SlideShare a Scribd company logo
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 1
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES
Priyaranjan B Mestri
University of Washington
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 2
Background
Inheritance is the practice of passing on property, titles, debts, rights and obligations upon
the death of an individual. It has long played an important role in human societies.
The Roman law introduced the concept of universal succession, which is to say that
in inheritance law the heirs enter into the legal position regarding property rights
Unique Characteristics of Digital Assets
Physical assets like books, clothes, accessories etc. can be easily passed on without any
legal complications because the laws are formed and defined. But when it comes to
digital assets like passwords, access to social network profiles e.g. Facebook, Twitter,
Google or Linked In; emails, tweets, databases, digital files and bank accounts, the legal
landscape has failed to keep up with the web 2.0 and the rapid technological
proliferation.Today, the amount of information accessed and stored online is growing at
the speed of lightning. The growing use of email and paperless bill paying has created a
situation where vital records are stored-in online accounts only. In addition, more and
more information and valuable items are resting on media that are not owned by the data
owner but by service provider(e.g. Google, Apple, Microsoft etc.). Also in contrast to
physical assets, electronic values can be copied indefinitely, which could be problematic
if the asset represents intellectual properties. In contrast to conventional inheritance of
physical assets, digital inheritance also needs to cope with the fact that the digital heirs
areonly known by their email addresses or mobile numbers. Handing over digital assets
requires additional information that may be crucial for a heir to further treat the digital
assets.
Digital Inheritance and the legal framework
Although, the Roman law introduced the concept of universal succession, in which the
heirs enter into the legal position regarding property rights of the testator by law. Muslim
sharia laws and Bible talks about the inheritance issue, but what about the digital assets
who will inherit it. The answer to this new question arising out of internet bubble of early
millennium year has been to create a legal framework wherein a person can specify as he
does with his physical assets that who should get what, when he is no more.
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 3
Some of the problem that came into light recently is related to what happens to the data
and information that is password protected and users don't share it with anyone. Some of
them could be our secret of life. How can users secure of password or decide what our
inheritor could access. All of these questions are becoming very important and Internet
users have been wrestling with it.
Digital inheritance and the law
At present, service providers and content sellers have been slow to react partly because
the issue of transference post death of the customer is complex and has been affecting
only a limited number of customers. However, these companies and content sellers will
be forced to react faster, more so because of the consumers’ demand. Therefore, the
debate at present is whether the next of the kin will be granted access to the digital
accounts. For example, access to Amazon account if the deceased person ishis or her next
of kin and did not have the password.
Consequently, there has been an increasing pressure on lawmakers to build broader
policies and practical solution to the ongoing confusion and misunderstanding as of now.
There has been some legislative progress for surviving family members. At least three
states -- Idaho, Nebraska and Indiana have enacted laws that allow next of kin to gain
access to digital accounts. Other states, including New York, North Carolina and Oregon,
are also considering making changes.
To prevent estate issues, digital media owners should plan ahead. Users can specify
information passwords and accounts to be passed on in their will.
Some data inheritance services have also emerged in recent years, promising a secure
place to store documents and passwords that will be passed on to a stated beneficiary
upon the account holder's death.
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 4
Conclusion and Opinion
The digital inheritance and accessibility issues came into light recently after a couple of
notable cases and lawsuits against the service providers for not giving the kin access to
the digital assets after the death of the owner. People have recently realized that digital
assets like bank account details, Facebook access and other digital properties are not
transferrable like the physical assets. The concept is fairly new because a large number of
people are not aware about the laws and terms and conditions behind the services
provided. In addition, digital media and electronic format is a new concept in people’s
lives.Since, the concept is very new there is a need to create awareness about the digital
rights and the importance of the medium.
In my opinion, the best way to approach this problem is by understanding that digital
assets are as good as physical assets and should be treated similar to the physical assets.
With just one difference i.e. unlike the physical assets digital assets are vulnerable in
terms of manipulation, duplication and deletion.
Another solution could be encryption of the password and split the password into
fragments and distribute it among the heirs. After the owner ceases to exist, these heirs
can combine their pieces to find out the password.
Companies can provide services to the users or customers wherein the owner could save
the digital details or assets in the name of the heir or next of the kin and specify what
assets should be given access and pay a nominal fees. Once, the owner is dead the heir
can have rightful access to the digital assets.
Also, Digital Rights Management (DRM) system or password locker like the Dswiss
could be a best solution as it allows access only to the testator and an executor presenting
a death certificate. For example: Hotmail has a provision to provide the details and access
upon the proof of death such as death certificate and a valid identity of the heir or the kin.
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 5
Citations
“The Legal Issues Arising from Marketing Through Digital Media in the UAE”by David
Yates & Yvonne Pah
“Legal issues regarding access to digital assets growing”
http://www.gallowaycollens.com/blog/2012/10/legal-issues-regarding-access-to-digital-
assets-growing.shtml
“Digital inheritance” http://en.wikipedia.org/wiki/Digital_inheritance

More Related Content

What's hot

Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012
gallowayandcollens
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?
Nicole Black
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
Digital-identity
 

What's hot (20)

The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security Concerns
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?
 
The Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowThe Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should Know
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
Societal and ethical issues of digitization
Societal and ethical issues of digitizationSocietal and ethical issues of digitization
Societal and ethical issues of digitization
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Human identity inforg
Human identity   inforgHuman identity   inforg
Human identity inforg
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
 
The Case for Personal Information Empowerment and the rise of personal data s...
The Case for Personal Information Empowerment and the rise of personal data s...The Case for Personal Information Empowerment and the rise of personal data s...
The Case for Personal Information Empowerment and the rise of personal data s...
 
Reading the Next Book
Reading the Next BookReading the Next Book
Reading the Next Book
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship Framework
 
Click-Wrap To Cost-Shifting
Click-Wrap To Cost-ShiftingClick-Wrap To Cost-Shifting
Click-Wrap To Cost-Shifting
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 

Viewers also liked

Burke museumdigitalmarketingplan
Burke museumdigitalmarketingplanBurke museumdigitalmarketingplan
Burke museumdigitalmarketingplan
Priyaranjan Mestri
 

Viewers also liked (17)

Prices
PricesPrices
Prices
 
CORT Sofa Secrets: Two Questions
CORT Sofa Secrets: Two QuestionsCORT Sofa Secrets: Two Questions
CORT Sofa Secrets: Two Questions
 
New girl fan site
New girl fan siteNew girl fan site
New girl fan site
 
Bi mat cua_hanh_phuc
Bi mat cua_hanh_phucBi mat cua_hanh_phuc
Bi mat cua_hanh_phuc
 
Running a Lean Startup Sales Process
Running a Lean Startup Sales ProcessRunning a Lean Startup Sales Process
Running a Lean Startup Sales Process
 
Portfolio
PortfolioPortfolio
Portfolio
 
Contemporary Issues
Contemporary IssuesContemporary Issues
Contemporary Issues
 
20141008 intelcollab
20141008 intelcollab20141008 intelcollab
20141008 intelcollab
 
Ranjan interm blog report
Ranjan interm blog reportRanjan interm blog report
Ranjan interm blog report
 
Types of advertising copy
Types of advertising copyTypes of advertising copy
Types of advertising copy
 
Media Planning Project
Media Planning ProjectMedia Planning Project
Media Planning Project
 
Wedding wonderful
Wedding wonderfulWedding wonderful
Wedding wonderful
 
Affiliate marketing
Affiliate marketingAffiliate marketing
Affiliate marketing
 
Carmax presentation (1)
Carmax presentation (1)Carmax presentation (1)
Carmax presentation (1)
 
Vodafone mumbai 2010
Vodafone mumbai 2010Vodafone mumbai 2010
Vodafone mumbai 2010
 
Burke museumdigitalmarketingplan
Burke museumdigitalmarketingplanBurke museumdigitalmarketingplan
Burke museumdigitalmarketingplan
 
RG Residency Noida construction update 15 Nov 2014
RG Residency Noida construction update 15 Nov 2014RG Residency Noida construction update 15 Nov 2014
RG Residency Noida construction update 15 Nov 2014
 

Similar to Digital inheritance final

Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
SANSKAR20
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
ursabrooks36447
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
todd521
 

Similar to Digital inheritance final (18)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. SnowerThe Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
 
Understanding Digital Inheritance.pdf
Understanding Digital Inheritance.pdfUnderstanding Digital Inheritance.pdf
Understanding Digital Inheritance.pdf
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Digital assets
Digital assetsDigital assets
Digital assets
 
Lawek mui
Lawek muiLawek mui
Lawek mui
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITY
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITYWEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITY
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITY
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their data
 
Five Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPRFive Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPR
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Cryptocollege how blockchain can reimagine higher education. J. David Judd
Cryptocollege  how blockchain can reimagine higher education. J. David JuddCryptocollege  how blockchain can reimagine higher education. J. David Judd
Cryptocollege how blockchain can reimagine higher education. J. David Judd
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 

