On March 7, 2019, Myrna M. DeLeon passed away, days before her 65th birthday. “Her death was completely unexpected,” said her daughter and my brother-in-law’s wife, Casey. In the emotional aftermath for the family, one thing made the grieving process less stressful: Myrna’s “in case of death” preparations. She had filed important documents in a safe and kept a categorized “little black book of information.”
“She was a nurse who was organized in the operating room, and she took that skillset of organization and advanced thinking into our home life as well,” Casey said. “For example, ‘B’ was not for people with the last name starting with B, but for banks and other financial institutions. It listed account numbers for policies and phone numbers to call for claims.”
Casey and her brother had set up their mom’s phone and email, so they knew her passwords for those, which proved essential. “All of her contacts were in her cellphone, and I needed those to inform them of Mom’s passing. I also needed to ask her colleagues how their union benefits worked so I could get answers as quickly as possible.”
Preparing for your eventual demise is a gift your loved ones will appreciate even as they mourn your loss — and it will give you peace of mind in the present, too. Most people have thought about setting up a will and doing other estate planning, but you should also arm your family with the most essential information they’ll need in the immediate days and weeks after you’re gone, preferably in one easy-to-access place. Here’s how to set up a digital version of Myrna’s “little black book” for simple and secure information sharing with family members and trusted friends.
Step 1: Share your account logins and other secure information with a password manager
Everyone should use a password manager, software that securely and conveniently stores all your account logins as well as notes you want to keep under virtual lock and key. With 1Password or LastPass, Wirecutter’s favorite password managers, you can share the critical information your family will need to know after you’re gone, such as important contacts and insurance details. The individual plans offer basic sharing features, but for these purposes a family plan is better because it provides accounts for your whole family.
With 1Password for Families ($60 per year), up to five people get their own account, you can easily move or copy items across accounts, and a designated person can help someone else in the plan recover their master password. LastPass Families ($48 per year) offers similar features for up to six people. Wirecutter prefers 1Password for its combination of security, compatibility with various devices, and ease of use, but if you want to save a few bucks a year, LastPass is a good option.
To share vaults in 1Password for Families or folders in LastPass Families, the process is roughly the same:
Click People in 1Password or Manage Family in LastPass, and invite members via email.
Once they accept your invitation, each family member creates a master password for their account and gains access to the shared vaults or folders.
Each family member can then add passwords, secure notes, bank info, contact info, files, and more in the shared vaults or folders.
To access all this information, the only thing each family member needs to remember is the one master password they set up for their account.
Step 2: Record and save emergency info
In addition to passwords, you should make other personal information readily accessible. These items include:
Instructions in case of death: Be sure to include details such as burial or living-will wishes.
Important logins or security codes that aren’t website logins: List your computer password, your phone PIN, the code to the fireproof safe, and so on.
Important contacts: Indicate who to contact at your workplace, as well as your lawyer, accountant, will executor, and insurance agents.
Locations of valuables and critical papers: Note the whereabouts of wills, passports, Social Security cards, birth certificates, and any other legal documents that are difficult to get copies of.
Recurring-bills details: Specify when the bills are due and how they’re paid (if they’re autopay or where to send a check).
Financial account details: List your retirement and investment accounts, insurance policies, bank accounts, and credit cards.
You can create a secure note in your password manager for each of the items above. Or, if you want a free option or if some family members aren’t likely to use a new app, you can create a password-protected spreadsheet that contains this information. We’ve created an emergency-information template as an Excel spreadsheet (which you can import into Google Sheets following these instructions from How-To Geek) for you to get started.
[Like what you’re reading? Sign up here for the Smarter Living newsletter to get stories like this (and much more!) delivered straight to your inbox every Monday morning.]
Step 3: Set up dead-man switches and assign custody for your digital accounts
A dead-man switch is a security feature on trains that requires operators to hold a handle on a control board so that if they let go, the switch applies the emergency brakes. A dead-man switch in non-transit terms notifies loved ones and can disable your accounts if you fail to respond to prompts. This feature is especially useful for people who live alone, because you want others to notice you’re gone as soon as possible. Google is perhaps the most important account you might want this feature for, if you use Gmail or store files in Google Drive: You can instruct the Inactive Account Manager to either delete your data or share your Google accounts with someone you trust after a period of inactivity.
Pick one person to manage your social media accounts to either preserve your memory or delete those accounts. Facebook, LinkedIn, Tumblr, Twitter, and other social media accounts all offer options for enabling your loved ones to manage your accounts, but you’ll need to change those settings before you die, of course.
Step 4: Drill practice — teach your loved ones how to survive without you
After you’ve done all the above, you should share the details with your family (you can also share select information in the password manager with a power of attorney or a trusted friend). Make sure they accept the password manager invite, install the apps, and know how to use them. Set up a calendar reminder to update your info at least once a year. And since no one likes talking about death, have that talk while you’re healthy so that your family won’t worry unnecessarily. Reassure them that all this preparation is a “just in case” measure, and you’re doing it for everyone’s peace of mind.
[ If you are having thoughts of suicide, call the National Suicide Prevention Lifeline at 1-800-273-8255 (TALK) or go to SpeakingOfSuicide.com/resources for a list of additional resources. ]
Summarise the legislative framework for the protection of personally identifiable information (PII). Does your jurisdiction have a dedicated data protection law? Is the data protection law in your jurisdiction based on any international instruments on privacy or data protection?
The legislative framework for the protection of PII in France is one of the oldest in Europe as it is based on the Law on Computer Technology and Freedom dated 6 January 1978 (Loi Informatique et Liberté, or LIL). This law has been amended several times since then, and especially by:
Law No. 2004-801 dated 6 August 2004 to implement the provisions of Directive 95/46/CE;
Law No. 2016-1321 dated 7 October 2016, which anticipates the implementation of certain provisions of the EU General Data Protection Regulation 2016/679 (GDPR);
Law No. 2018-493 of 20 June 2018 , which implements the GDPR in France and further amend the LIL;
Ordinance No. 2018-1125 of 12 December 2018 and Decree No. 2019-536 of 29 May 2019, which complete at the legislative level the compliance of the national law with the GDPR and redraft the LIL for a better readability and urderstanding of the law.
As a regulation, the GDPR has been directly effective in France since 25 May 2018.
Furthermore, the following international instruments on privacy and data protection also apply in France:
the Council of Europe Convention 108 on the Protection of Privacy and Trans-Border Flows of Personal Data;
the European Convention on Human Rights and Fundamental Freedoms (article 8 on the right to respect for private and family life); and
the Charter for Fundamental Rights of the European Union (article 7 on the right to respect for private and family life and article 8 on the right to the protection of personal data).
Data protection authority
Which authority is responsible for overseeing the data protection law? Describe the investigative powers of the authority.
The data protection authority in France is the National Commission for Data Protection and Liberties (CNIL). The CNIL is an independent public body entrusted with the following powers.
Powers of sanction
The maximum threshold of penalties that the CNIL can pronounce has been increased from €150,000 to €20 million or 4 per cent of world turnover for companies since the GDPR.
