Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
In an era where technology plays such an important part of everyday life, the attorney needs to understand how to properly plan for a client’s digital assets. This presentation will discuss Michigan’s new Fiduciary Access to Digital Assets Act and how to incorporate it into your existing practice.
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
In an era where technology plays such an important part of everyday life, the attorney needs to understand how to properly plan for a client’s digital assets. This presentation will discuss Michigan’s new Fiduciary Access to Digital Assets Act and how to incorporate it into your existing practice.
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
National Academy of Elder Law Attorneys Webinar 2015 presented by Attorney Howard Collens on the recent updates regarding Fiduciary Access to Digital Assets.
Developing Countries National ICT Identity Governance StrategyGuy Huntington
Reviews the governance components required to successfully implement and maintain an e-government strategy:
* Identity data governance
* Identity infrastructure governance
* Laws and regulations governance
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
A number of technological systems , sometimes known as "digital wills" are appearing on the market to help people bequeath digital assets such as passwords, emails, virtual game assets etc. Do these help provide a legal solution? Or do they merely confuse further a landscape alreqdy lacking good practice?
Global & National Identity Projects Failures and SuccessesGuy Huntington
* Reviews common causes for why so many large identity projects fail, go over budget and timelines and under-deliver
* Describes, based on my experience, ways to structure a large identity program with several related identity projects such that they will be successful
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
This presentation on public-sector blockchain projects and strategy was given by Jennifer O'Rourke of the Illinois Blockchain Initiative at the December 2017 meeting of Blockchain for Social Good (BSGC).
Presentation on VisitOSLOs "open design process", We were crowdsourcing input from the people of Oslo and the local travel industry under the tag #diggeroslo - inviting everybody digging Oslo to influence the designers (from Brandlab) and in the end choose between two different design concepts.
Presentation given at Norwegian Digital Travel Conference 2014.
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
National Academy of Elder Law Attorneys Webinar 2015 presented by Attorney Howard Collens on the recent updates regarding Fiduciary Access to Digital Assets.
Developing Countries National ICT Identity Governance StrategyGuy Huntington
Reviews the governance components required to successfully implement and maintain an e-government strategy:
* Identity data governance
* Identity infrastructure governance
* Laws and regulations governance
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
A number of technological systems , sometimes known as "digital wills" are appearing on the market to help people bequeath digital assets such as passwords, emails, virtual game assets etc. Do these help provide a legal solution? Or do they merely confuse further a landscape alreqdy lacking good practice?
Global & National Identity Projects Failures and SuccessesGuy Huntington
* Reviews common causes for why so many large identity projects fail, go over budget and timelines and under-deliver
* Describes, based on my experience, ways to structure a large identity program with several related identity projects such that they will be successful
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
This presentation on public-sector blockchain projects and strategy was given by Jennifer O'Rourke of the Illinois Blockchain Initiative at the December 2017 meeting of Blockchain for Social Good (BSGC).
Presentation on VisitOSLOs "open design process", We were crowdsourcing input from the people of Oslo and the local travel industry under the tag #diggeroslo - inviting everybody digging Oslo to influence the designers (from Brandlab) and in the end choose between two different design concepts.
Presentation given at Norwegian Digital Travel Conference 2014.
Towards a Digital Ecology: The New Organization's Digital FootprintJai (Phillip) Djwa
Ten years ago, many not-for-profit organizations didn't have a single website online and often struggled to create them. Today, many organizations have multiple websites: their main site, microsites, specific campaign sites, maybe even some program sites.
Add in Facebook and Twitter and the struggle required to maintain this digital footprint becomes obvious. All these websites form a digital brand that represents your organization's digital ecology.
This web presence, or digital ecology, needs to be thought through strategically. You need to explore this interconnectedness by answering basic questions like
How should all these connect?
When do you kill a site?
When do you launch a microsite and when do you add another navigation item?
