What happens to our virtual account/ digital asset or data after our death?
It is a settle fact that in our modern age, Data is oil or air of this virtually physical era, where we are more concerned about our virtual presence than that of physical one. When we are living, we continue to add or keep various data which is personally identifiable or personal data like person’s name, picture, online banking data, contact details, location data, race, sexual orientation, social security number, location, online identifiers and genetic information and face orientation etc with various online platforms. We are the owners of those sensitive personal data and which are our personal assets as well.
Now the question is if data we share or preserve or upload is our assets then what will happen to that assets after our death or can we make an will or can our heirs inherit the same after our demise or can we make an Will of our digital asset or bequeath the same in favour of our heirs …..let’s find out. .......
for details please read @ https://cyberchatterjee.blogspot.com/2020/07/what-happens-to-our-digit-data-after-death.html
An Indian Outline on Database ProtectionSinghania2015
One Business Processing Outsourcing company of India was in the eye of storm when one of its employees sold confidential financial information relating to customers of few British banks to an undercover reporter from the British tabloid ‘The Sun’. The incident sparked off a debate among the offshore industry circles, media and the legal world for the need of specific legislation for the protection for personal data in India which is absent currently.
Information Security: The Trinidad & Tobago Legal ContextJason Nathu
Presentation to students completing the Information System Security, Ethics and Law of the Master of Information System & Technology Management at the Lok Jack Graduate School of Business on 12 July, 2015.
An Indian Outline on Database ProtectionSinghania2015
One Business Processing Outsourcing company of India was in the eye of storm when one of its employees sold confidential financial information relating to customers of few British banks to an undercover reporter from the British tabloid ‘The Sun’. The incident sparked off a debate among the offshore industry circles, media and the legal world for the need of specific legislation for the protection for personal data in India which is absent currently.
Information Security: The Trinidad & Tobago Legal ContextJason Nathu
Presentation to students completing the Information System Security, Ethics and Law of the Master of Information System & Technology Management at the Lok Jack Graduate School of Business on 12 July, 2015.
History
Introduction
Introduce and finalized by Atal bhirai Bajpai
Parts of the Act
Amendments to I.T. ACT 2000
Offences of I.T ACT 2000
What works
What doesn’t work
Section of I.T. ACT 2000
The advantage of I.T. ACT 2000
The disadvantage of I.T ACT 2000
Conclusion
Draft Bill on the Protection of Personal DataRenato Monteiro
Presentation given at the DataGuidance´s webinar "Brazil: Towards Privacy Compliance", about the Brazlian Draft Bill for the Protection of Personal Data (Anteprojeto de Lei para a Proteção de Dados Pessoais) issued in January 2015, which introduced concepts such as Data Protection Officer and Binding Corporate Rules.
With the submission of SriKrishna Committee report on data protection, the final countdown for India’s own Data Protection Regime has finally begun. A detailed legal framework on data protection is to be implemented in the coming days.
Purpose of Data Protection Bill 2018- To protect the autonomy of individuals in relation with their personal data, to specify where the flow and usage of personal data is appropriate, to create a relationship of trust between persons and entities processing their personal data, to specify the rights of individuals whose personal data are processed, to create a framework for implementing organizational and technical measures in processing personal data, to lay down norms for cross-border transfer of personal data, to ensure the accountability of entities processing personal data, to provide remedies for unauthorized and harmful processing, and to establish a Data Protection Authority for overseeing processing activities.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
This presentation provides in-house counsel with a brief overview of IT / ICT related legislation within South Africa and the impact it might have on its organisations and its people
Ф franciscronje.com
regulatory compliance explained
In this presentation you will learn "The 4 General Principles of ESIGN" and the difference between UETA and Electronic Signatures in Global and National Commerce Act (ESIGN)
History
Introduction
Introduce and finalized by Atal bhirai Bajpai
Parts of the Act
Amendments to I.T. ACT 2000
Offences of I.T ACT 2000
What works
What doesn’t work
Section of I.T. ACT 2000
The advantage of I.T. ACT 2000
The disadvantage of I.T ACT 2000
Conclusion
Draft Bill on the Protection of Personal DataRenato Monteiro
Presentation given at the DataGuidance´s webinar "Brazil: Towards Privacy Compliance", about the Brazlian Draft Bill for the Protection of Personal Data (Anteprojeto de Lei para a Proteção de Dados Pessoais) issued in January 2015, which introduced concepts such as Data Protection Officer and Binding Corporate Rules.
With the submission of SriKrishna Committee report on data protection, the final countdown for India’s own Data Protection Regime has finally begun. A detailed legal framework on data protection is to be implemented in the coming days.
