of PII be legitimised on specific grounds, for example to meet the owner’s legal obligations or if the individual has provided consent?

Every collection, processing or use of PII needs to be justified under French data protection law. In principle, the ground for legitimate processing must be the consent of the data subject, but the LIL introduced statutory legal exemptions to obtain the consent of the data subject for some processing when it is carried out for the following purposes:

  • the respect of a legal obligation of the data controller;
  • the protection of the data subject’s life (interpreted restrictively);
  • the performance of a public service mission entrusted to the data controller or the data recipient;
  • the performance of either a contract to which the data subject is a party or steps taken at the request of the data subject prior to entering a contract; or
  • the pursuit of the data controller’s or the data recipient’s legitimate interest provided such interest is not incompatible with the fundamental rights and interests of the data subject.

Legitimate processing – types of PII

Does the law impose more stringent rules for specific types of PII?

French law is more restrictive for the processing of specific types of PII, known as sensitive personal data. As a matter of principle, processing of sensitive data is prohibited.

The LIL provides a non-exhaustive list of sensitive PII by nature, which is PII that reveals, directly or indirectly, the racial and ethnic origins, the political, philosophical, religious opinions or trade union affiliation of individuals, or that concerns their health or sexual life. This category of sensitive data by nature can only be processed in the following cases, among others:

  • the data subject gave prior express consent;
  • the processing is necessary to protect the vital interests of the data subject or of another person, where the data subject is physically or legally incapable of giving his or her consent;
  • the processing is carried out by a foundation, association or any other non-profit organisation with political, philosophical, religious or trade union objectives, in the course of its legitimate activities;
  • the processing relates to PII that has been made public by the data subject; or
  • the processing is necessary for the establishment, exercise or defence of legal claims.

In relation to the use of PII in the employment context, the CNIL published several opinions on monitoring the activities of employees, video surveillance, discrimination, localisation data and collection of PII in the recruitment process. Moreover, in France, employers cannot rely on consent for processing involving PII of its employees, since the employees cannot freely consent as they are by nature subordinated to the employer.

Moreover, processing can be prohibited due to its context, such as the processing of PII relating to offences, convictions and security measures, which can only be carried out by a limited number of specific entities.

Furthermore, according to the law on the protection of personal data, a minor may consent to the processing of personal data alone with regard to the offer of information society services from the age of 15, which differs from the threshold of 16 years provided in the GDPR.

The law on the protection of personal data establishes a principle of prohibition of decisions producing legal effects on the sole basis of automated processing, including profiling intended to define the profile of the person concerned or to evaluate certain aspects of his or her personality. Such a provision maintains a certain gap with the GDPR, since the law is based on a prohibition in principle of such automated processing while the GDPR refers to an ‘individual right’ of the person concerned ‘not to be the subject of a decision based solely on automated processing, including profiling’.

Data handling responsibilities of owners of PII

Notification

Does the law require owners of PII to notify individuals whose PII they hold? What must the notice contain and when must it be provided?

As a general rule, data subjects shall be provided with the following information when their PII is collected:

  • the identity of the data controller;
  • contact details for the data protection officer, where applicable;
  • the purposes and the legal basis of the processing;
  • the category of personal data;
  • when PII is collected via a questionnaire, whether replies to the question are compulsory or optional;
  • the consequences of an absence of reply;
  • the categories of recipients of the data;
  • information on the data subject’s rights and the method to be used to exercise them (ie, the right to access the collected PII and to rectify, complete, update, block or delete it if inaccurate, incomplete, equivocal or expired; and the right to direct the use of their PII after their death);
  • the intended transfer of PII outside the EEA;
  • the storage duration or the criteria that will be used to determine the duration;
  • the right to lodge a complaint with a supervisory authority; and
  • the existence of automated decision-making, including profiling and, if applicable, meaningful information about the logic used and the significance and envisaged consequences of such processing for the data subject.

Where the data was not obtained from the data subject, the information must be provided at the time of recording of the personal data or, if disclosure to a third party is planned, no later than at the time the data is disclosed for the first time.

Exemption from notification

When is notice not required?

Notice is not required if the data subject already received such information. Furthermore, in cases where the data subject did not provide his or her PII directly, the data controller is exempted from the notification obligation if:

  • informing the data subject proves impossible or would involve a disproportionate effort, in particular in the context of statistical, historical or scientific research, or for the purpose of medical examination of the population with a view to protecting and promoting public health;
  • the data subject already has the information;
  • the PII is recorded only to comply with statutory and legal obligations; or
  • the PII must remain confidential subject to an obligation of professional secrecy regulated by EU or member state law, including a statutory obligation of secrecy.

Control of use

Must owners of PII offer individuals any degree of choice or control over the use of their information? In which circumstances?

The LIL grants rights to data subjects allowing them to have some control over the use of their PII. The relevant rights in this field are notably the right to rectify inaccurate or out-of-date PII, and the right to be forgotten, in order to obtain the deletion of such PII (see question 38).

Data accuracy

Does the law impose standards in relation to the quality, currency and accuracy of PII?

