I Needed to Save My Mother’s Memories. I Hacked Her Phone.

I Needed to Save My Mother’s Memories. I Hacked Her Phone.

I Needed to Save My Mother’s Memories. I Hacked Her Phone.

Click here to view original web page at I Needed to Save My Mother’s Memories. I Hacked Her Phone.

Claire Merchlinsky

Several days after my mother died in a car accident, my two sisters and I sat together in her apartment, stunned and overwhelmed. High on our horrible to-do list — along with retrieving her smashed vehicle from the tow lot, making burial plans and meeting with the rabbi — was this: getting into her cellphone.

Everything we needed to get her affairs in order was on her phone. Her contacts would tell us who to reach out to about the memorial service. Her email would tell us whether she had made plans we needed to cancel. Her finance apps would tell us whether she had been paying bills electronically. And there would be personal information, too. Her texts to family and friends. Her notepad. Her photos. The e-book she had been reading on the flight home in the hours before the accident as she left the Tulsa International Airport.

Luckily, Mom had given me the passcode to her phone only a month before. When we felt ready, I turned on her iPhone in its pink plastic case and typed in the code.

Nothing.

I typed in the code a second time. Again, nothing. My sisters and I looked at one another. A tightness gripped my stomach as I realized that the code Mom had given me couldn’t possibly work: That code had contained four digits, and her phone was asking for six.

Six digits means one million possible combinations, and her phone would give us only 10 tries before Apple would erase all of her data. Her old passcode had been the last four digits of the phone number at our childhood home, which ended in a zero. We decided to add two zeros to the end and were so confident that we knew how Mom’s brain worked that I paused dramatically before I tapped in the final zero, certain it would work. It did not.

[As technology advances, will it continue to blur the lines between public and private? Sign up for Charlie Warzel’s limited-run newsletter to explore what’s at stake and what you can do about it.]

After that failure, my sisters and I treated every one of the remaining tries like some sort of nuclear access code. We made a few more attempts, none successful. With each failure, the phone made us wait longer between tries. Eventually we decided it was best to stop and find a different way in — the risk of permanently erasing everything was too great.

As a historian and biographer, I’ve made a career of reconstructing lives. To do that, you need information. The people I study and write about are entrepreneurs, innovators, famous and wealthy individuals. Their lives have been well documented in countless ways, including television interviews, newspaper and magazine articles, congressional testimony, patent records and the corporate archives of companies they founded. It’s relatively easy to reconstruct those lives, particularly if there are still friends and colleagues to help fill in the blanks.

Mom left no public record aside from a letter to the editor published in The Tulsa World. Instead, she had a dusty purple plastic bin she labeled “Memorabilia” with a Magic Marker. Inside were a prom program, a love letter from a boyfriend we had never heard of and hundreds of drawings, photos and notes from her grandchildren or us sisters as children. She had the photo albums she had made when we were little. A safe deposit box held her citizenship papers and other legal documents.

Nearly anything from the past 20 years existed only online, locked away behind passwords and firewalls. Notwithstanding the cards she made by gluing New Yorker cartoons onto cardstock, her written communications essentially stopped in the early 2000s, when she got an email account. She was a great texter, pouncing to be the first to respond in any group and embracing emojis with the passion of a preteenager. Her social media posts were politically passionate and at times head-scratchingly random.

I valued these public things, of course, but I also wanted more. We document our lives in two ways, one intended and one not. There are the emails we send, the photos we post and the comments we debate and wordsmith before hitting Return. And then there is the inadvertent record: the enraged first drafts, the unflattering selfies, the record of purchases at Amazon or Netflix, the digital sticky notes we had not meant to keep.

We work hard to curate the public self and rarely think about the shadow self. I knew from my own work, however, that off-the-cuff notes, old receipts, call logs and calendar entries can serve as proxies for feelings. A run of doctor’s appointments, a glut of calls to the same phone number that never picks up, the purchase of five types of acne cream or a self-help book — these are clues. When we are alive and artificial intelligence assembles these clues to hazard an eerily accurate prediction about our interests and future desires, we are horrified. But for a historian looking at the life of someone who has died, the same clues can lead to understanding.

