SlideShare a Scribd company logo
ERASING YOUR DIGITAL
FOOTPRINT – USING MICHIGAN’S
FIDUCIARY ACCESS TO DIGITAL
ASSETS ACT
HOWARD H. COLLENS
GALLOWAY AND COLLENS, PLLC
CREATING YOUR DIGITAL
FOOTPRINT
Photo courtesy - http://www.digitalfamilysummit.com/2012/safety-protecting-your-digital-footprint/
CREATING YOUR DIGITAL
FOOTPRINT
Source: Pew Research Center
CREATING YOUR DIGITAL
FOOTPRINT
Source: Pew Research Center
CREATING YOUR DIGITAL
FOOTPRINT: SOCIAL NETWORKS
Source: May 2012 Google Ad planner: plusdemographics.com
CREATING YOUR DIGITAL
FOOTPRINT
Source: 2010 Generations Online, Pew Internet and American Life Project
What are Digital Assets?
• Digital assets come in a variety of forms, and are constantly changing,
along with technology and social trends.
• An individual may have a property ownership interest in an asset, or
merely a license.
• The term “digital assets” means, but is not limited to, files, including but not
limited to, emails, documents, images, audio, video, and similar digital
files which currently exist or may exist as technology develops or
such comparable items as technology develops, stored on digital devices,
including, but not limited to, desktops, laptops, tablets, peripherals, storage
devices, mobile telephones, smart phones, and any similar digital device
which currently exists or may exist as technology develops or such
comparable items as technology develops, regardless of the ownership of
the physical device upon which the digital asset is stored.
Excerpt from: The Elder Law Report, Vol. XXV, Number 1
Categories of Digital Assets
• Personal
• Stored on computers, smart phones, or other devices, or are uploaded to a
Web site or digital service
• Photographs, videos, emails, and music playlist
• Social Media
• May involve photos, videos and other electronic files stored on these accounts
• Financial
• Online banking, online bill-paying activities
• Online accounts with no connection to a brick-and-mortar establishment
(Amazon, eBay, PayPal and E*TRADE, BitCoin)
• Business
• Varies by types of business and extent of its computer or Internet associated
activities, which may include blogs, domain names, credit card and financial
data
What Happens When a Person
Becomes Incapacitated or Dies?
Could someone else,
acting on your behalf, gain access to
your digital assets?
What if the person was deceased?
Would you want them to be able to?
Access to Digital Assets
would be challenging, if
not impossible, without a
Fiduciary Access to
Digital Assets law
• In 2011, the Uniform Law Commission established
the Fiduciary Access to Digital Assets Committee
to draft a free-standing act that will vest fiduciaries
with the authority to manage and distribute digital
assets, copy or delete digital assets, and access
digital assets
• July 2014 the ULC introduced 1st version of a Uniform
Fiduciary Access to Digital Assets Act (UFADAA)
• Only Delaware adopted law based on 2014 version
• In July 2015, the ULC developed a revised UFADAA
The UFADAA:
• Gives Account Holder control over whether digital
assets should be preserved, distributed or destroyed
• Authorizes access to digital assets that would not
violate the Federal Stored Communications Act, 18
USC 2701 and Computer Fraud and Abuse Act, 18
USC 1030
The UFADAA:
• If widely adopted, provides consistency throughout the
country
• Authorizes access by:
• Agent under Power of Attorney
• Conservator
• Personal Representative
• Trustee
Where Are We Now?
(as of November 2016)
• Twenty states have currently passed some form of
Fiduciary Access to Digital Assets Act. California also
passed a partial version that deals with decedents’ estates
only.
• Two states, Ohio and New Jersey, have legislation
pending. These two states’ legislatures are in session and
have active bills that could still pass in 2016.
• Twenty nine states have plans to introduce a RUFADAA
bill in 2017. If they are all enacted, we will have near-
universal enactment in the U.S.
- Benjamin Orzeske, Chief Counsel of the Uniform Law Commission
RUFADAA Enactment Map
http://www.uniformlaws.org/Act.aspx?title=Fiduciary%20Access%20to%20Digital%20Assets%20Act,%20Revised%20(2015)
Michigan and FADA
• HB 5034 was introduced, October 28, 2015 by Representative
Anthony Forlini
• Based on the ULC revised approach, HB 5034 offered a
comprehensive approach to Fiduciary Access to Digital Assets for
Michigan
• Joint Efforts of Elder Law and Disability Rights Section and Probate
and Estate Planning Sections to represent the interests of end users
Michigan and FADA
• HB 5034 became law in March 2016
• Effective as of June 27, 2016
• Codified at MCL 700.1001 et seq.