As a general rule, the PII controller shall ensure that the processed PII is adequate, relevant and not excessive in relation to the purposes for which it is collected and for onward processing. In addition, the PII owner shall also ensure that PII is accurate, complete and, if necessary, updated. In this respect, the law provides that the PII owner shall take appropriate measures to ensure that inaccurate or incomplete data for the purposes for which it is collected or processed is erased or rectified.

Amount and duration of data holding

Does the law restrict the amount of PII that may be held or the length of time it may be held?

PII owners are required to limit the processing of PII to what is strictly necessary for the purpose of the processing. The amount of PII collected and processed must be proportionate to the purposes of the processing.

The LIL also provides that the PII must only be kept in a form enabling the data subject to be identified for a period that does not exceed the time necessary for the purposes for which the PII is collected and processed. Accordingly, if the legitimate ground of the processing has disappeared or expired, the controller should erase, anonymise or pseudonymise the PII.

Finality principle

Are the purposes for which PII can be used by owners restricted? Has the ‘finality principle’ been adopted?

The finality principle is a core principle of data protection regulation in France. PII can only be collected for specified, explicit and legitimate purposes and must not be further processed in a way incompatible with those purposes.

Furthermore, the CNIL already encourages PII controllers to implement the ‘data minimisation’ principle (which is consecrated in the GDPR), as well as the systematic use, where applicable, of anonymisation and pseudonymisation techniques.

Use for new purposes

If the finality principle has been adopted, how far does the law allow for PII to be used for new purposes? Are there exceptions or exclusions from the finality principle?

PII can be processed for new purposes provided that such onward processing is not incompatible with the initial purposes for which the PII was collected and subject to the data subject’s rights and the principle of data minimisation.

Processing of PII for new purposes when such purposes are statistical, historical or medical research is generally considered as compatible with the initial purpose.

Processing of PII for new purposes even incompatible with the initial purpose is also possible with the prior consent of the data subject.

Security

Security obligations

What security obligations are imposed on PII owners and service providers that process PII on their behalf?

Data controllers must protect PII against accidental or unlawful destruction, loss, alteration and disclosure, particularly when processing involves data transmission over networks.

Data controllers are required to take steps to:

  • ensure that PII in their possession and control is protected from unauthorised access and use;
  • implement appropriate physical, technical and organisational security safeguards to protect PII; and
  • ensure that the level of security is appropriate with the amount, nature and sensitivity of the PII.

The CNIL issued guidelines on 23 January 2018 on the security measures to be implemented by data controllers, in line with the requirement of the GDPR, to guarantee the security of personal data processing. These guidelines encourage data controllers to perform a privacy impact assessment, which shall be carried out in consideration of the two following pillars:

  • the principles and fundamental rights identified as ‘not negotiable’, which are set by law and must be respected. They shall not be subject to any modulation, irrespective of the nature, seriousness or likelihood of the risks incurred; and
  • the management of risks on data subjects that allows data controllers to determine which appropriate technical and organisational measures shall be taken to protect the PII.

Notification of data breach

Does the law include (general or sector-specific) obligations to notify the supervisory authority or individuals of data breaches? If breach notification is not required by law, is it recommended by the supervisory authority?

With the GDPR, there is a general obligation for PII controllers to report PII data breaches to the CNIL without undue delay and, where feasible, not later than 72 hours after becoming aware of it. However, an exception to this notification exists when the data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification is not made within 72 hours, reasons will have to be provided to the supervisory authority.

The notification shall at least:

  • describe the nature of the personal data breach, including, where possible, the categories and approximate number of data subjects concerned, and the categories and approximate number of personal data records concerned;
  • communicate the name and contact details of the data protection officer or other contact point where more information can be obtained;
  • describe the likely consequences of the personal data breach; and
  • describe the measures taken or proposed to be taken by the owner to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.

Moreover, when the data breach is likely to result in a high risk to the rights and freedoms of data subjects, the controller shall notify the data breach to the data subject without undue delay. This notification can be waived if the CNIL considers that:

  • the controller has taken subsequent measures that ensure the high risk to the rights and freedoms of data subjects is no longer likely to materialise;
  • appropriate technical and organisational protection was in place at the time of the incident (eg, encrypted data); or
  • the notification would trigger disproportionate efforts (instead a public information campaign or ‘similar measures’ should be relied on so that affected data subjects can be effectively informed).

The PII owner must keep an updated record of all PII breaches, which must contain the list of conditions, effects and measures taken as remedies. This record must be communicated to the CNIL on request.

Failure to meet the above requirements exposes the owners of PII to an administrative fine of up to €10,000,000 or, in case of an undertaking, up to 2 per cent of the total worldwide annual turnover of the preceding financial year, whichever is higher.

Providers of electronic communication services are also subject to an obligation to notify the CNIL within 24 hours in the event of a PII breach. In this respect, when the PII breach may affect PII or the privacy of a data subject, the PII controller shall also notify the concerned data subject without delay.

Internal controls

Data protection officer

Is the appointment of a data protection officer mandatory? What are the data protection officer’s legal responsibilities?

Controllers and processors may decide to appoint a data protection officer (DPO). However, this is mandatory for public sector bodies, those involved in certain listed sensitive processing or monitoring activities or where local law requires an appointment to be made.

