Understanding Digital Assets. Practical Approaches to Estate Planning and Administration
|
|
|
- Ralf Morris
- 9 years ago
- Views:
Transcription
1 Understanding Digital Assets Practical Approaches to Estate Planning and Administration
2 What are Digital Assets? Wikipedia Defines a digital asset as: in essence anything that exists in a binary format and comes with the right to use. Files that do not possess the aforementioned right are not considered assets. Digital assets are classified as images, multimedia and textual content files
3
4 What are Digital Assets? Nathan Lustig, cofounder of Entrustet (acquired by SecureSafe in April of 2012) defines them as: any online account that you own or any file that you store on your computer or that you store in the cloud.
5 What are Digital Assets? Social network accounts, such as LinkedIn, Twitter and Facebook, etc. Websites Online account information for other websites and programs Videos, such as those posted on YouTube Photos and webmail Cryptocurrency Financial documents, such as those used for banking, investments and utilities Online businesses such as on ebay or Etsy Personal documents
6
7 Polling Question #1 How many audience members have provided for their digital assets in their Will? How many of those audience members who replied in the affirmative have also provided for their digital assets in their Power of Attorney?
8
9 McAfee Survey Highlights 55% of digital asset value is allocated to personal memories On average, Canadians have 2,584 digital files stored on at least one digital device Canadians value the personal memories they keep on their digital devices to be worth $17,711 Canadians value the personal records they keep on their digital devices to be worth $7,354 Forty-nine (49) per cent of Canadians are concerned about the loss of digital assets (photos, contacts, music, files, etc.)
10
11 Polling Question #2 How many audience members employ password management software?
12
13 McAfee Survey Highlights Continued Seventy-seven (77) per cent of Canadians are concerned about identity theft, monetary theft or fraud when online Forty-five (45) per cent of Canadians aged years write down their passwords on a piece of paper or in a notebook. Men are more likely than women to use password management software Fifty-four (54) per cent of Canadians use easy-to-remember passwords or use the same passwords for all websites Seventy-eight (78) per cent of Canadians have had to reset an online password at least once within the last six months.
14
15 Why Plan for Digital Assets? i. to make things easier on executors and family members ii. to prevent identity theft iii. to prevent losses to the estate iv. to avoid losing the deceased s story v. to prevent unwanted secrets from being discovered
16 Planning for Digital Assets 1. Make a List Make two lists (spreadsheets; masochists can handwrite) of all personal computing devices and passwords to those devices (offline ideally) One list should then include all online financial account information, including institution, account name/number, username, PIN, password (including 2 step verification), and answers to security questions (if applicable) The other list should include non-financial account information, including username, password (including 2 step verification), answers to security questions (if applicable), and instructions NOTE: if using password management software, hardcopy list need not include all account information, just master password and device access passwords, e.g. iphone passcode
17 Sample Social Media Will from USA.gov Social Media Will Template for (Your Name) Social Media Site Username/ Address Password (Case Sensitive) Answers to Security Questions How do you want this account to be managed (close, memorialize, deactivate)?
18 Planning for Digital Assets 1. Make a List (cont d) Consider saving lists to separate flash drives or external hard drives The list containing banking and other financial information should go to the Executor or the Attorney in the event of death or incapacity The list containing the non-financial information, such as social networking, photo sharing, loyalty rewards etc. should go to the Digital Executor or Digital Attorney in the event of death or incapacity NOTE: for individuals running businesses, a separate list with all information relevant to run the business should be created, e.g. web hosting account, e- commerce account, shipping accounts, etc.