The CNIL can now compel sanctioned entities to inform each data subject individually of this sanction at their own expense.
It may also impose financial penalties without prior formal notification by the bodies where the failure to fulfil obligations cannot be brought into conformity.
It can also limit temporarily or definitively a specific processing.
Control and investigation powers
The CNIL is vested with investigation and control powers that allow its staff to have access to all professional premises and to request, on the spot, all necessary documents and to take a copy of any useful information. CNIL staff can also access any computer programs linked to the processing of PII and to recorded information. The CNIL can also conduct a documentary control where a letter accompanied by a questionnaire is sent to a PII controller and/or processor to assess the conformity of processing operations carried out by them or an online investigation, in particular by consulting data that are freely accessible or made directly accessible online, including under a fake identity.
In 2019, the CNIL will focus its supervisory action on three main themes, directly resulting from the entry into force of the GDPR:
respect of the rights of the data subjects;
the processing of minors’ data; and
the sharing of responsibilities between controllers and processors.
Regulatory powers
The powers of the CNIL have recently been extended, as it will have to be consulted for every bill or decree related to data protection and processing. Opinions will automatically be published.
The CNIL is also entrusted with the power to certify, approve and publish standards or general methodologies to certify the compliance of personal data anonymisation processes with the GDPR, notably for the reuse of public information available online.
Legal obligations of data protection authority
Are there legal obligations on the data protection authority to cooperate with data protection authorities, or is there a mechanism to resolve different approaches?
If the owner or processor of PII carries out cross-border processing either through multiple establishments in the EU or with only a single establishment, the supervisory authority for the main or single establishment acts as lead authority in respect of that cross-border processing.
As lead authority, the CNIL must cooperate with the data protection authorities in other member states where the owner or the processor is established, or where data subjects are substantially affected, or authorities to whom a complaint has been made. Specifically, the CNIL has to provide information to other data protection authorities and can seek mutual assistance from them and conduct joint investigations with them on their territories.
More generally, the CNIL is required to provide assistance to other data protection authorities in the form of information or carrying out ‘prior authorisations and consultations, inspections and investigations’. The European Commission can specify forms and procedures for mutual assistance. The CNIL could also participate in joint investigation and enforcement operations with other data protection authorities, particularly when a controller has an establishment on its territory or a significant number of its data subjects are likely to be substantially affected.
Breaches of data protection
Can breaches of data protection law lead to administrative sanctions or orders, or criminal penalties? How would such breaches be handled?
Failure to comply with data protection laws can result in complaints, data authority investigations and audits, administrative fines, penalties or sanctions, seizure of equipment or data, civil actions (including class actions that have been introduced by Law No. 2016-1547 dated 18 November 2016 for the Modernisation of the 21st Century Justice), criminal proceedings and private rights of action.
Proceedings
When the CNIL finds a PII owner to be in breach of its obligations under the LIL, as a preliminary step the CNIL chairman may issue a formal notice for the PII owner to remedy the breach within a limited period of time. In cases of extreme urgency, this period may be reduced to 24 hours.
When the breach cannot be remedied in the context of a formal notice, the CNIL may impose one of the following sanctions without prior formal notice of adversarial procedure:
a formal warning notification;
a financial penalty; or
the withdrawal of the authorisation to operate the data processing.
When the PII owner complies with the terms of the formal notice, the CNIL chairman shall declare the proceedings closed. Otherwise, the competent committee of CNIL may, after a contradictory procedure, pronounce one of the following penalties:
a warning notification;
a financial penalty, except when the PII owner is a public authority;
an injunction to cease treatment; or
the withdrawal of the authorisation granted by the CNIL for the data processing concerned.
In case of emergency and infringement to civil rights and freedoms, the CNIL may, after an adversarial procedure, take the following measures:
the suspension of the operation of data processing;
a formal warning;
the lockdown of PII for a maximum of three months (except for certain processing carried out on behalf of the French Administration); or
for certain sensitive files of the French Administration, the Prime Minister is given information in order for him to take the necessary measures to remedy the breaches.
In the event of a serious and immediate violation of rights and freedoms, the chairman of the CNIL may request, by summary application, the competent judge to order any necessary security measures.
The CNIL may also inform the public prosecutor that it has found infringements of data protection law that are criminally sanctionable.
Publicity of the penalties
The CNIL can make public the financial penalties that it pronounces. The inclusion of these sanctions in publications or newspapers is no longer subject to the condition of bad faith of the entity concerned.
Criminal sanctions
Infringements to data protection law may be punished by imprisonment for a maximum period of five years and a criminal fine up to €300,000 (articles 226-16 to 226-22-1 of the Criminal Code). However, criminal sanctions are hardly ever pronounced.
Scope
Exempt sectors and institutions
Does the data protection law cover all sectors and types of organisation or are some areas of activity outside its scope?
The LIL is generally applicable to all public bodies and all non-public entities that process PII and intends to cover all sectors. However, certain processing carried out by public authorities is subject to specific obligations that differ from the general obligations imposed upon private entities, for example:
processing of PII by public bodies for reasons of national security is subject to a specific regime supervised by the executive power; and
processing of PII managed by judicial authorities related to offences, convictions and security measures is subject to a specific regime supervised by the executive power.
The following categories of data processing fall outside the scope of the LIL:
processing of PII solely for journalistic or artistic purposes; and
processing of PII by a natural person in the course of a purely personal or household activity.
Communications, marketing and surveillance laws
Does the data protection law cover interception of communications, electronic marketing or monitoring and surveillance of individuals? If not, list other relevant laws in this regard.
The LIL does not cover the interception of communications nor surveillance of individuals when implemented for public interest purposes.
This is subject to the authority of a dedicated public authority, the National Commission for Monitoring Intelligence Techniques. This field is regulated by several laws, mainly Law No. 91-646 of 10 July 1991 and Law No. 2015-912 of 24 July 2015.
Electronic marketing is subject to the Postal and Electronic Communication Code (article L. 34-5 et seq) and to the Consumer Code (article L. 121-20-5 et seq).
Other laws
Identify any further laws or regulations that provide specific data protection rules for related areas.
Processing of health PII is subject to the provisions of the Public Health Code as well as to the LIL.
The solicitation by automatic calling machines, email or fax, and the sale or transfer of PII for prospecting purposes using these, is subject to the provisions of the Postal and Electronic Communications Code.
PII formats
What forms of PII are covered by the law?
The LIL is aimed at covering all forms of PII, which means any information relating to an individual who is identified or who could be directly or indirectly identified, by reference to an identification number or to the combination of one or several elements.
In addition, the LIL applies to automatic processing and to non-automatic processing of PII that forms part of a filing system (or is intended to form part of a filing system), with the exception of processing carried out for personal purposes. Accordingly, even records of PII in paper form may be subject to the LIL.
Extraterritoriality
Is the reach of the law limited to PII owners and processors of PII established or operating in the jurisdiction?