The DPO assists the owner or the processor in all issues relating to the protection of the PII. In a nutshell, the DPO must:

  • monitor compliance of the organisation with all regulations regarding data protection, including audits, awareness-raising activities and training of staff involved in processing operations;
  • advise and inform the owner or processor, as well as their employees, of their obligations under data protection regulations;
  • act as a contact point for requests from individuals regarding the processing of their personal data and the exercise of their rights; and
  • cooperate with the data protection authorities (DPAs) and act as a contact point for DPAs on issues relating to processing.

Record keeping

Are owners or processors of PII required to maintain any internal records or establish internal processes or documentation?

PII controllers are required to maintain a record of processing activities under their responsibilities as referred to in article 30 of the GDPR. Processors of PII are also required to maintain such a record about personal data that controllers engage them to process.

While an exemption from the above obligations applies to organisations employing fewer than 250 people, this exemption will not apply where sensitive data is processed and where owners or processors of PII find themselves in the position of:

  • carrying out processing likely to result in a risk (not just a high risk) to the rights of the data subjects;
  • processing personal data on a non-occasional basis; or
  • processing sensitive data or data relating to criminal convictions.

New processing regulations

Are there any obligations in relation to new processing operations?

Since the GDPR is directly effective in France, controllers and processors of PII are required to apply a privacy-by-design approach by implementing technical and organisational measures to show that they have considered and integrated data compliance measures into their data-processing activities. These technical and organisational measures might include the use of pseudonymisation techniques, staff training programmes and specific policies and procedures.

In addition, when processing is likely to result in a high risk to the rights and freedoms of natural persons, owners and controllers are required to carry out a detailed privacy impact assessment (PIA). Where a PIA results in the conclusion that there is indeed a high, and unmitigated, risk for the data subjects, controllers must notify the supervisory authority and obtain its view on the adequacy of the measures proposed by the PIA to reduce the risks of processing.

Controllers and processors may decide to appoint a DPO (see question 22).

Registration and notification

Registration

Are PII owners or processors of PII required to register with the supervisory authority? Are there any exemptions?

PII controllers or processors are not required to register with the CNIL.

Since the entry into force of the GDPR, owners and processors no longer have the obligation to declare the PII processing they carry out to the CNIL.

However, the law on personal data maintains the requirement of a prior authorisation from the CNIL for the following processing:

  • of biometric or genetic data by the state;
  • for research, study or evaluation in the field of health.

Formalities

What are the formalities for registration?

The formalities of registration for data processing requiring prior authorisation must be performed for each new PII processing operation.

The formalities are free of charge and can be realised on the CNIL’s website and are non-renewable since they remain valid for the whole duration of the processing. The following information must be provided:

  • the identity and the address of the data controller;
  • the purposes of the processing and the general description of its functions;
  • if necessary, the combinations, alignments or any other form of relation with other processing;
  • the PII processed, its origin and the categories of data subjects to which the processing relates;
  • the period of retention of the processed information;
  • the department responsible for carrying out the processing;
  • the authorised recipients to whom the data may be disclosed;
  • the function of the person where the right of access is exercised, as well as the measures relating to the exercise of this right;
  • the steps taken to ensure the security of the processing and data, the safeguarding of secrets protected by law and, if necessary, information on recourse to a sub-contractor; and
  • if applicable, any transfer of PII that is envisaged outside of the EEA.

Penalties

What are the penalties for a PII owner or processor of PII for failure to make or maintain an entry on the register?

Failure to comply with the registration obligation can be punished by imprisonment for a maximum period of five years and a criminal fine of up to €300,000 (article 226-16 and 226-16-1 A of the Criminal Code).

Refusal of registration

On what grounds may the supervisory authority refuse to allow an entry on the register?

The CNIL can refuse its registration if some of the information to be provided is missing or if the PII collected for the processing is too broad in relation to its purpose. In such cases, the PII owner cannot carry out the intended data processing. Failure to comply with a refusal of the CNIL to authorise processing is subject to criminal sanctions (see question 27).

Public access

Is the register publicly available? How can it be accessed?

On 30 August 2017, the CNIL published on its website a register that lists the formalities completed since 1979 by data controllers (public and private). This register can be consulted freely, with ease, via the CNIL website.

Effect of registration

Does an entry on the register have any specific legal effect?

The PII controller may only be allowed to start carrying out the processing upon registration and receipt of authorisation from the CNIL.

The registration as such does not exempt a data controller from any of its other obligations. After the registration, data controllers still need to ensure that the processing complies with the information disclosed in the notification and with data protection standards.

Other transparency duties

Are there any other public transparency duties?

Not to our knowledge.

Transfer and disclosure of PII

Transfer of PII

How does the law regulate the transfer of PII to entities that provide outsourced processing services?

Under the LIL regime, any person that processes PII on behalf of the data controller is regarded as a processor. The processor may only process PII under the data controller’s instructions.

When a data controller outsources some of its processing or transfers PII in relation with such processing to a sub-contractor (ie, a data processor), it must establish an agreement with that processor.

This agreement shall specify the obligations incumbent upon the processor as regards the obligation of protection of the security and confidentiality of the data and provide that the processor may act only upon the instruction of the data controller.

Restrictions on disclosure

Describe any specific restrictions on the disclosure of PII to other recipients.

Generally, there are no specific restrictions on the disclosure of PII other than the general data protection principles provided by the LIL.

