This document discusses what happens to a person's digital assets when they die or become disabled. It notes that most people have accumulated significant "digital stuff" like photos, emails, social media accounts, finances and digital media purchases. The document outlines steps to take to plan for these digital assets, including creating an inventory, naming a "digital personal representative" and including any special instructions. It provides examples of how different social media platforms and companies handle deceased users' accounts. The document emphasizes the importance of having your wishes in writing to avoid headaches for loved ones later.
Considering how much information we keep on computers and on the internet, estate planning just isn’t complete anymore without including digital assets and social media accounts.
Digital Assets: A Path To Fiduciary AccessHoward Collens
Presented at State Bar of Michigan Elder Law and Disability Rights Section 2014 Fall Conference. Explores Fiduciary Access to Digital Assets, the Uniform Law Commission FADA, and Michigan's legislative changes to the Probate law.
A lot of talk about the future of the internet sounds almost hippie-spiritual or faux-philosophical. The Internet is not the same as the world-wide-web. But the Internet-of-Things and the Semantic Web - all parts of Web 3.0, are beginning to be very important to our learning environments. Here is a summary of key features, ranging from access, creativity, and information architecture.
Talk for the British library on how digital cultural heritage is increasingly created in prporietary "walled gardens" like Facebook , Second Life or Gmail. What effect will this have for future archivists or scholars?
Considering how much information we keep on computers and on the internet, estate planning just isn’t complete anymore without including digital assets and social media accounts.
Digital Assets: A Path To Fiduciary AccessHoward Collens
Presented at State Bar of Michigan Elder Law and Disability Rights Section 2014 Fall Conference. Explores Fiduciary Access to Digital Assets, the Uniform Law Commission FADA, and Michigan's legislative changes to the Probate law.
A lot of talk about the future of the internet sounds almost hippie-spiritual or faux-philosophical. The Internet is not the same as the world-wide-web. But the Internet-of-Things and the Semantic Web - all parts of Web 3.0, are beginning to be very important to our learning environments. Here is a summary of key features, ranging from access, creativity, and information architecture.
Talk for the British library on how digital cultural heritage is increasingly created in prporietary "walled gardens" like Facebook , Second Life or Gmail. What effect will this have for future archivists or scholars?
If you are a Facebook user, I suggest you view the presentation attached, and resolve to protect your privacy by following the practical steps to maximise your privacy settings. A few simple clicks are all that is required.
The Next Big Thing is Web 3.0. Catch It If You Can Judy O'Connell
The best minds on our planet are suggesting that the Internet will continue to be arguably the most influential invention of our time. We are in the midst of a highly dynamic and dramatically changing landscape. Where Web 1.0 made us consumers of information, Web 2.0 allowed us to be participators and creators. Web 3.0 and the Semantic Web technologies are beginning to play a larger and more significant role in the search and filtering of the content fire hose that teachers and students encounter each day. How will the semantic web influence our learning and teaching encounters on the web? What is the connection between meaning and data? Will search or discovery be the main driving force in the 3.0 information revolution? How will information and knowledge creation in a semantic-powered online world develop? This session will draw on Semantic Web research and developments and show how connecting, collaborating and networking in a Web 3.0 world is changing the ground-rules once again.
Managing your Digital Footprint : Taking control of the metadata and tracks a...CIGScotland
Find out how personal metadata, social media posts, and online activity make up an individual's "Digital Footprint", why they matter, and hear some advice on how to better manage digital tracks and traces. Nicola Osborne will draw on recent University of Edinburgh research on students' digital footprints, which is also the subject of the new #DFMOOC free online.
Presented at the CIG Scotland seminar 'Somewhere over the Rainbow: our metadata online, past, present & future' (Metadata & Web 2.0 Series) at the National Library of Scotland, Edinburgh, 5th April 2017
"Managing your Digital Footprint : Taking control of the metadata and tracks and traces that define us online" invited presentation for CIG Scotland's 7th Metadata & Web 2.0 Seminar: "Somewhere over the Rainbow: our metadata online, past, present & future", which took place at the National Library of Scotland, 5th April 2017.
