Understanding Digital Assets. Practical Approaches to Estate Planning and Administration



Similar documents
Death, Incapacity & Digital Assets

Catching Up to Digital Media: Digital Estate Planning for the 21 st Century. By: Brian Sweigman

PROTECTING YOUR DIGITAL ASSETS. 5 Easy Steps

Protecting Digital Assets

Planning for and Administering Digital Assets

NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS

Estate Planning and Administration in the Digital Age

How To Organize Your Digital Assets

CD and DVD drives offered a lot more capacity to install and store files but lacked the convenience of the small floppy disks.

Surf the Evolving Web of Laws Affecting Digital Assets

Information Systems. Connecting Smartphones to NTU s System

Introducing the New Office.

Digital Asset Management (DAM) Protecting, preserving, retrieving and distributing digital assets

Why you need. McAfee. Multi Acess PARTNER SERVICES

On-line Storage and Backup Services

A Guide to Social Media Marketing

Art-list License Agreement

YOUR SECURE ONLINE VAULT. DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH

REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (2015)

CHAPTER Committee Substitute for Committee Substitute for Senate Bill No. 494

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

ABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.

Digital Agency Guide DIGITAL AGENCY

Please see Section IX. for Additional Information:

Top 4 Ways Social Media is Helping to Reshape Marketing

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA,

Pinterest has to be one of my favourite Social Media platforms and I m not alone!

DEVELOPING A SOCIAL MEDIA STRATEGY

How to get started with Microsoft SkyDrive

INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF

Logging Off in Death

Apple Deployment Programs Apple ID for Students: Parent Guide

Android App Quick Start Guide

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

7 Reasons to Have a Trust in California

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

Checklist: Are you ready for ecommerce?

Computer Facilities and External Networks Acceptable Use by Students

RECORDS MANAGEMENT POLICY

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

WHERE THERE S A WILL, THERE S A... DUTY?: A CLOSER LOOK AT THE SAFEKEEPING OF CLIENTS ORIGINAL ESTATE PLANNING DOCUMENTS. Jennifer A.

Digital Estates: Handling Digital Assets In The Real World (With Forms And Resources)

BUSINESS CHICKS, INC. Privacy Policy

10 Quick Tips to Mobile Security

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

The 10 step communication plan

Pinterest Beginner s Guide for Attorneys

Software Copyright. 1. Introduction. Last update: July 2009

Privilege Gone Wild: The State of Privileged Account Management in 2015

Common Facebook issues

Life Cycle of Records

How Much Is the Data on Your Mobile Device Worth?

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Data storage, collaboration, backup, transfer and encryption

2014 Core Training 1

Mobile Learning Apps. Distance Learning (860) Founders 131/131A Middlesex Community College

PRIVACY POLICY. I. Introduction. II. Information We Collect

1. Manage your Group. 1. Log on to the CampusGroups platform.

Britepaper. How to grow your business through events 10 easy steps

Website Planning Questionnaire. Introduction. Thank you for your interest in the services of The Ultimate Answer!

Digital Credentials CLAIM YOUR BADGE!

TRUST & ESTATE INSIGHTS

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Florida Power of Attorney

Interpretive Guideline #16 Issued: June 2016 Records Management

Grand Canyon Council - Social Media Policy

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Students Mobile Messaging Registration & Configuration

RUTGERS POLICY. Approval Authority: Executive Vice President for Academic Affairs and Senior Vice President for Administration

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

MEMBER SOCIAL MEDIA SETUP GUIDEBOOK

Transcription:

Understanding Digital Assets Practical Approaches to Estate Planning and Administration

What are Digital Assets? Wikipedia Defines a digital asset as: in essence anything that exists in a binary format and comes with the right to use. Files that do not possess the aforementioned right are not considered assets. Digital assets are classified as images, multimedia and textual content files

What are Digital Assets? Nathan Lustig, cofounder of Entrustet (acquired by SecureSafe in April of 2012) defines them as: any online account that you own or any file that you store on your computer or that you store in the cloud.

What are Digital Assets? Social network accounts, such as LinkedIn, Twitter and Facebook, etc. Websites Online account information for other websites and programs Videos, such as those posted on YouTube Photos Email and webmail Cryptocurrency Financial documents, such as those used for banking, investments and utilities Online businesses such as on ebay or Etsy Personal documents

Polling Question #1 How many audience members have provided for their digital assets in their Will? How many of those audience members who replied in the affirmative have also provided for their digital assets in their Power of Attorney?