Purpose of Data Protection Bill 2018- To protect the autonomy of individuals in relation with their personal data, to specify where the flow and usage of personal data is appropriate, to create a relationship of trust between persons and entities processing their personal data, to specify the rights of individuals whose personal data are processed, to create a framework for implementing organizational and technical measures in processing personal data, to lay down norms for cross-border transfer of personal data, to ensure the accountability of entities processing personal data, to provide remedies for unauthorized and harmful processing, and to establish a Data Protection Authority for overseeing processing activities.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
This presentation provides in-house counsel with a brief overview of IT / ICT related legislation within South Africa and the impact it might have on its organisations and its people
Ф franciscronje.com
regulatory compliance explained
In this presentation you will learn "The 4 General Principles of ESIGN" and the difference between UETA and Electronic Signatures in Global and National Commerce Act (ESIGN)
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...Vijay Dalmia
REASONABLE SECURITY PRACTICES AND PROCEDURES AND SENSITIVE PERSONAL DATA OR INFORMATION RULES, 2011
Under
The (Indian) Information Technology Act, 2000
Indonesian Legislatives Passes Personal Data Protection Bill.pdfAHRP Law Firm
The long-awaited Personal Data Protection Bill was finally passed by the Indonesian legislative on 20 September 2022 after initiating the prioritised legislative program three years ago. This legislative milestone would make it the first law to set comprehensive rules regarding personal data protection. The finalized bill is still due for approval from the President before it is enacted as law
Personal Data and Information Classification under Data Privacy Act of the Ph...ABLoveria
Discusses the coverage of personal information, sensitive personal information and data and information not covered by the Data Privacy Act 2012 of the Philippines. Philippine Law.
Republic Act 10173 Data Privacy Act of 2012 (DPA)
“An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes”
Similar to What happens to our virtual account or digital asset or data after our death ? (20)
Cryptocurrency News India : Is Cryptocurrency Legal In INDIA ? SUPREME COURT ...Bivas Chatterjee
This post discusses in depth various crypto news in India and on whether cryptocurrency legal in India? supreme court on cryptocurrency bitcoin legal, whether Bitcoin or Cryptocurrency is legal in India? This video also discusses on whether we can Invest In Bitcoin in India ? OR Can We Trade In Bitcoin In India?
This video also discusses on the followings:
WHY CRYPTOCURRENCY IS SO POPULAR?
RISK IN CRYPTO – RISK IN BITCOIN - CRYPTO SCAM COINS - CRYPTO NEWS TODAY - CRYPTO NEWS IN INDIA
INNOVATION OF BITCOIN – SATOSHI NAKAMOTO WHITE PAPER – SATOSHI NAKAMOTO IDENTITY
WHAT ARE CRYPTOCURRENCIES?
BITCOIN PRICE PREDICTION – Bitcoin PRICE
HOW THE LAW ENFORCEMENT AGENCY INVESTIGATE BITCOIN ? - WHY HACKERS USE BITCOIN ?
IS IT LEGAL TO INVEST IN BITCOIN OR CRYPTOCURRENCY IN INDIA? - SHOULD YOU INVEST IN CRYPTOCURRENCY?
WHETHER BITCOIN IS LEGAL IN INDIA?
RBI CIRCULAR ON CRYPTOCURRENCY - RBI ON CRYPTOCURRENCY - SUPREME COURT ON CRYPTOCURRENCY
CAN WE INVEST IN BITCOIN ?
CAN WE TRADE IN BITCOIN IN INDIA?
.....This video covers :
IS IT LEGAL TO INVEST I
General Data Protection Regulation (GDPR) | Privacy Law in India |Bivas Chatterjee
This PPT deals with Privacy Law in India and GDPR. It also deals with GDPR compliance and result of non compliance for companies specially Indian companies dealing with European Citizen's personal data. It also deals with GDPR in connection with the use of Bitcoin, cloud, Artificial Intelligence, Big Data and IOT. So Enjoy reading and also be connected with my blog at cyberchatterjee.blogspot.com .
Cyber crime journal by central detective training schoolBivas Chatterjee
Cyber crime journal by central detective training school by Bivas Chatterjee. Special Public Prosecutor for Cyber Law and Electronics Evidence, Certified Ethical Hacker, Computer Hacking Forensic Investigator, Author of Cyber Crime Manual in English, Bengali and Hindi,
Cyber Evidence Manual, Cyber Security and The Law, Cyber Contract(Legal Analysis), Dense Cloud( Legal Analysis of Cloud), Information Technology Manual, Your Ultimate Protection Guide. Faculty at CDTS under MHA, SVSPA, ATI, CID, Cyber P.S. Kolkata, DCSI etc. Dealing with all major Telecom and infrastructure Companies.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
What happens to our virtual account or digital asset or data after our death ?
1. What happened to your Digital
asset/ property after death | Digital
wills | Inheritance of your digital
asset | law of Digital inheritance
Presented by
Bivas Chatterjee.
