SlideShare ist ein Scribd-Unternehmen logo
1 von 26
YOUR
DIGITAL INHERITANCE



DR. WENDY MONCUR, FRSA

SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE
VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
LIFE, DEATH &
ASSETS


   BEQUEATHING
   DIGITAL ASSETS



       STEPS TO TAKE?
THE DAYS OF
  OUR YEARS
        ARE
THREESCORE
      YEARS
    AND TEN
(PSALM 90:10, KING JAMES
         BIBLE)
ARE ONLINE & OFFLINE DEATH
          SYNCHRONOUS?




http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
YOUR REAL-LIFE ASSETS


 House
 Car
 Money
 Furniture
 Photos, videos, letters
 Jewellery
 Body
YOUR DIGITAL ASSETS
         Photos
       Blog posts
         Emails
 Social media accounts
    Online contacts
         Video
         Music
         Books
     Memberships
    Online business
   Airmiles accounts
    … and more…
WHERE ARE YOUR
DIGITAL ASSETS?




 Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD.
                Cloud backup service. Memory stick.
                            http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
WHAT ARE THEY WORTH?
UNEXPECTEDLY
USEFUL?




               http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
BEQUEATHING
DIGITAL ASSETS
BEQUEATHING DIGITAL
ASSETS

Can you? Yes, in Oklahoma (House bill 2800)
• social networking site
• micro blogging
• email & short message service websites



Barriers to bequeathal
BARRIERS TO BEQUEATHAL

Awareness of account’s existence
Identity –
actual, pseudonymous, anonymous
Password
Ownership of digital asset




                                   http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
http://info.yahoo.com/legal/uk/yahoo/utos-173.html/
LANCE CORPORAL ELLSWORTH
OTHER INTERNET
SERVICE PROVIDERS

 Facebook: Memorialize or remove the account. Content can be
 downloaded if you have password.                            http://www.facebook.com




 Twitter: remove account or assist family members in saving a
 backup of deceased‟s public Tweets.


 Gmail: May give access if formal evidence of death provided
 http://support.google.com/mail/bin/answer.py?hl=en&answer=14300




 eBay: You cannot “transfer your eBay account (including feedback) and
 user ID to another party without our consent”
 http://pages.ebay.co.uk/help/policies/user-agreement.html



                                                                                       /
DO YOU HAVE
                                                                    SKELETONS IN
                                                                    YOUR CLOSET?




http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet-
153072854
STEPS TO TAKE?
WHAT CAN YOU DO?: 1

Make a list of ALL your digital assets
   - ID, Password, Website


Consider using a software tool to store passwords securely
  • - E.g. LastPass, 1Password, Clipperz, RoboForm
Writing down or sharing your password
may violate the Terms of Service
agreement with your Internet Service
provider.
WHAT CAN YOU DO?: 2
Appoint a Digital Executor

DIY method
  • Family member
  • Friend
  • Colleague
  • Lawyer


Digital estate services

Posthumous email services
DIGITAL ESTATE
SERVICES
Secure online service
    • e.g. Legacy Locker, Entrustnet
    • May demand death certificate as proof of death


Stores your digital inventory

May also store:
•    last wishes
•    instructions for funeral
•    posthumous email
•    instructions in case if brain death
•    eg – Legacy Organiser app
POSTHUMOUS EMAIL
Online service
 • e.g http://www.deadmansswitch.net/


Death may be assumed if you fail to answer 3 emails
from service provider….


Emails sent after you die
DO YOU NEED A DIGITAL
ESTATE SERVICE, OR IS
IT OVERKILL?

Security

Password updates

Number of heirs

Your age & health

How good you are with computers

Triggering action
SUMMARY
Your digital assets are growing daily


Bequeathing them is not simple


You may wish to:
  • Make an inventory of your digital assets
  • Choose:
       • your digital executor
       • What assets you want to pass on, to whom.