As a daughter, my heart broke at the realization that digital records, along with the stories from those of us who loved Mom, were going to be the best way to be with her again, to learn from her again or to laugh again at her stupid jokes. But as a historian, my mind raced. If the only way to preserve her memories was to put together the pieces of her digital life, then we had to hack into her online accounts.

After a frantic hunt, my middle sister found a small pocket calendar in Mom’s desk. The back pages were filled with handwritten login IDs and passwords. I patted myself on the back for having insisted Mom record her passwords, and we sisters rejoiced … for about five minutes. At site after site, login page after login page, every attempt failed.

The only login and password combination that worked was for her Apple iCloud account, but she had protected it with two-factor authentication. We could see that her phone was receiving texts — texts from Apple containing the codes needed to get into her account — but we couldn’t unlock the phone, so we couldn’t see the code. I called a few high-powered techies I know from working at Stanford and living in Silicon Valley, but none of them could help. It seemed we would be locked out of everything.

Eventually I found a savior — a young employee at an Apple Store. I explained to him that I had Mom’s login ID (an email address) and the password for her Apple account, but I couldn’t override the two-factor authentication. He asked me to enter the login and password, and he grimaced when her locked phone lit up with the authentication code we could not see. Then his expression changed. “Let’s try her SIM card,” he said.

A phone’s SIM card is no bigger than the fingernail on your pinkie finger, but it is of vital importance. It gives your phone its unique identity, making it possible to associate the physical device with a specific mobile carrier and phone number. You can pop the card out of your phone by inserting a paper clip in the tiny hole you might have noticed on the side of your phone. Moving a SIM card from one phone to another is how most people move their phone number when they upgrade their devices.

The employee ejected the SIM card from Mom’s phone and put it in his own. His phone now had her phone number. We logged into Mom’s iCloud account again. This time we clicked the link that said we had not received the original two-factor passcode sent to the phone as a trusted device. We requested another be sent to her phone number. An instant later, his phone buzzed with the code. “O.K. to input this?” he asked. My heart pounded at the thought of this young stranger being with me when I peeked into Mom’s hidden digital life for the first time, but I nodded approval. He typed the code on the site.

Boom: We could see her Apple mail, her memos, her bookmarks and her photos. We had recovered a key to unlock her digital world.

At home, I put Mom’s SIM card into my husband’s phone so that it could receive texts sent to her number. Now, with her login ID and control over her phone number, I could impersonate her. At every website, I said that I forgot her password. The website tried to confirm her identity by texting a code to Mom’s registered phone number — and the code would go straight to my husband’s phone. Once I was logged in, I could then change both the password and the trusted phone number that would thereafter be associated with the account. Every time a page opened up with her name at the top, I felt a mix of elation and nausea.

It took hours, but I gained control of her email accounts, her Amazon account, her cable provider and the sites for her credit cards. We never did figure out the passcode to her phone, which means I will most likely never see the iMessages or other encrypted information. Otherwise, I now have access to almost all of her digital history.

After all that work to crack Mom’s accounts, I haven’t looked at them. It has been six months, but it’s still too soon. Looking through her digital life will mean remembering her before she was gone, back when I was a daughter with the luxury of being annoyed by her calls or texts, back before she or I understood in the visceral, never-going-back way I do now that it was all going to end. I haven’t even listened to the voice mail messages from her that I still have on my phone. I do know they almost all begin in the same way: with a pause and then her voice saying, “It’s just me.”

Leslie Berlin, a historian at Stanford, is the author, most recently, of “Troublemakers: Silicon Valley’s Coming of Age.”

The Times is committed to publishing a diversity of letters to the editor. We’d like to hear what you think about this or any of our articles. Here are some tips. And here’s our email: letters@nytimes.com.