http://www.legislature.mi.gov/(S(lbtllxurzntu2irpvxgxznb3))/mileg.aspx?page=getObject&objectName=mcl-Act-59-of-2016
Michigan’s
Fiduciary Access to Digital Assets Act
FADA Applies to:
• Fiduciary acting under a will or power of attorney
• Personal representative acting for a decedent estate
• Proceeding involving a conservator
• Trustee acting under a trust
• Digital custodian if the user resides in this state
• Does not apply to a digital asset of an employer used by an
employee in the ordinary course of business
Michigan’s
Fiduciary Access to Digital Assets Act
• What is a Digital Asset? - An electronic record in which a
user has a right or interest. Does not include an underlying
asset or liability unless the asset or liability is itself an
electronic record.
• Access to the bank account vs. the money in the bank
Catalogue and Content – Why it Matters
•Those who plan will be
rewarded
•Those who don’t will
be punished
Michigan’s
Fiduciary Access to Digital Assets Act
Accessing Content vs. Catalogue
• Personal Representatives
• Power of Attorney
• Trustee
• Conservator
Michigan’s
Fiduciary Access to Digital Assets Act
HOW MUCH ACCESS DOES THE DIGITAL CUSTODIAN
NEED TO PROVIDE?
• At the Digital Custodian’s SOLE DISCRETION, they may
• Grant a fiduciary or designated recipient full access to the user's
account.
• Grant a fiduciary or designated recipient partial access to the
user's account sufficient to perform the tasks with which the
fiduciary or designated recipient is charged.
• Provide a fiduciary or designated recipient a copy in a record of any
digital asset that, on the date the digital custodian received the
request for disclosure, the user could have accessed if the user
were alive and had full capacity and access to the account.
Michigan’s
Fiduciary Access to Digital Assets Act
HOW MUCH ACCESS DOES THE DIGITAL CUSTODIAN
NEED TO PROVIDE?
• A digital custodian may assess a reasonable administrative charge
• A digital custodian is not required to disclose a digital asset deleted by a
user
• If only a request for some but not all of the digital assets and if
segregation would impose an undue burden on the digital custodian, the
digital custodian may seek a court order to disclose some, all or
none of the digital assets.
Michigan’s
Fiduciary Access to Digital Assets Act
• Digital custodians shall comply with the requests for disclosure by
Fiduciary within 56 days of receipt of required information.
• If the digital custodian fails to comply, the fiduciary may petition
the court for an order directing compliance.
• A fiduciary as well as digital custodian are immune from liability
for any action done in good faith in compliance with this act.
Michigan’s
Fiduciary Access to Digital Assets Act
• A digital custodian may require a fiduciary or designated recipient
who requests disclosure or termination of an account to obtain a
court order that:
• Specifies that an account belongs to the protected person or
principal.
• Specifies that there is sufficient consent from the protected
person or principal to support the requested disclosure.
• Contains a finding required by law other than this act.
Michigan’s
Fiduciary Access to Digital Assets Act
• An interested person may petition the probate court to limit,
eliminate, or modify the personal representative's powers with
respect to the decedent's digital assets.
• Hearing shall be heard within 14 and 56 days of filing the petition.
ERASING YOUR DIGITAL
FOOTPRINT
Photo courtesy - http://www.digitalfamilysummit.com/2012/safety-protecting-your-digital-footprint/
Facebook
Memorialize the account
“We will memorialize the Facebook account of a deceased person when we receive a valid
request. We try to prevent references to memorialized accounts from appearing on
Facebook in ways that may be upsetting to the person's friends and family, and we also take
measures to protect the privacy of the deceased person by securing the account.
Please keep in mind that we cannot provide login information for a memorialized
account. It is always a violation of our policies to log into another person's account.”
• Memorial accounts can never be logged into again
Ask to have profile removed or deleted
“We will process certain special requests for verified immediate family members, including
requests to remove their loved one's account. This will completely remove the profile and all
associated content from Facebook, so no one can view it.”
Need to submit
• The deceased's birth certificate
• The deceased's death certificate
• Proof of authority under local law that you are the lawful representative of the
deceased or his/her estate
From: Facebook
Facebook
Legacy Contact is someone you choose to look after your account if it's memorialized. Once your account
is memorialized, your legacy contact will have the option to do things like:
• Write a pinned post for your profile (ex: to share a final message on your behalf or provide information
about a memorial service)
• Respond to new friend requests (ex: old friends or family members who weren't yet on Facebook)
• Update your profile picture and cover photo
• You also have the option to allow your legacy contact to download a copy of what
you've shared on Facebook, and we may add additional capabilities for legacy contacts in
the future.