                                 Dr. Wendy Moncur
                   http://www.computing.dundee.ac.uk/staff/wmoncur/
Digital Estate   Posthumous         DIY Method
                     Services         emails

Want stringent 3rd            Y         Less stringent          N
party verification

Death cert check              Y               N                 N

Automated digital             Y              1/2                N
executor

Digital „heirs‟           Complex         Complex             Simple

Passwords change              Y               N                 N
often
Open new accounts             Y               N                 N
frequently
Willing to pay for         Maybe           Maybe                N
service

Weitere ähnliche Inhalte

Ähnlich wie 2012 turing-security freedom WendyMoncur

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)KC Marie Knox
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenIDSimon Willison
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theftguest3151b0
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfBarbara O'Neill
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCarl Keller
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keysdimitrist
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessHoward Collens
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keysdimitrist
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 

Ähnlich wie 2012 turing-security freedom WendyMoncur (20)

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenID
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdf
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert Advice
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning Network
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keys
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary Access
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 

Kürzlich hochgeladen

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

2012 turing-security freedom WendyMoncur

  • 1. YOUR DIGITAL INHERITANCE DR. WENDY MONCUR, FRSA SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
  • 2. LIFE, DEATH & ASSETS BEQUEATHING DIGITAL ASSETS STEPS TO TAKE?
  • 3. THE DAYS OF OUR YEARS ARE THREESCORE YEARS AND TEN (PSALM 90:10, KING JAMES BIBLE)
  • 4.
  • 5. ARE ONLINE & OFFLINE DEATH SYNCHRONOUS? http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
  • 6. YOUR REAL-LIFE ASSETS House Car Money Furniture Photos, videos, letters Jewellery Body
  • 7. YOUR DIGITAL ASSETS Photos Blog posts Emails Social media accounts Online contacts Video Music Books Memberships Online business Airmiles accounts … and more…
  • 8. WHERE ARE YOUR DIGITAL ASSETS? Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD. Cloud backup service. Memory stick. http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
  • 9. WHAT ARE THEY WORTH?
  • 10. UNEXPECTEDLY USEFUL? http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
  • 12. BEQUEATHING DIGITAL ASSETS Can you? Yes, in Oklahoma (House bill 2800) • social networking site • micro blogging • email & short message service websites Barriers to bequeathal
  • 13. BARRIERS TO BEQUEATHAL Awareness of account’s existence Identity – actual, pseudonymous, anonymous Password Ownership of digital asset http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
  • 16. OTHER INTERNET SERVICE PROVIDERS Facebook: Memorialize or remove the account. Content can be downloaded if you have password. http://www.facebook.com Twitter: remove account or assist family members in saving a backup of deceased‟s public Tweets. Gmail: May give access if formal evidence of death provided http://support.google.com/mail/bin/answer.py?hl=en&answer=14300 eBay: You cannot “transfer your eBay account (including feedback) and user ID to another party without our consent” http://pages.ebay.co.uk/help/policies/user-agreement.html /
  • 17. DO YOU HAVE SKELETONS IN YOUR CLOSET? http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet- 153072854
  • 19. WHAT CAN YOU DO?: 1 Make a list of ALL your digital assets - ID, Password, Website Consider using a software tool to store passwords securely • - E.g. LastPass, 1Password, Clipperz, RoboForm
  • 20. Writing down or sharing your password may violate the Terms of Service agreement with your Internet Service provider.
  • 21. WHAT CAN YOU DO?: 2 Appoint a Digital Executor DIY method • Family member • Friend • Colleague • Lawyer Digital estate services Posthumous email services
  • 22. DIGITAL ESTATE SERVICES Secure online service • e.g. Legacy Locker, Entrustnet • May demand death certificate as proof of death Stores your digital inventory May also store: • last wishes • instructions for funeral • posthumous email • instructions in case if brain death • eg – Legacy Organiser app
  • 23. POSTHUMOUS EMAIL Online service • e.g http://www.deadmansswitch.net/ Death may be assumed if you fail to answer 3 emails from service provider…. Emails sent after you die
  • 24. DO YOU NEED A DIGITAL ESTATE SERVICE, OR IS IT OVERKILL? Security Password updates Number of heirs Your age & health How good you are with computers Triggering action
  • 25. SUMMARY Your digital assets are growing daily Bequeathing them is not simple You may wish to: • Make an inventory of your digital assets • Choose: • your digital executor • What assets you want to pass on, to whom. Dr. Wendy Moncur http://www.computing.dundee.ac.uk/staff/wmoncur/
  • 26. Digital Estate Posthumous DIY Method Services emails Want stringent 3rd Y Less stringent N party verification Death cert check Y N N Automated digital Y 1/2 N executor Digital „heirs‟ Complex Complex Simple Passwords change Y N N often Open new accounts Y N N frequently Willing to pay for Maybe Maybe N service