Follow @privacyproject on Twitter and The New York Times Opinion Section on Facebook and Instagram.

Images

Who Gets Your Data After Death? Accessing and Managing a Deceased Person’s Digital Remnants

Who Gets Your Data After Death? Accessing and Managing a Deceased Person’s Digital Remnants

Who Gets Your Data After Death? Accessing and Managing a Deceased Person’s Digital Remnants

Click here to view original web page at Who Gets Your Data After Death? Accessing and Managing a Deceased Person’s Digital Remnants

When a loved one passes away, dealing with the mundane little things is an unfortunate, and often headache-inducing, necessity. Canceling a deceased loved one’s bills and magazine subscriptions, dealing with their financial situations… And now you have to worry about your loved one’s digital affairs as well. You have to account for everything from their email inboxes to their Facebook account, and the data they left behind. What do you do with it all?

There aren’t many clear or easy ways for people to transfer their digital assets after they’ve passed on. This includes things like their iTunes media library, or even just the credentials needed to access the departed’s various online accounts. Some people have started to wonder if they should include things like passwords to their multitudes of online accounts in their wills.

It can be difficult to successfully petition the likes of Google or Apple to release information on users who have passed away. This is often true regardless of your relation to the deceased. And social media platforms keep a tight leash on their users’ login credentials, even after they’ve passed on.

Accessing Data From a Deceased Loved One’s Electronic Devices

On occasion, we here at Gillware receive calls from people looking to have data retrieved from a phone or tablet belonging to a deceased loved one. Usually all they’re looking for are photos and contacts belonging to the deceased—photos to remember them by, and friends to notify of their passing. Sometimes this data is very difficult to get a hold of outside of a data recovery lab. This is especially true when dealing with mobile devices.

When you die, all of your data stays right where you left it. Making sure your loved ones can access the data you leave behind isn’t something many of us plan for. This can leave your loved ones in a bind when you pass away and they have to deal with your affairs—both analog and digital. The trend in data storage, especially among mobile devices, is encryption and total data security. If you don’t plan ahead, accessing the data you’ve left behind on your phone or synced with your Apple or Google account can prove difficult, or even nigh-impossible, for your loved ones.

Below are some tips for retrieving data from mobile devices and computers after their users have passed on. If you cannot retrieve the data on your own or with help from Apple or Google, though, the experts at Gillware Data Recovery and Gillware Digital Forensics can help. Our data recovery and forensic engineers have often assisted people in retrieving data from phones, computers, and other mobile devices belonging to deceased loved ones. In these situations, the data we recover often helps bring much-needed closure to the deceased person’s grieving family and friends.

Accessing a Deceased Loved One’s iPhone

apple logo

Apple iPhones are, unfortunately, notoriously difficult to access in the event of their owners’ passing. Unlike many Android phone models, iPhones do not have (often unencrypted) microSD cards you can take out of the phone. All of the data resides within the encrypted flash memory chip built into the device. You can’t pick the lock or bust down the door, metaphorically speaking. Either you know the passcode that gives you access to the data on the phone, or you don’t. Your iPhone does not send your passcode directly to some giant password database at Apple HQ. Only the user—and anybody else they may have told—knows their own iPhone passcode.

Apple’s data protection policies, especially their encryption policies, are a harsh mistress. You cannot appeal to an iPhone’s reason or emotion, because it has none. Apple iPhones are designed to be virtually unhackable without taking the most extreme of measures. Each successive model is more unhackable than the last. That’s just the way these things are—and even appealing to Tim Cook can’t change that.

However, while Apple can’t help you access your loved one’s iPhone after they’ve passed on, their Apple ID, iTunes, and iCloud accounts present a much less insurmountable goal. These accounts often hold data that is synchronized between the owner’s iPhone, iPad, and other devices. Access to these accounts is often easier to gain than access to the iPhone itself.

To gain access to a deceased loved one’s Apple ID, iTunes, or iCloud account information, you can contact Apple Support. Apple Support will ask for identifying information, such as a death certificate of the user, and proof of relation. Apple Support does, of course, often err on the side of caution when it comes to releasing information on another user’s account.