Digital Natives? Basics of Information LiteracySarah Uthoff
Presentation takes you through what it means to be a native, if there really are digital natives and then turns to information literacy covering a few specific areas such as passwords, digital will, and some impressive tricks to gain you some credibility with any want to be natives.
Introduction to Social Marketing - Hofstra CEFrank Dinolfo
This was part of a course I am teaching with Robert O'regan at Hofstra University that is aimed at helping small and medium sized businesses integrate digital marketing strategies into their marketing strategies.
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
Part of the Fourth Amendment as a Service Workshops - @4thasaservice and www.fourthamendmentasaservice.org
This workshop will discuss matters of online privacy, your rights to privacy, protecting yourself from stalking, and more. We will incorporate live walkthroughs of how to install and configure popular privacy tools and demonstrate common ways to communicate in a safe, secure, and legal manner if you feel you are being targeted unfairly or illegally by people looking to do you harm.
Speakers
Ean Meyer – Course Director, Cloud Technologies
Jack Norman – Course Director, Cloud Technologies
Moderator: Jay Bunner – Program Director, Cloud Technologies
The presentation entitled “Social Networking, Privacy Policies, and Security Risks: How to Protect Your Personal Information Online” was specifically created for teens between 7th and 12th grades. The materials discuss ways that teenagers can negotiate social networking sites while protecting their personal information, instruction on privacy policies (how to read them, and what they mean), and how to deal with a variety of security risks like spyware and phishing.
Created by IAPP and Intel. Licensed under Creative Commons Attribution 3.0 Unported
The Baby Boomer population is booming and their long term care needs are booming too. If you are a Baby Boomer you need to be planning for your own long term care if you haven’t already.
In addition the prevalence of Alzheimer's is increasing, there is a serious shortage of Geriatric Professionals to care for seniors, long term care costs are increasing and there is very little governmental subsidy.
At some point, barring tragedy, every one of us becomes a senior yet we spend so little time considering what our long term care needs might be, how to prepare for them and of course how to finance them.
If you plan ahead there are options but you need to plan sooner rather than later!
If you are a Facebook user, I suggest you view the presentation attached, and resolve to protect your privacy by following the practical steps to maximise your privacy settings. A few simple clicks are all that is required.
The Next Big Thing is Web 3.0. Catch It If You Can Judy O'Connell
The best minds on our planet are suggesting that the Internet will continue to be arguably the most influential invention of our time. We are in the midst of a highly dynamic and dramatically changing landscape. Where Web 1.0 made us consumers of information, Web 2.0 allowed us to be participators and creators. Web 3.0 and the Semantic Web technologies are beginning to play a larger and more significant role in the search and filtering of the content fire hose that teachers and students encounter each day. How will the semantic web influence our learning and teaching encounters on the web? What is the connection between meaning and data? Will search or discovery be the main driving force in the 3.0 information revolution? How will information and knowledge creation in a semantic-powered online world develop? This session will draw on Semantic Web research and developments and show how connecting, collaborating and networking in a Web 3.0 world is changing the ground-rules once again.
Managing your Digital Footprint : Taking control of the metadata and tracks a...CIGScotland
Find out how personal metadata, social media posts, and online activity make up an individual's "Digital Footprint", why they matter, and hear some advice on how to better manage digital tracks and traces. Nicola Osborne will draw on recent University of Edinburgh research on students' digital footprints, which is also the subject of the new #DFMOOC free online.
Presented at the CIG Scotland seminar 'Somewhere over the Rainbow: our metadata online, past, present & future' (Metadata & Web 2.0 Series) at the National Library of Scotland, Edinburgh, 5th April 2017
"Managing your Digital Footprint : Taking control of the metadata and tracks and traces that define us online" invited presentation for CIG Scotland's 7th Metadata & Web 2.0 Seminar: "Somewhere over the Rainbow: our metadata online, past, present & future", which took place at the National Library of Scotland, 5th April 2017.
Digital Natives? Basics of Information LiteracySarah Uthoff
Presentation takes you through what it means to be a native, if there really are digital natives and then turns to information literacy covering a few specific areas such as passwords, digital will, and some impressive tricks to gain you some credibility with any want to be natives.