Nevertheless, disclosure of sensitive PII such as health data is limited to certain institutions and professionals, unless the data controller has obtained a specific and express consent of the data subject for the disclosure of such PII.

Cross-border transfer

Is the transfer of PII outside the jurisdiction restricted?

PII can be transferred freely to other countries within the EEA, as well as to countries recognised by the European Commission as providing an ‘adequate level of data protection’.

Such transfers of PII from France are permitted to Canada (under certain conditions), Switzerland, Argentina, Guernsey, the Isle of Man, Jersey, the Faroe Islands, Andorra, Israel, Uruguay and New Zealand.

Furthermore, transfers of PII from France to recipients established in the US are permitted to the extent that they are registered under the Privacy Shield certification.

Moreover, a controller or processor may transfer PII to other countries, or to recipients in the United States who have not chosen to sign up to the Privacy Shield, only if the controller or processor has provided appropriate safeguards, and on condition that enforceable data subject rights and effective legal remedies for data subjects are available.

The appropriate safeguards may be provided for by:

  • a legally binding and enforceable instrument between public authorities or bodies;
  • binding corporate rules approved by the CNIL;
  • standard data protection clauses – model clauses designed by the European Commission to facilitate transfers of personal data from the EU to all third countries, while providing sufficient safeguards for the protection of individuals’ privacy; or
  • a code of conduct approved by the CNIL, together with binding and enforceable commitments of the controller or processor in the third country to apply the appropriate safeguards, including as regards data subjects’ rights; or
  • a certification mechanism approved by the CNIL together with binding and enforceable commitments of the controller or processor in the third country to apply the appropriate safeguards, including as regards data subjects’ rights.

Subject to the authorisation from the CNIL, the appropriate safeguards may also be provided for, in particular, by:

  • contractual clauses between the controller or processor and the controller, processor or the recipient of the personal data in the third country or international organisation; or
  • provisions to be inserted into administrative arrangements between public authorities or bodies which include enforceable and effective data subject rights.

However, in the absence of an adequacy decision or of appropriate safeguards as descried above, a transfer of personal data to a third country or an international organisation shall take place if:

  • the data subject has explicitly consented to its transfer after having been informed of the possible risks of such transfers due to the absence of an adequacy decision and appropriate safeguards; or
  • the transfer is necessary under one of the following conditions:
    • protection of the data subject’s life;
    • protection of the public interest;
    • to meet obligations ensuring the establishment, exercise or defence of legal claims;
    • consultation of a public register that is intended for public information and is open for public consultation or by any person demonstrating a legitimate interest;
    • performance of a contract between the data controller and the data subject, or of pre-contractual measures taken in response to the data subject’s request; or
    • conclusion or performance of a contract, either concluded or to be concluded in the interest of the data subject between the data controller and a third party.

Data controllers must inform data subjects of the data transfer and provide the following information:

  • the country where the recipient of the data is established;
  • the nature of the data transferred;
  • the purpose of the transfer;
  • categories of the recipients; and
  • the level of protection of the state concerned or adopted alternative measures.

Notification of cross-border transfer

Does cross-border transfer of PII require notification to or authorisation from a supervisory authority?

The cross-border transfer must be approved by the CNIL when it is based on:

  • contractual clauses concluded between the controller or processor and the controller, processor or the recipient of the personal data in the third country or international organisation; or
  • provisions inserted into administrative arrangements between public authorities or public bodies which include enforceable and effective data subject rights.

Further transfer

If transfers outside the jurisdiction are subject to restriction or authorisation, do these apply equally to transfers to service providers and onwards transfers?

Restrictions on cross-border transfers apply to transfers from the PII owner based in France to a data processor outside of the EEA. Onward transfers are in principle subject to the restrictions in force in the recipient’s jurisdiction. By exception, SCCs contain specific requirements for onward transfers.

Rights of individuals

Access

Do individuals have the right to access their personal information held by PII owners? Describe how this right can be exercised as well as any limitations to this right.

Data subjects have a right to ‘access’ the PII that a controller holds about them.

Data subjects can exercise their right of access by sending a signed and dated access request, together with proof of identity. Data subjects can request that the PII owner provides the following information:

  • confirmation as to whether the controller processes the data subject’s PII;
  • information related to the purposes for which the PII is processed, and the recipients or categories of recipients to whom the PII is or has been provided;
  • where applicable, information related to cross-border data transfers;
  • the logic involved in any automated decision making (if any);
  • the communication, in an accessible form, of personal data concerning the data subject as well as any information available as to the origin of the data; and
  • information allowing the data subject to know and to contest the logic underlying the automated processing in the event of a decision taken on the basis of it and producing legal effects with regard to the person concerned.

The controller may oppose manifestly abusive access requests, in particular with respect to their excessive number or repetitive or systematic nature. In the event of a claim from the data subject, the burden of proving the manifestly abusive nature of the requests lies with the PII owner to whom they are addressed.

The right of access may be denied when the personal data is kept in a form that excludes any risk of invasion of the privacy of the data subjects (ie, if PII is pseudonymised or anonymised) and for a period not exceeding what is necessary for the sole purpose of statistical, scientific or historical research.

Other rights

Do individuals have other substantive rights?