The LIL applies to processing of PII carried out by a PII owner:
who is established in France, whether or not the processing takes place in France. In this context, ‘establishment’ is broadly interpreted as it refers to all sorts of ‘installation’, regardless of its legal form; or
who is not established in France, but who uses a means of processing located in French territory, for instance, hosting data, internet service provider, cloud services, among others.
Covered uses of PII
Is all processing or use of PII covered? Is a distinction made between those who control or own PII and those who provide PII processing services to owners? Do owners’, controllers’ and processors’ duties differ?
In principle, the LIL applies to all processing of PII, with the exception of that carried out for purely personal purposes. The controller determines the purposes for which and the means by which PII is processed, whereas the processor processes PII only on behalf of the controller. The duties of the processor towards the controller must be specified in a contract or another legal act.
In principle, the PII controller is the principal party for responsibilities such as collecting consent, enabling the right to access or managing consent-revoking. However, the GDPR introduces direct obligations for PII processors (including security, international transfers, record keeping, etc) and thus they can be held directly liable by data protection authorities for breaches of the GDPR and the LIL.
Controllers and processors are also jointly and severally liable where they are both responsible for damage caused by a breach.
Legitimate processing of PII
Legitimate processing – grounds
Does the law require that the holding of PII be legitimised on specific grounds, for example to meet the owner’s legal obligations or if the individual has provided consent?
Every collection, processing or use of PII needs to be justified under French data protection law. In principle, the ground for legitimate processing must be the consent of the data subject, but the LIL introduced statutory legal exemptions to obtain the consent of the data subject for some processing when it is carried out for the following purposes:
the respect of a legal obligation of the data controller;
the protection of the data subject’s life (interpreted restrictively);
the performance of a public service mission entrusted to the data controller or the data recipient;
the performance of either a contract to which the data subject is a party or steps taken at the request of the data subject prior to entering a contract; or
the pursuit of the data controller’s or the data recipient’s legitimate interest provided such interest is not incompatible with the fundamental rights and interests of the data subject.
Legitimate processing – types of PII
Does the law impose more stringent rules for specific types of PII?
French law is more restrictive for the processing of specific types of PII, known as sensitive personal data. As a matter of principle, processing of sensitive data is prohibited.
The LIL provides a non-exhaustive list of sensitive PII by nature, which is PII that reveals, directly or indirectly, the racial and ethnic origins, the political, philosophical, religious opinions or trade union affiliation of individuals, or that concerns their health or sexual life. This category of sensitive data by nature can only be processed in the following cases, among others:
the data subject gave prior express consent;
the processing is necessary to protect the vital interests of the data subject or of another person, where the data subject is physically or legally incapable of giving his or her consent;
the processing is carried out by a foundation, association or any other non-profit organisation with political, philosophical, religious or trade union objectives, in the course of its legitimate activities;
the processing relates to PII that has been made public by the data subject; or
the processing is necessary for the establishment, exercise or defence of legal claims.
In relation to the use of PII in the employment context, the CNIL published several opinions on monitoring the activities of employees, video surveillance, discrimination, localisation data and collection of PII in the recruitment process. Moreover, in France, employers cannot rely on consent for processing involving PII of its employees, since the employees cannot freely consent as they are by nature subordinated to the employer.
Moreover, processing can be prohibited due to its context, such as the processing of PII relating to offences, convictions and security measures, which can only be carried out by a limited number of specific entities.
Furthermore, according to the law on the protection of personal data, a minor may consent to the processing of personal data alone with regard to the offer of information society services from the age of 15, which differs from the threshold of 16 years provided in the GDPR.
The law on the protection of personal data establishes a principle of prohibition of decisions producing legal effects on the sole basis of automated processing, including profiling intended to define the profile of the person concerned or to evaluate certain aspects of his or her personality. Such a provision maintains a certain gap with the GDPR, since the law is based on a prohibition in principle of such automated processing while the GDPR refers to an ‘individual right’ of the person concerned ‘not to be the subject of a decision based solely on automated processing, including profiling’.
Data handling responsibilities of owners of PII
Notification
Does the law require owners of PII to notify individuals whose PII they hold? What must the notice contain and when must it be provided?
As a general rule, data subjects shall be provided with the following information when their PII is collected:
the identity of the data controller;
contact details for the data protection officer, where applicable;
the purposes and the legal basis of the processing;
the category of personal data;
when PII is collected via a questionnaire, whether replies to the question are compulsory or optional;
the consequences of an absence of reply;
the categories of recipients of the data;
information on the data subject’s rights and the method to be used to exercise them (ie, the right to access the collected PII and to rectify, complete, update, block or delete it if inaccurate, incomplete, equivocal or expired; and the right to direct the use of their PII after their death);
the intended transfer of PII outside the EEA;
the storage duration or the criteria that will be used to determine the duration;
the right to lodge a complaint with a supervisory authority; and
the existence of automated decision-making, including profiling and, if applicable, meaningful information about the logic used and the significance and envisaged consequences of such processing for the data subject.
Where the data was not obtained from the data subject, the information must be provided at the time of recording of the personal data or, if disclosure to a third party is planned, no later than at the time the data is disclosed for the first time.
Exemption from notification
When is notice not required?
Notice is not required if the data subject already received such information. Furthermore, in cases where the data subject did not provide his or her PII directly, the data controller is exempted from the notification obligation if:
informing the data subject proves impossible or would involve a disproportionate effort, in particular in the context of statistical, historical or scientific research, or for the purpose of medical examination of the population with a view to protecting and promoting public health;
the data subject already has the information;
the PII is recorded only to comply with statutory and legal obligations; or
the PII must remain confidential subject to an obligation of professional secrecy regulated by EU or member state law, including a statutory obligation of secrecy.
Control of use
Must owners of PII offer individuals any degree of choice or control over the use of their information? In which circumstances?
The LIL grants rights to data subjects allowing them to have some control over the use of their PII. The relevant rights in this field are notably the right to rectify inaccurate or out-of-date PII, and the right to be forgotten, in order to obtain the deletion of such PII (see question 38).
Data accuracy
Does the law impose standards in relation to the quality, currency and accuracy of PII?
As a general rule, the PII controller shall ensure that the processed PII is adequate, relevant and not excessive in relation to the purposes for which it is collected and for onward processing. In addition, the PII owner shall also ensure that PII is accurate, complete and, if necessary, updated. In this respect, the law provides that the PII owner shall take appropriate measures to ensure that inaccurate or incomplete data for the purposes for which it is collected or processed is erased or rectified.
Amount and duration of data holding
Does the law restrict the amount of PII that may be held or the length of time it may be held?
PII owners are required to limit the processing of PII to what is strictly necessary for the purpose of the processing. The amount of PII collected and processed must be proportionate to the purposes of the processing.
The LIL also provides that the PII must only be kept in a form enabling the data subject to be identified for a period that does not exceed the time necessary for the purposes for which the PII is collected and processed. Accordingly, if the legitimate ground of the processing has disappeared or expired, the controller should erase, anonymise or pseudonymise the PII.
Finality principle
Are the purposes for which PII can be used by owners restricted? Has the ‘finality principle’ been adopted?