Your legacy contact can't:
• Log into your account
• Remove or change past posts, photos and other things shared on your Timeline
• Read messages you've sent to other friends
• Remove any of your friends
From: Facebook
Twitter
“In the event of the death of a Twitter user, we can work with a person authorized to act on the
behalf of the estate or with a verified immediate family member of the deceased to have an
account deactivated.
In order for us to process an account deactivation, please provide us with all of the following
information:
The username of the deceased user's Twitter account (e.g., @username or
twitter.com/username)
A copy of the deceased user’s death certificate
A copy of your government-issued ID (e.g., driver’s license)
A signed statement including:
Your first and last name
Your email address
Your current contact information
Your relationship to the deceased user or their estate
Action requested (e.g., ‘please deactivate the Twitter account’)
A brief description of the details that evidence this account belongs to the
deceased, if the name on the account does not match the name on death
certificate.
A link to an online obituary or a copy of the obituary from a local newspaper
(optional)”
From Twitter: How to Contact Twitter About a Deceased User
Twitter
“Please send us the documentation by fax or mail to the following address:
Twitter, Inc.
c/o: Trust & Safety
1355 Market St., Suite 900
San Francisco, CA 94103
Fax : 1-415-865-5405”
*Please note: We are unable to provide login information for the
account to anyone regardless of his or her relationship to the
deceased.*
From Twitter: How to Contact Twitter About a Deceased User
Google Inactive Account Manager
• Can be set up through Google Settings
• Lets Google know what to do with some or all Google related
accounts after a specified period of inactivity
• Services that can be controlled: +1s; Blogger; Contacts and
Circles; Drive; Gmail; Google+ Profiles, Pages and Streams;
Picasa Web Albums; Google Voice and YouTube
• Google sends a warning text and email before action is taken
• Can have Google delete the accounts
• What about items bought on Google Play?
Directive Communication Systems
DCS provides estate management solutions to attorneys and personal representatives, providing them
with one source to manage digital assets which can include deletion, memorialization, etc. of accounts
DCS provides personal representatives:
• Control over timing of estate communication distribution
• Clarity in identifying financial and other accounts
• Straightforward instructions for providing directives to personal account holding institutions
• Relief from the arduous task of tracking down institution information
• The ability to separate business decisions from emotional decisions
Types of Accounts:
• Money and banking
• Finance and investment
• Travel and loyalty
• Shopping and rewards
From: DCS
Provide Access
• Create a document and note if the property is personal
or has monetary value
Examples of note
Excerpt from: The Trust Advisor
Provide Instructions:
• If you want a site to continue, for example if you have a
website or blog, you need to leave instructions for keeping
it up or having someone take it over and continue it.
• If a site is currently producing or could produce revenue (e-
books, photography, videos, blogs), make sure your
successor knows this.
• If there are things on your computer or hard drive that you
want to pass on (scanned family photos, ancestry research,
a book you have been writing), put them in a “Do Not
Delete” folder and include it on your inventory list.
Excerpt from: Estate Planning for Digital Assets and Social Media
Inventory Checklist
• Make sure you include everything from your computer,
other devices, and the “virtual world” (i.e. cloud,
internet)
• All email accounts
• All social websites you participate in
• Financial and commerce accounts
• Make a simple spreadsheet with passwords to access
assets
Digital Assets Inventory
Asset Access Wishes
Name Contents Location Username Password Instructions Recipient
Who is in Charge?
• After you inventory your digital assets, you must decide
who to give the access to in the event of your death or
disability.
• Make sure you indicate whether you want your digital
executor to archive your content, share your content
with others, or delete your content (and/or secure
privacy of some content which may be harmful).
• Make sure to include any special instructions (Think
sensitive and/or embarrassing content).
Incorporating Digital Estate Planning
into Your Estate Plan
• To help the process, complete a questionnaire to list all digital assets and
the value of those assets
• Discuss if any of the assets have financial value
• Keep a record of all passwords and profiles
• There are websites specifically designed to release account
information after death to designated beneficiaries but they may be
here today gone tomorrow.
• Protect significant data with strong encryption
• Speak to an Estate Planning Attorney about your legal needs
Test Out Our New Law
• Now that FADA is here in Michigan:
• What Works?
• What Needs Improving?
• Have You Been Able To Use The New Law To
Access Someone Else’s Digital Assets?