McAfee Survey Highlights 55% of digital asset value is allocated to personal memories On average, Canadians have 2,584 digital files stored on at least one digital device Canadians value the personal memories they keep on their digital devices to be worth $17,711 Canadians value the personal records they keep on their digital devices to be worth $7,354 Forty-nine (49) per cent of Canadians are concerned about the loss of digital assets (photos, contacts, music, files, etc.)

Polling Question #2 How many audience members employ password management software?

McAfee Survey Highlights Continued Seventy-seven (77) per cent of Canadians are concerned about identity theft, monetary theft or fraud when online Forty-five (45) per cent of Canadians aged 45-65 years write down their passwords on a piece of paper or in a notebook. Men are more likely than women to use password management software Fifty-four (54) per cent of Canadians use easy-to-remember passwords or use the same passwords for all websites Seventy-eight (78) per cent of Canadians have had to reset an online password at least once within the last six months.

Why Plan for Digital Assets? i. to make things easier on executors and family members ii. to prevent identity theft iii. to prevent losses to the estate iv. to avoid losing the deceased s story v. to prevent unwanted secrets from being discovered

Planning for Digital Assets 1. Make a List Make two lists (spreadsheets; masochists can handwrite) of all personal computing devices and passwords to those devices (offline ideally) One list should then include all online financial account information, including institution, account name/number, username, PIN, password (including 2 step verification), and answers to security questions (if applicable) The other list should include non-financial account information, including username, password (including 2 step verification), answers to security questions (if applicable), and instructions NOTE: if using password management software, hardcopy list need not include all account information, just master password and device access passwords, e.g. iphone passcode

Sample Social Media Will from USA.gov Social Media Will Template for (Your Name) Social Media Site Username/ Email Address Password (Case Sensitive) Answers to Security Questions How do you want this account to be managed (close, memorialize, deactivate)?

Planning for Digital Assets 1. Make a List (cont d) Consider saving lists to separate flash drives or external hard drives The list containing banking and other financial information should go to the Executor or the Attorney in the event of death or incapacity The list containing the non-financial information, such as social networking, photo sharing, loyalty rewards etc. should go to the Digital Executor or Digital Attorney in the event of death or incapacity NOTE: for individuals running businesses, a separate list with all information relevant to run the business should be created, e.g. web hosting account, e- commerce account, shipping accounts, etc.

Planning for Digital Assets 2. Protect and Manage Passwords Select a reliable password manager (PasswordBox, Assetlock, SecureSafe, 1Password, LastPass) and create vaults for each list by inputting all information from the spreadsheets previously created. Consider randomly generated passwords to increase online security Ensure that passwords are updated in your password management software from time to time and hardcopy if relevant Ensure that master password is accessible to Executor and Attorney, both traditional and digital Determine whether hardcopy backup in safety deposit box or other secure location is advisable

Planning for Digital Assets 3. Reduce Risk of Identity Theft Consider enabling 2 step verification to reduce risk of theft/unauthorized access to digital asset accounts PasswordBox is launching heart rate verification (www.getnymi.com). Similar biometric verification technology is in development and is expected to be widely implemented over the next decade (see Apple fingerprint lock or Google Ring ) Ensure that Executor and Attorney have access to secondary verification data if enabled or be familiar with work arounds to 2 step verification Note: potential issues relating to biometric verification, e.g. the Nymi Band

Planning for Digital Assets 4. Incorporate Digital Assets into Estate and Incapacity Planning Determine whether to include digital executor powers in Will and Power of Attorney or whether to create stand-alone digital asset planning documents If no need for digital Executor, consider including template from CLEBC Wills Precedents: An Annotated Guide (see next slide) If same individual(s) not appropriate for administration of both analog and digital assets, consider standalone Digital Will (similar to USA.gov Social Media Will ) which can be updated from time-to-time without lawyer or notary involvement (but always consider s. 58 of the WESA)

Planning for Digital Assets Digital and Electronic Assets and Liabilities My Trustee, subject to any contrary provisions in my Will [and any agreement that affects my interest in that property], may exercise any rights, powers, and privileges in connection with any digital or electronic property or online accounts forming part of my estate to the same extent as I could if I were alive and the only owner of that property. My Trustee s powers, which may be exercised how, when and on whatever terms my Trustee decides, include: (a) (b) (c) accessing, retrieving and downloading, or securely deleting digital or electronic property; managing or disposing of domain names; continuing operation of or dismantling websites; (d) managing or closing accounts (including social media accounts, e-mail accounts, cloud storage accounts, online gaming accounts, subscription media accounts and electronic commerce accounts); (e) protecting or securely deleting my digital works and related intellectual property, including documents, blog posts, photographs, videos and websites; (f) protecting my personal information; and (g) accessing digital wallets and managing any associated digital currencies or cryptocurrencies.