Accessing a Deceased Loved One’s Android Mobile Phone

If your deceased loved one owned an Android mobile phone, your options are less limited. Depending on the model of phone and version of the Android operating system, you may have some luck using one of these methods to bypass the passcode or pattern lock.

Many Android mobile phones also store some of the user’s data on a small microSD card inside the phone. You can easily remove the microSD card, place it into an adapter, and plug it into a computer, even if you can’t access the phone it belonged to. Not all mobile phones come with a microSD card preinstalled, however. In addition, how much data the user had on the SD card depends on how the user had their phone set up.

Owners of Android phones often have their phones tied to a Google account. In these cases, some data on the phone, such as contacts or photos, may be synchronized with the user’s Google Drive. Like with Apple, you can contact Google to access your loved one’s account. In the interest of protecting user privacy, Google asks for plenty of identifying information about both you and your loved one before they decide whether to comply with your request.

Requesting access to a deceased person’s Google account
Requesting access to a deceased person’s account on

Some of the information Google requires includes your name, mailing address, email address, the Google account username or Gmail address of your loved one, their death certificate, and an example of an email conversation between you and the deceased.

Requesting data from a loved one’s Google account is a two-part system. Google will review your request and may request a court order before moving onto the second step.

Accessing a Deceased Loved One’s Home Computer

Unlike with mobile phones, getting into your loved one’s computer to recover the files and documents they left behind proves much less of a challenge. Even if you don’t know the password to their user account, accessing the data on a computer is downright trivial. You can access their files from another account on the PC. Or, if you don’t have one, you can remove the hard drive from the PC and view the data on it on another computer using a hard disk drive enclosure or USB adapter cable. These methods all work, unless the data on the drive has been encrypted. When you encrypt data, it is impossible to make sense of it without the proper password to unlock the data (of course, if encryption were easy to circumvent, there wouldn’t be much point in having it).

This covers most of the data a deceased loved one will have lying on their physical devices once they pass on. But what about everything they’ve left behind on the Internet? What happens to it? Can you get to it?

What Happens to Your Social Media Accounts After Death?

The people using social media to stay abreast of current events, share things that are happening in their lives, and keep in touch with their families and friends number in the billions. Between Facebook, Twitter, Google+, Instagram, Pinterest, and various other platforms, people are accruing social media presences at an accelerating rate. When a user stops using an account, it just stays there. After all, your social media account won’t know when you’re dead. It can be unsettling, to say the least, to know that a family member or friend’s social media accounts are floating around through cyberspace as if nothing has changed.

All social media platforms highly value the privacy of their users, even their deceased users. As seen above with Google and Apple, the platforms holding onto your data, such as Facebook, Twitter, LinkedIn, etc., are reticent to release it to just anybody. (And in this case, family and friends count as “just anybody”.)

In general, social media platforms have no interest in providing other people with the proverbial keys to the kingdom, even after a user has passed on. However, social media platforms do have protocol in place regarding deceased users and what can be done to their accounts. Their protocol tends to be stringent, as many platforms, such as Facebook and Twitter, have fallen victim to celebrity death hoaxes in the past.

Some social media platforms have policies in place allowing people who were close to a deceased user to make limited decisions about what happens to their account after they have passed on. These include things like Facebook and Instagram’s memorial accounts. For the most part, though, social media platforms simply lock or deactivate the deceased user’s account.

Setting Up a Facebook Memorial Account

Facebook’s policy regarding deceased users allows for deceased users’ accounts to be transformed into “memorial accounts.” The deceased user is not treated as an “active” user and does not appear on potential friends lists for other users and other public spaces, although anything the user shared remains in place. Friends and family of the deceased user can post on the wall of the deceased and share memories of them.

Nobody can log into the deceased user’s account or alter any information on their account. However, if the user had defined a legacy contact prior to their passing, the legacy contact is allowed limited access to moderate the memorial account, and can request to download a copy of the account. However, they will not have access to the user’s private messages or be able to add or remove friends.

