Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
Attorney Howard Collens presents on Fiduciary Access to Digital Assets, where he focuses on photo sharing and storage sites such as Picasa, Dropbox and Flickr. #FADA4MI. Howard is working on getting a new law enacted in Michigan.
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...FAST NUCES
the presentation is about the e commerce its trade and its copy rights. Moreover it also includes the issues concern in e commerce. it has also include the privacy and data protection information.
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
A number of technological systems , sometimes known as "digital wills" are appearing on the market to help people bequeath digital assets such as passwords, emails, virtual game assets etc. Do these help provide a legal solution? Or do they merely confuse further a landscape alreqdy lacking good practice?
This presentation on public-sector blockchain projects and strategy was given by Jennifer O'Rourke of the Illinois Blockchain Initiative at the December 2017 meeting of Blockchain for Social Good (BSGC).
From the FinTech Webinar Series. Explores:
1. Recent Federal Cybersecurity Developments: Executive Order, NIST Standards, Information-Sharing, Legislation
2. Privacy and Security Issues in Cloud Computing Contracts
3. International Privacy and Transferring Data Across Borders
4. Mobile Devices and Mobile Apps
5. Workplace and Corporate Governance Developments
6. The FTC’s New Rules Concerning Children’s Privacy
The Identity of Things: Privacy & Security ConcernsSimon Moffatt
The 'Identity of Things' (IDoT) is fast becoming a critical component of the modern web.
Previously “dumb” devices are being upgraded with persistent network connectivity, enabling automatic data generation and facilitating interaction with other devices and people. Whilst this can bring significant benefits in form of personalised content and customised environmental and manufacturing settings, it also brings several concerns regarding data privacy, security and control.
* Lays out existing healthcare delivery problems many developing countries have
* Presents a high level framework for an ICT health care strategy leveraging identity
This is a presentation I gave to the South Carolina Law Review Symposium entitled: On Task?: Expanding the Boundaries of Legal Education, February 28, 2014.
National ICT & Education Strategy July 2016Guy Huntington
Presents the author’s own experience and efforts to change the Canadian education system
Warns countries of simply adding cost to their existing education and ICT budgets by adding technology if they don’t learn from past mistakes other countries have made
Presents a high level framework for an education strategy leveraging identity and ICT
Digital Assets: A Path To Fiduciary AccessHoward Collens
Presented at State Bar of Michigan Elder Law and Disability Rights Section 2014 Fall Conference. Explores Fiduciary Access to Digital Assets, the Uniform Law Commission FADA, and Michigan's legislative changes to the Probate law.
The nature of the knowledge work problem is growing faster than the capabilities of effective solutions for it. A few of the key problems faced by businesses over the next decade will involve the social contracts with their employees and partners as the adaptability and flexibility enabled by technology become requirements, not opportunities. How do businesses capture the critical tacit knowledge of their older employees as they retire? How do businesses enable new employees to be productive in different ways with new technologies and the skills that come with them? Much of what we know about today will not be relevant in 10 years.
In this presentation, Mark Bernstein shares research done on the Knowledge Work 2020 topic in a collaboration between PARC and Xerox Innovation Group researchers (in Canada, France, and New York). Findings point to more intelligent systems operating on information supporting humans engaged in complex tasks that require knowledge to make decisions; more use of collaborative and social technologies to mediate the time and space problem of distributed and even asynchronous work around the globe; and much more networked computation operating in the world at large.
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
Attorney Howard Collens presents on Fiduciary Access to Digital Assets, where he focuses on photo sharing and storage sites such as Picasa, Dropbox and Flickr. #FADA4MI. Howard is working on getting a new law enacted in Michigan.
From the FinTech Webinar Series. Explores:
1. Storage and Processing of Data in “the Cloud”
2. Mobile Devices and Mobile Apps
3. “Big Data”
4. Security and Privacy Issues in Third-Party Contracts
5. Data Security and Corporate Governance
6. International Privacy and Data Security
7. Data Security as a National Security Concern: Legislation and Executive Initiatives
E commerce law, copy rights of e commerce law, trade mark of e -commerce, pri...FAST NUCES
the presentation is about the e commerce its trade and its copy rights. Moreover it also includes the issues concern in e commerce. it has also include the privacy and data protection information.
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
A number of technological systems , sometimes known as "digital wills" are appearing on the market to help people bequeath digital assets such as passwords, emails, virtual game assets etc. Do these help provide a legal solution? Or do they merely confuse further a landscape alreqdy lacking good practice?
This presentation on public-sector blockchain projects and strategy was given by Jennifer O'Rourke of the Illinois Blockchain Initiative at the December 2017 meeting of Blockchain for Social Good (BSGC).