The finality principle is a core principle of data protection regulation in France. PII can only be collected for specified, explicit and legitimate purposes and must not be further processed in a way incompatible with those purposes.
Furthermore, the CNIL already encourages PII controllers to implement the ‘data minimisation’ principle (which is consecrated in the GDPR), as well as the systematic use, where applicable, of anonymisation and pseudonymisation techniques.
Use for new purposes
If the finality principle has been adopted, how far does the law allow for PII to be used for new purposes? Are there exceptions or exclusions from the finality principle?
PII can be processed for new purposes provided that such onward processing is not incompatible with the initial purposes for which the PII was collected and subject to the data subject’s rights and the principle of data minimisation.
Processing of PII for new purposes when such purposes are statistical, historical or medical research is generally considered as compatible with the initial purpose.
Processing of PII for new purposes even incompatible with the initial purpose is also possible with the prior consent of the data subject.
Security
Security obligations
What security obligations are imposed on PII owners and service providers that process PII on their behalf?
Data controllers must protect PII against accidental or unlawful destruction, loss, alteration and disclosure, particularly when processing involves data transmission over networks.
Data controllers are required to take steps to:
ensure that PII in their possession and control is protected from unauthorised access and use;
implement appropriate physical, technical and organisational security safeguards to protect PII; and
ensure that the level of security is appropriate with the amount, nature and sensitivity of the PII.
The CNIL issued guidelines on 23 January 2018 on the security measures to be implemented by data controllers, in line with the requirement of the GDPR, to guarantee the security of personal data processing. These guidelines encourage data controllers to perform a privacy impact assessment, which shall be carried out in consideration of the two following pillars:
the principles and fundamental rights identified as ‘not negotiable’, which are set by law and must be respected. They shall not be subject to any modulation, irrespective of the nature, seriousness or likelihood of the risks incurred; and
the management of risks on data subjects that allows data controllers to determine which appropriate technical and organisational measures shall be taken to protect the PII.
Notification of data breach
Does the law include (general or sector-specific) obligations to notify the supervisory authority or individuals of data breaches? If breach notification is not required by law, is it recommended by the supervisory authority?
With the GDPR, there is a general obligation for PII controllers to report PII data breaches to the CNIL without undue delay and, where feasible, not later than 72 hours after becoming aware of it. However, an exception to this notification exists when the data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification is not made within 72 hours, reasons will have to be provided to the supervisory authority.
The notification shall at least:
describe the nature of the personal data breach, including, where possible, the categories and approximate number of data subjects concerned, and the categories and approximate number of personal data records concerned;
communicate the name and contact details of the data protection officer or other contact point where more information can be obtained;
describe the likely consequences of the personal data breach; and
describe the measures taken or proposed to be taken by the owner to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.
Moreover, when the data breach is likely to result in a high risk to the rights and freedoms of data subjects, the controller shall notify the data breach to the data subject without undue delay. This notification can be waived if the CNIL considers that:
the controller has taken subsequent measures that ensure the high risk to the rights and freedoms of data subjects is no longer likely to materialise;
appropriate technical and organisational protection was in place at the time of the incident (eg, encrypted data); or
the notification would trigger disproportionate efforts (instead a public information campaign or ‘similar measures’ should be relied on so that affected data subjects can be effectively informed).
The PII owner must keep an updated record of all PII breaches, which must contain the list of conditions, effects and measures taken as remedies. This record must be communicated to the CNIL on request.
Failure to meet the above requirements exposes the owners of PII to an administrative fine of up to €10,000,000 or, in case of an undertaking, up to 2 per cent of the total worldwide annual turnover of the preceding financial year, whichever is higher.
Providers of electronic communication services are also subject to an obligation to notify the CNIL within 24 hours in the event of a PII breach. In this respect, when the PII breach may affect PII or the privacy of a data subject, the PII controller shall also notify the concerned data subject without delay.
Internal controls
Data protection officer
Is the appointment of a data protection officer mandatory? What are the data protection officer’s legal responsibilities?
Controllers and processors may decide to appoint a data protection officer (DPO). However, this is mandatory for public sector bodies, those involved in certain listed sensitive processing or monitoring activities or where local law requires an appointment to be made.
The DPO assists the owner or the processor in all issues relating to the protection of the PII. In a nutshell, the DPO must:
monitor compliance of the organisation with all regulations regarding data protection, including audits, awareness-raising activities and training of staff involved in processing operations;
advise and inform the owner or processor, as well as their employees, of their obligations under data protection regulations;
act as a contact point for requests from individuals regarding the processing of their personal data and the exercise of their rights; and
cooperate with the data protection authorities (DPAs) and act as a contact point for DPAs on issues relating to processing.
Record keeping
Are owners or processors of PII required to maintain any internal records or establish internal processes or documentation?
PII controllers are required to maintain a record of processing activities under their responsibilities as referred to in article 30 of the GDPR. Processors of PII are also required to maintain such a record about personal data that controllers engage them to process.
While an exemption from the above obligations applies to organisations employing fewer than 250 people, this exemption will not apply where sensitive data is processed and where owners or processors of PII find themselves in the position of:
carrying out processing likely to result in a risk (not just a high risk) to the rights of the data subjects;
processing personal data on a non-occasional basis; or
processing sensitive data or data relating to criminal convictions.
New processing regulations
Are there any obligations in relation to new processing operations?
Since the GDPR is directly effective in France, controllers and processors of PII are required to apply a privacy-by-design approach by implementing technical and organisational measures to show that they have considered and integrated data compliance measures into their data-processing activities. These technical and organisational measures might include the use of pseudonymisation techniques, staff training programmes and specific policies and procedures.
In addition, when processing is likely to result in a high risk to the rights and freedoms of natural persons, owners and controllers are required to carry out a detailed privacy impact assessment (PIA). Where a PIA results in the conclusion that there is indeed a high, and unmitigated, risk for the data subjects, controllers must notify the supervisory authority and obtain its view on the adequacy of the measures proposed by the PIA to reduce the risks of processing.
Controllers and processors may decide to appoint a DPO (see question 22).
Registration and notification
Registration
Are PII owners or processors of PII required to register with the supervisory authority? Are there any exemptions?
PII controllers or processors are not required to register with the CNIL.
Since the entry into force of the GDPR, owners and processors no longer have the obligation to declare the PII processing they carry out to the CNIL.
However, the law on personal data maintains the requirement of a prior authorisation from the CNIL for the following processing:
of biometric or genetic data by the state;
for research, study or evaluation in the field of health.
Formalities
What are the formalities for registration?
The formalities of registration for data processing requiring prior authorisation must be performed for each new PII processing operation.
The formalities are free of charge and can be realised on the CNIL’s website and are non-renewable since they remain valid for the whole duration of the processing. The following information must be provided:
the identity and the address of the data controller;
the purposes of the processing and the general description of its functions;
if necessary, the combinations, alignments or any other form of relation with other processing;
the PII processed, its origin and the categories of data subjects to which the processing relates;
the period of retention of the processed information;
the department responsible for carrying out the processing;
the authorised recipients to whom the data may be disclosed;
the function of the person where the right of access is exercised, as well as the measures relating to the exercise of this right;
the steps taken to ensure the security of the processing and data, the safeguarding of secrets protected by law and, if necessary, information on recourse to a sub-contractor; and
if applicable, any transfer of PII that is envisaged outside of the EEA.
