Digital Legacy Association urges hospices to support patients in managing their digital estate

Obstacles to Transferring Online Accounts

One possible obstacle to the transfer of online accounts concerns privacy laws. If an account owner dies, a personal representative or successor trustee may not be able to simply call up the service provider and obtain a password to the decedent’s account. The service provider may have a privacy policy that prohibits turning over account information or content to a third party without a user’s consent. As a result, the service provider may refuse to allow the personal representative access. In that case, counsel may need to make use of one of the procedures I describe in the previous section. Although the service provider arguably has an obligation to surrender property of the decedent, the service provider may want a court order authorizing turn over of the account in order to protect itself from a claim of a privacy violation. Even if the decedent did not assert a privacy claim, government regulators might. Therefore, requiring a court order would seem to be a prudent course for a service provider.

In addition, planners should consider the effect of cybercrime laws, like the Computer Fraud and Abuse Act, California’s cybercrime and identity theft laws. They should also account for service providers’ terms of service. A service provider could take the position that a personal representative’s use of a decedent’s password to access an account after death is a violation of its terms of service. The service provider might also say that using the decedent’s account violates cybercrime laws. On the other hand, the personal representative could contend that he or she steps in the shoes of the decedent for purposes of authority to access the account. Moreover, the personal representative may have documents signed by the decedent authorizing access to online accounts.

There seems to be a gray area regarding the legality of post-death access to accounts. Nonetheless, the Nicholson article mentioned above in Section III suggests to service providers

that they should make plans for death and disability by allowing users to name a contingent authorized user who has the authority to access the account. In the absence of clear procedures for contingent authorized users to an account, where online services warn of criminal liability for unauthorized access to accounts, it may be prudent for a personal

representative to avoid simply accessing the account following the decedent’s death using the decedent’s password. In such cases, it may be best to obtain the court’s instructions permitting the access.

Digital death is still a problem. A widow’s battle to access her husband’s Apple account

Practical Problems for Planning and Management

  1. Unawareness. In order for the fiduciary to take steps essential to property handle the belongings of the property, the fiduciary has to pay attention to these belongings’ existence.
  2. Digital Bureaucracy. Many of the businesses that function custodians of digital media, accounts, and companies, have created some type of aid for the fiduciaries and the members of the family of the deceased. Unfortunately, as every firm is performing underneath the authorized restraints and uncertainty nonetheless surrounding the digital estate planning, there isn’t any uniformity in approaches chosen by every firm, which makes it tough to search out the suitable method and navigate by way of the procedures. The procedures a person should observe to entry the info pertaining to the deceased vary from sending a standard letter with a duplicate of a demise certificates, will, authorities IDs, private contact data, proof of relationship, and different verifying data of the deceased, to sending an electronic mail with sure data or proof of being appointed a fiduciary, to filling out an internet type with no further verification. Apart from time delay, a few of these approaches add a considerable quantity of paperwork.
  3. Passwords and PIN Codes. Passwords are the important thing to entry our many units and recordsdata. Our telephones are password protected, our computer systems and emails are password protected, all of our on-line monetary accounts are password protected, and even now our flash drives will be password protected. Without entry to the passwords, the Digital Assets saved in these gadgets and in these on-line areas are of lowered if any worth.
  4. Encryption. 32-bit, sixty four-bit, 128-bit, and 256-bit encryption are all ranges of encryption used to additional safe domestically or remotely saved information, or knowledge that’s being transported on-line from a service supplier to your pc or cellphone. Fiduciaries who’re unable to seek out, guess or in any other case use passwords to open secured accounts are left with the choice of attempting to interrupt the encryption that secures the digital asset. However, that is simpler mentioned than executed! As reported by Seagate, a number one expertise firm, in 2008, a file encrypted with 128-bit AES encryption has over 340,000,000,000,000,000,000,000,000,000,000,000,000 potential mixtures, or sufficient to maintain 70 billion computer systems busy computing for over seventy seven billion years at 2008 computing speeds to guess the right key to unlock the encryption. With this in thoughts, cracking or guess in password appears a complete lot extra life like than cracking the encryption. In case you had been questioning, it’s believed that the present 256 AES encryption will be ample encryption safety till roughly the yr 2031, when pc will be quick sufficient that this degree of encryption will now not be robust sufficient.
  5. CFAA Criminal Laws. As famous above, the Computer Fraud and Abuse Act stands in the way in which of Fiduciaries who try and entry on-line accounts with out acceptable authorization.
  6. SCA Privacy legal guidelines. As famous above, the Stored Communications Act prohibits the disclosure of a shopper’s electronically saved info until the fiduciary meets one of many listed exemptions, and even then the service supplier might chorus from disclosing the knowledge or granting entry to the saved info.
Texts from the dead: Post-mortem digital communication has arrived

Template of a Digital Property Provision for a Will

(template)  Generally the following provision will be inserted as a subparagraph in the Powers of Personal Representative (Executor) Section of the Will, and may be modified to be used with Trust Agreements.