• I would love to hear how you experience
Fiduciary Access to Digital Assets
Howard H. Collens
Galloway and Collens, PLLC
26075 Woodward Ave, Suite 200
Huntington Woods, Michigan 48070
248.545.2500
GallowayCollens.com
Howard@GallowayCollens.com
Twitter: @howardcollens
@probatelawmi
@realestatelawmi

More Related Content

PPTX
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
PPTX
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
PPTX
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
PPTX
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
PPTX
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
PPTX
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
PPTX
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
PDF
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed

What's hot (20)

PPTX
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
PPTX
Update on Access to Digital Assets: Are We There Yet?
PPTX
Digital Assets and Estate Planning
PPTX
Developing Countries National ICT Identity Governance Strategy
PPTX
Social Media & Legal Risk
PPTX
Cdas 2012, lilian edwards and edina harbinja
PPTX
Global & National Identity Projects Failures and Successes
PPTX
Social media and the future of e-discovery
PPTX
Data Protection & Risk Management
PPTX
IAB Online Content Regulation: Trends
PPTX
Digital Immortality, Digital Atlanta 2012
PPTX
Cyber Banking Conference
PDF
Cloud primer
PPTX
GDPR for Dummies
PPTX
Cloud Security Law Issues--an Overview
PPTX
Internet of Things TCLG Oct 23 2014
PPT
IIW-11 NSTIC Update
PPT
Privacy and Data Security: Risk Management and Avoidance
PDF
piiLabsSeattleWorkshop_ChristinaGagnier
PDF
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Update on Access to Digital Assets: Are We There Yet?
Digital Assets and Estate Planning
Developing Countries National ICT Identity Governance Strategy
Social Media & Legal Risk
Cdas 2012, lilian edwards and edina harbinja
Global & National Identity Projects Failures and Successes
Social media and the future of e-discovery
Data Protection & Risk Management
IAB Online Content Regulation: Trends
Digital Immortality, Digital Atlanta 2012
Cyber Banking Conference
Cloud primer
GDPR for Dummies
Cloud Security Law Issues--an Overview
Internet of Things TCLG Oct 23 2014
IIW-11 NSTIC Update
Privacy and Data Security: Risk Management and Avoidance
piiLabsSeattleWorkshop_ChristinaGagnier
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
Ad

Viewers also liked (16)

PPTX
#diggeroslo and Oslo's digital footprint
PPTX
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
PPTX
Towards a Digital Ecology: The New Organization's Digital Footprint
KEY
Your Digital Footprint
PPS
Digital Footprints
PPTX
What’s your Digital Footprint?
PPT
My Digital Footprint
PDF
Online & More: Is Your Digital Footprint in the Digital Age?
PPT
DIGITAL FOOTPRINTS
PPTX
Build a positive digital footprint 3
PPT
Digital Footprints Presentation
PPT
Digital footprints& datamining
PPTX
Digital footprint powerpoint
PDF
Digital Footprints, Safety & Citizenship
PPTX
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
PPT
Discrete Mathematics - All chapters
#diggeroslo and Oslo's digital footprint
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
Towards a Digital Ecology: The New Organization's Digital Footprint
Your Digital Footprint
Digital Footprints
What’s your Digital Footprint?
My Digital Footprint
Online & More: Is Your Digital Footprint in the Digital Age?
DIGITAL FOOTPRINTS
Build a positive digital footprint 3
Digital Footprints Presentation
Digital footprints& datamining
Digital footprint powerpoint
Digital Footprints, Safety & Citizenship
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Discrete Mathematics - All chapters
Ad

Similar to Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital Assets Act (20)

PPTX
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
PPTX
Digital estate planning
PDF
Your Digital Afterlife: What happens to your digital memories when you die? ...
PDF
Privacy law-update-whitmeyer-tuffin
PPTX
National ICT & Healthcare Strategy
PPTX
National Identity ICT Defence and Intelligence Strategy
PPSX
June 2016 social media in legal investigations - final (for distribution)
PPSX
Social Media in Legal Investigations
PDF
What happens with a deceased person's social media accounts
PPTX
Pli workplace privacy in the year 2013 2013-6-13
PPTX
140226 TYLA Success Slidedeck
PPTX
Digital Assets: A Path To Fiduciary Access
PPTX
TYLA New Lawyer Talk
PDF
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
PPT
Anita Fineberg Step 2012 Branch Sept. 19. 12
PPTX
National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud ...
PPTX
Internet cybercrime,ebanking and security
PPTX
Mitigating Risk of Website Accessibility Lawsuits
PPT
Cyber Facts and Prevention Presentation Gianino
PPTX
Cyber Law slides of E commerce and legal issues
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Digital estate planning
Your Digital Afterlife: What happens to your digital memories when you die? ...