Developed in conjunction with UCL Careers, this hands-on workshop will help you find out what potential employers see when they search for your profile online and learn how to tailor it to make it more appealing. We’ll also discuss how to keep your private life private and suggest ways to raise your digital profile. Bring a smart device along and a pen to get the most out of this session.
Online & More: Is Your Digital Footprint in the Digital Age?Denny McCorkle
This is my session presentation for the Radius of Influence Legal Marketing Conference in Denver on May 1, 2015.
In this presentation I talked about the digital do’s and don’ts of defining, monitoring, and improving your digital footprint and brand identity.
This includes the importance of using the social web for search engine optimization, social media optimization, networking convergence, and as a personal learning network.
Hello folks,this was my seminar topic in 2nd year polytechnic (ETC).I hope you all like this,references are shown which helped me complete this presentation.
You Can Run, But You Can't Hide! - How far should the government regulate the Internet? -Has data mining gone too far? (Great secondary research project.) Digital footprint makeover handouts available at: digitalmakeover.wikispaces.com Find ideas for classroom instruction, also, on this wikispace.
This presentation was a breakout session at WLMA14 and has been updated to reflect recent revelations on medical information mining. We did not even get to discuss the EDUCATIONAL DATA MINING that is occurring on our students and children! Caveat!
My books- Learning to Go https://gumroad.com/l/learn2go & The 30 Goals Challenge for Teachers http://amazon.com/The-Goals-Challenge-Teachers-Transform/dp/0415735343 Find resources at http://shellyterrell.com/citizenship
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Arniel Ping
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digital Footprints, and Digital Issues
Topic: Legal, Ethical, and Societal Issues in Media and Information (Part 2)
Learning Competencies
1. explain digital citizenship, netiquette, and digital footprints (SSHS);
2. demonstrate proper conduct and behavior online (netiquette, virtual self) (MIL11/12LESI-IIIg18);
3. Identify some of the digital issues in the Philippines (SSHS);
4. put into action personal resolve to combat digital divide, addiction, and bullying (MIL11/12LESI-IIIg19)
5. explain actions to promote ethical use of media and information (MIL11/12LESI-IIIg22)
6. enumerate opportunities and challenges in media and information (MIL12LESI-IIIg-23)
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
Attorney Howard Collens presents on Fiduciary Access to Digital Assets, where he focuses on photo sharing and storage sites such as Picasa, Dropbox and Flickr. #FADA4MI. Howard is working on getting a new law enacted in Michigan.
* Lays out existing healthcare delivery problems many developing countries have
* Presents a high level framework for an ICT health care strategy leveraging identity
National Identity ICT Defence and Intelligence StrategyGuy Huntington
Examines:
* Significant risk of governments being held for ransom from malware attacks on their national ICT infrastructure
* Lays out high level requirements for:
- Privacy
- Malware and denial of service attack defence
- High availability
2019-06-11 What New US State Laws Mean For Your BusinessTrustArc
On-Demand Webinar Recording: https://info.trustarc.com/WB-2019-06-11-USDataProtectionLaws_RegPage.html
-------
While the focus over the past two years has been around global privacy regulations such as the EU GDPR regulation, individual US states have been proposing -- and enacting -- a number of privacy-impacting laws that may affect your company in new and challenging ways. From the comprehensive California Consumer Privacy Act (CCPA) to the revisions in data breach laws in Colorado, Oregon and Vermont, it can be difficult to track these changes, and even more difficult to build a compliance program with the flexibility to adapt to the constantly changing environment.
This webinar will provide:
-An overview of major new US state privacy laws and important pending legislation
-An update on the discussions and atmospherics around a comprehensive US privacy law
-Recommendations on incorporating US state privacy law compliance into a global privacy risk management program
Pli workplace privacy in the year 2013 2013-6-13mkeane
Addresses privacy issues associated with hiring in a social media world, privacy issues associated with BYOD programs; employee privacy rights associated with off-duty activity including Facebook postings and activity protected by lifestyle laws.