Only the user themselves can designate a legacy contact. In your Facebook account settings, you can choose a legacy contact, arrange to have your account memorialized after your death, or request to have your account deleted after you pass on.

A verified immediate family member on Facebook can request to have their departed loved one’s account memorialized or permanently deleted by contacting Facebook Support.

Instagram, which is owned by Facebook, has a similar policy, with memorial accounts of its own for deceased users. However, unlike Facebook, users cannot arrange to have their account memorialized before they pass on. Instead, a relative of the deceased user must contact Instagram and provide a copy of the user’s death certificate.

Deactivating a Deceased User’s Twitter Account

Unlike Facebook, Twitter has no options for “memorializing” deceased users’ accounts. But like Facebook, Twitter refuses to share login credentials for a deceased user’s account, so nobody can post on their behalf or read through their direct messages. Twitter will deactivate the account, which puts it in a queue for permanent deletion.

If you have login credentials to the deceased user’s account, you can simply deactivate their account just as easily as you would your own. If you do not know their credentials, though, you must go through Twitter Support. To request the deactivation of a deceased user’s account, you must fill out Twitter Support’s Privacy Form. To prevent abuse of this feature, Twitter requires you to provide information about yourself and the user. This includes a copy of their ID and your ID, and may include a Power of Attorney authorizing you to act on their behalf. If you meet these criteria, Twitter will honor your request to deactivate the deceased user’s account.

Removing LinkedIn Profiles for Deceased Users

Like any online account, nothing automatically happens to your LinkedIn account when you die. This can make it distressing for your loved ones, coworkers, or classmates if, after your death, LinkedIn serves up your profile to them in a “People You Might Want to Link To” email.

LinkedIn Help requires a friend or relative of the deceased to go through a rather involved process to close a LinkedIn profile for a deceased user. LinkedIn allows anybody to submit the form to remove the profile of a user who has passed on. However, since LinkedIn asks for you to state your relationship to the deceased, they will likely deny any request made by someone who is not close to the deceased.

Deactivating a Deceased Google User’s Account

You can request to have a deceased loved one’s Google account, including their Google+ page, Google Drive, Gmail inbox, and YouTube account, deleted by contacting Google Support. You will have to go through many of the same steps as you would when trying to access data stored on a loved one’s Google account as we discussed earlier. Google is more likely to honor a request to simply deactivate a deceased user’s account altogether than to release data from or provide access to the account. Understandably, deactivating a deceased user’s account is less of a breach of privacy than sharing their data.

Planning for the Future: Keeping Your Data Manageable and Accessible After Death

Image source:

Losing a loved one is painful enough. We wish that dealing with the myriad things left behind in their absence were easier. Almost nobody likes thinking about mortality. Even fewer people relish the thought of dealing with everything their deceased loved one left behind.

Throw in our swiftly-accumulating social media accounts in the mix and things get uglier. Your grieving loved ones quickly become inundated with a flood of tiring and frustrating work as they find and deactivate the roughly half-dozen accounts the average person has today.

You can ensure that dealing with your digital affairs when you pass on doesn’t put your loved ones through unnecessary layers of bureaucracy by creating a digital estate plan.

Estate planning is an important part of making sure everything goes smoothly after you’ve shed your mortal coil. Estate planning includes writing up a Last Will and Testament, financial or health care Power of Attorney, and other documents. In the modern age, what to do with all your digital remains has to be taken into consideration as well.

A digital estate plan is, as its name suggests, a plan for your digital estate—the online data and digital documentation and belongings you’ve accumulated over the years. Your digital estate encompasses everything from digital financial records to your online accounts. Keeping your digital accounts accessible after death is part of having a good digital estate plan.

Creating a Digital Estate Plan

A digital estate plan will help your family deal with whatever you leave behind when you pass on. This includes accessing and appropriately managing your online accounts, determining whether any of your digital property has any financial value that needs to be reported, and distributing and transferring any digital assets. A digital estate plan can even keep you and your family safe from “ghosting”, or identity theft of deceased persons.