Penalties
What are the penalties for a PII owner or processor of PII for failure to make or maintain an entry on the register?
Failure to comply with the registration obligation can be punished by imprisonment for a maximum period of five years and a criminal fine of up to €300,000 (article 226-16 and 226-16-1 A of the Criminal Code).
Refusal of registration
On what grounds may the supervisory authority refuse to allow an entry on the register?
The CNIL can refuse its registration if some of the information to be provided is missing or if the PII collected for the processing is too broad in relation to its purpose. In such cases, the PII owner cannot carry out the intended data processing. Failure to comply with a refusal of the CNIL to authorise processing is subject to criminal sanctions (see question 27).
Public access
Is the register publicly available? How can it be accessed?
On 30 August 2017, the CNIL published on its website a register that lists the formalities completed since 1979 by data controllers (public and private). This register can be consulted freely, with ease, via the CNIL website.
Effect of registration
Does an entry on the register have any specific legal effect?
The PII controller may only be allowed to start carrying out the processing upon registration and receipt of authorisation from the CNIL.
The registration as such does not exempt a data controller from any of its other obligations. After the registration, data controllers still need to ensure that the processing complies with the information disclosed in the notification and with data protection standards.
Other transparency duties
Are there any other public transparency duties?
Not to our knowledge.
Transfer and disclosure of PII
Transfer of PII
How does the law regulate the transfer of PII to entities that provide outsourced processing services?
Under the LIL regime, any person that processes PII on behalf of the data controller is regarded as a processor. The processor may only process PII under the data controller’s instructions.
When a data controller outsources some of its processing or transfers PII in relation with such processing to a sub-contractor (ie, a data processor), it must establish an agreement with that processor.
This agreement shall specify the obligations incumbent upon the processor as regards the obligation of protection of the security and confidentiality of the data and provide that the processor may act only upon the instruction of the data controller.
Restrictions on disclosure
Describe any specific restrictions on the disclosure of PII to other recipients.
Generally, there are no specific restrictions on the disclosure of PII other than the general data protection principles provided by the LIL.
Nevertheless, disclosure of sensitive PII such as health data is limited to certain institutions and professionals, unless the data controller has obtained a specific and express consent of the data subject for the disclosure of such PII.
Cross-border transfer
Is the transfer of PII outside the jurisdiction restricted?
PII can be transferred freely to other countries within the EEA, as well as to countries recognised by the European Commission as providing an ‘adequate level of data protection’.
Such transfers of PII from France are permitted to Canada (under certain conditions), Switzerland, Argentina, Guernsey, the Isle of Man, Jersey, the Faroe Islands, Andorra, Israel, Uruguay and New Zealand.
Furthermore, transfers of PII from France to recipients established in the US are permitted to the extent that they are registered under the Privacy Shield certification.
Moreover, a controller or processor may transfer PII to other countries, or to recipients in the United States who have not chosen to sign up to the Privacy Shield, only if the controller or processor has provided appropriate safeguards, and on condition that enforceable data subject rights and effective legal remedies for data subjects are available.
The appropriate safeguards may be provided for by:
a legally binding and enforceable instrument between public authorities or bodies;
binding corporate rules approved by the CNIL;
standard data protection clauses – model clauses designed by the European Commission to facilitate transfers of personal data from the EU to all third countries, while providing sufficient safeguards for the protection of individuals’ privacy; or
a code of conduct approved by the CNIL, together with binding and enforceable commitments of the controller or processor in the third country to apply the appropriate safeguards, including as regards data subjects’ rights; or
a certification mechanism approved by the CNIL together with binding and enforceable commitments of the controller or processor in the third country to apply the appropriate safeguards, including as regards data subjects’ rights.
Subject to the authorisation from the CNIL, the appropriate safeguards may also be provided for, in particular, by:
contractual clauses between the controller or processor and the controller, processor or the recipient of the personal data in the third country or international organisation; or
provisions to be inserted into administrative arrangements between public authorities or bodies which include enforceable and effective data subject rights.
However, in the absence of an adequacy decision or of appropriate safeguards as descried above, a transfer of personal data to a third country or an international organisation shall take place if:
the data subject has explicitly consented to its transfer after having been informed of the possible risks of such transfers due to the absence of an adequacy decision and appropriate safeguards; or
the transfer is necessary under one of the following conditions:
protection of the data subject’s life;
protection of the public interest;
to meet obligations ensuring the establishment, exercise or defence of legal claims;
consultation of a public register that is intended for public information and is open for public consultation or by any person demonstrating a legitimate interest;
performance of a contract between the data controller and the data subject, or of pre-contractual measures taken in response to the data subject’s request; or
conclusion or performance of a contract, either concluded or to be concluded in the interest of the data subject between the data controller and a third party.
Data controllers must inform data subjects of the data transfer and provide the following information:
the country where the recipient of the data is established;
the nature of the data transferred;
the purpose of the transfer;
categories of the recipients; and
the level of protection of the state concerned or adopted alternative measures.
Notification of cross-border transfer
Does cross-border transfer of PII require notification to or authorisation from a supervisory authority?
The cross-border transfer must be approved by the CNIL when it is based on:
contractual clauses concluded between the controller or processor and the controller, processor or the recipient of the personal data in the third country or international organisation; or
provisions inserted into administrative arrangements between public authorities or public bodies which include enforceable and effective data subject rights.
Further transfer
If transfers outside the jurisdiction are subject to restriction or authorisation, do these apply equally to transfers to service providers and onwards transfers?
Restrictions on cross-border transfers apply to transfers from the PII owner based in France to a data processor outside of the EEA. Onward transfers are in principle subject to the restrictions in force in the recipient’s jurisdiction. By exception, SCCs contain specific requirements for onward transfers.
Rights of individuals
Access
Do individuals have the right to access their personal information held by PII owners? Describe how this right can be exercised as well as any limitations to this right.
Data subjects have a right to ‘access’ the PII that a controller holds about them.
Data subjects can exercise their right of access by sending a signed and dated access request, together with proof of identity. Data subjects can request that the PII owner provides the following information:
confirmation as to whether the controller processes the data subject’s PII;
information related to the purposes for which the PII is processed, and the recipients or categories of recipients to whom the PII is or has been provided;
where applicable, information related to cross-border data transfers;
the logic involved in any automated decision making (if any);
the communication, in an accessible form, of personal data concerning the data subject as well as any information available as to the origin of the data; and
information allowing the data subject to know and to contest the logic underlying the automated processing in the event of a decision taken on the basis of it and producing legal effects with regard to the person concerned.
The controller may oppose manifestly abusive access requests, in particular with respect to their excessive number or repetitive or systematic nature. In the event of a claim from the data subject, the burden of proving the manifestly abusive nature of the requests lies with the PII owner to whom they are addressed.