In addition to the right of access described above, data subjects are granted the rights described below. When PII has been collected by electronic means, the data subjects must be provided with a way to exercise their rights using electronic means.

Right to object

Data subjects have the right to object to the processing of their PII on legitimate grounds, unless the processing is necessary for compliance with a legal obligation or when the act authorising the processing expressly excludes the data subjects’ right to object.

Data subjects also have the right to object, at no fee and without justification, to the use of PII related to them for the purposes of direct marketing by the PII owner or by an onward data controller.

Right to correct

Upon proof of their identity, data subjects may require the PII owner to correct, supplement, update, lock or erase personal data related to them that is inaccurate, incomplete, equivocal or out of date, or whose collection, use, disclosure or storage is prohibited.

When the concerned PII has been transmitted to a third party, the data controller must carry out the necessary diligence to notify such third party of the modifications operated in accordance with the data subjects’ request.

Right to be forgotten

Data subjects have the right to request the PII controller to erase personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay, in particular where one of the following grounds applies:

  • the PII is no longer necessary in relation to the purposes for which it was collected or otherwise processed;
  • the data subject withdraws consent on which the processing is based, and where there is no other legal ground for the processing;
  • the PII has been unlawfully processed;
  • the PII has to be erased for compliance with a legal obligation in EU or member state law to which the controller is subject; or
  • the PII has been collected in relation to the offer of information society services.

Right to be forgotten for children

Data subjects have the right to request the PII controller to erase without undue delay the personal data that has been collected in the context of the provision of information society services where the data subject was under age at the time of collection. When the PII controller has transmitted the concerned data to another PII owner, the data controller shall take reasonable measures, including technical measures, to inform the onward PII owner of the data subject’s request for the deletion of any link to the data, or any copy or reproduction thereof.

This is unless the data processing is necessary:

  • to exercise the right to freedom of expression and information;
  • to comply with a legal obligation requiring the processing of such data or to carry out a task in the public interest or in the exercise of the public authority entrusted to the controller;
  • to public health;
  • to archival purposes of public interest, for scientific or historical research or for statistical purposes; or
  • to establish or exercise legal rights.

Right of data portability

Data subjects have a right to:

  • receive a copy of their personal data in a structured, commonly used, machine-readable format that supports re-use;
  • transfer their personal data from one controller to another;
  • store their personal data for further personal use on a private device; and
  • have their personal data transmitted directly between controllers without hindrance.

‘Digital death’

Data subjects have the right to set guidelines for the retention, deletion and communication of their personal data after their death.

Compensation

Are individuals entitled to monetary damages or compensation if they are affected by breaches of the law? Is actual damage required or is injury to feelings sufficient?

Individuals may claim for damages when they are affected by a breach of the LIL that qualifies as a criminal offence subject to the referral to criminal jurisdiction.

In this case, compensation may amount to the total amount of damage endured by the individual, which includes moral damages or injury to feelings.

Enforcement

Are these rights exercisable through the judicial system or enforced by the supervisory authority or both?

Where the data controller does not answer or refuses to grant the right to the data subjects’ request, the latter can refer to the CNIL or a judge to obtain interim measures against the data controller.

Exemptions, derogations and restrictions

Further exemptions and restrictions

Does the law include any derogations, exclusions or limitations other than those already described? Describe the relevant provisions.

Not applicable.

Supervision

Judicial review

Can PII owners appeal against orders of the supervisory authority to the courts?

PII owners can appeal against orders or sanctions pronounced by the CNIL in front of the Supreme Court for the administrative order (the Council of State).

Specific data processing

Internet use

Describe any rules on the use of ‘cookies’ or equivalent technology.

Data controllers may install cookies or equivalent devices subject to the data subject’s prior consent. Such consent may derive from the browser or other application settings. The following categories of cookies require the prior consent of the data subject:

  • cookies related to targeted advertising;
  • social networks’ cookies generated in particular by their buttons of sharing when collecting personal data without the consent of the persons concerned; and
  • analytics cookies.

As regards analytics, the CNIL considers that these cookies may be exempted from prior consent subject to the following:

  • information must be given to users who must be able to oppose processing (this opposition must be possible from any terminal);
  • the data collected must not be cross-checked with other processing (client files or statistics of attendance of other sites, for example);
  • the cookies must be used only for the purpose of anonymous statistics and should not allow the tracking of navigation on different sites;
  • raw attendance data associating an identifier must also not be retained for more than 13 months; and
  • the use of an IP address to geolocate the user should not allow the street to be determined: only the first two bytes of the IPv4 addresses can be preserved and possibly used for delocalisation (for IPv6 only the first six bytes can be retained).

Implied consent is now accepted and companies must implement a two-step approach for obtaining consent.

Data controllers must use a banner providing the following information to the website user:

  • purposes of the cookies;
  • the possibility to object to the use of cookies and to modify settings by clicking on a link (made available in the cookie banner). Such link must describe the operations to be carried out by the data subject to disable the cookies;
  • that further navigation on the website constitutes valid consent to the storage of cookies on their device; and
  • an explanation of how disabling cookies might affect the data subject’s use of the website or app.

The CNIL recommends that to ensure that the data subject’s consent is unambiguous, the banner shall not disappear until the individual continues to navigate on the website, for example, by clicking on an element of the website or navigating to another page of the website.