Privacy law-update-whitmeyer-tuffin
National ICT & Healthcare Strategy
National Identity ICT Defence and Intelligence Strategy
June 2016 social media in legal investigations - final (for distribution)
Social Media in Legal Investigations
What happens with a deceased person's social media accounts
Pli workplace privacy in the year 2013 2013-6-13
140226 TYLA Success Slidedeck
Digital Assets: A Path To Fiduciary Access
TYLA New Lawyer Talk
5 Key Things to Know About eDiscovery and How to Implement Them in Your Practice
Anita Fineberg Step 2012 Branch Sept. 19. 12
National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud ...
Internet cybercrime,ebanking and security
Mitigating Risk of Website Accessibility Lawsuits
Cyber Facts and Prevention Presentation Gianino
Cyber Law slides of E commerce and legal issues

More from gallowayandcollens (20)

PPTX
Setting Every Community Up for Retirement Enhancement (SECURE) Act
PPTX
Hoarding Issues Impacting Realtors
PPTX
Problems with Unfunded Revocable Trusts
PPTX
Social Media for Business
PPTX
Galloway and Collens, PLLC Firm Overview
PPTX
Trusts 101: Ethical Considerations
PPTX
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014
PPTX
Lichtenberg Financial Decision Screening Scale
PPTX
NBI 2014 Probate Process from Start to Finish - Administering the Estate Effe...
PPTX
Understanding Hoarding Disorder Presentation - Spring 2014
PPTX
Social Media and Estate Planning presented to Wayne State University Law Scho...
PPTX
Organ Donations and Funeral Practices Summer 2013
PPTX
Estate Planning in the Digital Age - Fall 2012
PPTX
Estate planning essentials the sandwich generation fall 2012
PDF
Estate Planning in the Digital Age
PPTX
Limited Liability Companies and Realtors, Summer 2012
PDF
Estate Planning for the Digital Age
PPT
Designations of Patient Advocate 3.12.12
PPT
Designations of Patient Advocate -Huntington Woods Lunch Bunch 3.12.12
PPTX
Estate Planning in the Digital Age
Setting Every Community Up for Retirement Enhancement (SECURE) Act
Hoarding Issues Impacting Realtors
Problems with Unfunded Revocable Trusts
Social Media for Business
Galloway and Collens, PLLC Firm Overview
Trusts 101: Ethical Considerations
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014
Lichtenberg Financial Decision Screening Scale
NBI 2014 Probate Process from Start to Finish - Administering the Estate Effe...
Understanding Hoarding Disorder Presentation - Spring 2014
Social Media and Estate Planning presented to Wayne State University Law Scho...
Organ Donations and Funeral Practices Summer 2013
Estate Planning in the Digital Age - Fall 2012
Estate planning essentials the sandwich generation fall 2012
Estate Planning in the Digital Age
Limited Liability Companies and Realtors, Summer 2012
Estate Planning for the Digital Age
Designations of Patient Advocate 3.12.12
Designations of Patient Advocate -Huntington Woods Lunch Bunch 3.12.12
Estate Planning in the Digital Age

Recently uploaded (20)

PDF
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
PPTX
PoSH act in a nutshell by Lovely Kumari .pptx
PPT
Gender sensitivity and fair language implementation
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
PDF
8-14-25 Examiner Report from NJ Bankruptcy (Heller)
PPTX
4-D...Preparation of Research Design.pptx
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
PPTX
prenuptial agreement ppt my by a phd scholar
PPTX
Income under income Tax Act..pptx Introduction
PDF
AI in Modern Warfare and Business Ethics Ortynska Law Ventures Cafe.pdf
PPTX
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
PPTX
Sexual Harassment Prevention training class
PPT
looking_into_the_crystal_ball - Merger Control .ppt
PPT
Understanding the Impact of the Cyber Act
PPTX
BL - Chapter 1 - Law and Legal Reasoning
PPTX
Indian Medical Device Rules or Institute of Management Development and Research
PPTX
Law of Torts , unit I for BA.LLB integrated course
PPTX
Constitutional Law 2 Final Report.ppt bill of rights in under the constitution
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
PDF
AHRP LB - OJK’s New Rules Updating Electronic Shareholders Meetings Introduci...
