SlideShare a Scribd company logo
1 of 26
YOUR
DIGITAL INHERITANCE



DR. WENDY MONCUR, FRSA

SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE
VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
LIFE, DEATH &
ASSETS


   BEQUEATHING
   DIGITAL ASSETS



       STEPS TO TAKE?
THE DAYS OF
  OUR YEARS
        ARE
THREESCORE
      YEARS
    AND TEN
(PSALM 90:10, KING JAMES
         BIBLE)
ARE ONLINE & OFFLINE DEATH
          SYNCHRONOUS?




http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
YOUR REAL-LIFE ASSETS


 House
 Car
 Money
 Furniture
 Photos, videos, letters
 Jewellery
 Body
YOUR DIGITAL ASSETS
         Photos
       Blog posts
         Emails
 Social media accounts
    Online contacts
         Video
         Music
         Books
     Memberships
    Online business
   Airmiles accounts
    … and more…
WHERE ARE YOUR
DIGITAL ASSETS?




 Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD.
                Cloud backup service. Memory stick.
                            http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
WHAT ARE THEY WORTH?
UNEXPECTEDLY
USEFUL?




               http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
BEQUEATHING
DIGITAL ASSETS
BEQUEATHING DIGITAL
ASSETS

Can you? Yes, in Oklahoma (House bill 2800)
• social networking site
• micro blogging
• email & short message service websites



Barriers to bequeathal
BARRIERS TO BEQUEATHAL

Awareness of account’s existence
Identity –
actual, pseudonymous, anonymous
Password
Ownership of digital asset




                                   http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
http://info.yahoo.com/legal/uk/yahoo/utos-173.html/
LANCE CORPORAL ELLSWORTH
OTHER INTERNET
SERVICE PROVIDERS

 Facebook: Memorialize or remove the account. Content can be
 downloaded if you have password.                            http://www.facebook.com




 Twitter: remove account or assist family members in saving a
 backup of deceased‟s public Tweets.


 Gmail: May give access if formal evidence of death provided
 http://support.google.com/mail/bin/answer.py?hl=en&answer=14300




 eBay: You cannot “transfer your eBay account (including feedback) and
 user ID to another party without our consent”
 http://pages.ebay.co.uk/help/policies/user-agreement.html



                                                                                       /
DO YOU HAVE
                                                                    SKELETONS IN
                                                                    YOUR CLOSET?




http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet-
153072854
STEPS TO TAKE?
WHAT CAN YOU DO?: 1

Make a list of ALL your digital assets
   - ID, Password, Website


Consider using a software tool to store passwords securely
  • - E.g. LastPass, 1Password, Clipperz, RoboForm
Writing down or sharing your password
may violate the Terms of Service
agreement with your Internet Service
provider.
WHAT CAN YOU DO?: 2
Appoint a Digital Executor

DIY method
  • Family member
  • Friend
  • Colleague
  • Lawyer


Digital estate services

Posthumous email services
DIGITAL ESTATE
SERVICES
Secure online service
    • e.g. Legacy Locker, Entrustnet
    • May demand death certificate as proof of death


Stores your digital inventory

May also store:
•    last wishes
•    instructions for funeral
•    posthumous email
•    instructions in case if brain death
•    eg – Legacy Organiser app
POSTHUMOUS EMAIL
Online service
 • e.g http://www.deadmansswitch.net/


Death may be assumed if you fail to answer 3 emails
from service provider….


Emails sent after you die
DO YOU NEED A DIGITAL
ESTATE SERVICE, OR IS
IT OVERKILL?

Security

Password updates

Number of heirs

Your age & health

How good you are with computers

Triggering action
SUMMARY
Your digital assets are growing daily


Bequeathing them is not simple


You may wish to:
  • Make an inventory of your digital assets
  • Choose:
       • your digital executor
       • What assets you want to pass on, to whom.




                                 Dr. Wendy Moncur
                   http://www.computing.dundee.ac.uk/staff/wmoncur/
Digital Estate   Posthumous         DIY Method
                     Services         emails

Want stringent 3rd            Y         Less stringent          N
party verification

Death cert check              Y               N                 N

Automated digital             Y              1/2                N
executor

Digital „heirs‟           Complex         Complex             Simple

Passwords change              Y               N                 N
often
Open new accounts             Y               N                 N
frequently
Willing to pay for         Maybe           Maybe                N
service

More Related Content

Similar to 2012 turing-security freedom WendyMoncur

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)
KC Marie Knox
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert Advice
Keynectis
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
Rozell Sneede
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
Risk Crew
 

Similar to 2012 turing-security freedom WendyMoncur (20)

Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)Protecting Preserving and Passing Your Digital Estate (2)
Protecting Preserving and Passing Your Digital Estate (2)
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building the Social Web with OpenID
Building the Social Web with OpenIDBuilding the Social Web with OpenID
Building the Social Web with OpenID
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdf
 
Keynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert AdviceKeynectis SSL Certificate - Expert Advice
Keynectis SSL Certificate - Expert Advice
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Creating Your Own Personal Learning Network
Creating Your Own Personal Learning NetworkCreating Your Own Personal Learning Network
Creating Your Own Personal Learning Network
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Protecting cryptocurrency keys
Protecting cryptocurrency keysProtecting cryptocurrency keys
Protecting cryptocurrency keys
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary Access
 
Protecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency KeysProtecting Bitcoin and cryptocurrency Keys
Protecting Bitcoin and cryptocurrency Keys
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 

Recently uploaded

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

2012 turing-security freedom WendyMoncur

  • 1. YOUR DIGITAL INHERITANCE DR. WENDY MONCUR, FRSA SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
  • 2. LIFE, DEATH & ASSETS BEQUEATHING DIGITAL ASSETS STEPS TO TAKE?
  • 3. THE DAYS OF OUR YEARS ARE THREESCORE YEARS AND TEN (PSALM 90:10, KING JAMES BIBLE)
  • 4.
  • 5. ARE ONLINE & OFFLINE DEATH SYNCHRONOUS? http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
  • 6. YOUR REAL-LIFE ASSETS House Car Money Furniture Photos, videos, letters Jewellery Body
  • 7. YOUR DIGITAL ASSETS Photos Blog posts Emails Social media accounts Online contacts Video Music Books Memberships Online business Airmiles accounts … and more…
  • 8. WHERE ARE YOUR DIGITAL ASSETS? Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD. Cloud backup service. Memory stick. http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
  • 9. WHAT ARE THEY WORTH?
  • 10. UNEXPECTEDLY USEFUL? http://jlluesma.deviantart.com/art/Back-Tattoo-133720061
  • 12. BEQUEATHING DIGITAL ASSETS Can you? Yes, in Oklahoma (House bill 2800) • social networking site • micro blogging • email & short message service websites Barriers to bequeathal
  • 13. BARRIERS TO BEQUEATHAL Awareness of account’s existence Identity – actual, pseudonymous, anonymous Password Ownership of digital asset http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
  • 16. OTHER INTERNET SERVICE PROVIDERS Facebook: Memorialize or remove the account. Content can be downloaded if you have password. http://www.facebook.com Twitter: remove account or assist family members in saving a backup of deceased‟s public Tweets. Gmail: May give access if formal evidence of death provided http://support.google.com/mail/bin/answer.py?hl=en&answer=14300 eBay: You cannot “transfer your eBay account (including feedback) and user ID to another party without our consent” http://pages.ebay.co.uk/help/policies/user-agreement.html /
  • 17. DO YOU HAVE SKELETONS IN YOUR CLOSET? http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet- 153072854
  • 19. WHAT CAN YOU DO?: 1 Make a list of ALL your digital assets - ID, Password, Website Consider using a software tool to store passwords securely • - E.g. LastPass, 1Password, Clipperz, RoboForm
  • 20. Writing down or sharing your password may violate the Terms of Service agreement with your Internet Service provider.
  • 21. WHAT CAN YOU DO?: 2 Appoint a Digital Executor DIY method • Family member • Friend • Colleague • Lawyer Digital estate services Posthumous email services
  • 22. DIGITAL ESTATE SERVICES Secure online service • e.g. Legacy Locker, Entrustnet • May demand death certificate as proof of death Stores your digital inventory May also store: • last wishes • instructions for funeral • posthumous email • instructions in case if brain death • eg – Legacy Organiser app
  • 23. POSTHUMOUS EMAIL Online service • e.g http://www.deadmansswitch.net/ Death may be assumed if you fail to answer 3 emails from service provider…. Emails sent after you die
  • 24. DO YOU NEED A DIGITAL ESTATE SERVICE, OR IS IT OVERKILL? Security Password updates Number of heirs Your age & health How good you are with computers Triggering action
  • 25. SUMMARY Your digital assets are growing daily Bequeathing them is not simple You may wish to: • Make an inventory of your digital assets • Choose: • your digital executor • What assets you want to pass on, to whom. Dr. Wendy Moncur http://www.computing.dundee.ac.uk/staff/wmoncur/
  • 26. Digital Estate Posthumous DIY Method Services emails Want stringent 3rd Y Less stringent N party verification Death cert check Y N N Automated digital Y 1/2 N executor Digital „heirs‟ Complex Complex Simple Passwords change Y N N often Open new accounts Y N N frequently Willing to pay for Maybe Maybe N service