The CNIL considers that the consent given by the data subject is only valid for 13 months. After this period, the consent of data subjects shall be collected again with the same conditions. Accordingly, the cookies’ lifetime shall be limited to 13 months from the date of the first deposit on the user’s device. New visits of the user to the website shall not automatically extend the cookies’ lifespan.

In addition, data subjects shall be provided with an easy way to withdraw their consent to the deposit of cookies at any time.

Electronic communications marketing

Describe any rules on marketing by email, fax or telephone.

Sending unsolicited marketing messages is prohibited without the prior consent of the recipient. Such consent of the data subject cannot derive from:

  • a pre-ticked box; or
  • general acceptance of terms and conditions.

Under the following conditions, the prior consent of the data subject is not required to address unsolicited marketing messages:

  • when the information of the data subject has been collected on the occasion of a purchase in accordance with the applicable data protection rules;
  • the marketing messages concern products or services similar to those purchased by the data subject; and
  • the data subject is provided with an easy way to opt out of receiving marketing messages when the data is collected and with each marketing message.

In a B2B relationship, the prior consent of the recipient is not required provided that:

  • the recipient has been informed that his or her email address would be used to address marketing messages;
  • the recipient has the possibility to oppose the use of his or her email address for the purpose of direct marketing at the time of its collection and with each message; and
  • the marketing messages must be in relation to the recipient’s profession.

Direct marketing by regular mail or telephone is not subject to the prior consent of the recipient, but the recipient has the possibility to object to it by signing up to an opt-out list. In France, this list is called Bloctel, which is the governmental opt-out list for telephone marketing.

Cloud services

Describe any rules or regulator guidance on the use of cloud computing services.

There is no specific provision applicable to cloud computing in the LIL or the GDPR. The CNIL issued guidelines addressed to companies contemplating subscription to cloud computing services dated 25 June 2012. These guidelines contain seven recommendations by the CNIL that should be taken into account by data controllers when assessing the opportunity to migrate to cloud services, as well as a template clause to be inserted into agreements with cloud computing services providers.

The recommendations are to:

  • establish a precise mapping of the data and processing that will be migrating to the cloud and the related risks;
  • define technical and legal security requirements adapted to the categories of data and processing;
  • carry out a risk analysis to identify the security measures to be implemented to preserve the essential interests of the company;
  • identify the type of cloud services and data hosting appropriate with respect to all data processing;
  • select cloud service providers that provide adequate security and confidentiality guarantees;
  • review and adapt the internal security policies of the company; and
  • carry out regular assessments of the cloud services.

Update and trends

Key developments of the past year

Are there any emerging trends or hot topics in international data protection in your jurisdiction?

Key developments of the past year46 Are there any emerging trends or hot topics in international data protection in your jurisdiction?

Since the implementation of the GDPR one year ago, many national data protection authorities have reported a sharp increase in the number of complaints. In France, the CNIL recently observed a 32 per cent increase in the number of complaints received in 2018, largely attributable to the RGPD. Indeed, the CNIL has received more than 11,900 complaints since May 2018. During the first nine months of the RGPD, the EDPB reported 144,376 complaints.

In the first major example, on 25 and 28 May 2018, the CNIL received group complaints from the associations None Of Your Business (NOYB) and La Quadrature du Net (LQDN). LQDN was mandated by 10,000 people to refer the matter to the CNIL. In the two complaints, the associations reproach Google for not having a valid legal basis to process the personal data of the users of its services, particularly for ads personalisation purposes.

As a result, Google has been fined €50 million by the CNIL for not properly informing to its users how data is collected across its services to present personalised advertisements. The CNIL noticed that the information on the data-processing activities provided to users was neither easily accessible to users nor always clear or comprehensive.

The CNIL also observed that Google doesn’t properly obtain users’ consent to target them with personalised ads. Essential information required to sufficiently inform data subjects of storage purposes, periods or categories of personal data used for ads personalisation is diluted in several documents and does not enable the user to be aware of their extent, with a several clicks required to access the full information. Therefore, the CNIL underlined that the user gives his or her consent in full, for all the processing operations purposes carried out by Google based on this consent (ads personalisation, speech recognition, etc). However, the GDPR provides that the consent is ‘specific’ only if it is given distinctly for each purpose.

Finally, we can also underlines that the CNIL is more likely to make public the sanctions that it imposes on the PII controller or processor.

What happens to our online identities when we die?

What happens to our online identities when we die?

What happens to our online identities when we die?

Click here to view original web page at What happens to our online identities when we die?

Hayley Atwell in the Black Mirror episode Be Right Back.

Esther Earl never meant to tweet after she died. On 25 August 2010, the 16-year-old internet vlogger died after a four-year battle with thyroid cancer. In her early teens, Esther had gained a loyal following online, where she posted about her love of Harry Potter, and her illness. Then, on 18 February 2011 – six months after her death – Esther posted a message on her Twitter account, @crazycrayon.

“It’s currently Friday, January 14 of the year 2010. just wanted to say: I seriously hope that I’m alive when this posts,” she wrote, adding an emoji of a smiling face in sunglasses. Her mother, Lori Earl from Massachusetts, tells me Esther’s online friends were “freaked out” by the tweet.