Introduction to Social Marketing - Hofstra CEFrank Dinolfo
This was part of a course I am teaching with Robert O'regan at Hofstra University that is aimed at helping small and medium sized businesses integrate digital marketing strategies into their marketing strategies.
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
Part of the Fourth Amendment as a Service Workshops - @4thasaservice and www.fourthamendmentasaservice.org
This workshop will discuss matters of online privacy, your rights to privacy, protecting yourself from stalking, and more. We will incorporate live walkthroughs of how to install and configure popular privacy tools and demonstrate common ways to communicate in a safe, secure, and legal manner if you feel you are being targeted unfairly or illegally by people looking to do you harm.
Speakers
Ean Meyer – Course Director, Cloud Technologies
Jack Norman – Course Director, Cloud Technologies
Moderator: Jay Bunner – Program Director, Cloud Technologies
The presentation entitled “Social Networking, Privacy Policies, and Security Risks: How to Protect Your Personal Information Online” was specifically created for teens between 7th and 12th grades. The materials discuss ways that teenagers can negotiate social networking sites while protecting their personal information, instruction on privacy policies (how to read them, and what they mean), and how to deal with a variety of security risks like spyware and phishing.
Created by IAPP and Intel. Licensed under Creative Commons Attribution 3.0 Unported
The Baby Boomer population is booming and their long term care needs are booming too. If you are a Baby Boomer you need to be planning for your own long term care if you haven’t already.
In addition the prevalence of Alzheimer's is increasing, there is a serious shortage of Geriatric Professionals to care for seniors, long term care costs are increasing and there is very little governmental subsidy.
At some point, barring tragedy, every one of us becomes a senior yet we spend so little time considering what our long term care needs might be, how to prepare for them and of course how to finance them.
If you plan ahead there are options but you need to plan sooner rather than later!
Still don’t understand the difference between qualified and nonqualified funds? Check out this Abaris module to learn how your annuity will be taxed by the IRS.
There are a number of tax implications associated with annuities and, as with all major financial decisions, it’s easy to get confused. We’ve laid out the basic tax implications that you need to know before you make a decision.
The way income annuities are taxed is based on what kind of money goes into the purchase of the annuity. Specifically, whether the input money or premium is pre- or post- tax money. If the input is pre-tax dollars, then the distribution from the income annuity is subject to income tax. If the input funds are post-tax dollars, however, then the distributed payouts are partially taxed, and partially not taxed. This second type of income annuity (the one purchased with post-tax dollars) is known as a non-qualified annuity, and the distribution is broken into a principal, which is not taxed, and a gain, which is taxed.
The size of the gain, meaning the taxed portion of the distribution, is calculated based on the Exclusion Ratio. The Exclusion Ratio is the ratio of the total investment in the contract to the expected return. To further break it down, the total investment in the contract equals the the premium you’ve paid for the contract. The expected return is simply the monthly payout times the IRS expectancy for how long you’ll receive those payments, or your life expectancy. This is no arbitrary number; far from it. The IRS uses actuarial tables based on age, sex, and overall health or longevity expectations to arrive at an average life expectancy of an individual.
You’ve got the framework, now let’s see an example. Say you’ve invested $100,000 (the premium) in an annuity that will pay $750 per month ($9,000 per year), beginning at age 62, for the rest of your life. You are the sole annuitant, meaning the only person receiving the annuity payments, and you take no early withdrawals. According to the IRS longevity tables you’ll receive payments for 22.5 years. In order to determine the tax implications, we must find the exclusion ratio:
Exclusion Ratio = Total Investment in the Contract / Expected Return
Total Investment in the Contract = Premium = $100,000
Expected Return = Yearly Payout x Expected Years of Payout = $9,000 x 22.5 yrs = $202,500
So….
Exclusion Ratio = $100,000 / $202,500 = 49.4%
Therefore, of the $9,000 you’ll receive each year, 49.4% will be non-taxed, meaning $4,446 will be non-taxed. This leaves the remaining taxed portion to be $4,554. The actual tax liability (or how much you pay in taxes) will depend on your individual tax bracket. And once you’ve received the entire premium back in the form of principal repayments, you’ll then be taxed on the entire amount. In this example, beginning at age 84.5 (62 years old + 22.5 years), your payouts would be fully taxed.