From the FinTech Webinar Series. Explores:
1. Recent Federal Cybersecurity Developments: Executive Order, NIST Standards, Information-Sharing, Legislation
2. Privacy and Security Issues in Cloud Computing Contracts
3. International Privacy and Transferring Data Across Borders
4. Mobile Devices and Mobile Apps
5. Workplace and Corporate Governance Developments
6. The FTC’s New Rules Concerning Children’s Privacy
The Identity of Things: Privacy & Security ConcernsSimon Moffatt
The 'Identity of Things' (IDoT) is fast becoming a critical component of the modern web.
Previously “dumb” devices are being upgraded with persistent network connectivity, enabling automatic data generation and facilitating interaction with other devices and people. Whilst this can bring significant benefits in form of personalised content and customised environmental and manufacturing settings, it also brings several concerns regarding data privacy, security and control.
* Lays out existing healthcare delivery problems many developing countries have
* Presents a high level framework for an ICT health care strategy leveraging identity
This is a presentation I gave to the South Carolina Law Review Symposium entitled: On Task?: Expanding the Boundaries of Legal Education, February 28, 2014.
National ICT & Education Strategy July 2016Guy Huntington
Presents the author’s own experience and efforts to change the Canadian education system
Warns countries of simply adding cost to their existing education and ICT budgets by adding technology if they don’t learn from past mistakes other countries have made
Presents a high level framework for an education strategy leveraging identity and ICT
Digital Assets: A Path To Fiduciary AccessHoward Collens
Presented at State Bar of Michigan Elder Law and Disability Rights Section 2014 Fall Conference. Explores Fiduciary Access to Digital Assets, the Uniform Law Commission FADA, and Michigan's legislative changes to the Probate law.
The nature of the knowledge work problem is growing faster than the capabilities of effective solutions for it. A few of the key problems faced by businesses over the next decade will involve the social contracts with their employees and partners as the adaptability and flexibility enabled by technology become requirements, not opportunities. How do businesses capture the critical tacit knowledge of their older employees as they retire? How do businesses enable new employees to be productive in different ways with new technologies and the skills that come with them? Much of what we know about today will not be relevant in 10 years.
In this presentation, Mark Bernstein shares research done on the Knowledge Work 2020 topic in a collaboration between PARC and Xerox Innovation Group researchers (in Canada, France, and New York). Findings point to more intelligent systems operating on information supporting humans engaged in complex tasks that require knowledge to make decisions; more use of collaborative and social technologies to mediate the time and space problem of distributed and even asynchronous work around the globe; and much more networked computation operating in the world at large.
Understanding knowledge work and the performance potential of its computeriza...Pekka Lampelto
Research paper on knowledge work and its computerization. A knowledge work task typology and a framework for knowledge work capabilities are presented, among other things. Level: Master's thesis.
This talks about knowledge workers, what they look like, what the qualities of knowledge work are, some background in where mass production and scientific management came from, and then ultimately what technology that will support knowledge work will need to look like.
Intro presentation from the Enterprise 2.0 Summit 2013 in Paris that served as the basis for a discussion panel around approaches for the technology framework of a Digital Workplace and its challenges
The Digital Workplace - Building a more productive digital work environment s...Oscar Berg
It's time to take employee productivity and digital working seriously. The Digital Workplace is an approach that helps you build a more productive digital work environment - service by service.
Globalization and technology change the work place. Place making is the dynamic motor of innovation, even in the midst of Internet and other advanced technology.
Building Blocks of a Knowledge Work Culture - NDC London 2016Doc Norton
Re-designed presentation on Autonomy, Connection, Excellence, and Diversity. This version shows a bit more about the management styles appropriate in different domains of complexity, connects knowledge work to Complicated and Complex, and then walks through the Building Blocks.
For more information + 2 downloadable formats visit:
www.FlashbulbInteraction.com/WTS.html
Working through Screens: 100 Ideas for Envisioning Powerful, Engaging, and Productive User Experiences in Knowledge Work
This heavily illustrated deck of idea cards is a reference for product teams creating new or iteratively improved applications for thinking work. Written for use during early, formative conversations, it provides teams with a broad range of considerations for setting the overall direction and priorities for their onscreen tools. With hundreds of envisioning questions and fictional examples from clinical research, financial trading, and architecture, this volume can help definers and designers to explore innovative new directions for their products.
Also freely available as a more comprehensive book in .pdf and .html formats at www.FlashbulbInteraction.com
Three major shifts will affect the workplace of the future: globalization, changing demographics, and social technologies. Millennials, those people born after 1979, will bring new expectations to the workplace, and they will dominate the US workplace in less than four years. What are companies doing now to attract, develop, and keep tomorrow's employees today? Learn some practical tips to prepare for the changes ahead from Karie Willyerd, the co-author of the bestselling book, The 2020 Workplace.
Considering how much information we keep on computers and on the internet, estate planning just isn’t complete anymore without including digital assets and social media accounts.