Planning your digital estate involves tallying up all of your digital records and online accounts. This includes all of your data storage hardware in addition to your online accounts. Once you’ve made a list of your digital assets, you decide what should be done with each, just as you would with your physical assets.

Some people recommend creating a separate “digital will” for your digital assets. In your will, you can appoint a digital executor. A digital executor will manage your digital estate, just like an executor manages your physical estate.

However, while Wisconsin has laws in place regarding “digital asset custodians”, not all states have legislation regarding digital estate planning. And as a result, your digital executor may not be legally recognized. Despite the legal limbo, though, appointing a digital executor can still make dealing with your estate much easier. A digital estate plan is still of great use, even if you cannot formalize it in a legally binding document.

Using Password Management Tools to Manage Your Digital Estate

We here at Gillware recommend that you store your passwords in a safe, secure place. Common choices are a locked file cabinet or a safe or safety deposit box. Only your trusted loved ones should be able to access it in the event of your death. The easiest and most convenient way to do this is with a password manager, such as KeePass.

With KeePass, you can store a digital record of all your online and device passwords in a database file. This includes anything from email, social media accounts, and streaming and data storage accounts to your smartphone’s passcode. With your password credentials in hand, your loved ones can easily deal with the digital cruft that built up over the course of your life.

Of course, this allows your loved ones to see all of the data on your accounts. You may want to exercise prudence in what login credentials you make available to your heirs.

There are many options for you to choose from to make your password database file accessible only to the right people. To make sure your loved ones can get to the file itself, leave the database on a flash drive or burn it to a CD. The next step is ensuring that only the right people have the master password to unlock the database.

Whatever you do, proactively planning your digital estate can make things much easier on your loved ones once you’ve moved on.

Keep in mind that we here at Gillware are data recovery and IT experts, not probate law experts. To plan your digital estate, discuss the matter with your estate lawyer, just as you would to plan your physical estate.

Funerals and Instagram: A look at the funeral hashtags

Do You Need a Digital Estate Plan?

Will your estate executor have access to your digital estate? Do you know what is involved in a digital estate plan? It’s more than signing your paper will.

Is it enough to leave your email password on a notepad beside your computer?

Sorry, no. You need to learn more digital dos and don’ts.

Digital assets are various online or electronic files with your personal information. They include financial resources and social networks. Digital assets can include personal data with high emotional value. You could also have digital business property with monetary value. Digital assets can be stored electronically, online, in the cloud or on physical devices.

Passwords Can Control Access

Access to your online information or electronic storage is vital. Who should have access to your passwords?

When you make a will, you can appoint a digital executor. You can authorize your executor to hire experts to handle digital assets. You must, however, share passwords and login information to manage such assets.

Executors face a dilemma; in some cases, you may not have ownership of some digital property. Instead, only a non-transferrable access license may exist. Social media user agreements may only permit network access with a personal password. There is nothing to own or sell.

But executors have a duty to collect estate assets. Will they have to hunt for your passwords and usernames?

What about your material in the cloud, on social media or video sites? You can create a digital estate plan and specify your preferences. How is your executor to handle your digital accounts? Should files be closed, maintained or memorialized?

Secure Devices

Estate trustees must be aware of their duties to secure devices with digital information. This includes cell phones, tablets, laptops and computers.

Documents, photos, videos, text messages can be personal or business materials. Executors may not be able to distinguish between these.

Digital assets may have emotional and personal connections for your survivors. This may not translate to monetary value to calculate probate or income tax. However, the loss or expiry of a business domain name or blog can affect online sales and value.

Customer subscription lists and shopping carts can be stored online for businesses. Trademarks, copyrights and creative work can be considered assets and intellectual property. What about the value of an unpublished manuscript or musical composition?