Planning for Digital Assets 5. Understand the Law Do the TOS allow instructions to be carried out. If not, provide warning to individual of potential frustration of wishes (breach of contract, termination of service, etc.) Are instructions contrary to statute? For example, in U.S. various statutes (Computer Fraud and Abuse Act, Electronic Communications Privacy Act) forbid online access using another s credentials, although UFADAA should address this eventually, but only in force in DE currently NOTE: ULC Uniform Access to Digital Assets By Fiduciaries Act (Canada) may obviate need to be familiar with TOS and foreign statutes depending upon situs of digital assets

Obstacles to Planning No digital asset list, no access No fiduciary access statute in Canada (ULC annual conference in 2016 will evaluate draft form of Uniform Access to Digital Assets By Fiduciaries Act ) Updating passwords and list can be time consuming Potential security risk inherent in creating list, regardless of whether list is analog or digital Biometric and/or 2 Step verification could potentially frustrate access despite meticulous planning Potential for conflicts between Will and Digital Will (S. 58 of the WESA)

Administering Digital Assets 1. Confirm Instructions Consult relevant document, i.e. Will, Power of Attorney, Digital Will, Digital Power of Attorney for instructions (preserve, transfer, destroy) Confer with any other representatives who may be named Seek legal advice Note: if instructions are to destroy, ensure this has actually been carried out properly (see www.blancco.com)

Administering Digital Assets 2. Primary Email Account The foremost concern of the personal or digital representative should be gaining access to the decedent s primary email account, i.e. the filing cabinet Critical for tracking online payments and retrieving passwords if information not already available

Administering Digital Assets 3. Inventory Digital Assets If no list available, consider using WebCease or a similar forensic search provider to compile a list of the decedent s online accounts Determine if any digital assets are perishable, e.g. cryptocurrency, reward miles, incomplete PayPal transactions, interac-transfers,etc. High risk of identity theft in period between death of individual and service provider receiving notification of death

Administering Digital Assets 4. Gain Control If no list available, use forensic report to determine various service providers to be contacted Review TOS for each provider and contact provider with necessary documentation to gain access to/control of digital asset on priority basis by virtue of perishability

Obstacles The vast majority of individuals do not have digital asset lists, and it is unlikely that they have provided access credentials to loved ones TOS change monthly and have changed for all the major service providers in response to statutory developments in the U.S. (see Fiduciary Access to Digital Assets and Digital Accounts Act, Delaware) No statute in Canada currently providing explicit access rights for fiduciaries (special problem for Power of Attorney) despite general agreement by legal professionals that Personal Representatives have same access rights as the individual granting those rights Digital content is increasingly moving to a subscription format, i.e. Spotify, Apple Music, Netflix, rather than the current itunes / AppleTV individual download format, making estate planning for such services redundant

Solutions Introduction of Fiduciary Access to Digital Assets uniform law or equivalency in Canada Harmonization of service providers TOS with digital access statutes Introduction of digital planning and administration services by financial institutions (addresses privacy concerns, longevity, etc.)

Planning Takeaways 1. Encourage your clients to prepare lists (and keep them up-to-date) of their digital assets and to backup all digital assets that are capable of being backed up onto portable storage devices that can be easily accessed and transferred (pictures, videos, files, etc.) 2. Ensure that the Will and the Digital Will (if one is created) are harmonized and consistent

Administration Takeaways 1. Track down primary email address and gain access as soon as possible 2. Make use of forensic investigators to determine the digital assets of the estate, if the digital assets are unknown 3. Prioritize digital assets based on perishability 4. Familiarize yourself with custodian s access requirements for fiduciaries 5. Consult and cooperate with any other individual named as personal representative of the deceased or incapacitated individual

THANK YOU!

Ryan N. Howe Tel: 604-484-1740 Email: rhowe@ahbl.ca Twitter: @ryannoelhowe Blog: http://willsandestateslawyersblog.ahbl.ca/