The right of access may be denied when the personal data is kept in a form that excludes any risk of invasion of the privacy of the data subjects (ie, if PII is pseudonymised or anonymised) and for a period not exceeding what is necessary for the sole purpose of statistical, scientific or historical research.
Other rights
Do individuals have other substantive rights?
In addition to the right of access described above, data subjects are granted the rights described below. When PII has been collected by electronic means, the data subjects must be provided with a way to exercise their rights using electronic means.
Right to object
Data subjects have the right to object to the processing of their PII on legitimate grounds, unless the processing is necessary for compliance with a legal obligation or when the act authorising the processing expressly excludes the data subjects’ right to object.
Data subjects also have the right to object, at no fee and without justification, to the use of PII related to them for the purposes of direct marketing by the PII owner or by an onward data controller.
Right to correct
Upon proof of their identity, data subjects may require the PII owner to correct, supplement, update, lock or erase personal data related to them that is inaccurate, incomplete, equivocal or out of date, or whose collection, use, disclosure or storage is prohibited.
When the concerned PII has been transmitted to a third party, the data controller must carry out the necessary diligence to notify such third party of the modifications operated in accordance with the data subjects’ request.
Right to be forgotten
Data subjects have the right to request the PII controller to erase personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay, in particular where one of the following grounds applies:
the PII is no longer necessary in relation to the purposes for which it was collected or otherwise processed;
the data subject withdraws consent on which the processing is based, and where there is no other legal ground for the processing;
the PII has been unlawfully processed;
the PII has to be erased for compliance with a legal obligation in EU or member state law to which the controller is subject; or
the PII has been collected in relation to the offer of information society services.
Right to be forgotten for children
Data subjects have the right to request the PII controller to erase without undue delay the personal data that has been collected in the context of the provision of information society services where the data subject was under age at the time of collection. When the PII controller has transmitted the concerned data to another PII owner, the data controller shall take reasonable measures, including technical measures, to inform the onward PII owner of the data subject’s request for the deletion of any link to the data, or any copy or reproduction thereof.
This is unless the data processing is necessary:
to exercise the right to freedom of expression and information;
to comply with a legal obligation requiring the processing of such data or to carry out a task in the public interest or in the exercise of the public authority entrusted to the controller;
to public health;
to archival purposes of public interest, for scientific or historical research or for statistical purposes; or
to establish or exercise legal rights.
Right of data portability
Data subjects have a right to:
receive a copy of their personal data in a structured, commonly used, machine-readable format that supports re-use;
transfer their personal data from one controller to another;
store their personal data for further personal use on a private device; and
have their personal data transmitted directly between controllers without hindrance.
‘Digital death’
Data subjects have the right to set guidelines for the retention, deletion and communication of their personal data after their death.
Compensation
Are individuals entitled to monetary damages or compensation if they are affected by breaches of the law? Is actual damage required or is injury to feelings sufficient?
Individuals may claim for damages when they are affected by a breach of the LIL that qualifies as a criminal offence subject to the referral to criminal jurisdiction.
In this case, compensation may amount to the total amount of damage endured by the individual, which includes moral damages or injury to feelings.
Enforcement
Are these rights exercisable through the judicial system or enforced by the supervisory authority or both?
Where the data controller does not answer or refuses to grant the right to the data subjects’ request, the latter can refer to the CNIL or a judge to obtain interim measures against the data controller.
Exemptions, derogations and restrictions
Further exemptions and restrictions
Does the law include any derogations, exclusions or limitations other than those already described? Describe the relevant provisions.
Not applicable.
Supervision
Judicial review
Can PII owners appeal against orders of the supervisory authority to the courts?
PII owners can appeal against orders or sanctions pronounced by the CNIL in front of the Supreme Court for the administrative order (the Council of State).
Specific data processing
Internet use
Describe any rules on the use of ‘cookies’ or equivalent technology.
Data controllers may install cookies or equivalent devices subject to the data subject’s prior consent. Such consent may derive from the browser or other application settings. The following categories of cookies require the prior consent of the data subject:
cookies related to targeted advertising;
social networks’ cookies generated in particular by their buttons of sharing when collecting personal data without the consent of the persons concerned; and
analytics cookies.
As regards analytics, the CNIL considers that these cookies may be exempted from prior consent subject to the following:
information must be given to users who must be able to oppose processing (this opposition must be possible from any terminal);
the data collected must not be cross-checked with other processing (client files or statistics of attendance of other sites, for example);
the cookies must be used only for the purpose of anonymous statistics and should not allow the tracking of navigation on different sites;
raw attendance data associating an identifier must also not be retained for more than 13 months; and
the use of an IP address to geolocate the user should not allow the street to be determined: only the first two bytes of the IPv4 addresses can be preserved and possibly used for delocalisation (for IPv6 only the first six bytes can be retained).
Implied consent is now accepted and companies must implement a two-step approach for obtaining consent.
Data controllers must use a banner providing the following information to the website user:
purposes of the cookies;
the possibility to object to the use of cookies and to modify settings by clicking on a link (made available in the cookie banner). Such link must describe the operations to be carried out by the data subject to disable the cookies;
that further navigation on the website constitutes valid consent to the storage of cookies on their device; and
an explanation of how disabling cookies might affect the data subject’s use of the website or app.
The CNIL recommends that to ensure that the data subject’s consent is unambiguous, the banner shall not disappear until the individual continues to navigate on the website, for example, by clicking on an element of the website or navigating to another page of the website.
The CNIL considers that the consent given by the data subject is only valid for 13 months. After this period, the consent of data subjects shall be collected again with the same conditions. Accordingly, the cookies’ lifetime shall be limited to 13 months from the date of the first deposit on the user’s device. New visits of the user to the website shall not automatically extend the cookies’ lifespan.
In addition, data subjects shall be provided with an easy way to withdraw their consent to the deposit of cookies at any time.
Electronic communications marketing
Describe any rules on marketing by email, fax or telephone.
Sending unsolicited marketing messages is prohibited without the prior consent of the recipient. Such consent of the data subject cannot derive from:
a pre-ticked box; or
general acceptance of terms and conditions.
Under the following conditions, the prior consent of the data subject is not required to address unsolicited marketing messages:
when the information of the data subject has been collected on the occasion of a purchase in accordance with the applicable data protection rules;
the marketing messages concern products or services similar to those purchased by the data subject; and
the data subject is provided with an easy way to opt out of receiving marketing messages when the data is collected and with each marketing message.
In a B2B relationship, the prior consent of the recipient is not required provided that:
the recipient has been informed that his or her email address would be used to address marketing messages;
the recipient has the possibility to oppose the use of his or her email address for the purpose of direct marketing at the time of its collection and with each message; and
the marketing messages must be in relation to the recipient’s profession.
Direct marketing by regular mail or telephone is not subject to the prior consent of the recipient, but the recipient has the possibility to object to it by signing up to an opt-out list. In France, this list is called Bloctel, which is the governmental opt-out list for telephone marketing.
