SlideShare une entreprise Scribd logo
1  sur  26
YOUR
DIGITAL INHERITANCE



DR. WENDY MONCUR, FRSA

SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE
VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
LIFE, DEATH &
ASSETS


   BEQUEATHING
   DIGITAL ASSETS



       STEPS TO TAKE?
THE DAYS OF
  OUR YEARS
        ARE
THREESCORE
      YEARS
    AND TEN
(PSALM 90:10, KING JAMES
         BIBLE)
ARE ONLINE & OFFLINE DEATH
          SYNCHRONOUS?




http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
YOUR REAL-LIFE ASSETS


 House
 Car
 Money
 Furniture
 Photos, videos, letters
 Jewellery
 Body
YOUR DIGITAL ASSETS
         Photos
       Blog posts
         Emails
 Social media accounts
    Online contacts
         Video
         Music
         Books
     Memberships
    Online business
   Airmiles accounts
    … and more…
WHERE ARE YOUR
DIGITAL ASSETS?




 Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD.
                Cloud backup service. Memory stick.
                            http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
WHAT ARE THEY WORTH?
UNEXPECTEDLY
USEFUL?




               http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
BEQUEATHING
DIGITAL ASSETS
BEQUEATHING DIGITAL
ASSETS

Can you? Yes, in Oklahoma (House bill 2800)
• social networking site
• micro blogging
• email & short message service websites



Barriers to bequeathal
BARRIERS TO BEQUEATHAL

Awareness of account’s existence
Identity –
actual, pseudonymous, anonymous
Password
Ownership of digital asset




                                   http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
http://info.yahoo.com/legal/uk/yahoo/utos-173.html/
LANCE CORPORAL ELLSWORTH
OTHER INTERNET
SERVICE PROVIDERS

 Facebook: Memorialize or remove the account. Content can be
 downloaded if you have password.                            http://www.facebook.com




 Twitter: remove account or assist family members in saving a
 backup of deceased‟s public Tweets.


 Gmail: May give access if formal evidence of death provided
 http://support.google.com/mail/bin/answer.py?hl=en&answer=14300




 eBay: You cannot “transfer your eBay account (including feedback) and
 user ID to another party without our consent”
 http://pages.ebay.co.uk/help/policies/user-agreement.html



                                                                                       /
DO YOU HAVE
                                                                    SKELETONS IN
                                                                    YOUR CLOSET?




http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet-
153072854
STEPS TO TAKE?
WHAT CAN YOU DO?: 1

Make a list of ALL your digital assets
   - ID, Password, Website


Consider using a software tool to store passwords securely
  • - E.g. LastPass, 1Password, Clipperz, RoboForm
Writing down or sharing your password
may violate the Terms of Service
agreement with your Internet Service
provider.
WHAT CAN YOU DO?: 2
Appoint a Digital Executor

DIY method
  • Family member
  • Friend
  • Colleague
  • Lawyer


Digital estate services

Posthumous email services
DIGITAL ESTATE
SERVICES
Secure online service
    • e.g. Legacy Locker, Entrustnet
    • May demand death certificate as proof of death


Stores your digital inventory

May also store:
•    last wishes
•    instructions for funeral
•    posthumous email
•    instructions in case if brain death
•    eg – Legacy Organiser app
POSTHUMOUS EMAIL
Online service
 • e.g http://www.deadmansswitch.net/


Death may be assumed if you fail to answer 3 emails
from service provider….


Emails sent after you die
DO YOU NEED A DIGITAL
ESTATE SERVICE, OR IS
IT OVERKILL?

Security

Password updates

Number of heirs

Your age & health

How good you are with computers

Triggering action
SUMMARY
Your digital assets are growing daily


Bequeathing them is not simple


You may wish to:
  • Make an inventory of your digital assets
  • Choose:
       • your digital executor
       • What assets you want to pass on, to whom.