Your online financial accounts may automatically pay utilities, credit card bills, income taxes or loan payments. Your digital estate property can include:

  • blogs
  • domain names
  • online photos and music
  • memorial websites
  • shopping networks
  • loyalty and reward programs

Credit card agreements may impose deadlines for the transfer of rewards or membership points.

Do Not Store Passwords in Wills

You need to store your digital information somewhere other than your will.

Once probated, your will and any password information become public. This could lead to fraud, cybercrime and identity theft.

Many online services store passwords and access codes. These may promise confidentiality. Their guarantees may be short-lived when such businesses fail. Also, digital laws will likely change and courts can order disclosure of such records.

Executors must be aware that online fees can continue to be charged and go undetected. Credit card payments or debt service accounts may have been set up for automatic payments. Without paper statements, executors may be unable to track them.

Digital worlds often have no paper trail to follow. User agreements may prohibit the transfer of passwords and access to anyone other than the registered user.

Can your executor answer your secret questions?

When asked, “What is your favourite bar beverage?” my answer is, “who’s buying?”

Bang! You're dead. Who gets your email, iTunes and Facebook?

Bang! You’re dead. Who gets your email, iTunes and Facebook?

Two things in life are certain: death and taxes. Amazon and other international corporations have found ways* around the latter, but no one can avoid the former.

In the age of Facebook and Google accounts, and with the existence of services such as iTunes where people invest considerable sums in entirely virtual goods, the question needs to be asked: What happens to your online profile and assets in the event of your passing?

Nobody likes to contemplate their death, but in the analogue world we make arrangements – in terms of a will. So why not include online?

Social networks are a huge repository of assets – documents and pictures. iTunes zealots might have invested in libraries stretching to tens of thousands of titles – is that part of the deceased person’s estate?

Not as far as some tech firms are concerned.

There are two parts to dealing effectively with your earthly IT estate: the physical devices and the content of online services. Given the declining cost of hardware, I’d argue the greater value lies in the digital stuff online. Your digital legacy has residual value and it needs to be treated as a valuable asset.

Obtaining access to online accounts of deceased family members has often been a fraught experience. Just over a decade ago, the argument regarding ownership of digital content came to a head when the family of the soldier Justin Ellsworth sued Yahoo! to get access to his email account after his death. Yahoo! only handed over the data when ordered by a court, despite being shown proof of Justin’s passing.

In response Yahoo! changed its policy with regard to what happens after death and effectively, when a user passes, so does the account. It’s in the terms of service. Bummer. With regards to other service providers, the way in which they deal with a user’s death varies dramatically. Some providers won’t even entertain the notion of doing anything, the Yahoo! approach.

Other providers will, with proof of passing, present a number of options. Some services even provide a dead man’s switch that will enable your loved ones to gain some degree of account or information recovery after the event.

Google inactive account manager provides a dead-hand mechanism, configurable ahead of time, to allow the contents of an account to either be completely removed or released to up to 10 nominated contacts – assuming they have the required identification for security purposes. To make it crystal clear, your account will not be available for login. Access to the service will not be granted. This process only delivers the content rather than reclaiming the account.

It would also be good manners to let your next of kin/nominated representative know these options are set on your account. To get that email without realising you were the nominated person could be very distressing. The information required to recover an account usually consists of: birth certificate, death certificate, proof of assignment over the account in question.

What Happens To Your Digital Assets When You Die?

What Happens To Your Digital Assets When You Die? – Infographics

This may sound new but the truth is the digital world is ridiculously part of everyday lives of many Filipinos. And because it is part of almost every Filipino’s lives, digital assets are accumulated by them over time.

In our growing advocacy for financial literacy, not only do we teach how to build up wealth and valuable physical properties and how to take good care of them. We also would like to teach about taking care of one’s assets that are built up online.

If you are a blogger or an online seller, most probably you have accounts in online “money banks” and payment systems such as PayPal, Google Wallet, Stripe, Adyen, etc.  You consider your money in these accounts as your digital asset.