Cloud services
Describe any rules or regulator guidance on the use of cloud computing services.
There is no specific provision applicable to cloud computing in the LIL or the GDPR. The CNIL issued guidelines addressed to companies contemplating subscription to cloud computing services dated 25 June 2012. These guidelines contain seven recommendations by the CNIL that should be taken into account by data controllers when assessing the opportunity to migrate to cloud services, as well as a template clause to be inserted into agreements with cloud computing services providers.
The recommendations are to:
establish a precise mapping of the data and processing that will be migrating to the cloud and the related risks;
define technical and legal security requirements adapted to the categories of data and processing;
carry out a risk analysis to identify the security measures to be implemented to preserve the essential interests of the company;
identify the type of cloud services and data hosting appropriate with respect to all data processing;
select cloud service providers that provide adequate security and confidentiality guarantees;
review and adapt the internal security policies of the company; and
carry out regular assessments of the cloud services.
Update and trends
Key developments of the past year
Are there any emerging trends or hot topics in international data protection in your jurisdiction?
Key developments of the past year46 Are there any emerging trends or hot topics in international data protection in your jurisdiction?
Since the implementation of the GDPR one year ago, many national data protection authorities have reported a sharp increase in the number of complaints. In France, the CNIL recently observed a 32 per cent increase in the number of complaints received in 2018, largely attributable to the RGPD. Indeed, the CNIL has received more than 11,900 complaints since May 2018. During the first nine months of the RGPD, the EDPB reported 144,376 complaints.
In the first major example, on 25 and 28 May 2018, the CNIL received group complaints from the associations None Of Your Business (NOYB) and La Quadrature du Net (LQDN). LQDN was mandated by 10,000 people to refer the matter to the CNIL. In the two complaints, the associations reproach Google for not having a valid legal basis to process the personal data of the users of its services, particularly for ads personalisation purposes.
As a result, Google has been fined €50 million by the CNIL for not properly informing to its users how data is collected across its services to present personalised advertisements. The CNIL noticed that the information on the data-processing activities provided to users was neither easily accessible to users nor always clear or comprehensive.
The CNIL also observed that Google doesn’t properly obtain users’ consent to target them with personalised ads. Essential information required to sufficiently inform data subjects of storage purposes, periods or categories of personal data used for ads personalisation is diluted in several documents and does not enable the user to be aware of their extent, with a several clicks required to access the full information. Therefore, the CNIL underlined that the user gives his or her consent in full, for all the processing operations purposes carried out by Google based on this consent (ads personalisation, speech recognition, etc). However, the GDPR provides that the consent is ‘specific’ only if it is given distinctly for each purpose.
Finally, we can also underlines that the CNIL is more likely to make public the sanctions that it imposes on the PII controller or processor.
A young man is staring straight into the camera. He looks late 20s or early 30s, with a suede blazer and two-toned hipster glasses, and cheerfully waves as he introduces himself. “Hi, my name’s Will,” he tells the YouTube audience. “And I’m dead.”
“While my family is a bit upset, they’re not stressed. Because when I was among the land of the living, I made the incredibly smart move of signing up for Everest.”
Will flashes a smile. His family plans his funeral in the background, using the detailed plan he left behind.
Everest is a Houston-based funeral concierge, and the firm that commissioned Will’s upbeat, millennial-friendly video last fall from Sandwich Video, a Los Angeles production company popular with the tech set in Silicon Valley. Everest published the film in February 2016 as part of a campaign to target millennials, hoping even twentysomethings can be lured into thinking about their digital afterlives.
Everest is just one of a wave of apps and digital services that are emerging to help millennials plan their own #authentic mortal passings, right down to Instagram-worthy funerals. Last fall, rival apps Cake and SafeBeyond were released within one month of each other, and both hope to streamline end-of-life planning into one simple app.
Death apps promise to help a person organize his or her entire online life into a bundle of digital living wills, funeral plans, multimedia memorial portfolios and digital estate arrangements. It could be the mother of all personal media accounts, designed to store all of a person’s online passwords in one spot, for a successor to retrieve after he or she dies.
But millennials already curate their digital lives to perfection on social media. So how much are these “death apps” adding just another layer of pressure to personalize yet another stage of their lives?
Google, Pinterest, Twitter and Facebook already offer options to let users pass control of their accounts to their loved ones if they die – with limitations. Facebook legacy contacts, for example, cannot edit a memorialized account’s old posts or delete the account entirely.
In contrast, death apps help people give their loved ones unconditional control of all of their online accounts by digitally transmitting their account passwords to them, post-mortem. Online banking, digital newspaper subscription and online shopping accounts are all scooped up by death apps, not just social media accounts.
Millennials aren’t exactly dying more frequently these days. In 2013, the most recent year for which official data is available, Millennials’ death rates stayed constant in the US, even dropping slightly in the youngest group. Logically, it’s the post-second world war baby boomers driving the business of death apps – and coincidentally, the death rates of people between 55 and 64 also jumped in 2013.
But end-of-life planning services see millennials as their newest drivers as they begin to have families and think about how to manage their legacies. And some are making death a part of their lifestyles. “Death salons” and “death cafés” have grown cult followings, and there are selfie tumblrs of people at funerals.
Everest claims that more than 25 million people across the US and Canada have access to the service as part of their employee benefits packages. In 2013, under pressure from its customers, Everest rolled out a cloud service, similar to Cake and SafeBeyond, that lets clients store any type of digital data on its servers.
“They’re getting used to these kinds of services in other parts of their lives. It’s just one more of those,” says Mark Duffey, Everest’s CEO. “Instead of making it harder, in many cases, it makes it simpler.”
The co-founder of another end-of-life planning company, Everplans, formed the basis for Everplans by drawing on her own experience planning her wedding with The Knot’s online wedding planning tool. Sites like The Knot and The Bump provide online checklists and weekly email reminders for wedding and family planning, spanning several months or even years ahead of an event. But planning for death? With these death apps, it could turn into a lifelong Facebook update.
“We don’t expect somebody to go through and finish an Everplan in an hour or a day. We see it as an ongoing process,” says Gene Newman, Everplans’ editorial director.
Newman says he updates his own Everplans account every week, sometimes when he hears user feedback on new data scenarios the company should include or exclude if a service shuts down. After Everplans adds and deletes fields in its service plan, Newman usually makes changes to his own account in the same places.
Some services, like Afternote, offer people templates to create multimedia tributes about themselves while they’re still living and save them to their accounts. In case you only wanted people to remember you in a photomontage, this would be the route to go.
Since millennials already love visually documenting their lives, they could make photography in the end-of-life industry take off. Melanie Parker is an independent photographer that has specialized in funeral photography for five years. Although none of the funerals she has photographed have been for millennials, she says that the average age of the clients who ask her to photograph funerals is 24 years old.
And while no one has reserved Parker’s photography services as part of a pre-meditated funeral plan, she affirms that the profile of the person seeking funeral photography services typically is a millennial.
“The people that I talk to look at the pictures again and again,” Parker says. “This is another stage in their lives, too, like any other.”
