The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Digital Assets: A Path To Fiduciary AccessHoward Collens
Presented at State Bar of Michigan Elder Law and Disability Rights Section 2014 Fall Conference. Explores Fiduciary Access to Digital Assets, the Uniform Law Commission FADA, and Michigan's legislative changes to the Probate law.
Considering how much information we keep on computers and on the internet, estate planning just isn’t complete anymore without including digital assets and social media accounts.
An overview of the way the law profession's rules of professional responsibility/conduct apply to the use of social media platforms and tools, including advertising, searching, and use of social media information in investigation, discovery, and at trial.
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Digital Assets: A Path To Fiduciary AccessHoward Collens
Presented at State Bar of Michigan Elder Law and Disability Rights Section 2014 Fall Conference. Explores Fiduciary Access to Digital Assets, the Uniform Law Commission FADA, and Michigan's legislative changes to the Probate law.
Considering how much information we keep on computers and on the internet, estate planning just isn’t complete anymore without including digital assets and social media accounts.
An overview of the way the law profession's rules of professional responsibility/conduct apply to the use of social media platforms and tools, including advertising, searching, and use of social media information in investigation, discovery, and at trial.
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right InCarol Spencer
This presentation reviews the types of policies that should be adopted before a government agency enters the social media world. It reviews current court cases and their implications (through July 2019). This presentation is not by a lawyer, but rather a practitioner who wrote policies as part of her job, and needed to understand all of this to do so.
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
Driven by the behaviors and preferences of millennials, digital identities are growing rapid-fire. See how the largest cohort in history is driving a "digital first" evolution, and what role federated identity will play in this shift.
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Walter Neary
These are slides from a 75-minute presentation sponsored by the Association of Washington Cities and the cities of Everett and Lakewood. You can hear the webinar recording through a link at http://www.awcnet.org/portal/studionew.asp?Mode=b1&WebID=1&UID=&MenuActionTypeID=81&MenuActionParm=31&OriginPage=/portal/studionew.asp&EDate=&ChannelLinkID=8716
The YouTube video that is referenced in the segment is at http://www.youtube.com/watch?v=AcW1OebCf-w
These slides were prepared by Ramsey Ramerman, assistant city attorney, Everett, and Walter Neary, city councilman in Lakewood, Washington. The slides were designed by the folks at http://cornerstoneleadershiponline.com/
The March conference referenced toward the end is OpenGovWest: http://opengovwest.wordpress.com/
Estate Planning for Digital Assets | Patti SpencerPatti Spencer
"Digital assets" include information stored on a computer or external drive, content uploaded onto websites, and rights in digital property. If your estate plan doesn't account for these digital assets properly, your beneficiaries may not be able to gain access to them.
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at DerbyCon 3.0, September 28, 2013 in Louisville, Kentucky)
"What Could Go Wrong?" - We're Glad You Asked!Shawn Tuma
Dallas cybersecurity and data privacy attorney Shawn Tuma delivered this presentation on social media law to Social Media Breakfast on February 22, 2018.
Is your data secure? privacy and trust in the social webPhil Cryer
My talk given to the SEMAFOR (Security, Management, Audit Forum) in Warsaw, Poland on February 24, 2012. I look at the various ways social networking sites are (ab)using private client data, without the user’s consent.
Virtual Assets in Probate
Estates lawyers need to learn the new issues surrounding digital assets and online communications. Are you documenting virtual assets? What are the wishes of the deceased on the disposal of online profiles? Have you preserved access to crucial internet communications and document storage? Estate law now goes beyond tangible property and must include virtual assets. Is your law firm prepared?