The Asset Return - Funding Cost Paradox: The Case for LDINorman Ehrentreich
Presentation for the IQPC Pension Plan De-Risking Conference on November 9th and 10th in New York (preliminary draft)
Proves that lower returning LDI strategies can result in lower funding costs than higher returning, but more volatile equity strategies. Furthermore argues that this is most likely the standard case in reality.
Want to understand how our population is aging and what it means for you? Want an Action Plan for retirement? Use Abaris' simple tutorial to get answers to these questions and more.
Science has proved it: people today are living longer than ever before. But as average life expectancies have been rising, the mean retirement age has stayed more or less the same. Since 1940 the average life span has gone up about 17 years, now at about age 79, yet the average age of retirement is more or less the exact same, about 65 years old. That leaves a big gap of your life filled without a paycheck, which is why Social Security, pensions and retirement income products are so important.
Despite the importance of Social Security and pension plans, fewer people than ever have pensions today and Social Security rarely covers all of a retiree’s expenses. On average, money received from Social Security only makes up about 42% of an individual’s pre-retirement income. Additionally, Social Security reserves are suffering from underfunding, and are expected to run out by 2033 under current law. Pension plans are great in that they guarantee a lifetime income, but they’re becoming more and more rare. Today, the predominant form of individual retirement savings is in 401(k)s and IRAs. But those plans don’t automatically provide lifetime income, leaving people to struggle with longevity risk: the chance that you live far longer than you expect. If you lead a long healthy life, as you certainly hope to, you’d end up running out of your savings.One solution? Deferred income annuities.
A deferred income annuity is a way of insuring against longevity. You make a payment, or series of payments, to an insurance company. Insurance companies are able to pool risk and use the market for pooling and protection in ways that you can’t on your own. This allows them to pay you an annual income, beginning at some future date, for the rest of your life. Surely stocks tend to yield a greater financial return, but with a deferred income annuity the value is in the guaranteed protection and the peace of mind. Deferred income annuities aren’t right for everyone. If you’re younger than 45, in below average health, most concerned about passing money onto your heirs, able to “self-insure” off the wealth of your investment income, or if you haven’t saved enough and need to keep the money you have in case of emergency then you’re probably not the best fit for a deferred income annuity. But otherwise, you’re looking like a great candidate.
Long term care expenses are one of the largest threats to retirment security. 70% of people over age 65 will need some form of LTC. This workshop outlines the potential costs, what expenses are covered by health insurance, medicare and medicaid.
The current economic turmoil has hit harder and is biting deeper than any downturn in recent memory. This presentation examines how organisations can respond quickly and efficiently to remain focused on the market, position themselves to take advantage of the upswing when it arrives and reduce costs.
Who will have access to your digital legacy when you become incapacitated or upon your death? Looks at the emerging field of estate planning for digital assets.
The Internet has evolved into a collaborative environment where anyone can publish information as easily as viewing or downloading it. There are many powerful learning opportunities on the Internet and we want to ensure our students get the most of this valuable tool while being safe. This session includes introductions to the technologies, the benefits, the concerns, and proactive strategies for keeping students safe.
Setting Every Community Up for Retirement Enhancement (SECURE) Act gallowayandcollens
The Setting Every Community Up for Retirement Enhancement Act of 2019, called the “SECURE Act” makes significant changes to how IRAs and certain retirement benefits must be treated post-death.
Attorney Howard H. Collens presents information on the newly enacted law effective January 1, 2020
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
Hoarding is a reality that impacts a realtor’s listing and sale of property. This overview seeks to provide insight into this often misunderstood mental health condition, and provide practical solutions that realtors can use when encountering a hoarder owned property.
Many problems can arise if a trust is not properly funded. Attorney Howard Collens provides a few tips on how to properly fund a trust and avoid probate court.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
In an era where technology plays such an important part of everyday life, the attorney needs to understand how to properly plan for a client’s digital assets. This presentation will discuss Michigan’s new Fiduciary Access to Digital Assets Act and how to incorporate it into your existing practice.
