SlideShare a Scribd company logo
YOUR
DIGITAL INHERITANCE



DR. WENDY MONCUR, FRSA

SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE
VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
LIFE, DEATH &
ASSETS


   BEQUEATHING
   DIGITAL ASSETS



       STEPS TO TAKE?
THE DAYS OF
  OUR YEARS
        ARE
THREESCORE
      YEARS
    AND TEN
(PSALM 90:10, KING JAMES
         BIBLE)
ARE ONLINE & OFFLINE DEATH
          SYNCHRONOUS?




http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
YOUR REAL-LIFE ASSETS


 House
 Car
 Money
 Furniture
 Photos, videos, letters
 Jewellery
 Body
YOUR DIGITAL ASSETS
         Photos
       Blog posts
         Emails
 Social media accounts
    Online contacts
         Video
         Music
         Books
     Memberships
    Online business
   Airmiles accounts
    … and more…
WHERE ARE YOUR
DIGITAL ASSETS?




 Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD.
                Cloud backup service. Memory stick.
                            http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
WHAT ARE THEY WORTH?
UNEXPECTEDLY
USEFUL?




               http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
BEQUEATHING
DIGITAL ASSETS
BEQUEATHING DIGITAL
ASSETS

Can you? Yes, in Oklahoma (House bill 2800)
• social networking site
• micro blogging
• email & short message service websites



Barriers to bequeathal
BARRIERS TO BEQUEATHAL

Awareness of account’s existence
Identity –
actual, pseudonymous, anonymous
Password
Ownership of digital asset




                                   http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
http://info.yahoo.com/legal/uk/yahoo/utos-173.html/
LANCE CORPORAL ELLSWORTH
OTHER INTERNET
SERVICE PROVIDERS

 Facebook: Memorialize or remove the account. Content can be
 downloaded if you have password.                            http://www.facebook.com




 Twitter: remove account or assist family members in saving a
 backup of deceased‟s public Tweets.


 Gmail: May give access if formal evidence of death provided
 http://support.google.com/mail/bin/answer.py?hl=en&answer=14300




 eBay: You cannot “transfer your eBay account (including feedback) and
 user ID to another party without our consent”
 http://pages.ebay.co.uk/help/policies/user-agreement.html



                                                                                       /
DO YOU HAVE
                                                                    SKELETONS IN
                                                                    YOUR CLOSET?




http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet-
153072854
STEPS TO TAKE?
WHAT CAN YOU DO?: 1

Make a list of ALL your digital assets
   - ID, Password, Website


Consider using a software tool to store passwords securely
  • - E.g. LastPass, 1Password, Clipperz, RoboForm
Writing down or sharing your password
may violate the Terms of Service
agreement with your Internet Service
provider.
WHAT CAN YOU DO?: 2
Appoint a Digital Executor

DIY method
  • Family member
  • Friend
  • Colleague
  • Lawyer


Digital estate services

Posthumous email services
DIGITAL ESTATE
SERVICES
Secure online service
    • e.g. Legacy Locker, Entrustnet
    • May demand death certificate as proof of death


Stores your digital inventory

May also store:
•    last wishes
•    instructions for funeral
•    posthumous email
•    instructions in case if brain death
•    eg – Legacy Organiser app
POSTHUMOUS EMAIL
Online service
 • e.g http://www.deadmansswitch.net/


Death may be assumed if you fail to answer 3 emails
from service provider….


Emails sent after you die
DO YOU NEED A DIGITAL
ESTATE SERVICE, OR IS
IT OVERKILL?

Security

Password updates

Number of heirs

Your age & health

How good you are with computers

Triggering action
SUMMARY
Your digital assets are growing daily


Bequeathing them is not simple


You may wish to:
  • Make an inventory of your digital assets
  • Choose:
       • your digital executor
       • What assets you want to pass on, to whom.