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
PoSH act in a nutshell by Lovely Kumari .pptx
Gender sensitivity and fair language implementation
Vinayaka Mission Law School Courses and Infrastructure.pdf
8-14-25 Examiner Report from NJ Bankruptcy (Heller)
4-D...Preparation of Research Design.pptx
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
prenuptial agreement ppt my by a phd scholar
Income under income Tax Act..pptx Introduction
AI in Modern Warfare and Business Ethics Ortynska Law Ventures Cafe.pdf
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
Sexual Harassment Prevention training class
looking_into_the_crystal_ball - Merger Control .ppt
Understanding the Impact of the Cyber Act
BL - Chapter 1 - Law and Legal Reasoning
Indian Medical Device Rules or Institute of Management Development and Research
Law of Torts , unit I for BA.LLB integrated course
Constitutional Law 2 Final Report.ppt bill of rights in under the constitution
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
AHRP LB - OJK’s New Rules Updating Electronic Shareholders Meetings Introduci...

Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital Assets Act

  • 1. ERASING YOUR DIGITAL FOOTPRINT – USING MICHIGAN’S FIDUCIARY ACCESS TO DIGITAL ASSETS ACT HOWARD H. COLLENS GALLOWAY AND COLLENS, PLLC
  • 2. CREATING YOUR DIGITAL FOOTPRINT Photo courtesy - http://www.digitalfamilysummit.com/2012/safety-protecting-your-digital-footprint/
  • 5. CREATING YOUR DIGITAL FOOTPRINT: SOCIAL NETWORKS Source: May 2012 Google Ad planner: plusdemographics.com
  • 6. CREATING YOUR DIGITAL FOOTPRINT Source: 2010 Generations Online, Pew Internet and American Life Project
  • 7. What are Digital Assets? • Digital assets come in a variety of forms, and are constantly changing, along with technology and social trends. • An individual may have a property ownership interest in an asset, or merely a license. • The term “digital assets” means, but is not limited to, files, including but not limited to, emails, documents, images, audio, video, and similar digital files which currently exist or may exist as technology develops or such comparable items as technology develops, stored on digital devices, including, but not limited to, desktops, laptops, tablets, peripherals, storage devices, mobile telephones, smart phones, and any similar digital device which currently exists or may exist as technology develops or such comparable items as technology develops, regardless of the ownership of the physical device upon which the digital asset is stored. Excerpt from: The Elder Law Report, Vol. XXV, Number 1
  • 8. Categories of Digital Assets • Personal • Stored on computers, smart phones, or other devices, or are uploaded to a Web site or digital service • Photographs, videos, emails, and music playlist • Social Media • May involve photos, videos and other electronic files stored on these accounts • Financial • Online banking, online bill-paying activities • Online accounts with no connection to a brick-and-mortar establishment (Amazon, eBay, PayPal and E*TRADE, BitCoin) • Business • Varies by types of business and extent of its computer or Internet associated activities, which may include blogs, domain names, credit card and financial data
  • 9. What Happens When a Person Becomes Incapacitated or Dies?
  • 10. Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to?
  • 11. Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law
  • 12. • In 2011, the Uniform Law Commission established the Fiduciary Access to Digital Assets Committee to draft a free-standing act that will vest fiduciaries with the authority to manage and distribute digital assets, copy or delete digital assets, and access digital assets
  • 13. • July 2014 the ULC introduced 1st version of a Uniform Fiduciary Access to Digital Assets Act (UFADAA) • Only Delaware adopted law based on 2014 version • In July 2015, the ULC developed a revised UFADAA
  • 14. The UFADAA: • Gives Account Holder control over whether digital assets should be preserved, distributed or destroyed • Authorizes access to digital assets that would not violate the Federal Stored Communications Act, 18 USC 2701 and Computer Fraud and Abuse Act, 18 USC 1030
  • 15. The UFADAA: • If widely adopted, provides consistency throughout the country • Authorizes access by: • Agent under Power of Attorney • Conservator • Personal Representative • Trustee
  • 16. Where Are We Now? (as of November 2016) • Twenty states have currently passed some form of Fiduciary Access to Digital Assets Act. California also passed a partial version that deals with decedents’ estates only. • Two states, Ohio and New Jersey, have legislation pending. These two states’ legislatures are in session and have active bills that could still pass in 2016. • Twenty nine states have plans to introduce a RUFADAA bill in 2017. If they are all enacted, we will have near- universal enactment in the U.S. - Benjamin Orzeske, Chief Counsel of the Uniform Law Commission
  • 18. Michigan and FADA • HB 5034 was introduced, October 28, 2015 by Representative Anthony Forlini • Based on the ULC revised approach, HB 5034 offered a comprehensive approach to Fiduciary Access to Digital Assets for Michigan • Joint Efforts of Elder Law and Disability Rights Section and Probate and Estate Planning Sections to represent the interests of end users
  • 19. Michigan and FADA • HB 5034 became law in March 2016 • Effective as of June 27, 2016 • Codified at MCL 700.1001 et seq. http://www.legislature.mi.gov/(S(lbtllxurzntu2irpvxgxznb3))/mileg.aspx?page=getObject&objectName=mcl-Act-59-of-2016