This presentation provides tips for creating and managing a social media page for your business. Learn how to engage your followers and reach the right people with ads and branding.
The law firm of Galloway and Collens, PLLC represents individuals and businesses in a wide variety of legal matters. We apply our expertise and experience to your unique situation, providing you with effective, creative and valued representation. Our areas of practice include Estate Planning, Probate, Elder Law, Real Estate for homeowners and professionals, Landlord/Tenant Matters, Litigation and Transactions.
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
Attorney Howard Collens presents on Fiduciary Access to Digital Assets, where he focuses on photo sharing and storage sites such as Picasa, Dropbox and Flickr. #FADA4MI. Howard is working on getting a new law enacted in Michigan.
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
National Academy of Elder Law Attorneys Webinar 2015 presented by Attorney Howard Collens on the recent updates regarding Fiduciary Access to Digital Assets.
Understanding Hoarding Disorder Presentation - Spring 2014gallowayandcollens
Learn the different aspects of the hoarding disorder.
Understand the probate process including admission and administration of an estate under a will.
Learn about the different types of Power of Attorney and which one is right for you and your family.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
4. Most of us and our clients have now developed a
collection of “stuff” online
The move from physical to digital has impacted all of
the following…
Pictures
Communications (email)
Social Media and online profiles (who will tend my Farmville
farm when I’m gone?)
Finances
Online store accounts (ebay, overstock.com, etc.)
Digital media (iTunes, amazon.com, etc.)
Virtual Property (Fantasy sports leagues, on-line gaming)
4
6. These are all good things
Start converting your photos, VHS, cassette tapes,
floppy disks, etc. NOW!
Digitizing everything ensures that it will last forever,
and can’t be destroyed by negligence, natural disasters
or time. Beware of backwards compatibility problems.
HOWEVER, we must protect access to this property
(both now, if/when we become disabled, and upon our
inevitable demise).
6
7. HOW DO WE DO THIS
?
How do we assist clients in this planning?
7
8. PLAN!
A. Create an inventory of your online assets (“stuff”).
B. Decide who is in charge of those assets if you become
disabled or when you die, and name that person
(your digital personal representative with power to
protect your assets).
C. Include special instructions (i.e. privacy concerns).
8
9. INVENTORY
Decide “what has value” (not just financial value).
In addition to photos, emails, and social media sites,
chances are you have invested $ online with no
tangible products to show for it. Protect your
property!
Personal information may be invaluable to your loved
ones (we will get into this more later with the Justin
Ellsworth case).
9
10. Inventory Checklist
Make sure you include everything from your computer,
other devices, and the “virtual world” (i.e. cloud, internet)
All email accounts
All social websites you participate in
Financial and commerce accounts
There are apps for this (My Eyes Only)
Make a simple spreadsheet with passwords to access assets
DIGITAL ASSET INVENTORY
Asset Access Wishes
Name Contents Location Username Password Instructions Recipient
10
11. What digital media have I
purchased or created?
Digital movies
TV Shows
Books (Kindle, iPad-audio and written)
Apps
Computer software
www.YouTube.com favorites
And…
11
12. iTunes!
When you purchase digital From Apple.com…10. Export Control. You may
not use or otherwise export or reexport the
files (music, movies, books), Apple Software except as authorized by United
you have merely purchased a States law and the laws of the jurisdiction in
license for personal use. which the Apple. Software was obtained. In
particular, but without limitation, the Apple
Apple’s Terms of Service has a Software may not be exported or re-exported (a)
provision covering nuclear into any U.S. embargoed countries or (b) to anyone
weapons – but nothing on the U.S.Treasury Department's list of Specially
Designated Nationals or the U.S. Department of
specifically about the transfer Commerce Denied Person’s List or Entity List. By
of your media upon death or using the Apple Software, you represent and
disability. warrant that you are not located in any such
country or on any such list. You also agree that you
It appears that legally – for will not use these products for any purposes
now – there is no way to prohibited by United States law, including, without
transfer iTunes media upon limitation, the development, design, manufacture
death or disability. or production of missiles, or nuclear, chemical
or biological weapons.