“I’d say they found her tweet jarring because it was unexpected,” she says. Earl doesn’t know which service her daughter used to schedule the tweet a year in advance, but believes it was intended for herself, not for loved ones after her death. “She hoped she would receive her own messages … [it showed] her hopes and longings to still be living, to hold on to life.”

Although Esther did not intend her tweet to be a posthumous message for her family, a host of services now encourage people to plan their online afterlives. Want to post on social media and communicate with your friends after death? There are lots of apps for that! Replika and Eternime are artificially intelligent chatbots that can imitate your speech for loved ones after you die; GoneNotGone enables you to send emails from the grave; and DeadSocial’s “goodbye tool” allows you to “tell your friends and family that you have died”. In season two, episode one of Black Mirror, a young woman recreates her dead boyfriend as an artificial intelligence – what was once the subject of a dystopian 44-minute fantasy is nearing reality.

Esther Earl at home in 2010 … before she died, she arranged for emails to be sent to her imagined future self.
Esther Earl at home in 2010 … before she died, she arranged for emails to be sent to her imagined future self. Photograph: Boston Globe via Getty Images

But although Charlie Brooker portrayed the digital afterlife as something twisted, in reality online legacies can be comforting for the bereaved. Esther Earl used a service called FutureMe to send emails to herself, stating that her parents should read them if she died. Three months after Esther’s death, her mother received one of these emails. “They were seismically powerful,” she says. “That letter made us weep, but also brought us great comfort – I think because of its intentionality, the fact that she was thinking about her future, the clarity with which she accepted who she was and who she hoped to become.”

Because of the power of Esther’s messages, Earl knows that if she were dying, she would also schedule emails for her husband and children. “I think I would be very clear about how many messages I had written and when to expect them,” she adds, noting they could cause anxiety for relatives and friends otherwise.

Yet while the terminally ill ponder their digital legacies, the majority of us do not. In November 2018, a YouGov survey found that only 7% of people want their social media accounts to remain online after they die, yet it is estimated that by 2100, there could be 4.9bn dead users on Facebook alone. Planning your digital death is not really about scheduling status updates for loved ones or building an AI avatar. In practice, it is a series of unglamorous decisions about deleting your Facebook, Twitter and Netflix accounts; protecting your email against hackers; bestowing your music library to your friends; allowing your family to download photos from your cloud; and ensuring that your online secrets remain hidden in their digital alcoves.

In Be Right Back, a young woman recreates her dead boyfriend as an artificial intelligence.
In Be Right Back, a young woman recreates her dead boyfriend as an artificial intelligence. Photograph: Channel 4

“We should think really carefully about anything we’re entrusting or storing on any digital platform,” says Dr Elaine Kasket, a psychologist and author of All the Ghosts in the Machine: Illusions of Immortality in the Digital Age. “If our digital stuff were like our material stuff, we would all look like extreme hoarders.” Kasket says it is naive to assume that our online lives die with us. In practice, your hoard of digital data can cause endless complications for loved ones, particularly when they don’t have access to your passwords.

“I cursed my father every step of the way,” says Richard, a 34-year-old engineer from Ontario who was made executor of his father’s estate four years ago. Although Richard’s father left him a list of passwords, not one remained valid by the time of his death. Richard couldn’t access his father’s online government accounts, his email (to inform his contacts about the funeral), or even log on to his computer. For privacy reasons, Microsoft refused to help Richard access his father’s computer. “Because of that experience I will never call Microsoft again,” he says.

Our devices capture so much stuff, we don’t think about the consequences for when we’re not here

Compare this with the experience of Jan-Ole Lincke, a 24-year-old pharmaceutical worker from Hamburg whose father left up-to-date passwords behind on a sheet of paper when he died two years ago. “Getting access was thankfully very easy,” says Lincke, who was able to download pictures from his father’s Google profile, shut down his email to prevent hacking, and delete credit card details from his Amazon account. “It definitely made me think about my own [digital legacy],” says Lincke, who has now written his passwords down.

Yet despite growing awareness about the data we leave behind, very few of us are doing anything about it. In 2013, a Brighton-based company called Cirrus Legacy made headlines after it began allowing people to securely leave behind passwords for a nominated loved one. Yet the Cirrus website is now defunct, and the Guardian was unable to reach its founder for comment. Clarkson Wright & Jakes Solicitors, a Kent-based law firm that offered the Cirrus service to its clients, says the option was never popular.

“We’ve been aware for quite a period now that the big issue for the next generation is digital footprints,” says Jeremy Wilson, head of the wills and estates team at CWJ. “Cirrus made sense and ticked a lot of boxes but, to be honest, not one client has taken us up on it.”

Wilson also notes that people don’t know about the laws surrounding digital assets such as the music, movies and games they have downloaded. While many of us assume we own our iTunes library or collection of PlayStation games, in fact, most digital downloads are only licensed to us, and this licence ends when we die.

What we want to do and what the law allows us to do with our digital legacy can therefore be very different things. Yet at present it is not the law that dominates our decisions about digital death. “Regulation is always really slow to keep up with technology,” says Kasket. “That means that platforms and corporations like Facebook end up writing the rules.”