  • 20. Michigan’s Fiduciary Access to Digital Assets Act FADA Applies to: • Fiduciary acting under a will or power of attorney • Personal representative acting for a decedent estate • Proceeding involving a conservator • Trustee acting under a trust • Digital custodian if the user resides in this state • Does not apply to a digital asset of an employer used by an employee in the ordinary course of business
  • 21. Michigan’s Fiduciary Access to Digital Assets Act • What is a Digital Asset? - An electronic record in which a user has a right or interest. Does not include an underlying asset or liability unless the asset or liability is itself an electronic record. • Access to the bank account vs. the money in the bank
  • 22. Catalogue and Content – Why it Matters •Those who plan will be rewarded •Those who don’t will be punished
  • 23. Michigan’s Fiduciary Access to Digital Assets Act Accessing Content vs. Catalogue • Personal Representatives • Power of Attorney • Trustee • Conservator
  • 24. Michigan’s Fiduciary Access to Digital Assets Act HOW MUCH ACCESS DOES THE DIGITAL CUSTODIAN NEED TO PROVIDE? • At the Digital Custodian’s SOLE DISCRETION, they may • Grant a fiduciary or designated recipient full access to the user's account. • Grant a fiduciary or designated recipient partial access to the user's account sufficient to perform the tasks with which the fiduciary or designated recipient is charged. • Provide a fiduciary or designated recipient a copy in a record of any digital asset that, on the date the digital custodian received the request for disclosure, the user could have accessed if the user were alive and had full capacity and access to the account.
  • 25. Michigan’s Fiduciary Access to Digital Assets Act HOW MUCH ACCESS DOES THE DIGITAL CUSTODIAN NEED TO PROVIDE? • A digital custodian may assess a reasonable administrative charge • A digital custodian is not required to disclose a digital asset deleted by a user • If only a request for some but not all of the digital assets and if segregation would impose an undue burden on the digital custodian, the digital custodian may seek a court order to disclose some, all or none of the digital assets.
  • 26. Michigan’s Fiduciary Access to Digital Assets Act • Digital custodians shall comply with the requests for disclosure by Fiduciary within 56 days of receipt of required information. • If the digital custodian fails to comply, the fiduciary may petition the court for an order directing compliance. • A fiduciary as well as digital custodian are immune from liability for any action done in good faith in compliance with this act.
  • 27. Michigan’s Fiduciary Access to Digital Assets Act • A digital custodian may require a fiduciary or designated recipient who requests disclosure or termination of an account to obtain a court order that: • Specifies that an account belongs to the protected person or principal. • Specifies that there is sufficient consent from the protected person or principal to support the requested disclosure. • Contains a finding required by law other than this act.
  • 28. Michigan’s Fiduciary Access to Digital Assets Act • An interested person may petition the probate court to limit, eliminate, or modify the personal representative's powers with respect to the decedent's digital assets. • Hearing shall be heard within 14 and 56 days of filing the petition.
  • 29. ERASING YOUR DIGITAL FOOTPRINT Photo courtesy - http://www.digitalfamilysummit.com/2012/safety-protecting-your-digital-footprint/
  • 30. Facebook Memorialize the account “We will memorialize the Facebook account of a deceased person when we receive a valid request. We try to prevent references to memorialized accounts from appearing on Facebook in ways that may be upsetting to the person's friends and family, and we also take measures to protect the privacy of the deceased person by securing the account. Please keep in mind that we cannot provide login information for a memorialized account. It is always a violation of our policies to log into another person's account.” • Memorial accounts can never be logged into again Ask to have profile removed or deleted “We will process certain special requests for verified immediate family members, including requests to remove their loved one's account. This will completely remove the profile and all associated content from Facebook, so no one can view it.” Need to submit • The deceased's birth certificate • The deceased's death certificate • Proof of authority under local law that you are the lawful representative of the deceased or his/her estate From: Facebook
  • 31. Facebook Legacy Contact is someone you choose to look after your account if it's memorialized. Once your account is memorialized, your legacy contact will have the option to do things like: • Write a pinned post for your profile (ex: to share a final message on your behalf or provide information about a memorial service) • Respond to new friend requests (ex: old friends or family members who weren't yet on Facebook) • Update your profile picture and cover photo • You also have the option to allow your legacy contact to download a copy of what you've shared on Facebook, and we may add additional capabilities for legacy contacts in the future. Your legacy contact can't: • Log into your account • Remove or change past posts, photos and other things shared on your Timeline • Read messages you've sent to other friends • Remove any of your friends From: Facebook
