SlideShare une entreprise Scribd logo
1  sur  5
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 1
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES
Priyaranjan B Mestri
University of Washington
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 2
Background
Inheritance is the practice of passing on property, titles, debts, rights and obligations upon
the death of an individual. It has long played an important role in human societies.
The Roman law introduced the concept of universal succession, which is to say that
in inheritance law the heirs enter into the legal position regarding property rights
Unique Characteristics of Digital Assets
Physical assets like books, clothes, accessories etc. can be easily passed on without any
legal complications because the laws are formed and defined. But when it comes to
digital assets like passwords, access to social network profiles e.g. Facebook, Twitter,
Google or Linked In; emails, tweets, databases, digital files and bank accounts, the legal
landscape has failed to keep up with the web 2.0 and the rapid technological
proliferation.Today, the amount of information accessed and stored online is growing at
the speed of lightning. The growing use of email and paperless bill paying has created a
situation where vital records are stored-in online accounts only. In addition, more and
more information and valuable items are resting on media that are not owned by the data
owner but by service provider(e.g. Google, Apple, Microsoft etc.). Also in contrast to
physical assets, electronic values can be copied indefinitely, which could be problematic
if the asset represents intellectual properties. In contrast to conventional inheritance of
physical assets, digital inheritance also needs to cope with the fact that the digital heirs
areonly known by their email addresses or mobile numbers. Handing over digital assets
requires additional information that may be crucial for a heir to further treat the digital
assets.
Digital Inheritance and the legal framework
Although, the Roman law introduced the concept of universal succession, in which the
heirs enter into the legal position regarding property rights of the testator by law. Muslim
sharia laws and Bible talks about the inheritance issue, but what about the digital assets
who will inherit it. The answer to this new question arising out of internet bubble of early
millennium year has been to create a legal framework wherein a person can specify as he
does with his physical assets that who should get what, when he is no more.
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 3
Some of the problem that came into light recently is related to what happens to the data
and information that is password protected and users don't share it with anyone. Some of
them could be our secret of life. How can users secure of password or decide what our
inheritor could access. All of these questions are becoming very important and Internet
users have been wrestling with it.
Digital inheritance and the law
At present, service providers and content sellers have been slow to react partly because
the issue of transference post death of the customer is complex and has been affecting
only a limited number of customers. However, these companies and content sellers will
be forced to react faster, more so because of the consumers’ demand. Therefore, the
debate at present is whether the next of the kin will be granted access to the digital
accounts. For example, access to Amazon account if the deceased person ishis or her next
of kin and did not have the password.
Consequently, there has been an increasing pressure on lawmakers to build broader
policies and practical solution to the ongoing confusion and misunderstanding as of now.
There has been some legislative progress for surviving family members. At least three
states -- Idaho, Nebraska and Indiana have enacted laws that allow next of kin to gain
access to digital accounts. Other states, including New York, North Carolina and Oregon,
are also considering making changes.
To prevent estate issues, digital media owners should plan ahead. Users can specify
information passwords and accounts to be passed on in their will.
Some data inheritance services have also emerged in recent years, promising a secure
place to store documents and passwords that will be passed on to a stated beneficiary
upon the account holder's death.
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 4
Conclusion and Opinion
The digital inheritance and accessibility issues came into light recently after a couple of
notable cases and lawsuits against the service providers for not giving the kin access to
the digital assets after the death of the owner. People have recently realized that digital
assets like bank account details, Facebook access and other digital properties are not
transferrable like the physical assets. The concept is fairly new because a large number of
people are not aware about the laws and terms and conditions behind the services
provided. In addition, digital media and electronic format is a new concept in people’s
lives.Since, the concept is very new there is a need to create awareness about the digital
rights and the importance of the medium.
In my opinion, the best way to approach this problem is by understanding that digital
assets are as good as physical assets and should be treated similar to the physical assets.
With just one difference i.e. unlike the physical assets digital assets are vulnerable in
terms of manipulation, duplication and deletion.
Another solution could be encryption of the password and split the password into
fragments and distribute it among the heirs. After the owner ceases to exist, these heirs
can combine their pieces to find out the password.
Companies can provide services to the users or customers wherein the owner could save
the digital details or assets in the name of the heir or next of the kin and specify what
assets should be given access and pay a nominal fees. Once, the owner is dead the heir
can have rightful access to the digital assets.
Also, Digital Rights Management (DRM) system or password locker like the Dswiss
could be a best solution as it allows access only to the testator and an executor presenting
a death certificate. For example: Hotmail has a provision to provide the details and access
upon the proof of death such as death certificate and a valid identity of the heir or the kin.
DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 5
Citations
“The Legal Issues Arising from Marketing Through Digital Media in the UAE”by David
Yates & Yvonne Pah
“Legal issues regarding access to digital assets growing”
http://www.gallowaycollens.com/blog/2012/10/legal-issues-regarding-access-to-digital-
assets-growing.shtml
“Digital inheritance” http://en.wikipedia.org/wiki/Digital_inheritance

Contenu connexe

Tendances

The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsSimon Moffatt
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012gallowayandcollens
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Nicole Black
 
The Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowThe Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowSrinath Srinivasa
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity Digital-identity
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationNicole Black
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpii2011
 
The Case for Personal Information Empowerment and the rise of personal data s...
The Case for Personal Information Empowerment and the rise of personal data s...The Case for Personal Information Empowerment and the rise of personal data s...
The Case for Personal Information Empowerment and the rise of personal data s...Mydex CIC
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkDarren Kuropatwa
 
Click-Wrap To Cost-Shifting
Click-Wrap To Cost-ShiftingClick-Wrap To Cost-Shifting
Click-Wrap To Cost-Shiftingagfortslideshare
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
 

Tendances (20)

The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security Concerns
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012Estate Planning in the Digital Age - Fall 2012
Estate Planning in the Digital Age - Fall 2012
 
Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?Does Cloud Computing Compromise Clients?
Does Cloud Computing Compromise Clients?
 
The Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should KnowThe Power Law of Social Media: What CIOs Should Know
The Power Law of Social Media: What CIOs Should Know
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
Societal and ethical issues of digitization
Societal and ethical issues of digitizationSocietal and ethical issues of digitization
Societal and ethical issues of digitization
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Human identity inforg
Human identity   inforgHuman identity   inforg
Human identity inforg
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
 
The Case for Personal Information Empowerment and the rise of personal data s...
The Case for Personal Information Empowerment and the rise of personal data s...The Case for Personal Information Empowerment and the rise of personal data s...
The Case for Personal Information Empowerment and the rise of personal data s...
 
Reading the Next Book
Reading the Next BookReading the Next Book
Reading the Next Book
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship Framework
 
Click-Wrap To Cost-Shifting
Click-Wrap To Cost-ShiftingClick-Wrap To Cost-Shifting
Click-Wrap To Cost-Shifting
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 

En vedette (17)

Prices
PricesPrices
Prices
 
CORT Sofa Secrets: Two Questions
CORT Sofa Secrets: Two QuestionsCORT Sofa Secrets: Two Questions
CORT Sofa Secrets: Two Questions
 
New girl fan site
New girl fan siteNew girl fan site
New girl fan site
 
Bi mat cua_hanh_phuc
Bi mat cua_hanh_phucBi mat cua_hanh_phuc
Bi mat cua_hanh_phuc
 
Running a Lean Startup Sales Process
Running a Lean Startup Sales ProcessRunning a Lean Startup Sales Process
Running a Lean Startup Sales Process
 
Portfolio
PortfolioPortfolio
Portfolio
 
Contemporary Issues
Contemporary IssuesContemporary Issues
Contemporary Issues
 
20141008 intelcollab
20141008 intelcollab20141008 intelcollab
20141008 intelcollab
 
Ranjan interm blog report
Ranjan interm blog reportRanjan interm blog report
Ranjan interm blog report
 
Types of advertising copy
Types of advertising copyTypes of advertising copy
Types of advertising copy
 
Media Planning Project
Media Planning ProjectMedia Planning Project
Media Planning Project
 
Wedding wonderful
Wedding wonderfulWedding wonderful
Wedding wonderful
 
Affiliate marketing
Affiliate marketingAffiliate marketing
Affiliate marketing
 
Carmax presentation (1)
Carmax presentation (1)Carmax presentation (1)
Carmax presentation (1)
 
Vodafone mumbai 2010
Vodafone mumbai 2010Vodafone mumbai 2010
Vodafone mumbai 2010
 
Burke museumdigitalmarketingplan
Burke museumdigitalmarketingplanBurke museumdigitalmarketingplan
Burke museumdigitalmarketingplan
 
RG Residency Noida construction update 15 Nov 2014
RG Residency Noida construction update 15 Nov 2014RG Residency Noida construction update 15 Nov 2014
RG Residency Noida construction update 15 Nov 2014
 

Similaire à Digital inheritance final

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. SnowerThe Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snowereraser Juan José Calderón
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.pptamreena6
 
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITY
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITYWEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITY
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITYLiveplex
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their dataGiuliadeNicolellis
 
Five Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPRFive Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPRDivyaConsagous
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxSANSKAR20
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Cryptocollege how blockchain can reimagine higher education. J. David Judd
Cryptocollege  how blockchain can reimagine higher education. J. David JuddCryptocollege  how blockchain can reimagine higher education. J. David Judd
Cryptocollege how blockchain can reimagine higher education. J. David Judderaser Juan José Calderón
 

Similaire à Digital inheritance final (18)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. SnowerThe Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
 
Understanding Digital Inheritance.pdf
Understanding Digital Inheritance.pdfUnderstanding Digital Inheritance.pdf
Understanding Digital Inheritance.pdf
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Digital assets
Digital assetsDigital assets
Digital assets
 
Lawek mui
Lawek muiLawek mui
Lawek mui
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITY
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITYWEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITY
WEB 3.0 & IDENTITY: THE NEW ERA OF DIGITAL IDENTITY
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their data
 