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
2021 Digital Accessibility Legal Update with Lainey Feingold3Play Media
In this webinar, Lainey will take us through key cases, court decisions, government agency activity, settlements, and other recent developments in the digital accessibility legal space.
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
In an era where technology plays such an important part of everyday life, the attorney needs to understand how to properly plan for a client’s digital assets. This presentation will discuss Michigan’s new Fiduciary Access to Digital Assets Act and how to incorporate it into your existing practice.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Benjamin Wright, Texas attorney and Senior Instructor at the SANS Institute, shares tips for gathering social media evidence in an investigation. Check out the webinar recording: http://i-sight.com/gathering-social-media-evidence/
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
Setting Every Community Up for Retirement Enhancement (SECURE) Act gallowayandcollens
The Setting Every Community Up for Retirement Enhancement Act of 2019, called the “SECURE Act” makes significant changes to how IRAs and certain retirement benefits must be treated post-death.
Attorney Howard H. Collens presents information on the newly enacted law effective January 1, 2020
Hoarding is a reality that impacts a realtor’s listing and sale of property. This overview seeks to provide insight into this often misunderstood mental health condition, and provide practical solutions that realtors can use when encountering a hoarder owned property.
Many problems can arise if a trust is not properly funded. Attorney Howard Collens provides a few tips on how to properly fund a trust and avoid probate court.
This presentation provides tips for creating and managing a social media page for your business. Learn how to engage your followers and reach the right people with ads and branding.
The law firm of Galloway and Collens, PLLC represents individuals and businesses in a wide variety of legal matters. We apply our expertise and experience to your unique situation, providing you with effective, creative and valued representation. Our areas of practice include Estate Planning, Probate, Elder Law, Real Estate for homeowners and professionals, Landlord/Tenant Matters, Litigation and Transactions.
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
National Academy of Elder Law Attorneys Webinar 2015 presented by Attorney Howard Collens on the recent updates regarding Fiduciary Access to Digital Assets.
Understanding Hoarding Disorder Presentation - Spring 2014gallowayandcollens
Learn the different aspects of the hoarding disorder.
Understand the probate process including admission and administration of an estate under a will.
Learn about the different types of Power of Attorney and which one is right for you and your family.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxshweeta209
transfer of the P.I.L filed by lawyer Ashwini Kumar Upadhyay in Delhi High Court to Supreme Court.
on the issue of UNIFORM MARRIAGE AGE of men and women.
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
Update on Access to Digital Assets: Are We There Yet?
1. UPDATE ON ACCESS TO DIGITAL
ASSETS:
ARE WE THERE YET?
PRESENTED BY:
HOWARD COLLENS
GALLOWAY AND COLLENS, PLLC
MICHAEL LICHTERMAN
BOLHOUSE, BAAR & HOFSTEE, P.C.
3. Categories of Digital Assets
Personal
Stored on computers, smart phones, or other devices, or are
uploaded to a Web site or digital service
Photographs, videos, emails, and music playlist
Social Media
May involve photos, videos and other electronic files stored on
these accounts
Financial
Online banking, online bill-paying activities
Online accounts with no connection to a brick-and-mortar
establishment (Amazon, eBay, PayPal and E*TRADE, BitCoin)
Business
Varies by types of business and extent of its computer or Internet
associated activities, which may include blogs, domain names,
credit card and financial data
8. Value of Digital Assets
“Digital Assets” may have sentimental and
monetary value
2013 survey conducted by McAfee - average
value on digital assets of $35,000
Both personal and business assets – actual
monetary value (i.e. domain names, blogs, etc.)
9. Access to Digital Assets - Provide
Instructions:
If you want a site to continue, for example if you have a
website or blog, you need to leave instructions for keeping
it up or having someone take it over and continue it.
If a site is currently producing or could produce revenue (e-
books, photography, videos, blogs), make sure your
successor knows this.
If there are things on your computer or hard drive that you
want to pass on (scanned family photos, ancestry research,
a book you have been writing), put them in a “Do Not
Delete” folder and include it on your inventory list.
Excerpt from: Estate Planning for Digital Assets and Social Media
10. Terms of Service
Facebook’s Statement of Rights and
Responsibilities
Yahoo Terms of Service
LinkedIn User Agreement
Google Terms of Service
Ello
11. Facebook
Memorialize the account
“We will memorialize the Facebook account of a deceased person when
we receive a valid request. We try to prevent references to memorialized
accounts from appearing on Facebook in ways that may be upsetting to
the person's friends and family, and we also take measures to protect the
privacy of the deceased person by securing the account.
Please keep in mind that we cannot provide login information for a
memorialized account. It is always a violation of our policies to log into
another person's account.”