19 Planning for Digital Assets 2. Protect and Manage Passwords Select a reliable password manager (PasswordBox, Assetlock, SecureSafe, 1Password, LastPass) and create vaults for each list by inputting all information from the spreadsheets previously created. Consider randomly generated passwords to increase online security Ensure that passwords are updated in your password management software from time to time and hardcopy if relevant Ensure that master password is accessible to Executor and Attorney, both traditional and digital Determine whether hardcopy backup in safety deposit box or other secure location is advisable
20 Planning for Digital Assets 3. Reduce Risk of Identity Theft Consider enabling 2 step verification to reduce risk of theft/unauthorized access to digital asset accounts PasswordBox is launching heart rate verification ( Similar biometric verification technology is in development and is expected to be widely implemented over the next decade (see Apple fingerprint lock or Google Ring ) Ensure that Executor and Attorney have access to secondary verification data if enabled or be familiar with work arounds to 2 step verification Note: potential issues relating to biometric verification, e.g. the Nymi Band
21
22 Planning for Digital Assets 4. Incorporate Digital Assets into Estate and Incapacity Planning Determine whether to include digital executor powers in Will and Power of Attorney or whether to create stand-alone digital asset planning documents If no need for digital Executor, consider including template from CLEBC Wills Precedents: An Annotated Guide (see next slide) If same individual(s) not appropriate for administration of both analog and digital assets, consider standalone Digital Will (similar to USA.gov Social Media Will ) which can be updated from time-to-time without lawyer or notary involvement (but always consider s. 58 of the WESA)
23 Planning for Digital Assets Digital and Electronic Assets and Liabilities My Trustee, subject to any contrary provisions in my Will [and any agreement that affects my interest in that property], may exercise any rights, powers, and privileges in connection with any digital or electronic property or online accounts forming part of my estate to the same extent as I could if I were alive and the only owner of that property. My Trustee s powers, which may be exercised how, when and on whatever terms my Trustee decides, include: (a) (b) (c) accessing, retrieving and downloading, or securely deleting digital or electronic property; managing or disposing of domain names; continuing operation of or dismantling websites; (d) managing or closing accounts (including social media accounts, accounts, cloud storage accounts, online gaming accounts, subscription media accounts and electronic commerce accounts); (e) protecting or securely deleting my digital works and related intellectual property, including documents, blog posts, photographs, videos and websites; (f) protecting my personal information; and (g) accessing digital wallets and managing any associated digital currencies or cryptocurrencies.
24 Planning for Digital Assets 5. Understand the Law Do the TOS allow instructions to be carried out. If not, provide warning to individual of potential frustration of wishes (breach of contract, termination of service, etc.) Are instructions contrary to statute? For example, in U.S. various statutes (Computer Fraud and Abuse Act, Electronic Communications Privacy Act) forbid online access using another s credentials, although UFADAA should address this eventually, but only in force in DE currently NOTE: ULC Uniform Access to Digital Assets By Fiduciaries Act (Canada) may obviate need to be familiar with TOS and foreign statutes depending upon situs of digital assets
25 Obstacles to Planning No digital asset list, no access No fiduciary access statute in Canada (ULC annual conference in 2016 will evaluate draft form of Uniform Access to Digital Assets By Fiduciaries Act ) Updating passwords and list can be time consuming Potential security risk inherent in creating list, regardless of whether list is analog or digital Biometric and/or 2 Step verification could potentially frustrate access despite meticulous planning Potential for conflicts between Will and Digital Will (S. 58 of the WESA)
26
27 Administering Digital Assets 1. Confirm Instructions Consult relevant document, i.e. Will, Power of Attorney, Digital Will, Digital Power of Attorney for instructions (preserve, transfer, destroy) Confer with any other representatives who may be named Seek legal advice Note: if instructions are to destroy, ensure this has actually been carried out properly (see
28 Administering Digital Assets 2. Primary Account The foremost concern of the personal or digital representative should be gaining access to the decedent s primary account, i.e. the filing cabinet Critical for tracking online payments and retrieving passwords if information not already available
29 Administering Digital Assets 3. Inventory Digital Assets If no list available, consider using WebCease or a similar forensic search provider to compile a list of the decedent s online accounts Determine if any digital assets are perishable, e.g. cryptocurrency, reward miles, incomplete PayPal transactions, interac-transfers,etc. High risk of identity theft in period between death of individual and service provider receiving notification of death
30 Administering Digital Assets 4. Gain Control If no list available, use forensic report to determine various service providers to be contacted Review TOS for each provider and contact provider with necessary documentation to gain access to/control of digital asset on priority basis by virtue of perishability
31
32 Obstacles The vast majority of individuals do not have digital asset lists, and it is unlikely that they have provided access credentials to loved ones TOS change monthly and have changed for all the major service providers in response to statutory developments in the U.S. (see Fiduciary Access to Digital Assets and Digital Accounts Act, Delaware) No statute in Canada currently providing explicit access rights for fiduciaries (special problem for Power of Attorney) despite general agreement by legal professionals that Personal Representatives have same access rights as the individual granting those rights Digital content is increasingly moving to a subscription format, i.e. Spotify, Apple Music, Netflix, rather than the current itunes / AppleTV individual download format, making estate planning for such services redundant
33 Solutions Introduction of Fiduciary Access to Digital Assets uniform law or equivalency in Canada Harmonization of service providers TOS with digital access statutes Introduction of digital planning and administration services by financial institutions (addresses privacy concerns, longevity, etc.)