Five Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPRFive Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPR
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Cryptocollege how blockchain can reimagine higher education. J. David Judd
Cryptocollege  how blockchain can reimagine higher education. J. David JuddCryptocollege  how blockchain can reimagine higher education. J. David Judd
Cryptocollege how blockchain can reimagine higher education. J. David Judd
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Digital inheritance final

  • 1. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 1 DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES Priyaranjan B Mestri University of Washington
  • 2. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 2 Background Inheritance is the practice of passing on property, titles, debts, rights and obligations upon the death of an individual. It has long played an important role in human societies. The Roman law introduced the concept of universal succession, which is to say that in inheritance law the heirs enter into the legal position regarding property rights Unique Characteristics of Digital Assets Physical assets like books, clothes, accessories etc. can be easily passed on without any legal complications because the laws are formed and defined. But when it comes to digital assets like passwords, access to social network profiles e.g. Facebook, Twitter, Google or Linked In; emails, tweets, databases, digital files and bank accounts, the legal landscape has failed to keep up with the web 2.0 and the rapid technological proliferation.Today, the amount of information accessed and stored online is growing at the speed of lightning. The growing use of email and paperless bill paying has created a situation where vital records are stored-in online accounts only. In addition, more and more information and valuable items are resting on media that are not owned by the data owner but by service provider(e.g. Google, Apple, Microsoft etc.). Also in contrast to physical assets, electronic values can be copied indefinitely, which could be problematic if the asset represents intellectual properties. In contrast to conventional inheritance of physical assets, digital inheritance also needs to cope with the fact that the digital heirs areonly known by their email addresses or mobile numbers. Handing over digital assets requires additional information that may be crucial for a heir to further treat the digital assets. Digital Inheritance and the legal framework Although, the Roman law introduced the concept of universal succession, in which the heirs enter into the legal position regarding property rights of the testator by law. Muslim sharia laws and Bible talks about the inheritance issue, but what about the digital assets who will inherit it. The answer to this new question arising out of internet bubble of early millennium year has been to create a legal framework wherein a person can specify as he does with his physical assets that who should get what, when he is no more.
  • 3. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 3 Some of the problem that came into light recently is related to what happens to the data and information that is password protected and users don't share it with anyone. Some of them could be our secret of life. How can users secure of password or decide what our inheritor could access. All of these questions are becoming very important and Internet users have been wrestling with it. Digital inheritance and the law At present, service providers and content sellers have been slow to react partly because the issue of transference post death of the customer is complex and has been affecting only a limited number of customers. However, these companies and content sellers will be forced to react faster, more so because of the consumers’ demand. Therefore, the debate at present is whether the next of the kin will be granted access to the digital accounts. For example, access to Amazon account if the deceased person ishis or her next of kin and did not have the password. Consequently, there has been an increasing pressure on lawmakers to build broader policies and practical solution to the ongoing confusion and misunderstanding as of now. There has been some legislative progress for surviving family members. At least three states -- Idaho, Nebraska and Indiana have enacted laws that allow next of kin to gain access to digital accounts. Other states, including New York, North Carolina and Oregon, are also considering making changes. To prevent estate issues, digital media owners should plan ahead. Users can specify information passwords and accounts to be passed on in their will. Some data inheritance services have also emerged in recent years, promising a secure place to store documents and passwords that will be passed on to a stated beneficiary upon the account holder's death.
  • 4. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 4 Conclusion and Opinion The digital inheritance and accessibility issues came into light recently after a couple of notable cases and lawsuits against the service providers for not giving the kin access to the digital assets after the death of the owner. People have recently realized that digital assets like bank account details, Facebook access and other digital properties are not transferrable like the physical assets. The concept is fairly new because a large number of people are not aware about the laws and terms and conditions behind the services provided. In addition, digital media and electronic format is a new concept in people’s lives.Since, the concept is very new there is a need to create awareness about the digital rights and the importance of the medium. In my opinion, the best way to approach this problem is by understanding that digital assets are as good as physical assets and should be treated similar to the physical assets. With just one difference i.e. unlike the physical assets digital assets are vulnerable in terms of manipulation, duplication and deletion. Another solution could be encryption of the password and split the password into fragments and distribute it among the heirs. After the owner ceases to exist, these heirs can combine their pieces to find out the password. Companies can provide services to the users or customers wherein the owner could save the digital details or assets in the name of the heir or next of the kin and specify what assets should be given access and pay a nominal fees. Once, the owner is dead the heir can have rightful access to the digital assets. Also, Digital Rights Management (DRM) system or password locker like the Dswiss could be a best solution as it allows access only to the testator and an executor presenting a death certificate. For example: Hotmail has a provision to provide the details and access upon the proof of death such as death certificate and a valid identity of the heir or the kin.
  • 5. DIGITAL INHERITANCE AND ACCESSIBILITY ISSUES 5 Citations “The Legal Issues Arising from Marketing Through Digital Media in the UAE”by David Yates & Yvonne Pah “Legal issues regarding access to digital assets growing” http://www.gallowaycollens.com/blog/2012/10/legal-issues-regarding-access-to-digital- assets-growing.shtml “Digital inheritance” http://en.wikipedia.org/wiki/Digital_inheritance