And if you are a writer or an author, you may be keeping your works and files in your Kindle e-books. You know how valuable these digital assets of yours are. The same thing goes to musicians and songwriters who keep their unreleased songs in iTunes or other similar platforms.

These are some of the very important assets that are mostly overlooked by your family members and your financial advisor. That is if you have one.

In a survey data done online security company McAfee, online users worldwide value their digital assets starting from $35,000. That includes items like personal records, career information, special projects, hobbies, and music and art files.

That’s why I believe that aside from our physical assets we should also ensure that we are able to pass on to our intended family members and beneficiaries all our digital assets in the event of our death.

Here’s a very clear yet disturbing infographic from McAfee that made me think further about taking care of my non-tangible assets in my online portfolio.

DigitalAssets_Infographic1

The sadder part is that digital estate planning is very new and countries like the Philippines have no laws or regulations with regards to the access to your online accounts by your heirs.

However, there are some ways and measures to take so that your loved ones can access your online accounts or receive your digital assets in similar ways they would receive your money from investment in paper assets and other tangible properties like your land or house or car.

How Can A Digital Estate Plan Help Your Family After You Die?

Creating a digital estate plan will help your family on the following issues:

1) They can easily locate any of your accounts online
2) They can access your accounts and the information you left in those accounts
3) They can determine if your digital asset has any monetary value
4) They will be able to know if your digital assets have to be distributed or transferred to any beneficiary or loved one.
5) This will also helped them help you avoid online identity theft.

What Happens To Your Digital Assets When You Die And How To Create A Digital Estate Plan?

1. Keep an inventory of all your online accounts. Your log-in IDs and passwords should always be kept in a secure place. You can assign a digital executor and let him know where to access your information. Another option is using a service like PasswordBox where you can transfer your online information to a digital executor upon your death.

Digital assets may include the following:

  • Computers, external hard drives or flash drives, tablets, smartphones, music players, card readers, digicams, and other digital gadgets
  • Data and information that are stored online (cloud) or in a physical device or gadget
  • Online accounts such as email and social media accounts, shopping accounts, photo and video sharing accounts (Tumblr, Flickr, etc.), online storage accounts, websites, and blogs that you may manage
  • Domain or website names
  • Intellectual property such as your copyrighted songs, lyrics, poems, logos, trademarks, and other secret codes and inventions you created or written.

2. Determine and decide what to do with your online accounts. Each of your digital asset should be clearly given instructions on how they should be handled. How should each asset be handled? Know which of them should be saved, deleted, or transferred to your loved ones, friends, or business partners.

If you are making money with these digital assets then determine now who to transfer them to and who should receive all the access information after you are gone.

3. Assign a digital executor. Choose someone who is patient, highly-organized and is detail-oriented. He should be committed to listening and following your wishes as you have written in your will. And of course, he should be tech-savvy and comfortable using the Internet and different social media websites.

As much as possible, name different digital executors for your personal, financial, or business-related digital assets.

4. Save and store data and information in secure yet easy to access location. You can securely store and entrust your data to a chosen, trusted person such as your independent counsel. You may also keep them in a secure online data-keeping services, or simply store them in hardware and lock them up in your cabinet or vault.

The most important thing that you inform one or two persons you really trust such as your spouse, adult kids, and of course, your digital executor on HOW and WHERE they can access your files and data.

5. Include your digital assets in your estate plan. Again, digital estate planning is still alien to Philippine legal industry. But then formalizing your plan to include your digital assets. Look back to our first four steps on how to make your digital estate plan effectively executed after you are gone.

However, do not include your passwords and other digital asset access information in your will. Remember that a will becomes a public document when you die and that anyone can read it. Make a separate document containing all the necessary information without the need to formally change your will.

What happens to you digital assets after you die? They depend on how you will follow the steps given above.

Join the OFW UsapangPiso Facebook Group to learn how to plan your finances the right way and how to grow your money in various financial instruments and investment vehicles such as stocks, mutual funds, UITF’s, bonds, money market, real estate, and others.