Digital Assets: A Path To Fiduciary AccessHoward Collens
Presented at State Bar of Michigan Elder Law and Disability Rights Section 2014 Fall Conference. Explores Fiduciary Access to Digital Assets, the Uniform Law Commission FADA, and Michigan's legislative changes to the Probate law.
5 Key Things to Know About eDiscovery and How to Implement Them in Your PracticeESI Attorneys LLC
A primer for attorneys, legal professionals, board members and business people on what to be aware of with digital information and the process of electronic discovery.
This presentation covers the challenges of:
* Most African governments struggle with people Illegally immigrating in and then masquerading as a citizen
* Voting irregularities
* Pretending to be students when they’re not
* Using dead citizen’s identities to then use them to access social programs
* Governments find the identity is effectively siloed in many different ministry databases and have problems with fake identity cards being used
Presents an integrated framework that not only addresses this BUT ALSO can be used for education, health and citizen payments
Presented by Vipin Chandra Joshi at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Mitigating Risk of Website Accessibility Lawsuits3Play Media
Attempts to enforce ADA website compliance continue and may be increasing in some business verticals with the effects of the pandemic and the push to an all-on-line era. The need to make your websites more accessible to all is not a matter of if, but rather when. Accessible360’s Co-founder has been teaching CLE classes for several years, come learn what you can do now to make websites and apps available to more people, and how to reduce your risk.
Setting Every Community Up for Retirement Enhancement (SECURE) Act gallowayandcollens
The Setting Every Community Up for Retirement Enhancement Act of 2019, called the “SECURE Act” makes significant changes to how IRAs and certain retirement benefits must be treated post-death.
Attorney Howard H. Collens presents information on the newly enacted law effective January 1, 2020
Hoarding is a reality that impacts a realtor’s listing and sale of property. This overview seeks to provide insight into this often misunderstood mental health condition, and provide practical solutions that realtors can use when encountering a hoarder owned property.
Many problems can arise if a trust is not properly funded. Attorney Howard Collens provides a few tips on how to properly fund a trust and avoid probate court.
This presentation provides tips for creating and managing a social media page for your business. Learn how to engage your followers and reach the right people with ads and branding.
The law firm of Galloway and Collens, PLLC represents individuals and businesses in a wide variety of legal matters. We apply our expertise and experience to your unique situation, providing you with effective, creative and valued representation. Our areas of practice include Estate Planning, Probate, Elder Law, Real Estate for homeowners and professionals, Landlord/Tenant Matters, Litigation and Transactions.
Considering how much information we keep on computers and on the internet, estate planning just isn’t complete anymore without including digital assets and social media accounts.
Understanding Hoarding Disorder Presentation - Spring 2014gallowayandcollens
Learn the different aspects of the hoarding disorder.
Understand the probate process including admission and administration of an estate under a will.
Learn about the different types of Power of Attorney and which one is right for you and your family.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
7. What are Digital Assets?
• Digital assets come in a variety of forms, and are constantly changing,
along with technology and social trends.
• An individual may have a property ownership interest in an asset, or
merely a license.
• The term “digital assets” means, but is not limited to, files, including but not
limited to, emails, documents, images, audio, video, and similar digital
files which currently exist or may exist as technology develops or
such comparable items as technology develops, stored on digital devices,
including, but not limited to, desktops, laptops, tablets, peripherals, storage
devices, mobile telephones, smart phones, and any similar digital device
which currently exists or may exist as technology develops or such
comparable items as technology develops, regardless of the ownership of
the physical device upon which the digital asset is stored.
Excerpt from: The Elder Law Report, Vol. XXV, Number 1
8. Categories of Digital Assets
• Personal
• Stored on computers, smart phones, or other devices, or are uploaded to a
Web site or digital service
• Photographs, videos, emails, and music playlist
• Social Media
• May involve photos, videos and other electronic files stored on these accounts
• Financial
• Online banking, online bill-paying activities
• Online accounts with no connection to a brick-and-mortar establishment
(Amazon, eBay, PayPal and E*TRADE, BitCoin)
• Business
• Varies by types of business and extent of its computer or Internet associated
activities, which may include blogs, domain names, credit card and financial
data
10. Could someone else,
acting on your behalf, gain access to
your digital assets?