In this one-hour, CLE-eligible, webinar join Joshua Lenon, Clio’s lawyer in residence, and Rich Martin from Directives Online as they review what steps elder and estates lawyers need to take to document and preserve crucial online information when building a probate-focused law firm. Topics will include:
- Classifying digital assets
- Accessing online documents and communications post-mortem
- Comparing wills to trusts for online assets disposition
- Tools to manage decedents’ digital assets
Slides for a presentation on how to research social media. I discuss legal, ethical and privacy issues in accessing social media. I address specific sites and explore how privacy settings impact searches. I also discuss whether sites will cooperate with subpoenas along with getting the other side to download and provide accounts. In addition, I go over some question you will want to ask during the discovery process. Last I mention some specific cases and explore some ethics violations. This was presented in Philadelphia on July 30, 2015.
In the age of social media, intellectual property can be murky territory. In this presentation, Primum Marketing Communications, a Milwaukee-based agency, covers social media implications on copyrights, trademarks, patents, defamation and trade secrets. The presentation also takes a look at some Terms of Service and Privacy Policies for several popular social media sites and covers best practices for marketing your brand without crossing the legal line.
This is a brief policy primer on Google's Privacy and Terms of Use details. Explained without dogma, instead with an insight into how their guidelines impact on your digital shadow online.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Legal Issues in the Gov't Social Media World: The Dangers of Diving Right InCarol Spencer
This presentation reviews the types of policies that should be adopted before a government agency enters the social media world. It reviews current court cases and their implications (through July 2019). This presentation is not by a lawyer, but rather a practitioner who wrote policies as part of her job, and needed to understand all of this to do so.
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
Driven by the behaviors and preferences of millennials, digital identities are growing rapid-fire. See how the largest cohort in history is driving a "digital first" evolution, and what role federated identity will play in this shift.
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Walter Neary
These are slides from a 75-minute presentation sponsored by the Association of Washington Cities and the cities of Everett and Lakewood. You can hear the webinar recording through a link at http://www.awcnet.org/portal/studionew.asp?Mode=b1&WebID=1&UID=&MenuActionTypeID=81&MenuActionParm=31&OriginPage=/portal/studionew.asp&EDate=&ChannelLinkID=8716
The YouTube video that is referenced in the segment is at http://www.youtube.com/watch?v=AcW1OebCf-w
These slides were prepared by Ramsey Ramerman, assistant city attorney, Everett, and Walter Neary, city councilman in Lakewood, Washington. The slides were designed by the folks at http://cornerstoneleadershiponline.com/
The March conference referenced toward the end is OpenGovWest: http://opengovwest.wordpress.com/
Estate Planning for Digital Assets | Patti SpencerPatti Spencer
"Digital assets" include information stored on a computer or external drive, content uploaded onto websites, and rights in digital property. If your estate plan doesn't account for these digital assets properly, your beneficiaries may not be able to gain access to them.
Almost every day there are new revelations about violations of user's online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can be part of censorship, a surveillance state or even a government breaking the law when accessing such data. With email being so personal, webmail (which is generally hosted free of charge by for-profit providers) is a particularly vulnerable space where people are not doing enough to protect online privacy. When a highly decorated four-star general is brought down because he couldn't secure his online webmail, what hope do we have in terms of guaranteeing our own online privacy? The Electronic Communications Privacy Act of 1986 states that after 6 months, email messages lose their status as protected communication and no longer requires a warrant, only a subpoena, for a government agency to force email providers to produce copies of user's data. Online privacy is a right we have taken too lightly. Attendees of this talk will learn real world techniques that will enable them to make educated decisions about how to properly protect their webmail. Generally, you have little email privacy with US-based email services, so we will focus on offshore hosting where laws better regulate your data protection and online privacy. A survey of current options, with details from the speaker's own trials of multiple solutions, will provide a framework for you to replicate, allowing you the online email privacy everyone deserves. (This talk was given at DerbyCon 3.0, September 28, 2013 in Louisville, Kentucky)
"What Could Go Wrong?" - We're Glad You Asked!Shawn Tuma
Dallas cybersecurity and data privacy attorney Shawn Tuma delivered this presentation on social media law to Social Media Breakfast on February 22, 2018.