Andrew Scott stars in the new Black Mirror episode Smithereens, which explores our digital dependency.
Andrew Scott stars in the new Black Mirror episode Smithereens, which explores our digital dependency. Photograph: Netflix / Black Mirror

In 2012, a 15-year-old German girl died after being hit by a subway train in Berlin. Although the girl had given her parents her online passwords, they were unable to access her Facebook account because it had been “memorialised” by the social network. Since October 2009, Facebook has allowed profiles to be transformed into “memorial pages” that exist in perpetuity. No one can then log into the account or update it, and it remains frozen as a place for loved ones to share their grief.

The girl’s parents sued Facebook for access to her account – they hoped to use it to determine whether her death was suicide. They originally lost the case, although a German court later granted the parents permission to get into her account, six years after her death.

“I find it concerning that any big tech company that hasn’t really shown itself to be the most honest, transparent or ethical organisation is writing the rulebook for how we should grieve, and making moral judgments about who should or shouldn’t have access to sensitive personal data,” says Kasket. The author is concerned with how Facebook uses the data of the dead for profit, arguing that living users keep their Facebook accounts because they don’t want to be “locked out of the cemetery” and lose access to relatives’ memorialised pages. As a psychologist, she is also concerned that Facebook is dictating our grief.

“Facebook created memorial profiles to prevent what they called ‘pain points’, like getting birthday reminders for a deceased person,” she says. “But one of the mothers I spoke to for my book was upset when her daughter’s profile was memorialised and she stopped getting these reminders. She was like, ‘This is my daughter, I gave birth to her, it’s still her birthday’.”

While Facebook users now have the option to appoint a “legacy contact” who can manage or delete their profile after death, Kasket is concerned that there are very few personalisation options when it comes to things like birthday reminders, or whether strangers can post on your wall. “The individuality and the idiosyncrasy of grief will flummox Facebook every time in its attempts to find a one-size-fits-all solution,” she says.

Pain points … should we allow loved ones to curate our legacy, or create ‘memorial pages’?
Pain points … should we allow loved ones to curate our legacy, or create ‘memorial pages’? Photograph: Yui Mok/PA

Matthew Helm, a 27-year-old technical analyst from Minnesota, says his mother’s Facebook profile compounded his grief after she died four years ago. “The first year was the most difficult,” says Helm, who felt some relatives posted about their grief on his mother’s wall in order to get attention. “In the beginning I definitely wished I could just wipe it all.” Helm hoped to delete the profile but was unable to access his mother’s account. He did not ask the tech giant to delete the profile because he didn’t want to give it his mother’s death certificate.

Conversely, Stephanie Nimmo, a 50-year-old writer from Wimbledon, embraced the chance to become her husband’s legacy contact after he died of bowel cancer in December 2015. “My husband and I shared a lot of information on Facebook. It almost became a bit of an online diary,” she says. “I didn’t want to lose that.” She is pleased people continue to post on her husband’s wall, and enjoys tagging him in posts about their children’s achievements. “I’m not being maudlin or creating a shrine, just acknowledging that their dad lived and he played a role in their lives,” she explains.

Nimmo is now passionate about encouraging people to plan their digital legacies. Her husband also left her passwords for his Reddit, Twitter, Google and online banking accounts. He also deleted Facebook messages he didn’t want his wife to see. “Even in a marriage there are certain things you wouldn’t want your other half to see because it’s private,” says Nimmo. “It worries me a little that if something happened to me, there are things I wouldn’t want my kids to see.”

When it comes to the choice between allowing relatives access to your accounts or letting a social media corporation use your data indefinitely after your death, privacy is a fundamental issue. Although the former makes us sweat, the latter is arguably more dystopian. Dr Edinja Harbinja is a law lecturer at the University of Hertfordshire, who argues that we should all legally be entitled to postmortem privacy.

If we don’t start making decisions about our digital deaths, then someone else will be making them for us

“The deceased should have the right to control what happens to their personal data and online identities when they die,” she says, explaining that the Data Protection Act 2018 defines “personal data” as relating only to living people. Harbinja says this is problematic because rules such as the EU’s General Data Protection Regulation don’t apply to the dead, and because there are no provisions that allow us to pass on our online data in wills. “There can be many issues because we don’t know what would happen if someone is a legacy contact on Facebook, but the next of kin want access.” For example, if you decide you want your friend to delete your Facebook pictures after you die, your husband could legally challenge this. “There could be potential court cases.”

Kasket says people “don’t realise how much preparation they need to do in order to make plans that are actually able to be carried out”. It is clear that if we don’t start making decisions about our digital deaths, then someone else will be making them for us. “What one person craves is what another person is horrified about,” says Kasket.

How close are we to a Black Mirror-style digital afterlife?

Read more

Esther Earl continued to tweet for another year after her death. Automated posts from the music website Last.fm updated her followers about the music she enjoyed. There is no way to predict the problems we will leave online when we die; Lori Earl would never have thought of revoking Last.fm’s permissions to post on her daughter’s page before she died. “We would have turned off the posts if we had been able to,” she says.

Kasket says “the fundamental message” is to think about how much you store digitally. “Our devices, without us even having to try, capture so much stuff,” she says. “We don’t think about the consequences for when we’re not here any more.”

• Black Mirror season 5 launches on Netflix on 5 June.

Images