What if the person was deceased?
Would you want them to be able to?
11. Access to Digital Assets
would be challenging, if
not impossible, without a
Fiduciary Access to
Digital Assets law
12. • In 2011, the Uniform Law Commission established
the Fiduciary Access to Digital Assets Committee
to draft a free-standing act that will vest fiduciaries
with the authority to manage and distribute digital
assets, copy or delete digital assets, and access
digital assets
13. • July 2014 the ULC introduced 1st version of a Uniform
Fiduciary Access to Digital Assets Act (UFADAA)
• Only Delaware adopted law based on 2014 version
• In July 2015, the ULC developed a revised UFADAA
14. The UFADAA:
• Gives Account Holder control over whether digital
assets should be preserved, distributed or destroyed
• Authorizes access to digital assets that would not
violate the Federal Stored Communications Act, 18
USC 2701 and Computer Fraud and Abuse Act, 18
USC 1030
15. The UFADAA:
• If widely adopted, provides consistency throughout the
country
• Authorizes access by:
• Agent under Power of Attorney
• Conservator
• Personal Representative
• Trustee
16. Where Are We Now?
(as of November 2016)
• Twenty states have currently passed some form of
Fiduciary Access to Digital Assets Act. California also
passed a partial version that deals with decedents’ estates
only.
• Two states, Ohio and New Jersey, have legislation
pending. These two states’ legislatures are in session and
have active bills that could still pass in 2016.
• Twenty nine states have plans to introduce a RUFADAA
bill in 2017. If they are all enacted, we will have near-
universal enactment in the U.S.
- Benjamin Orzeske, Chief Counsel of the Uniform Law Commission
18. Michigan and FADA
• HB 5034 was introduced, October 28, 2015 by Representative
Anthony Forlini
• Based on the ULC revised approach, HB 5034 offered a
comprehensive approach to Fiduciary Access to Digital Assets for
Michigan
• Joint Efforts of Elder Law and Disability Rights Section and Probate
and Estate Planning Sections to represent the interests of end users
19. Michigan and FADA
• HB 5034 became law in March 2016
• Effective as of June 27, 2016
• Codified at MCL 700.1001 et seq.
http://www.legislature.mi.gov/(S(lbtllxurzntu2irpvxgxznb3))/mileg.aspx?page=getObject&objectName=mcl-Act-59-of-2016
20. Michigan’s
Fiduciary Access to Digital Assets Act
FADA Applies to:
• Fiduciary acting under a will or power of attorney
• Personal representative acting for a decedent estate
• Proceeding involving a conservator
• Trustee acting under a trust
• Digital custodian if the user resides in this state
• Does not apply to a digital asset of an employer used by an
employee in the ordinary course of business
21. Michigan’s
Fiduciary Access to Digital Assets Act
• What is a Digital Asset? - An electronic record in which a
user has a right or interest. Does not include an underlying
asset or liability unless the asset or liability is itself an
electronic record.
• Access to the bank account vs. the money in the bank
22. Catalogue and Content – Why it Matters
•Those who plan will be
rewarded
•Those who don’t will
be punished
23. Michigan’s
Fiduciary Access to Digital Assets Act
Accessing Content vs. Catalogue
• Personal Representatives
• Power of Attorney
• Trustee
• Conservator
24. Michigan’s
Fiduciary Access to Digital Assets Act
HOW MUCH ACCESS DOES THE DIGITAL CUSTODIAN
NEED TO PROVIDE?
• At the Digital Custodian’s SOLE DISCRETION, they may
• Grant a fiduciary or designated recipient full access to the user's
account.