                                 Dr. Wendy Moncur
                   http://www.computing.dundee.ac.uk/staff/wmoncur/
Digital Estate   Posthumous         DIY Method
                     Services         emails

Want stringent 3rd            Y         Less stringent          N
party verification

Death cert check              Y               N                 N

Automated digital             Y              1/2                N
executor

Digital „heirs‟           Complex         Complex             Simple

Passwords change              Y               N                 N
often
Open new accounts             Y               N                 N
frequently
Willing to pay for         Maybe           Maybe                N
service

More Related Content

Similar to 2012 turing-security freedom WendyMoncur

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)
KC Marie Knox
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenID
Simon Willison
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
guest3151b0
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
Andy Smith
 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdf
Barbara O'Neill
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert Advice
Keynectis
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
ConnectYourCommunity
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
Rozell Sneede
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning Network
Carl Keller
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
Kaliya "Identity Woman" Young
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keys
dimitrist
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary Access
Howard Collens
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
dimitrist
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
Risk Crew
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
Gabor Szathmari
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
Paul Yang
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 

Similar to 2012 turing-security freedom WendyMoncur (20)

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenID
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdf
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert Advice
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning Network
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keys
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary Access
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 

Recently uploaded

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 

Recently uploaded (20)

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 

2012 turing-security freedom WendyMoncur

  • 1. YOUR DIGITAL INHERITANCE DR. WENDY MONCUR, FRSA SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
  • 2. LIFE, DEATH & ASSETS BEQUEATHING DIGITAL ASSETS STEPS TO TAKE?
  • 3. THE DAYS OF OUR YEARS ARE THREESCORE YEARS AND TEN (PSALM 90:10, KING JAMES BIBLE)
  • 4.
  • 5. ARE ONLINE & OFFLINE DEATH SYNCHRONOUS? http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
  • 6. YOUR REAL-LIFE ASSETS House Car Money Furniture Photos, videos, letters Jewellery Body
  • 7. YOUR DIGITAL ASSETS Photos Blog posts Emails Social media accounts Online contacts Video Music Books Memberships Online business Airmiles accounts … and more…
  • 8. WHERE ARE YOUR DIGITAL ASSETS? Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD. Cloud backup service. Memory stick. http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
  • 9. WHAT ARE THEY WORTH?
  • 10. UNEXPECTEDLY USEFUL? http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
  • 12. BEQUEATHING DIGITAL ASSETS Can you? Yes, in Oklahoma (House bill 2800) • social networking site • micro blogging • email & short message service websites Barriers to bequeathal
  • 13. BARRIERS TO BEQUEATHAL Awareness of account’s existence Identity – actual, pseudonymous, anonymous Password Ownership of digital asset http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
  • 16. OTHER INTERNET SERVICE PROVIDERS Facebook: Memorialize or remove the account. Content can be downloaded if you have password. http://www.facebook.com Twitter: remove account or assist family members in saving a backup of deceased‟s public Tweets. Gmail: May give access if formal evidence of death provided http://support.google.com/mail/bin/answer.py?hl=en&answer=14300 eBay: You cannot “transfer your eBay account (including feedback) and user ID to another party without our consent” http://pages.ebay.co.uk/help/policies/user-agreement.html /
  • 17. DO YOU HAVE SKELETONS IN YOUR CLOSET? http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet- 153072854
  • 19. WHAT CAN YOU DO?: 1 Make a list of ALL your digital assets - ID, Password, Website Consider using a software tool to store passwords securely • - E.g. LastPass, 1Password, Clipperz, RoboForm
  • 20. Writing down or sharing your password may violate the Terms of Service agreement with your Internet Service provider.
  • 21. WHAT CAN YOU DO?: 2 Appoint a Digital Executor DIY method • Family member • Friend • Colleague • Lawyer Digital estate services Posthumous email services
  • 22. DIGITAL ESTATE SERVICES Secure online service • e.g. Legacy Locker, Entrustnet • May demand death certificate as proof of death Stores your digital inventory May also store: • last wishes • instructions for funeral • posthumous email • instructions in case if brain death • eg – Legacy Organiser app
  • 23. POSTHUMOUS EMAIL Online service • e.g http://www.deadmansswitch.net/ Death may be assumed if you fail to answer 3 emails from service provider…. Emails sent after you die
  • 24. DO YOU NEED A DIGITAL ESTATE SERVICE, OR IS IT OVERKILL? Security Password updates Number of heirs Your age & health How good you are with computers Triggering action
  • 25. SUMMARY Your digital assets are growing daily Bequeathing them is not simple You may wish to: • Make an inventory of your digital assets • Choose: • your digital executor • What assets you want to pass on, to whom. Dr. Wendy Moncur http://www.computing.dundee.ac.uk/staff/wmoncur/
  • 26. Digital Estate Posthumous DIY Method Services emails Want stringent 3rd Y Less stringent N party verification Death cert check Y N N Automated digital Y 1/2 N executor Digital „heirs‟ Complex Complex Simple Passwords change Y N N often Open new accounts Y N N frequently Willing to pay for Maybe Maybe N service