Is your data secure? privacy and trust in the social webPhil Cryer
My talk given to the SEMAFOR (Security, Management, Audit Forum) in Warsaw, Poland on February 24, 2012. I look at the various ways social networking sites are (ab)using private client data, without the user’s consent.
Virtual Assets in Probate
Estates lawyers need to learn the new issues surrounding digital assets and online communications. Are you documenting virtual assets? What are the wishes of the deceased on the disposal of online profiles? Have you preserved access to crucial internet communications and document storage? Estate law now goes beyond tangible property and must include virtual assets. Is your law firm prepared?
In this one-hour, CLE-eligible, webinar join Joshua Lenon, Clio’s lawyer in residence, and Rich Martin from Directives Online as they review what steps elder and estates lawyers need to take to document and preserve crucial online information when building a probate-focused law firm. Topics will include:
- Classifying digital assets
- Accessing online documents and communications post-mortem
- Comparing wills to trusts for online assets disposition
- Tools to manage decedents’ digital assets
Slides for a presentation on how to research social media. I discuss legal, ethical and privacy issues in accessing social media. I address specific sites and explore how privacy settings impact searches. I also discuss whether sites will cooperate with subpoenas along with getting the other side to download and provide accounts. In addition, I go over some question you will want to ask during the discovery process. Last I mention some specific cases and explore some ethics violations. This was presented in Philadelphia on July 30, 2015.
In the age of social media, intellectual property can be murky territory. In this presentation, Primum Marketing Communications, a Milwaukee-based agency, covers social media implications on copyrights, trademarks, patents, defamation and trade secrets. The presentation also takes a look at some Terms of Service and Privacy Policies for several popular social media sites and covers best practices for marketing your brand without crossing the legal line.
This is a brief policy primer on Google's Privacy and Terms of Use details. Explained without dogma, instead with an insight into how their guidelines impact on your digital shadow online.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
Attorney Howard Collens presents on Fiduciary Access to Digital Assets, where he focuses on photo sharing and storage sites such as Picasa, Dropbox and Flickr. #FADA4MI. Howard is working on getting a new law enacted in Michigan.
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
National Academy of Elder Law Attorneys Webinar 2015 presented by Attorney Howard Collens on the recent updates regarding Fiduciary Access to Digital Assets.
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
In an era where technology plays such an important part of everyday life, the attorney needs to understand how to properly plan for a client’s digital assets. This presentation will discuss Michigan’s new Fiduciary Access to Digital Assets Act and how to incorporate it into your existing practice.
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
A number of technological systems , sometimes known as "digital wills" are appearing on the market to help people bequeath digital assets such as passwords, emails, virtual game assets etc. Do these help provide a legal solution? Or do they merely confuse further a landscape alreqdy lacking good practice?
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
Step right into a realm where cyber security meets the enchanting world of Harry Potter! Join Brian Pichman, our fearless Defense Against the Dark Arts wizard, as he unveils the secrets to safeguarding our digital realms. Prepare to be captivated as Brian illuminates the spellbinding techniques of encryption, firewalls, and intrusion detection, equipping us to fortify our cherished data against the sinister forces of the digital realm.
But beware! Just like in the magical world, treacherous adversaries prowl the shadows. Brian will expose the dark arts of phishing, ransomware, and social engineering, empowering us to defend our digital castles. Engrossed in tales of peril and armed with ancient cyber security spells, this captivating presentation promises to leave you spellbound and ready to protect yourself in this ever-evolving landscape. So grab your wands and brace yourselves as Brian Pichman conjures a shield of protection, ensuring the safety of our digital realms against the forces of darkness. Together, we shall prevail in this journey of cyber security and magic.
CyberSecurity - Computers In Libraries 2024Brian Pichman
Protecting privacy and security while leveraging technology to accomplish positive change is becoming a serious challenge for individuals, communities, and businesses. This workshop, led by expert leaders and practitioners, covers personal and organizational privacy as well as top security issues for libraries and their communities, especially the implications of AI. If you don’t have a security plan in place, are unsure of where to even start to make sure your library is secure, or have an existing plan in place but want to cross your T’s and dot your I’s, come to this interactive workshop.