• Grant a fiduciary or designated recipient partial access to the
user's account sufficient to perform the tasks with which the
fiduciary or designated recipient is charged.
• Provide a fiduciary or designated recipient a copy in a record of any
digital asset that, on the date the digital custodian received the
request for disclosure, the user could have accessed if the user
were alive and had full capacity and access to the account.
25. Michigan’s
Fiduciary Access to Digital Assets Act
HOW MUCH ACCESS DOES THE DIGITAL CUSTODIAN
NEED TO PROVIDE?
• A digital custodian may assess a reasonable administrative charge
• A digital custodian is not required to disclose a digital asset deleted by a
user
• If only a request for some but not all of the digital assets and if
segregation would impose an undue burden on the digital custodian, the
digital custodian may seek a court order to disclose some, all or
none of the digital assets.
26. Michigan’s
Fiduciary Access to Digital Assets Act
• Digital custodians shall comply with the requests for disclosure by
Fiduciary within 56 days of receipt of required information.
• If the digital custodian fails to comply, the fiduciary may petition
the court for an order directing compliance.
• A fiduciary as well as digital custodian are immune from liability
for any action done in good faith in compliance with this act.
27. Michigan’s
Fiduciary Access to Digital Assets Act
• A digital custodian may require a fiduciary or designated recipient
who requests disclosure or termination of an account to obtain a
court order that:
• Specifies that an account belongs to the protected person or
principal.
• Specifies that there is sufficient consent from the protected
person or principal to support the requested disclosure.
• Contains a finding required by law other than this act.
28. Michigan’s
Fiduciary Access to Digital Assets Act
• An interested person may petition the probate court to limit,
eliminate, or modify the personal representative's powers with
respect to the decedent's digital assets.
• Hearing shall be heard within 14 and 56 days of filing the petition.
30. Facebook
Memorialize the account
“We will memorialize the Facebook account of a deceased person when we receive a valid
request. We try to prevent references to memorialized accounts from appearing on
Facebook in ways that may be upsetting to the person's friends and family, and we also take
measures to protect the privacy of the deceased person by securing the account.
Please keep in mind that we cannot provide login information for a memorialized
account. It is always a violation of our policies to log into another person's account.”
• Memorial accounts can never be logged into again
Ask to have profile removed or deleted
“We will process certain special requests for verified immediate family members, including
requests to remove their loved one's account. This will completely remove the profile and all
associated content from Facebook, so no one can view it.”
Need to submit
• The deceased's birth certificate
• The deceased's death certificate
• Proof of authority under local law that you are the lawful representative of the
deceased or his/her estate
From: Facebook
31. Facebook
Legacy Contact is someone you choose to look after your account if it's memorialized. Once your account
is memorialized, your legacy contact will have the option to do things like:
• Write a pinned post for your profile (ex: to share a final message on your behalf or provide information
about a memorial service)
• Respond to new friend requests (ex: old friends or family members who weren't yet on Facebook)
• Update your profile picture and cover photo
• You also have the option to allow your legacy contact to download a copy of what
you've shared on Facebook, and we may add additional capabilities for legacy contacts in
the future.
Your legacy contact can't:
• Log into your account
• Remove or change past posts, photos and other things shared on your Timeline
• Read messages you've sent to other friends
• Remove any of your friends
From: Facebook
32. Twitter
“In the event of the death of a Twitter user, we can work with a person authorized to act on the
behalf of the estate or with a verified immediate family member of the deceased to have an
account deactivated.
In order for us to process an account deactivation, please provide us with all of the following
information:
The username of the deceased user's Twitter account (e.g., @username or
twitter.com/username)
A copy of the deceased user’s death certificate
A copy of your government-issued ID (e.g., driver’s license)
A signed statement including:
Your first and last name
Your email address
Your current contact information
Your relationship to the deceased user or their estate
Action requested (e.g., ‘please deactivate the Twitter account’)
A brief description of the details that evidence this account belongs to the
deceased, if the name on the account does not match the name on death
certificate.