12
13. Who is in charge?
After you inventory your digital assets, you must decide
who to give the access to in the event of your death or
disability.
Make sure you indicate whether you want your digital
personal rep. to archive your content, share your content
with others, or delete your content (and/or secure privacy
of some content which may be harmful).
Make sure to include any special instructions (like deleting
adult content so your grandma doesn’t run across it while
searching your computer for family photos).
13
14. SOCIAL MEDIA PROFILES
What happens to my personal
cyberspace pages after I die or become
disabled?
14
15. FACEBOOK
Memorializing accounts (from www.facebook.com)
We may memorialize the account of a deceased person.
When we memorialize an account we keep the profile on
Facebook, but only let friends and family look at pictures or
write on the user's Wall in remembrance. You can report a
deceased person's profile. We also may close an account if
we receive a formal request from the person's next of kin
http://www.facebook.com/help/contact.php?show_form=
deceased
http://www.facebook.com/help/contact.php?show_form=
memorialize_special_requests
15
16. TWITTER
(From Twitter.com…) How to Contact Twitter About a Deceased User
In the event of the death of a Twitter user, we can close the account and help family
members recover public Tweets from the account.
Please provide us the following:
Your first and last name, contact information (including email address), and your
relationship to the deceased person.
The username of the Twitter account, or a link to the account's public profile page.
A link to a public obituary article.
You may contact us at privacy@twitter.com, by fax, or by mail at the following address :
Twitter Inc.,
c/o: Trust & Safety
795 Folsom Street, Suite 600
San Francisco, CA 94107
Fax : 415-222-9958
We will answer by email while specifying which information is needed.
We may not hand over access to the account, or share any non public information related
to the account.
16
17. LINKEDIN
Memorializing Accounts (from www.linkedin.com)
If we learn that a User is deceased, we may memorialize
the User’s account. In these cases we may restrict profile
access, remove messaging functionality, and close an
account if we receive a formal request from the User’s
next of kin or other proper legal request to do so.
17
18. BLOG SPECIFICS
• The Brad Graham story: Brad had a popular blog.
He died suddenly at a young age and had no plan
in place for his blog. His friends decided to
continue his blog in his memory.
• Even the most technologically savvy people often
do not leave instructions for what is to happen to
their online creations.
18
19.
20. Other Posthumous Options
Have your digital personal rep. add an auto response
on your email account for a set number months…
-Example: “This email address is no longer being
checked because John Doe is no longer alive. Please
send any condolences to his family at
doe@comcast.net”
They could also send a “final tweet or post” to your
friends, if those are your wishes.
20
21. Posthumous Options
Greatgoodbye.com-This site sends an email for you
(written by you in advance) upon notice of your death.
Sites like this don’t require relying on a human to send
your final messages to your friends and family.
There are also many online memorial sites, including…
-Bcelebrated.com
-Online-Legacy.com
-MyWonderfulLife.com
21
22. How will my loved ones know
which online sites are mine?
*This can be especially tricky for
people with common names, i.e.
Amy Tripp, John Doe.
22
23. CLAIM WHAT IS YOURS
This is a process where you use a program called
“ClaimID” and point out what is and is not yours on
the web.
Give your digital personal representative access to the
claimID so they do not have to wade through the
entire internet trying to figure out what is yours.
This can be done unofficially.
23
24. Who has access to my “stuff”?
Who controls/owns it?
-Alive, with capacity
-Alive, without capacity (digital personal rep.)
-After death (digital personal rep.)
-For how long?
Your digital personal rep. can be a single person or a
Web service of your choosing.
They will distribute or delegate your digital assets
according to your wishes.
24
26. Background
Justin Ellsworth was a Marine serving in Iraq.
He most often communicated with his family by
exchanging emails with his father. These emails were
sometimes shared with the whole family, and they
were a great source of comfort to Justin and his family.
Justin was killed in the line of duty, in November of
2004.
Justin’s family wanted to retrieve all his Yahoo! emails,
a request that was denied by Yahoo!