Cyberchatterjee.blogspot.com
2. Inheritance of digital assets
In our Google account we might have sensitive information
relating to funds in Google Pay, refreshing memories in Google
Photos, important documents in Google Drive -----All these
and many more in other sites, ………….your heirs may demand
for inheritance ……
3. THE INFORMATION TECHNOLOGY ACT, 2000
2. Definitions.—(1) In this Act, unless the context otherwise requires,—
(o) “data” means a representation of information, knowledge, facts, concepts or
instructions which are being prepared or have been prepared in a formalised
manner, and is intended to be processed, is being processed or has been
processed in a computer system or computer network, and may be in any form
(including computer printouts magnetic or optical storage media, punched
cards, punched tapes) or stored internally in the memory of the computer;
What is Data?
4. AS PER THE INFORMATION TECHNOLOGY ACT, 2000
SECTION 43A. Compensation for failure to protect data.–Where a body corporate, possessing, dealing or
handling any sensitive personal data or information in a computer resource which it owns, controls or
operates, is negligent in implementing and maintaining reasonable security practices and procedures and
thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay
damages by way of compensation to the person so affected.
Section 72A. PUNISHMENT FOR DISCLOSURE OF INFORMATION IN BREACH OF LAWFUL CONTRACT
Save as otherwise provided in this Act or any other law for the time being in force, any person including an
intermediary who, while providing services under the terms of lawful contract, has secured access to any
material containing personal information about another person, with the intent to cause or knowing that he
is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in
breach of a lawful contract, such material to any other person, shall be punished with imprisonment for a
term which may extend to three years, or with fine which may extend to five lakh rupees, or with both.
Social sites and other online service providers must comply
followings:
5. Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011
3. Sensitive personal data or information.— Sensitive personal data or information of a person means such personal information which
consists of information relating to;—
(i) password;
(ii) financial information such as Bank account or credit card or debit card or other payment instrument details
(iii) physical, physiological and mental health condition;
(iv) sexual orientation;
(v) medical records and history;
(vi) Biometric information;
(vii) any detail relating to the above clauses as provided to body corporate for providing service; and
(viii) any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or
otherwise: provided that, any information that is freely available or accessible in public domain or furnished under the Right to
Information Act, 2005 or any other law for the time being in force shall not be regarded as sensitive personal data or information for the
purposes of these rules.
What is Sensitive Personal Data?
6. ‘personal data’ means any information relating to an identified or identifiable natural person
(‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in
particular by reference to an identifier such as a name, an identification number, location data, an
online identifier or to one or more factors specific to the physical, physiological, genetic, mental,
economic, cultural or social identity of that natural person.
‘personal data breach’ means a breach of security leading to the accidental or unlawful
destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted,
stored or otherwise processed.
GDPR ARTICLE : 4
7. Inheritance may be through following ways:
Person leaving an will, which is a legal declaration carrying the intention of the
person making the will with respect to his property or estate which will take
effect only after his or her death.
Or by
Hindu Succession Act, 1956
Indian Succession Act, 1925
Or other personal laws
Law of inheritance in India:
8. THE SALE OF GOODS ACT, 1930:
2. Definitions
(11) “property” means the general property in goods, and
not merely a special property;
What is Property ?
9. DOCUMENTS OR TRANSACTIONS TO WHICH THE ACT SHALL NOT APPLY:
As per THE FIRST SCHEDULE [See sub-section (4) of section 1] :
1. A negotiable instrument (other than a cheque) as defined in section 13 of the Negotiable
Instruments Act, 1881 (26 of 1881).
2. A power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882 (7 of 1882).
3. A trust as defined in section 3 of the Indian Trust Act, 1882 (2 of 1882).
4. A will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 (39 of 1925),
including any other testamentary disposition by whatever name called.
5. Any contract for the sale or conveyance of immovable property or any interest in such property
In Information Technology Act followings are barred:
10. Some Instances
1) In 2005 Yahoo! was ordered by a Michigan Court, to release emails of deceased to his father.
2) In 2018, One Dubai forum ruled that Twitter, Facebook, and others social should deliver digital
data is accordance of a legal will.
3) In France and Canada the owner of the data can make will or access to their digital assets.
4) Inheritance of digital assets are accepted in other countries as well.
5) In India we do not have any law to that effect specifically covering the inheritance of digital
asset.
11. Will and Passwords : Controversy
In making the will of one’s digital asset the person can not mention the
password or other sensitive data in his Will as the will has to be exhibited
and proved in open Court of Law when probate is obtained…..
This may create a huge security breach issue…….
12. Thanks for paying attention:
STAY CONNECTED BY SUBSCRIBING TO BLOG:
CYBER CHATTERJEE @
cyberchatterjee.blogspot.com
BIVAS CHATTERJEE