* Lays out existing healthcare delivery problems many developing countries have
* Presents a high level framework for an ICT health care strategy leveraging identity
Similar to Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018 (20)
Setting Every Community Up for Retirement Enhancement (SECURE) Act gallowayandcollens
The Setting Every Community Up for Retirement Enhancement Act of 2019, called the “SECURE Act” makes significant changes to how IRAs and certain retirement benefits must be treated post-death.
Attorney Howard H. Collens presents information on the newly enacted law effective January 1, 2020
Hoarding is a reality that impacts a realtor’s listing and sale of property. This overview seeks to provide insight into this often misunderstood mental health condition, and provide practical solutions that realtors can use when encountering a hoarder owned property.
Many problems can arise if a trust is not properly funded. Attorney Howard Collens provides a few tips on how to properly fund a trust and avoid probate court.
This presentation provides tips for creating and managing a social media page for your business. Learn how to engage your followers and reach the right people with ads and branding.
The law firm of Galloway and Collens, PLLC represents individuals and businesses in a wide variety of legal matters. We apply our expertise and experience to your unique situation, providing you with effective, creative and valued representation. Our areas of practice include Estate Planning, Probate, Elder Law, Real Estate for homeowners and professionals, Landlord/Tenant Matters, Litigation and Transactions.
Understanding Hoarding Disorder Presentation - Spring 2014gallowayandcollens
Learn the different aspects of the hoarding disorder.
Understand the probate process including admission and administration of an estate under a will.
Learn about the different types of Power of Attorney and which one is right for you and your family.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
ADR in criminal proceeding in Bangladesh with global perspective.
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
1. THE FIDUCIARY ACCESS
TO DIGITAL ASSETS ACT IN
MICHIGAN:
NOW THAT WE HAVE IT,
WHAT CAN WE DO?
HOWARD H. COLLENS
GALLOWAY AND COLLENS, PLLC
2. Categories of Digital Assets
• Personal
• Stored on computers, smart phones, or other devices, or are uploaded to a
Web site or digital service
• Photographs, videos, emails, and music playlist
• Social Media
• May involve photos, videos and other electronic files stored on these accounts
• Financial
• Online banking, online bill-paying activities
• Access to online accounts with no connection to a brick-and-mortar
establishment (Amazon, eBay, PayPal and E*TRADE, BitCoin)
• Business
• Varies by types of business and extent of its computer or Internet associated
activities, which may include blogs, domain names, credit card and financial
data
4. Could someone else,
acting on your behalf, gain access to
your digital assets?
Would you want them to be able to?
Is the answer different if you are
incapacitated or deceased?
5. Access to Digital Assets
would be challenging, if
not impossible, without a
Fiduciary Access to
Digital Assets law
6. • In 2011, the Uniform Law Commission established
the Fiduciary Access to Digital Assets Committee
to draft a free-standing act that will vest fiduciaries
with the authority to manage and distribute digital
assets, copy or delete digital assets, and access
digital assets
7. • July 2014 the ULC introduced 1st version of a Uniform
Fiduciary Access to Digital Assets Act (UFADAA)
• Only Delaware adopted law based on 2014 version
• In July 2015, the ULC developed a revised UFADAA
8. The UFADAA:
• Gives Account Holder control over whether digital
assets should be preserved, distributed or destroyed
• Authorizes access to digital assets that would not
violate the Federal Stored Communications Act, 18
USC 2701 and Computer Fraud and Abuse Act, 18
USC 1030
9. The UFADAA:
• If widely adopted, provides consistency throughout the
country
• Authorizes access by:
• Agent under Power of Attorney
• Conservator
• Personal Representative
• Trustee
10. Where Are We Now?
(2018)
• Forty states have passed some form of Fiduciary
Access to Digital Assets Act.