26
27. Case Notes
Yahoo! denied the Ellsworth family access to Justin’s
emails due to a clause in their terms of service
agreement that states “accounts are non-transferrable”.
Justin’s father took Yahoo! to court in Oakland County,
MI, both in the Court of Public Opinion and the
Probate Court of Oakland County.
Within six months, a Probate Court judge signed an
order instructing Yahoo! to provide Justin’s father John
with copies of his son’s emails.
27
29. Why is this important?
Companies (such as Yahoo!) will have to add language
to their terms and conditions clauses to deal with the
issue of “what happens to my digital content when I
die or become disabled”?
This is just another example of why it is important to
have your wishes in writing, including how you want
your digital assets disposed of or protected and
distributed.
29
30. Similar Litigation
There haven’t been too many cases dealing with these
matters so far. The Justin Ellsworth case is the most
prominent.
OKLAHOMA: In November, 2010, Oklahoma
enacted a probate statute that allows executors to
access, delete, or administer online accounts of
deceased persons.
IDAHO: Adopted a similar statute in July, 2011.
30
31. How can we save our loved ones
these headaches?
Give those that we trust our passwords.
Create an maintain an INVENTORY of your digital life
-On paper
-Online (or applications)
-Keep this up to date!
Archive in numerous places.
Remember: Inventory, name your digital personal
rep., pass along special instructions.
31
32. Other Options: Online Storage
Accounts
Many companies are cropping up to help us preserve
our digital legacy.
These sites serve as a secure backup to all your digital
files.
Flickr
Carbonite
Dropbox
32
33. Password Keepers
RoboForm.com-stores all your passwords in one
place and allows you instant access into all your
frequented websites.
StickyPassword.com-password manager and online
form-filler.
Aurora Password Manager on www.animabilis.com-
stores website and email access passwords, helps you
create unbreakable passwords.
33
34. Digital Estate Planning
LegacyLocker.com – “a safe, secure repository for your virtual digital
property that lets you grant access to online assets for friends and loved
ones in the event of loss, death or disability”.
Entrustet.com – “allows people to quickly, easily and securely prepare
last wishes for their digital assets”.
DataInherit.com – “The highly secure online storage for passwords
and documents. These online safes from Switzerland offer individuals
around the world highly secure online storage for passwords and digital
documents.
34
35. How to help those who have no
plan in place?
DigitalEstateServices.com-This site helps survivors
get into locked computers to archive the contents and
gain usernames and passwords. A “digital locksmith”.
Forensic computer services-Companies that help
recover lost passwords and deleted computer data.
-www.compforensics.com
-www.computerforensicservicesllc.com
-www.forensiccomputerservice.net
35
36. The Law
Like anything else, if you don’t have your wishes clearly
expressed at the time of your death, your digital assets
will be distributed according to the laws of the state
you were residing.
Do not include usernames and passwords in your
documents (especially your will). Once a will is filed,
it becomes part of the public record.
Hopefully firms will start asking about digital content
on their estate planning intake forms (see attachment
B).
36
37. Where should I note my intent?
Powers of Attorney
-Sample language: Electronic and Social Media. To access
any and all of my online accounts; to obtain, use, or change
any of my usernames and/or passwords to any of my online
accounts; to manage, add, delete, modify, curate, archive,
maintain and increase access or limit access to any of my
online content; to transfer ownership rights and to
maintain, modify, delete, or cancel any of my online
accounts. Such powers shall apply to all of my digital
assets, including, but not limited to, social media accounts
such as Facebook, Twitter, LinkedIn, any and all data and
photo archiving sites, blogs and websites of mine whether I
am maintaining such accounts in my individual name,
through a business, through a pseudonym or anonymously.
37
38. Where should I note my intent?
Last Will and Testament
-Electronic and Social Media. To access any and all of my online
accounts; to obtain, use or change any of my usernames and/or
passwords to any of my online accounts; to manage, add, delete,
modify, curate, archive, maintain, and increase access or limit
access to any of my online content; to transfer ownership rights
and to maintain, modify, delete, or cancel any of my online
accounts. Such powers shall apply to all of Settlor’s digital assets,
including, but not limited to, social media accounts such as
Facebook, Twitter, LinkedIn, any and all data and photo
archiving sites, blogs and websites of mine whether I have been
maintaining such accounts in my individual name, through a
business, through a pseudonym or anonymously.