A link to an online obituary or a copy of the obituary from a local newspaper
(optional)”
From Twitter: How to Contact Twitter About a Deceased User
33. Twitter
“Please send us the documentation by fax or mail to the following address:
Twitter, Inc.
c/o: Trust & Safety
1355 Market St., Suite 900
San Francisco, CA 94103
Fax : 1-415-865-5405”
*Please note: We are unable to provide login information for the
account to anyone regardless of his or her relationship to the
deceased.*
From Twitter: How to Contact Twitter About a Deceased User
34. Google Inactive Account Manager
• Can be set up through Google Settings
• Lets Google know what to do with some or all Google related
accounts after a specified period of inactivity
• Services that can be controlled: +1s; Blogger; Contacts and
Circles; Drive; Gmail; Google+ Profiles, Pages and Streams;
Picasa Web Albums; Google Voice and YouTube
• Google sends a warning text and email before action is taken
• Can have Google delete the accounts
• What about items bought on Google Play?
35. Directive Communication Systems
DCS provides estate management solutions to attorneys and personal representatives, providing them
with one source to manage digital assets which can include deletion, memorialization, etc. of accounts
DCS provides personal representatives:
• Control over timing of estate communication distribution
• Clarity in identifying financial and other accounts
• Straightforward instructions for providing directives to personal account holding institutions
• Relief from the arduous task of tracking down institution information
• The ability to separate business decisions from emotional decisions
Types of Accounts:
• Money and banking
• Finance and investment
• Travel and loyalty
• Shopping and rewards
From: DCS
36. Provide Access
• Create a document and note if the property is personal
or has monetary value
Examples of note
Excerpt from: The Trust Advisor
37. Provide Instructions:
• If you want a site to continue, for example if you have a
website or blog, you need to leave instructions for keeping
it up or having someone take it over and continue it.
• If a site is currently producing or could produce revenue (e-
books, photography, videos, blogs), make sure your
successor knows this.
• If there are things on your computer or hard drive that you
want to pass on (scanned family photos, ancestry research,
a book you have been writing), put them in a “Do Not
Delete” folder and include it on your inventory list.
Excerpt from: Estate Planning for Digital Assets and Social Media
38. Inventory Checklist
• Make sure you include everything from your computer,
other devices, and the “virtual world” (i.e. cloud,
internet)
• All email accounts
• All social websites you participate in
• Financial and commerce accounts
• Make a simple spreadsheet with passwords to access
assets
Digital Assets Inventory
Asset Access Wishes
Name Contents Location Username Password Instructions Recipient
39. Who is in Charge?
• After you inventory your digital assets, you must decide
who to give the access to in the event of your death or
disability.
• Make sure you indicate whether you want your digital
executor to archive your content, share your content
with others, or delete your content (and/or secure
privacy of some content which may be harmful).
• Make sure to include any special instructions (Think
sensitive and/or embarrassing content).
40. Incorporating Digital Estate Planning
into Your Estate Plan
• To help the process, complete a questionnaire to list all digital assets and
the value of those assets
• Discuss if any of the assets have financial value
• Keep a record of all passwords and profiles
• There are websites specifically designed to release account
information after death to designated beneficiaries but they may be
here today gone tomorrow.
• Protect significant data with strong encryption
• Speak to an Estate Planning Attorney about your legal needs
41. Test Out Our New Law
• Now that FADA is here in Michigan:
• What Works?
• What Needs Improving?
• Have You Been Able To Use The New Law To
Access Someone Else’s Digital Assets?
• I would love to hear how you experience
Fiduciary Access to Digital Assets
42. Howard H. Collens
Galloway and Collens, PLLC
26075 Woodward Ave, Suite 200
Huntington Woods, Michigan 48070
248.545.2500
GallowayCollens.com
Howard@GallowayCollens.com
Twitter: @howardcollens
@probatelawmi
@realestatelawmi