Power With Regard to Digital and other Intangible Property.

In the event that at the time of my death I owned an interest in any form of electronic, digital or intangible assets (including but not limited to leaseholds, licenses, contractual rights, computing devices, data storage devices, a domain names, user accounts, email accounts, digital pictures, digital music, or any other form of electronically stored information (collectively, “Digital Assets”)), whether included in my probate estate or not, then in addition to any other powers described in this Section or provided for under applicable law, the powers granted to the Personal Representative of my estate shall include, but not be limited to, the following:

(1)   the power to obtain copies of any electronically stored information of mine from any person or entity that possesses, custodies, or controls that information, including but not limited to entities that may be subject to the Stored Communications Act under or similar state laws that may then be in effect;

(2)   power to decrypt any encrypted electronically stored information of mine or to bypass, reset, or recover any passwords or other kind of authentication or authorization necessary to gain access to access the Digital Assets;

(3)   the power to waive any confidentiality that I may have had under any Terms of Service Agreement or Privacy Policy that I had previously agreed to in regards to any Digital Asset, to the extent allowable under such Terms of Service or Privacy Policy;

(4)   all other powers that an absolute owner of a Digital Asset would have, and any other powers appropriate to achieve the proper investment, management, and distribution of my Digital Assets, including the power to employ any consultants or agents to advise or assist the Personal Representative in exercising the powers listed above.

In furtherance of such powers of personal representative, I hereby authorize, to the extent permitted by federal and state law, including the Electronic Communications Privacy Act of1986 (which includes the Stored Communications Act), as amended, the Computer Fraud and Abuse Act of 1986, as amended, any person or entity that possesses, custodies, or controls any electronically stored information of mine or that provides to me an electronic communication service or remote computing service, whether public or private, to divulge to the Personal Representative: (1) any electronically stored information of mine; (2) the contents of any communication that is in electronic storage by that service or that is carried or maintained on that service; and (3) any record or other information pertaining to me with respect to that service. This authorization is to be construed to be my lawful consent under the Stored Communications Act, as amended, and any other applicable federal or state data privacy law or criminal law. The terms used in this paragraph are to be construed as broadly as possible, and the term “user account” includes without limitation an established relationship between a user and a computing device or between a user and a provider of Internet or other network access, electronic communication services, or remote computing services, whether public or private.

Template of Digital Property Provision for a Power of Attorney

(template)  Generally the following provision will be inserted as a subparagraph in the section of a Power of Attorney which explicitly enumerates the powers granted to a Attorney in Fact.

Power With Regard to Digital and other Intangible Property.

In the event that I own an interest in any form of electronic, digital or intangible assets (including but not limited to leaseholds, licenses, contractual rights, computing devices, data storage devices, a domain names, user accounts, email accounts, digital pictures, digital music, or any other form of electronically stored information (collectively, “Digital Assets”)), then in addition to any other powers granted to my Attorney in Fact under this Durable Power of Attorney, or which may otherwise be provided for under applicable law, my Attorney in Fact shall have the following powers:

(1)   the power to obtain copies of any electronically stored information of mine from any person or entity that possesses, custodies, or controls that information, including but not limited to entities that may be subject to the Stored Communications Act under or similar state laws that may then be in effect;

(2)   power to decrypt any encrypted electronically stored information of mine or to bypass, reset, or recover any passwords or other kind of authentication or authorization necessary to gain access to access the Digital Assets;

(3)   the power to waive any confidentiality that I may have had under any Terms of Service Agreement or Privacy Policy that I had previously agreed to in regards to any Digital Asset, to the extent allowable under such Terms of Service or Privacy Policy;

(4)   all other powers that an absolute owner of a Digital Asset would have, and any other powers appropriate to achieve the proper investment, management, and distribution of my Digital Assets, including the power to employ any consultants or agents to advise or assist the Attorney in Fact in exercising the powers listed above.

In furtherance of such powers which are granted to the Attorney In Fact above, I hereby authorize, to the extent permitted by federal and state law, including the Electronic Communications Privacy Act of1986 (which includes the Stored Communications Act), as amended, and the Computer Fraud and Abuse Act of 1986, as amended, any person or entity that possesses, custodies, or controls any electronically stored information of mine or that provides to me an electronic communication service or remote computing service, whether public or private, to divulge to my Attorney in Fact (1) any electronically stored information of mine; (2) the contents of any communication that is in electronic storage by that service or that is carried or maintained on that service; and (3) any record or other information pertaining to me with respect to that service. This authorization is to be construed to be my lawful consent under the Stored Communications Act, as amended, and any other applicable federal or state data privacy law or criminal law. The terms used in this paragraph are to be construed as broadly as possible, and the term “user account” includes without limitation an established relationship between a user and a computing device or between a user and a provider of Internet or other network access, electronic communication services, or remote computing services, whether public or private.