34
35 Planning Takeaways 1. Encourage your clients to prepare lists (and keep them up-to-date) of their digital assets and to backup all digital assets that are capable of being backed up onto portable storage devices that can be easily accessed and transferred (pictures, videos, files, etc.) 2. Ensure that the Will and the Digital Will (if one is created) are harmonized and consistent
36 Administration Takeaways 1. Track down primary address and gain access as soon as possible 2. Make use of forensic investigators to determine the digital assets of the estate, if the digital assets are unknown 3. Prioritize digital assets based on perishability 4. Familiarize yourself with custodian s access requirements for fiduciaries 5. Consult and cooperate with any other individual named as personal representative of the deceased or incapacitated individual
37 THANK YOU!
38 Ryan N. Howe Tel: Blog:
Death, Incapacity & Digital Assets
Death, Incapacity & Digital Assets Presented by: Donald J. Farinato, Esq. Hodges, Doughty & Carson, PLLC 617 W. Main Street Knoxville, TN 37902 865-292-2307 Facebook and the Death of Loren Williams Loren
Catching Up to Digital Media: Digital Estate Planning for the 21 st Century. By: Brian Sweigman
Catching Up to Digital Media: Digital Estate Planning for the 21 st Century By: Brian Sweigman Agenda 1) What is Digital Estate Planning? 2) What is a Digital Asset? 3) How does the legislation treat Digital
PROTECTING YOUR DIGITAL ASSETS. 5 Easy Steps
PROTECTING YOUR DIGITAL ASSETS 5 Easy Steps PROTECTING YOUR DIGITAL ASSETS: WHY A DIGITAL ESTATE PLAN? Have you ever stopped to think about what happens to your digital presence your Facebook photos or
Protecting Digital Assets
Protecting Digital Assets 2015 Probate Update Presented by the Clearwater Bar Association Probate and Real Property Section and the St. Petersburg Bar Association Probate & Guardianship Section Eric Virgil,
Planning for and Administering Digital Assets
Planning for and Administering Digital Assets by Richard Weiland Clark Wilson LLP T. 604.891.7709 [email protected] with the assistance of Gordon Behan Clark Wilson LLP T. 604.643.3141 [email protected] TABLE
NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS
NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS NC PSyA Recommended Facebook Settings - October 2014 1 Introduction 3 Privacy Shortcuts 3 Privacy Settings and Tools 6 General
Estate Planning and Administration in the Digital Age
Estate Planning and Administration in the Digital Age Robert R. Dunn, Esq. Bailey Cavalieri, LLC 10 West Broad Street, Suite 2100 Columbus, Ohio 43215 I. What are Digital Assets that a Fiduciary Needs
How To Organize Your Digital Assets
Documents Passare and Evan Carroll rom TheDigitalBeyond.com How-to Manage Your Digital Assets ebook #10 How-to Manage Your Digital Assets ebook #10: How-to Manage Your Digital Assets Like millions o people
CD and DVD drives offered a lot more capacity to install and store files but lacked the convenience of the small floppy disks.
Slide 1 Safe in the Cloud This presentation was given to the U3A South East Region Committees Workshop October 25 th 2013 and follows up the article published in Third Age Matters Issue 7 Summer 2013 page
Surf the Evolving Web of Laws Affecting Digital Assets
Posted with permission of the authors, Checkpoint and Estate Planning Journal Checkpoint Contents Estate Planning Library Estate Planning Journals Estate Planning Journal (WG&L) Estate Planning Journal
Information Systems. Connecting Smartphones to NTU s Email System
Information Systems Connecting Smartphones to NTU s Email System Connecting Smartphones to NTU s Email System Contents Things to be aware of before you start 3 Connecting a Windows Mobile 6 (6.0-6.5) Phone
Introducing the New Office.