38
39. Where should I note my intent?
Revocable Living Trust
-Sample Language: Electronic and Social Media. To access
any and all of Settlor’s online accounts; to obtain, use or
change any of Settlor’s usernames and/or passwords to any
of Settlor’s online accounts; to manage, add, delete,
modify, curate, archive, maintain, and increase access or
limit access to any of Settlor’s online content; to transfer
ownership rights and to maintain, modify, delete, or cancel
any of Settlor’s online accounts. Such powers shall apply to
all of Settlor’s digital assets, including, but not limited to,
social media accounts such as Facebook, Twitter, LinkedIn,
any and all data and photo archiving sites, blogs and
websites of Settlor’s whether Settlor is maintaining such
accounts in Settlor’s individual name, through a business,
through a pseudonym or anonymously.
39
40. Assign Digital Assets in a Trust
Here digital assets are transferred into the trust during the
client’s lifetime (if permitted).
Much of your digital content is not owned by you, but
licensed to you during your lifetime. The license ends at
death/disability. However, if you have transferred the
digital media to a trust, the assets should survive past your
death since the trust does not terminate on death.
This is a good option because you can easily update the
trust, and this way your digital contents remain private
while avoiding probate.
You can have the same trustee or different ones for digital
assets (see attachment C and D).
40
41. Where should I note my intent?
General Assignment
-Sample Language: To the extent possible, this
assignment shall also act as delivery of all of my
digital assets, including, but not limited to, social
media accounts such as Facebook, Twitter,
LinkedIn, any and all data and photo archiving
sites, blogs and websites of mine whether I am
maintaining such accounts in my individual
name, through a pseudonym or anonymously.
41
42. Auto-triggers set up by you
These sites will release your emails or digital content either
due to a lack of response from you, after so much time, or a
response from your identified digital executors.
Ifidie.org-sends you an email every two weeks, requiring a
response. If no response, they release your content.
Greatgoodbye.com-this site relies on a code from your
digital personal rep. before it will release your emails.
DeadMansSwitch.com-if you fail to respond to three
emails in a row your emails will be released.
42
43. Stay up to Date:
These websites have breaking news on the subject of
protecting your digital assets upon death or disability…
www.thedigitalbeyond.com
www.deathanddigitallegacy.com
www.yourdigitalafterlife.com/resources
@onlinememorials (twitter)
43
45. Howard H. Collens
Galloway and Collens, PLLC
26075 Woodward Ave, Suite 200
Huntington Woods, Michigan 48070
248.545.2500
GallowayCollens.com
Howard@GallowayCollens.com
Twitter: @howardcollens
45
46. Patricia E. Kefalas Dudek
Patricia E. Kefalas Dudek & Associates
30445 Northwestern Highway
Suite 250
Farmington Hills, MI 48334
248.254.3462
pdudek@pekdadvocacy.com
www.pekdadvocacy.com
46
48. Your Digital Afterlife
When Facebook, Flickr and Twitter Are Your
Estate, What’s Your Legacy?
By Evan Carroll and John Romano
Copyright 2011 by Evan Carroll and John Romano
New Riders publishing
48
49. From Estate Planning for Digital Assets and Online Financial
Accounts: A live 90 minute webinar presented on July 27, 2011
David A. Shulman, Esq.
Law Offices of David A. Shulman, PL
401 E. Las Olas Blvd. Suite 130-491
Fort Lauderdale, FL 33301
954.990.0896
david@davidshulmanlaw.com
www.sofloridaestateplanning.com
49
50. From Estate Planning for Digital Assets and Online Financial
Accounts: A live 90 minute webinar presented on July 27, 2011
Nathan J. Dosch, JD, MST
Grant Thornton, LLP
100 E. Wisconsin Avenue, Suite 2100
Milwaukee, WI 53202-4169
414.277.6491
50