• Six states introduced a FADAA proposal in 2018.
• If enacted, we will have near-universal enactment in
the U.S.
- Benjamin Orzeske, Chief Counsel of the Uniform Law Commission
11.
12. Michigan and FADAA
• HB 5034 was introduced, October 28, 2015 by Representative
Anthony Forlini
• Based on the ULC revised approach, HB 5034 offered a
comprehensive approach to Fiduciary Access to Digital Assets for
Michigan
• Joint Efforts of Elder Law and Disability Rights Section and Probate
and Estate Planning Sections to represent the interests of end users
13. Michigan and FADAA
• HB 5034 became law in March 2016
• Effective as of June 27, 2016
• Codified at MCL 700.1001 et seq.
14. Michigan’s
Fiduciary Access to Digital Assets Act
FADAA Applies to:
• Fiduciary acting under a will or power of attorney
• Personal representative acting for a decedent estate
• Proceeding involving a conservator
• Trustee acting under a trust
• Digital custodian if the user resides in this state
• Does not apply to a digital asset of an employer used by an
employee in the ordinary course of business
15. Michigan’s
Fiduciary Access to Digital Assets Act
• What is a Digital Asset? - An electronic record in which a
user has a right or interest. Does not include an underlying
asset or liability unless the asset or liability is itself an
electronic record.
• Access to the bank account vs. the money in the bank
16. Catalogue and Content – Why it Matters
•Those who plan will be
rewarded
•Those who don’t will
be punished
17. Michigan’s
Fiduciary Access to Digital Assets Act
Accessing Content vs. Catalogue
• Personal Representatives
• Power of Attorney
• Trustee
• Conservator
18. Michigan’s
Fiduciary Access to Digital Assets Act
HOW MUCH ACCESS DOES THE DIGITAL CUSTODIAN
NEED TO PROVIDE?
• At the Digital Custodian’s SOLE DISCRETION, they may
• Grant a fiduciary or designated recipient full access to the user's
account.
• Grant a fiduciary or designated recipient partial access to the
user's account sufficient to perform the tasks with which the
fiduciary or designated recipient is charged.
• Provide a fiduciary or designated recipient a copy in a record of any
digital asset that, on the date the digital custodian received the
request for disclosure, the user could have accessed if the user
were alive and had full capacity and access to the account.
19. Michigan’s
Fiduciary Access to Digital Assets Act
HOW MUCH ACCESS DOES THE DIGITAL CUSTODIAN
NEED TO PROVIDE?
• A digital custodian may assess a reasonable administrative charge
• A digital custodian is not required to disclose a digital asset deleted by a
user
• If only a request for some but not all of the digital assets and if
segregation would impose an undue burden on the digital custodian, the
digital custodian may seek a court order to disclose some, all or
none of the digital assets.
20. Michigan’s
Fiduciary Access to Digital Assets Act
• A digital custodian may require a fiduciary or designated recipient
who requests disclosure or termination of an account to obtain a
court order that:
• Specifies that an account belongs to the protected person or
principal.
• Specifies that there is sufficient consent from the protected
person or principal to support the requested disclosure.
• Contains a finding required by law other than this act.
21. Michigan’s
Fiduciary Access to Digital Assets Act
• An interested person may petition the probate court to limit,
eliminate, or modify the personal representative's powers with
respect to the decedent's digital assets.
• Hearing shall be heard within 14 and 56 days of filing the petition.
22. Facebook
Memorialize the account
Memorialized accounts are a place for friends and family to gather and share memories after
a person has passed away.