Introducing the New Office. Contents Meet the new Office... 4 Help customers choose the right Office....10 Office at-a-glance...18 Selling Office...20 Frequently asked questions...28 Office applications:
Digital Asset Management (DAM) Protecting, preserving, retrieving and distributing digital assets
Digital Asset Management (DAM) Protecting, preserving, retrieving and distributing digital assets What is DAM? Digital asset management (DAM) consists of management tasks and decisions surrounding the
Why you need. McAfee. Multi Acess PARTNER SERVICES
Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices
On-line Storage and Backup Services
Google Drive, icloud, Dropbox, Evernote There are many different services available that allow us to store, backup, and even share our files. Tonight we will explore some of these; how to use them and
A Guide to Social Media Marketing
A Guide to Social Media Marketing Social Media Marketing Social media marketing is a tricky term to identify and is more of a concept to be grasped as opposed to having a simple definition attached to
Art-list License Agreement
Art-list License Agreement 1. General 1.1. The Agreement herein is made between you and Art list (or by any other name), the owner of the site: www.art list.io, and it settles the terms and conditions
YOUR SECURE ONLINE VAULT. DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH [email protected] +41 44 515 11 11 www.securesafe.com
YOUR SECURE ONLINE VAULT DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH [email protected] +41 44 515 11 11 www.securesafe.com SECURESAFE PRIVACY MANIFESTO We have embedded privacy directly into the design
REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (2015)
FOR APPROVAL REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (2015) NATIONAL CONFERENCE OF COMMISSIONERS ON UNIFORM STATE LAWS MEETING IN ITS ONE-HUNDRED-AND-TWENTY-FOURTH YEAR WILLIAMSBURG, VIRGINIA
CHAPTER 2016-46. Committee Substitute for Committee Substitute for Senate Bill No. 494
CHAPTER 2016-46 Committee Substitute for Committee Substitute for Senate Bill No. 494 An act relating to digital assets; providing a directive to the Division of Law Revision and Information; creating
Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide
Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide 1 P a g e Contents Module Objectives... 3 Training Materials / Resources... 3 2 P a g e Module Outcomes After completing these
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.
ABC PRIVACY POLICY The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. Our goal is to provide you and your family with media experiences
Digital Agency Guide DIGITAL AGENCY
Digital Agency Guide DIGITAL AGENCY Digital Agency: The Who? Through our industry leading Do It With Me solution, Vendasta s Digital Agency collaborate with your clients on a level everyone is comfortable
Please see Section IX. for Additional Information:
The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) BILL: CS/CS/SB 494 Prepared By:
Top 4 Ways Social Media is Helping to Reshape Marketing
Top 4 Ways Social Media is Helping to Reshape Marketing How implementing social media into your business strategy can position your brand for the better Inside, you ll find information on: The ever-changing
Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716
Measurabl, Inc. ( Company ) is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined below) we collect from
Pinterest has to be one of my favourite Social Media platforms and I m not alone!
Pinterest has to be one of my favourite Social Media platforms and I m not alone! With 79.3 million users, 50 billion pins and 1 billion boards it is host to an enormous amount of content. But many of
DEVELOPING A SOCIAL MEDIA STRATEGY
DEVELOPING A SOCIAL MEDIA STRATEGY Creating a social media strategy for your business 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Video Tutorials 3 Getting Started with Social
How to get started with Microsoft SkyDrive
How to get started with Microsoft SkyDrive Blog Post Date: August 27, 2012 Category: Technology made easy Author: Ulrika Hedlund Source: http://www.businessproductivity.com/how-to-get-started-with-microsoft-skydrive
INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF
INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF go.qub.ac.uk/socialmedia WHY ARE SOCIAL MEDIA TOOLS IMPORTANT TO QUEEN S UNIVERSITY? The term social media is used to describe a range of communication
Logging Off in Death
Logging Off in Death 9 October 2015 Introduction With the prevalence of technology and ever increasing uptake of online services in today s digital age you should consider the importance of digital assets
Apple Deployment Programs Apple ID for Students: Parent Guide
Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows
Android App Quick Start Guide
Android App Quick Start Guide We have made this app available FREE to all members of entities that have a current subscription to IamResponding.com. If you are not a member of an entity with a current
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
7 Reasons to Have a Trust in California
ROCHELLE J. BIOTEAU, PARTNER Direct Dial Number (619) 696-8854 Direct Fax Number (619) 696-8190 Email Address: [email protected] SQUIRES, SHERMAN & BIOTEAU, LLP A LIMITED LIABILITY PARTNERSHIP INCLUDING PROFESSIONAL
USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
Checklist: Are you ready for ecommerce?
ORGANIZATION 1. Please provide your e-mail address so we can mail your results: 2. ebusiness Plan in Place? An e-business plan is much the same as any business plan where the business concept, its financials,
Computer Facilities and External Networks Acceptable Use by Students
Related Policies Copyright Media Usage Offshore Data Hosting Privacy Web Publishing Purpose Policy Computer facilities and external networks are made available as resources for use by students in Catholic
RECORDS MANAGEMENT POLICY
[Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body
Defense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
WHERE THERE S A WILL, THERE S A... DUTY?: A CLOSER LOOK AT THE SAFEKEEPING OF CLIENTS ORIGINAL ESTATE PLANNING DOCUMENTS. Jennifer A.