  • 32. Twitter “In the event of the death of a Twitter user, we can work with a person authorized to act on the behalf of the estate or with a verified immediate family member of the deceased to have an account deactivated. In order for us to process an account deactivation, please provide us with all of the following information: The username of the deceased user's Twitter account (e.g., @username or twitter.com/username) A copy of the deceased user’s death certificate A copy of your government-issued ID (e.g., driver’s license) A signed statement including: Your first and last name Your email address Your current contact information Your relationship to the deceased user or their estate Action requested (e.g., ‘please deactivate the Twitter account’) A brief description of the details that evidence this account belongs to the deceased, if the name on the account does not match the name on death certificate. A link to an online obituary or a copy of the obituary from a local newspaper (optional)” From Twitter: How to Contact Twitter About a Deceased User
  • 33. Twitter “Please send us the documentation by fax or mail to the following address: Twitter, Inc. c/o: Trust & Safety 1355 Market St., Suite 900 San Francisco, CA 94103 Fax : 1-415-865-5405” *Please note: We are unable to provide login information for the account to anyone regardless of his or her relationship to the deceased.* From Twitter: How to Contact Twitter About a Deceased User
  • 34. Google Inactive Account Manager • Can be set up through Google Settings • Lets Google know what to do with some or all Google related accounts after a specified period of inactivity • Services that can be controlled: +1s; Blogger; Contacts and Circles; Drive; Gmail; Google+ Profiles, Pages and Streams; Picasa Web Albums; Google Voice and YouTube • Google sends a warning text and email before action is taken • Can have Google delete the accounts • What about items bought on Google Play?
  • 35. Directive Communication Systems DCS provides estate management solutions to attorneys and personal representatives, providing them with one source to manage digital assets which can include deletion, memorialization, etc. of accounts DCS provides personal representatives: • Control over timing of estate communication distribution • Clarity in identifying financial and other accounts • Straightforward instructions for providing directives to personal account holding institutions • Relief from the arduous task of tracking down institution information • The ability to separate business decisions from emotional decisions Types of Accounts: • Money and banking • Finance and investment • Travel and loyalty • Shopping and rewards From: DCS
  • 36. Provide Access • Create a document and note if the property is personal or has monetary value Examples of note Excerpt from: The Trust Advisor
  • 37. Provide Instructions: • If you want a site to continue, for example if you have a website or blog, you need to leave instructions for keeping it up or having someone take it over and continue it. • If a site is currently producing or could produce revenue (e- books, photography, videos, blogs), make sure your successor knows this. • If there are things on your computer or hard drive that you want to pass on (scanned family photos, ancestry research, a book you have been writing), put them in a “Do Not Delete” folder and include it on your inventory list. Excerpt from: Estate Planning for Digital Assets and Social Media
  • 38. Inventory Checklist • Make sure you include everything from your computer, other devices, and the “virtual world” (i.e. cloud, internet) • All email accounts • All social websites you participate in • Financial and commerce accounts • Make a simple spreadsheet with passwords to access assets Digital Assets Inventory Asset Access Wishes Name Contents Location Username Password Instructions Recipient
  • 39. Who is in Charge? • After you inventory your digital assets, you must decide who to give the access to in the event of your death or disability. • Make sure you indicate whether you want your digital executor to archive your content, share your content with others, or delete your content (and/or secure privacy of some content which may be harmful). • Make sure to include any special instructions (Think sensitive and/or embarrassing content).
  • 40. Incorporating Digital Estate Planning into Your Estate Plan • To help the process, complete a questionnaire to list all digital assets and the value of those assets • Discuss if any of the assets have financial value • Keep a record of all passwords and profiles • There are websites specifically designed to release account information after death to designated beneficiaries but they may be here today gone tomorrow. • Protect significant data with strong encryption • Speak to an Estate Planning Attorney about your legal needs
  • 41. Test Out Our New Law • Now that FADA is here in Michigan: • What Works? • What Needs Improving? • Have You Been Able To Use The New Law To Access Someone Else’s Digital Assets? • I would love to hear how you experience Fiduciary Access to Digital Assets
  • 42. Howard H. Collens Galloway and Collens, PLLC 26075 Woodward Ave, Suite 200 Huntington Woods, Michigan 48070 248.545.2500 GallowayCollens.com Howard@GallowayCollens.com Twitter: @howardcollens @probatelawmi @realestatelawmi