SlideShare ist ein Scribd-Unternehmen logo
1 von 26
YOUR
DIGITAL INHERITANCE



DR. WENDY MONCUR, FRSA

SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE
VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
LIFE, DEATH &
ASSETS


   BEQUEATHING
   DIGITAL ASSETS



       STEPS TO TAKE?
THE DAYS OF
  OUR YEARS
        ARE
THREESCORE
      YEARS
    AND TEN
(PSALM 90:10, KING JAMES
         BIBLE)
ARE ONLINE & OFFLINE DEATH
          SYNCHRONOUS?




http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
YOUR REAL-LIFE ASSETS


 House
 Car
 Money
 Furniture
 Photos, videos, letters
 Jewellery
 Body
YOUR DIGITAL ASSETS
         Photos
       Blog posts
         Emails
 Social media accounts
    Online contacts
         Video
         Music
         Books
     Memberships
    Online business
   Airmiles accounts
    … and more…
WHERE ARE YOUR
DIGITAL ASSETS?




 Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD.
                Cloud backup service. Memory stick.
                            http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
WHAT ARE THEY WORTH?
UNEXPECTEDLY
USEFUL?




               http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
BEQUEATHING
DIGITAL ASSETS
BEQUEATHING DIGITAL
ASSETS

Can you? Yes, in Oklahoma (House bill 2800)
• social networking site
• micro blogging
• email & short message service websites



Barriers to bequeathal
BARRIERS TO BEQUEATHAL

Awareness of account’s existence
Identity –
actual, pseudonymous, anonymous
Password
Ownership of digital asset




                                   http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
http://info.yahoo.com/legal/uk/yahoo/utos-173.html/
LANCE CORPORAL ELLSWORTH
OTHER INTERNET
SERVICE PROVIDERS

 Facebook: Memorialize or remove the account. Content can be
 downloaded if you have password.                            http://www.facebook.com




 Twitter: remove account or assist family members in saving a
 backup of deceased‟s public Tweets.


 Gmail: May give access if formal evidence of death provided
 http://support.google.com/mail/bin/answer.py?hl=en&answer=14300




 eBay: You cannot “transfer your eBay account (including feedback) and
 user ID to another party without our consent”
 http://pages.ebay.co.uk/help/policies/user-agreement.html



                                                                                       /
DO YOU HAVE
                                                                    SKELETONS IN
                                                                    YOUR CLOSET?




http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet-
153072854
STEPS TO TAKE?
WHAT CAN YOU DO?: 1

Make a list of ALL your digital assets
   - ID, Password, Website


Consider using a software tool to store passwords securely
  • - E.g. LastPass, 1Password, Clipperz, RoboForm
Writing down or sharing your password
may violate the Terms of Service
agreement with your Internet Service
provider.
WHAT CAN YOU DO?: 2
Appoint a Digital Executor

DIY method
  • Family member
  • Friend
  • Colleague
  • Lawyer


Digital estate services

Posthumous email services
DIGITAL ESTATE
SERVICES
Secure online service
    • e.g. Legacy Locker, Entrustnet
    • May demand death certificate as proof of death


Stores your digital inventory

May also store:
•    last wishes
•    instructions for funeral
•    posthumous email
•    instructions in case if brain death
•    eg – Legacy Organiser app
POSTHUMOUS EMAIL
Online service
 • e.g http://www.deadmansswitch.net/


Death may be assumed if you fail to answer 3 emails
from service provider….


Emails sent after you die
DO YOU NEED A DIGITAL
ESTATE SERVICE, OR IS
IT OVERKILL?

Security

Password updates

Number of heirs

Your age & health

How good you are with computers

Triggering action
SUMMARY
Your digital assets are growing daily


Bequeathing them is not simple


You may wish to:
  • Make an inventory of your digital assets
  • Choose:
       • your digital executor
       • What assets you want to pass on, to whom.