Memorial accounts can never be logged into again
From: Facebook
12. The State of the Law Is In Flux
In matters of incapacity and post death, the Probate laws
(and in certain cases in Michigan, the Mental Health Code)
will control who can access digital assets
Digital companies have created terms of service agreement
to begin to address the management of digital property
after incapacity and death
Only eight states have passed legislation regarding access
to digital assets (Delaware, Oklahoma, Idaho, Rhode
Island, Indiana, Virginia, Nevada and Connecticut, who was
the first in 2005)
13. Federal Statues and Michigan
Statues
Stored Communications Act, 18 USC 2701,
(also known as the Electronic Communications
Privacy Act (ECPA))
Computer Fraud and Abuse Act, 18 USC 1030
Michigan law, in MCL 750.540
14. Michigan and
FADA
HB 4072 is the latest effort in Michigan
Michigan FADA should improve on UFADAA by adopting
broader definition of Fiduciary to include:
Guardian of the Person/Guardian of the Estate
Special Fiduciaries
15. In 2011, the Uniform Law Commission established
the Fiduciary Access to Digital Assets Committee
to draft a free-standing act that will vest fiduciaries
with the authority to manage and distribute digital
assets, copy or delete digital assets, and access
digital assets
The Committee has met since that time and in July
2014 the ULC adopted a final version of a Uniform
Fiduciary Access to Digital Assets Act (UFADAA)
16. The UFADAA:
Gives Account Holder control over whether
digital assets should be preserved,
distributed or destroyed
Authorizes access to digital assets that
would not violate the Federal Stored
Communications Act, 18 USC 2701 and
Computer Fraud and Abuse Act, 18 USC
1030
17. The UFADAA:
If widely adopted, provides consistency
throughout the country
Currently, there is a hodge-podge
approach
Authorizes access by:
Agent under Power of Attorney
Conservator
Personal Representative
Trustee
18. The UFADAA:
Requires that fiduciaries provide
proof of authority in the form of a
certified document
Gives Custodians of digital assets
immunity for relying on a fiduciary’s
apparent authority
Addresses Impairment of Contract
and Public Policy
19. Under UFADAA:
Personal Representative/Trustee are “opt-out”
May Access Digital Assets Unless
Otherwise Provided in Writing
Conservator is “opt-in”
May Access Digital Assets Only With
Authority from Court
Agent under Power of Attorney is mixed
Access to Catalogue of Electronic
Communications is “opt-out”, Content is
“opt-in”
20. Privacy Expectation Afterlife and
Choices Act
The Privacy Expectation Afterlife and Choices
Act (PEAC Act)
Proposed by NetChoice
Addresses post-death access only
Requires probate in every instance
21. A Robust, Effective Approach for
Michigan
Drafted by Updating Michigan Law Committee
of the Probate Council
Final version of UFADAA as its basis
A practical, Michigan specific law developed
by members of the Michigan Bar.
Endorsed by Probate and Estate Planning
Section, the Elder Law and Disability Rights
Section and the Michigan Probate Judges
Association
22. Incorporating Digital Estate Planning
into Your Practice
To help the process, a questionnaire for the client to
list all digital assets and the value of those assets
Discuss if any of the assets have financial value
Keep record of all passwords and profiles
There are websites specifically designed to
release account information after death to
designated beneficiaries (PasswordBox.com or
AssetLock.net)
Suggest clients protect significant data with strong
encryption
23. Inventory Checklist
Make sure to include everything from the computer,
other devices, and the “virtual world” (i.e. cloud,
internet)
All email accounts
All meaningful social websites
Financial and commerce accounts
Make a simple spreadsheet with passwords to access
assets
Digital Assets Inventory
Asset Access Wishes
Name Contents Location Username Password Instructions Recipient
24. Who is in Charge?
After an inventory of digital assets is created, decide
who to give the access to in the event of death or
disability.
Make sure to indicate whether the digital executor
should archive content, share content with others,
or delete content (and/or secure privacy of some
content which may be harmful).
Make sure to include any special instructions (Think
sensitive and/or embarrassing content).
25. Access to Digital Assets
Create a document and note if the property is personal
or has monetary value
Examples of note
Excerpt from: The Trust Advisor
26. Where Should The Client
Note His or Her Intent?
Powers of Attorney
Last Will and Testament
Revocable Living Trust
General Assignment
27. Using Tools that Service Providers
Offer
Facebook Legacy Contact
Google Inactive Account Manager
28.
29. Howard H. Collens
Galloway and Collens, PLLC
26075 Woodward Ave, Suite 200
Huntington Woods, Michigan 48070
248.545.2500
GallowayCollens.com
Howard@GallowayCollens.com
Twitter: @howardcollens
Michael Lichterman
Bolhouse, Baar & Hofstee, P.C.
Grandville State Bank Building
3996 Chicago Drive SW
Grandville, Michigan 49418
616.531.7711
BolhouseLaw.com
MikeL@BolhouseLaw.com