WHERE THERE S A WILL, THERE S A... DUTY?: A CLOSER LOOK AT THE SAFEKEEPING OF CLIENTS ORIGINAL ESTATE PLANNING DOCUMENTS Jennifer A. Kosteva Before the ink has dried on their newly executed wills, clients
Digital Estates: Handling Digital Assets In The Real World (With Forms And Resources)
Digital Estates: Handling Digital Assets In The Real World (With Forms And Resources) Susan Porter Susan Porter is a trusts and estates attorney in New York City. This article is based on a paper the author
BUSINESS CHICKS, INC. Privacy Policy
BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
The 10 step communication plan
The 10 step communication plan Follow these 10 suggested steps and you will be successful at launching the Specops password reset service. Step 1 Activity: Intranet texts explaining the service Suggested
Pinterest Beginner s Guide for Attorneys
Pinterest Beginner s Guide for Attorneys Are you looking for an additional source of website traffic and leads? Pinterest can deliver them. This guide will walk you through setting up your account, how
Software Copyright. 1. Introduction. Last update: July 2009
- 1. Introduction...1-1.1. The scope of this briefing paper...1-1.2. "Software" defined...1-2. What is software copyright?...2-3. The Community Directive on software copyright...3-3.1. What does software
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Common Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
How Much Is the Data on Your Mobile Device Worth?
How Much Is the Data on Your Mobile Device Worth? Sponsored by Lookout Independently conducted by Ponemon Institute LLC Publication Date: January 2016 Ponemon Institute Research Report Part 1. Introduction
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
Data storage, collaboration, backup, transfer and encryption
Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and
2014 Core Training 1
2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System
Mobile Learning Apps. Distance Learning [email protected] (860) 343 5756 Founders 131/131A Middlesex Community College http://mxcc.
Mobile Learning Apps Distance Learning [email protected] (860) 343 5756 Founders 131/131A Middlesex Community College http://mxcc.edu/ett 4/10/2014 Mobile Learning Basics Basics in Mobile Devices Settings
PRIVACY POLICY. I. Introduction. II. Information We Collect
PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting
1. Manage your Group. 1. Log on to the CampusGroups platform.
1 1. Manage your Group 1. Log on to the CampusGroups platform. 2. Upon logging in, select your club from the Groups drop-down (next to the Home icon) and click on the Manage button next to the group of
Britepaper. How to grow your business through events 10 easy steps
Britepaper How to grow your business through events 10 easy steps 1 How to grow your business through events 10 easy steps As a small and growing business, hosting events on a regular basis is a great
Website Planning Questionnaire. Introduction. Thank you for your interest in the services of The Ultimate Answer!
Website Planning Questionnaire Colleen Rice Nelson Introduction Thank you for your interest in the services of The Ultimate Answer! Every choice and decision you make concerning your website may or may
Digital Credentials CLAIM YOUR BADGE!
Digital Credentials CLAIM YOUR BADGE! Why Use Digital Credentials? To market your credentials This is an important means of empowering you to promote yourself professionally and communicate the value of
TRUST & ESTATE INSIGHTS
TRUST & ESTATE INSIGHTS SEPTEMBER 2015 A PUBLICATION OF SEILER LLP INSIDE THIS ISSUE Life Insurance A Powerful Estate Planning Tool for Nontaxable Estates 4 Ways to Transfer a Family Business The BDIT
Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015
Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 What are You Trying to Protect? If someone got into your email, what
Florida Power of Attorney
Florida Power of Attorney 1 Unless otherwise specified, the information in this booklet applies to Powers of Attorney signed on or after Oct. 1, 2011. Consult a lawyer regarding use and enforceability
Interpretive Guideline #16 Issued: June 2016 Records Management
Interpretive Guideline #16 Issued: June 2016 Records Management This guideline is designed to outline the requirements and provide suggestions related to records management as required by provisions of
Grand Canyon Council - Social Media Policy
INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested
Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:
Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check
Students Mobile Messaging Registration & Configuration
Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established
RUTGERS POLICY. Approval Authority: Executive Vice President for Academic Affairs and Senior Vice President for Administration
RUTGERS POLICY Section: 30.4.5 Section Title: Business Services Policy Name: Records Management Formerly Book: Formerly Policy 50.3.10 Approval Authority: Executive Vice President for Academic Affairs
What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1
Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
MEMBER SOCIAL MEDIA SETUP GUIDEBOOK
MEMBER SOCIAL MEDIA SETUP GUIDEBOOK I n t r o d u c t i o n The use of social media to support Have the Talk of a Lifetime SM Social media has become a part of everyone s life and provides a powerful platform