Digital inheritance final

  • 1. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 1 DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES Priyaranjan B Mestri University of Washington
  • 2. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 2 Background Inheritance is the practice of passing on property, titles, debts, rights and obligations upon the death of an individual. It has long played an important role in human societies. The Roman law introduced the concept of universal succession, which is to say that in inheritance law the heirs enter into the legal position regarding property rights Unique Characteristics of Digital Assets Physical assets like books, clothes, accessories etc. can be easily passed on without any legal complications because the laws are formed and defined. But when it comes to digital assets like passwords, access to social network profiles e.g. Facebook, Twitter, Google or Linked In; emails, tweets, databases, digital files and bank accounts, the legal landscape has failed to keep up with the web 2.0 and the rapid technological proliferation.Today, the amount of information accessed and stored online is growing at the speed of lightning. The growing use of email and paperless bill paying has created a situation where vital records are stored-in online accounts only. In addition, more and more information and valuable items are resting on media that are not owned by the data owner but by service provider(e.g. Google, Apple, Microsoft etc.). Also in contrast to physical assets, electronic values can be copied indefinitely, which could be problematic if the asset represents intellectual properties. In contrast to conventional inheritance of physical assets, digital inheritance also needs to cope with the fact that the digital heirs areonly known by their email addresses or mobile numbers. Handing over digital assets requires additional information that may be crucial for a heir to further treat the digital assets. Digital Inheritance and the legal framework Although, the Roman law introduced the concept of universal succession, in which the heirs enter into the legal position regarding property rights of the testator by law. Muslim sharia laws and Bible talks about the inheritance issue, but what about the digital assets who will inherit it. The answer to this new question arising out of internet bubble of early millennium year has been to create a legal framework wherein a person can specify as he does with his physical assets that who should get what, when he is no more.
  • 3. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 3 Some of the problem that came into light recently is related to what happens to the data and information that is password protected and users don't share it with anyone. Some of them could be our secret of life. How can users secure of password or decide what our inheritor could access. All of these questions are becoming very important and Internet users have been wrestling with it. Digital inheritance and the law At present, service providers and content sellers have been slow to react partly because the issue of transference post death of the customer is complex and has been affecting only a limited number of customers. However, these companies and content sellers will be forced to react faster, more so because of the consumers’ demand. Therefore, the debate at present is whether the next of the kin will be granted access to the digital accounts. For example, access to Amazon account if the deceased person ishis or her next of kin and did not have the password. Consequently, there has been an increasing pressure on lawmakers to build broader policies and practical solution to the ongoing confusion and misunderstanding as of now. There has been some legislative progress for surviving family members. At least three states -- Idaho, Nebraska and Indiana have enacted laws that allow next of kin to gain access to digital accounts. Other states, including New York, North Carolina and Oregon, are also considering making changes. To prevent estate issues, digital media owners should plan ahead. Users can specify information passwords and accounts to be passed on in their will. Some data inheritance services have also emerged in recent years, promising a secure place to store documents and passwords that will be passed on to a stated beneficiary upon the account holder's death.
  • 4. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 4 Conclusion and Opinion The digital inheritance and accessibility issues came into light recently after a couple of notable cases and lawsuits against the service providers for not giving the kin access to the digital assets after the death of the owner. People have recently realized that digital assets like bank account details, Facebook access and other digital properties are not transferrable like the physical assets. The concept is fairly new because a large number of people are not aware about the laws and terms and conditions behind the services provided. In addition, digital media and electronic format is a new concept in people’s lives.Since, the concept is very new there is a need to create awareness about the digital rights and the importance of the medium. In my opinion, the best way to approach this problem is by understanding that digital assets are as good as physical assets and should be treated similar to the physical assets. With just one difference i.e. unlike the physical assets digital assets are vulnerable in terms of manipulation, duplication and deletion. Another solution could be encryption of the password and split the password into fragments and distribute it among the heirs. After the owner ceases to exist, these heirs can combine their pieces to find out the password. Companies can provide services to the users or customers wherein the owner could save the digital details or assets in the name of the heir or next of the kin and specify what assets should be given access and pay a nominal fees. Once, the owner is dead the heir can have rightful access to the digital assets. Also, Digital Rights Management (DRM) system or password locker like the Dswiss could be a best solution as it allows access only to the testator and an executor presenting a death certificate. For example: Hotmail has a provision to provide the details and access upon the proof of death such as death certificate and a valid identity of the heir or the kin.
  • 5. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 5 Citations “The Legal Issues Arising from Marketing Through Digital Media in the UAE”by David Yates & Yvonne Pah “Legal issues regarding access to digital assets growing” http://www.gallowaycollens.com/blog/2012/10/legal-issues-regarding-access-to-digital- assets-growing.shtml “Digital inheritance” http://en.wikipedia.org/wiki/Digital_inheritance