                                 Dr. Wendy Moncur
                   http://www.computing.dundee.ac.uk/staff/wmoncur/
Digital Estate   Posthumous         DIY Method
                     Services         emails

Want stringent 3rd            Y         Less stringent          N
party verification

Death cert check              Y               N                 N

Automated digital             Y              1/2                N
executor

Digital „heirs‟           Complex         Complex             Simple

Passwords change              Y               N                 N
often
Open new accounts             Y               N                 N
frequently
Willing to pay for         Maybe           Maybe                N
service

Contenu connexe

Similaire à 2012 turing-security freedom WendyMoncur

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)KC Marie Knox
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenIDSimon Willison
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theftguest3151b0
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfBarbara O'Neill
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCarl Keller
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keysdimitrist
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessHoward Collens
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keysdimitrist
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 

Similaire à 2012 turing-security freedom WendyMoncur (20)

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenID
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdf
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert Advice
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning Network
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keys
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary Access
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

2012 turing-security freedom WendyMoncur

  • 1. YOUR DIGITAL INHERITANCE DR. WENDY MONCUR, FRSA SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
  • 2. LIFE, DEATH & ASSETS BEQUEATHING DIGITAL ASSETS STEPS TO TAKE?
  • 3. THE DAYS OF OUR YEARS ARE THREESCORE YEARS AND TEN (PSALM 90:10, KING JAMES BIBLE)
  • 4.
  • 5. ARE ONLINE & OFFLINE DEATH SYNCHRONOUS? http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
  • 6. YOUR REAL-LIFE ASSETS House Car Money Furniture Photos, videos, letters Jewellery Body
  • 7. YOUR DIGITAL ASSETS Photos Blog posts Emails Social media accounts Online contacts Video Music Books Memberships Online business Airmiles accounts … and more…
  • 8. WHERE ARE YOUR DIGITAL ASSETS? Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD. Cloud backup service. Memory stick. http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
  • 9. WHAT ARE THEY WORTH?
  • 10. UNEXPECTEDLY USEFUL? http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
  • 12. BEQUEATHING DIGITAL ASSETS Can you? Yes, in Oklahoma (House bill 2800) • social networking site • micro blogging • email & short message service websites Barriers to bequeathal
  • 13. BARRIERS TO BEQUEATHAL Awareness of account’s existence Identity – actual, pseudonymous, anonymous Password Ownership of digital asset http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
  • 16. OTHER INTERNET SERVICE PROVIDERS Facebook: Memorialize or remove the account. Content can be downloaded if you have password. http://www.facebook.com Twitter: remove account or assist family members in saving a backup of deceased‟s public Tweets. Gmail: May give access if formal evidence of death provided http://support.google.com/mail/bin/answer.py?hl=en&answer=14300 eBay: You cannot “transfer your eBay account (including feedback) and user ID to another party without our consent” http://pages.ebay.co.uk/help/policies/user-agreement.html /
  • 17. DO YOU HAVE SKELETONS IN YOUR CLOSET? http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet- 153072854
  • 19. WHAT CAN YOU DO?: 1 Make a list of ALL your digital assets - ID, Password, Website Consider using a software tool to store passwords securely • - E.g. LastPass, 1Password, Clipperz, RoboForm
  • 20. Writing down or sharing your password may violate the Terms of Service agreement with your Internet Service provider.
  • 21. WHAT CAN YOU DO?: 2 Appoint a Digital Executor DIY method • Family member • Friend • Colleague • Lawyer Digital estate services Posthumous email services
  • 22. DIGITAL ESTATE SERVICES Secure online service • e.g. Legacy Locker, Entrustnet • May demand death certificate as proof of death Stores your digital inventory May also store: • last wishes • instructions for funeral • posthumous email • instructions in case if brain death • eg – Legacy Organiser app
  • 23. POSTHUMOUS EMAIL Online service • e.g http://www.deadmansswitch.net/ Death may be assumed if you fail to answer 3 emails from service provider…. Emails sent after you die
  • 24. DO YOU NEED A DIGITAL ESTATE SERVICE, OR IS IT OVERKILL? Security Password updates Number of heirs Your age & health How good you are with computers Triggering action
  • 25. SUMMARY Your digital assets are growing daily Bequeathing them is not simple You may wish to: • Make an inventory of your digital assets • Choose: • your digital executor • What assets you want to pass on, to whom. Dr. Wendy Moncur http://www.computing.dundee.ac.uk/staff/wmoncur/
  • 26. Digital Estate Posthumous DIY Method Services emails Want stringent 3rd Y Less stringent N party verification Death cert check Y N N Automated digital Y 1/2 N executor Digital „heirs‟ Complex Complex Simple Passwords change Y N N often Open new accounts Y N N frequently Willing to pay for Maybe Maybe N service