Memorialized accounts have the following key features:
• The word Remembering will be shown next to the person's name on their profile
• Depending on the privacy settings of the account, friends can share memories on the
memorialized timeline
• Content the person shared (example: photos, posts) stays on Facebook and is visible to
the audience it was shared with
• Memorialized profiles don't appear in public spaces such as in suggestions for People
You May Know, ads or birthday reminders
• No one can log into a memorialized account
• Memorialized accounts that don't have a legacy contact can't be changed
• Pages with a sole admin whose account was memorialized will be removed from
Facebook if we receive a valid request
Delete the account
From: Facebook
23. Facebook
Delete the account
You can choose to have your account permanently deleted should you pass away. To do
this:
1.From the top right of Facebook, click and select Settings
2.From the left menu, click General
3.Click Manage Account
4.Click Request account deletion and follow the on-screen instructions
From: Facebook
24. Facebook
Legacy Contact is someone you choose to look after your account if it's memorialized. Once your account
is memorialized, your legacy contact will have the option to do things like:
• Write a pinned post for your profile (ex: to share a final message on your behalf or provide information
about a memorial service)
• Respond to new friend requests (ex: old friends or family members who weren't yet on Facebook)
• Update your profile picture and cover photo
• You also have the option to allow your legacy contact to download a copy of what
you've shared on Facebook, and we may add additional capabilities for legacy contacts in
the future.
Your legacy contact can't:
• Log into your account
• Remove or change past posts, photos and other things shared on your Timeline
• Read messages you've sent to other friends
• Remove any of your friends
From: Facebook
25. Google Inactive Account Manager
• Can be set up through Google Settings
• Lets Google know what to do with some or all Google related
accounts after a specified period of inactivity
• Services that can be controlled: +1s; Blogger; Contacts and
Circles; Drive; Gmail; Google+ Profiles, Pages and Streams;
Picasa Web Albums; Google Voice and YouTube
• Google sends a warning text and email before action is taken
• Can have Google delete the accounts
• What about items bought on Google Play?
26. Provide Instructions:
• If you want a site to continue, for example if you have a
website or blog, you need to leave instructions for keeping
it up or having someone take it over and continue it.
• If a site is currently producing or could produce revenue (e-
books, photography, videos, blogs), make sure your
successor knows this.
• If there are things on your computer or hard drive that you
want to pass on (scanned family photos, ancestry research,
a book you have been writing), put them in a “Do Not
Delete” folder and include it on your inventory list.
Excerpt from: Estate Planning for Digital Assets and Social Media
27. Inventory Checklist
• Make sure you include everything from your computer,
other devices, and the “virtual world” (i.e. cloud,
internet)
• All email accounts
• All social websites you participate in
• Financial and commerce accounts
• Make a simple spreadsheet with passwords to access
assets
Digital Assets Inventory
Asset Access Wishes
Name Contents Location Username Password Instructions Recipient
28. Who is in Charge?
• After you inventory your digital assets, you must decide
who to give the access to in the event of your death or
disability.
• Make sure you indicate whether you want your digital
executor to archive your content, share your content
with others, or delete your content (and/or secure
privacy of some content which may be harmful).
• Make sure to include any special instructions (Think
sensitive and/or embarrassing content).
29. Incorporating Digital Estate Planning
into Your Estate Plan
• To help the process, complete a questionnaire to list all digital assets and
the value of those assets
• Discuss if any of the assets have financial value
• Keep a record of all passwords and profiles
• There are websites specifically designed to release account
information after death to designated beneficiaries but they may be
here today gone tomorrow.
• Protect significant data with strong encryption
• Speak to an Estate Planning Attorney about your legal needs
30. Test Out Our New Law
• Now that FADAA is here in Michigan:
• What Works?
• What Needs Improving?
• Have You Been Able To Use The New Law To
Access Someone Else’s Digital Assets?
• I would love to hear how you experience
Fiduciary Access to Digital Assets
31. Howard H. Collens
Galloway and Collens, PLLC
26075 Woodward Ave, Suite 200
Huntington Woods, Michigan 48070
248.545.2500
GallowayCollens.com
Howard@GallowayCollens.com
Twitter/Instagram: @howardcollens
Facebook: Galloway and Collens