This article is provided by Legal Templates — the web’s leading resource for creating free legal documents simply and quickly. We equip people with the right tools to be their own legal advocates. Find out more at Legal Templates »
Americans are creating online data at an alarming rate, and it is increasing exponentially. Each minute of the day, online users share roughly 2.5 million pieces of content on Facebook, Tweet 2.8 million times, post 2.2 million photos on Instagram, and swipe over 400,000 times on Tinder. On top of social media, people may use a combination of other online accounts – email, financial, blogs, photo-sharing, and online data storage services.
This adds up to a large amount of “digital property” or “digital assets” for most individuals. It should, therefore, seem commonplace to include a plan for your digital estate in a Last Will & Testament to ensure this sensitive data remains secure and is managed properly after one’s death. Otherwise, this data could be vulnerable to identity thieves and hackers who target the records of approximately 2.5 million deceased individuals a year.
What is Your Digital Estate?
A person’s digital estate is made up of all the information about themselves or created by themselves that exists in digital forms, either on the internet or on some sort of electronic storage device. This article will help you better understand the many different kinds of “digital assets” you might own.
Types of Digital Property
Personal digital property
Personal digital property with monetary value
Digital business property
Personal Digital Property
Your personal digital property includes any information or data that you store electronically – online, on the cloud, or on external hardware. Examples include:
Computing hardware – computers, external hard drives, flash drives, tablets, smartphones, digital music players, digital cameras, and any other digital devices
Online accounts – email accounts, social media accounts, shopping accounts, photograph or video sharing platforms, video gaming accounts, online storage, websites or blogs you manage
Intellectual property – copyrighted materials and trademarked items
Personal Digital Property with Monetary Value
This is not completely separate from the list above, but includes digital property that brings in some sort of monetary value or generates revenue. Examples include:
Computing hardware – computers, external hard drives, flash drives, tablets, smartphones, digital music players, digital cameras, and any other digital devices of monetary value
Websites that generate revenue
Payment platforms – Paypal, Amazon Payments, Google Wallet, bank accounts, loyalty rewards programs, and accounts with credit balances in your favor
Digital Business Property
This includes digital property that is owned by a business organization, either your business or your employer. Examples include:
Online accounts registered to the business
Assets to sell on an online store – eBay, Etsy, Amazon, etc
Mailing lists, newsletter subscriptions, or email lists with the names of company clients
Client information and customer history
Other Digital Property to Manage
Hardware
It is not just online data that you need to secure in order to keep your digital estate safe. There are numerous external hardware devices that can contain either valuable or sensitive data. Here are some examples and what content needs to be secured:
External hard drives – all contents
Smart phones and mobile phones – call history, text history, photographs, videos, location data, contact list, online access through applications, and other content
Tablets – all contents
Computers – all contents
Digital music player – personal data and online store accounts
Digital camera – photographs or videos
E-readers – personal data and online store accounts
Online Accounts
It has become common for people to have a wide variety of online accounts. Each one of these accounts likely required some sensitive data – name, age, gender, email address – in order to open it. Beyond this personal data, many of these accounts generate and host a lot more personal information about you that makes up a large portion of your digital estate and therefore, needs to be managed. Consider these digital assets:
Social media accounts
Facebook, Twitter, LinkedIn, Pinterest, and other, including any content you shared and any correspondences you had on those platforms
Online communication tools
Skype, FaceTime, IM, iChat, WhatsApp, Line, Facebook Messenger, Gchat, and any data or conversations you have shared on those platforms
Email accounts
Any conversations or data you have shared
Photo and video sharing platforms
Instagram, Youtube, Flickr, Photobucket, Picasa, and others, including any content you shared, personal data in account settings, and correspondences you had
Websites
Writing or content you created, history of interactions with readers or users, and any income that was generated as a result
Online shopping accounts
Personal information stored in account settings – credit card information, address, purchase history, and credit card information or online credit you have with the company
Video gaming accounts
In-game or in-app purchase history, account information, and any in-game assets you acquired
Online storage accounts
Dropbox, Goggle Drive, and other cloud storage, including any data and information stored there
Loyalty programs
Credit cards, airlines, car rental companies, hotels, and other, including any benefits you have collected
Intellectual Property
Your digital estate can also include intellectual property that you have created whether there are physical elements or not. Intellectual property can often have monetary value or the potential for future gains. Intellectual property can include:
Registered trademarks
Copyrighted digital materials
Patents
Conclusion
By being aware of what digital property you own, you can begin to grasp what makes up your entire digital estate, and, as you can see from the lists above, this can include a vast web of online accounts and personal data. Although it might seem like a daunting task, it’s important to keep track of all of this sensitive online data. One day, you will have to include this information as part of your digital estate planning in order for the Executor, or Digital Executor, of your Will to have the ability to manage your digital property. Without a plan to keep this data secure, identity thieves and hackers can pose a serious threat to your digital assets and, in turn, your loved ones.
For as long as people have lived, it has always been hard to contemplate the matters of life and death. Although, the things that people had left behind back then seemed more physical and easier to pass on to our loved ones. But then man created the internet, which has been expanding rapidly, absorbing everything that is being typed through our computers. According to Domo, the estimated amount of users in 2015 is 3.2 billion (“Data never sleeps”) worldwide. Of course, not everything that is created daily would pass as “valuable content”.
As our daily lives become more intertwined with the digital frontier, so does the information that is valuable to us and our families. I know it is hard to ponder over death, but just think for a second “what will I leave behind?” An email account? A Facebook profile? Your daily newsletter subscription? But does that really matter to me? That is the question you should be asking yourself.
It is hard to imagine that any of the earthly problems would still bother you after your departure, but have a look from another perspective on this issue: what would have helped me in dealing with the passing of a beloved one? The common practice in this case would be to make a will. There comes a time in our lives when we start feeling that this issue should be straightened out. Most likely you would take a piece of paper, write down the things you own and the people, to whom you would like these things to be passed on to. Pretty straight forward. Now, let’s say you have a subscription to a music platform. Would you write that down in your will? A username and a password? There are so many things that we own, but that we are not able to touch. Your name has been written in countless online forms, many accounts have been created and so on, and so forth. Not all of it is valuable, but some of it is important. Your social security number. Or that photo you took of your children during holidays. I have been working at a pension fund and had seen situations when children could have inherited the assets of their parents but weren’t able to, because they not got knowledge of them. In 2012 ID Analytics conducted a research and found out that the identities of nearly 2.5 million deceased Americans had been stolen to apply for credit products and services each year (“Identities of Nearly 2.5 Million Deceased Americans Misused Each Year”). So, in parallel to the loss of a beloved one, your family could have to deal with such issues as well.
But not everything is that bad! We at unobliterate.com have come up with a solution that can help tackle these issues. Think of it as a digital vault, which will open and reveal itself after you’re not around anymore. You are the sole content creator – you can store anything from financial information to passwords to pictures. And in addition you are free to choose who gets this information. We know a way how to let your digital footprint become an opportunity, not a curse to your family.