                                 Dr. Wendy Moncur
                   http://www.computing.dundee.ac.uk/staff/wmoncur/
Digital Estate   Posthumous         DIY Method
                     Services         emails

Want stringent 3rd            Y         Less stringent          N
party verification

Death cert check              Y               N                 N

Automated digital             Y              1/2                N
executor

Digital „heirs‟           Complex         Complex             Simple

Passwords change              Y               N                 N
often
Open new accounts             Y               N                 N
frequently
Willing to pay for         Maybe           Maybe                N
service

Weitere ähnliche Inhalte

Ähnlich wie 2012 turing-security freedom WendyMoncur

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)KC Marie Knox
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenIDSimon Willison
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theftguest3151b0
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfBarbara O'Neill
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCarl Keller
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keysdimitrist
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessHoward Collens
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keysdimitrist
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 

Ähnlich wie 2012 turing-security freedom WendyMoncur (20)

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenID
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdf
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert Advice
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning Network
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keys
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary Access
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 

Kürzlich hochgeladen

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

2012 turing-security freedom WendyMoncur

  • 1. YOUR DIGITAL INHERITANCE DR. WENDY MONCUR, FRSA SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
  • 2. LIFE, DEATH & ASSETS BEQUEATHING DIGITAL ASSETS STEPS TO TAKE?
  • 3. THE DAYS OF OUR YEARS ARE THREESCORE YEARS AND TEN (PSALM 90:10, KING JAMES BIBLE)
  • 4.
  • 5. ARE ONLINE & OFFLINE DEATH SYNCHRONOUS? http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
  • 6. YOUR REAL-LIFE ASSETS House Car Money Furniture Photos, videos, letters Jewellery Body
  • 7. YOUR DIGITAL ASSETS Photos Blog posts Emails Social media accounts Online contacts Video Music Books Memberships Online business Airmiles accounts … and more…
  • 8. WHERE ARE YOUR DIGITAL ASSETS? Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD. Cloud backup service. Memory stick. http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
  • 9. WHAT ARE THEY WORTH?
  • 10. UNEXPECTEDLY USEFUL? http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
  • 12. BEQUEATHING DIGITAL ASSETS Can you? Yes, in Oklahoma (House bill 2800) • social networking site • micro blogging • email & short message service websites Barriers to bequeathal
  • 13. BARRIERS TO BEQUEATHAL Awareness of account’s existence Identity – actual, pseudonymous, anonymous Password Ownership of digital asset http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
  • 16. OTHER INTERNET SERVICE PROVIDERS Facebook: Memorialize or remove the account. Content can be downloaded if you have password. http://www.facebook.com Twitter: remove account or assist family members in saving a backup of deceased‟s public Tweets. Gmail: May give access if formal evidence of death provided http://support.google.com/mail/bin/answer.py?hl=en&answer=14300 eBay: You cannot “transfer your eBay account (including feedback) and user ID to another party without our consent” http://pages.ebay.co.uk/help/policies/user-agreement.html /
  • 17. DO YOU HAVE SKELETONS IN YOUR CLOSET? http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet- 153072854
  • 19. WHAT CAN YOU DO?: 1 Make a list of ALL your digital assets - ID, Password, Website Consider using a software tool to store passwords securely • - E.g. LastPass, 1Password, Clipperz, RoboForm
  • 20. Writing down or sharing your password may violate the Terms of Service agreement with your Internet Service provider.
  • 21. WHAT CAN YOU DO?: 2 Appoint a Digital Executor DIY method • Family member • Friend • Colleague • Lawyer Digital estate services Posthumous email services
  • 22. DIGITAL ESTATE SERVICES Secure online service • e.g. Legacy Locker, Entrustnet • May demand death certificate as proof of death Stores your digital inventory May also store: • last wishes • instructions for funeral • posthumous email • instructions in case if brain death • eg – Legacy Organiser app
  • 23. POSTHUMOUS EMAIL Online service • e.g http://www.deadmansswitch.net/ Death may be assumed if you fail to answer 3 emails from service provider…. Emails sent after you die
  • 24. DO YOU NEED A DIGITAL ESTATE SERVICE, OR IS IT OVERKILL? Security Password updates Number of heirs Your age & health How good you are with computers Triggering action
  • 25. SUMMARY Your digital assets are growing daily Bequeathing them is not simple You may wish to: • Make an inventory of your digital assets • Choose: • your digital executor • What assets you want to pass on, to whom. Dr. Wendy Moncur http://www.computing.dundee.ac.uk/staff/wmoncur/
  • 26. Digital Estate Posthumous DIY Method Services emails Want stringent 3rd Y Less stringent N party verification Death cert check Y N N Automated digital Y 1/2 N executor Digital „heirs‟ Complex Complex Simple Passwords change Y N N often Open new accounts Y N N frequently Willing to pay for Maybe Maybe N service