Karin Prangley Brown Brothers Harriman Trust Co. Chicago, IL Estate Planning Council of Naples September 17, 2015 Estate Planning and Digital Assets: Weren’t.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Digital Assets Presented by Sharon Rivenson Mark, Esq. and Shirley B. Whitenack, Esq. Adapted from Presentation by Catherine A. Seal, Esq.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Estate Planning WILLS, TRUSTS, HEALTH CARE PROXIES AND ADVANCE DIRECTIVES BALANCING LIFE’S ISSUES, INC.
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
Critical Data Management Indiana University HR Summit April 24, 2014.
Complying with Privacy to Enable Innovation & Research
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
2/16/2010 The Family Educational Records and Privacy Act.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Class 7 Internet Privacy Law Your Digital Afterlife.
Estate Planning Maybe it is only death that is certain. Lara Daniel.
Digital Assets and Estate Planning MCLE Estate Planning Symposium 2015 June 17, 2015 Katie L. S. Von Kohorn, Esq. Casner & Edwards LLP 303 Congress St.,
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
Presented By: Stephanie R. Taylor ESTATE PLANNING FOR DIGITAL ASSETS R ANDALL |D ANSKIN A Professional Service Corporation.
Ben Miller. Shawn “Jay Z” Carter  Rapper, Producer, Entrepreneur, Investor and Sports Agent  Worth nearly $500 Million  Arguably the most successful.
1 Ethics For the Employee Benefits Agent.  Ethics – defined as a principle of right or good conduct; a system of moral principles or values; the rules.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Staying Safe Online A Practical Guide for Middle School Students.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
THE GIRLFRIENDS’ GUIDE TO FINANCIAL SAVVY Estate Planning Handout September 23, 2014 Kimberly B. McDermott Lewis, Rice & Fingersh, L.C. 600 Washington.
Cybercrime What is it, what does it cost, & how is it regulated?
The Next Frontier of Guardianship: Locating, Collecting, and Safeguarding Digital Assets CHARLES P. GOLBERT, ESQ. DEPUTY PUBLIC GUARDIAN OFFICE OF THE.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
BASICS OF ESTATE PLANNING AND PROBATE Margie Connolly, Attorney at Law MARGARET McCULLOUGH CONNOLLY, PLLC Sugar Land TX Mmconnollylaw.com.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Issues for Computer Users, Electronic Devices, Computer and Safety.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Privacy, Confidentiality, and the Best Interest of the State Richard Pearce-Moses Director of Digital Government Information Arizona State Library, Archives.
Nassau Association of School Technologists
Chapter 9: Internet Law, Social Media, and Privacy
Estate planning for digital assets
Estate Planning Council of Lee County
Protection of CONSUMER information
Chapter 10 Cyberlaw, Social Media, and Privacy
Privacy of Client Data.
Update on the Computer Fraud and Abuse Act
Digital Assets and Estate Planning
Cyber Estate Planning and Administration
Digital Assets – What a Practical Planner Can Do!
Presentation transcript:

Karin Prangley Brown Brothers Harriman Trust Co. Chicago, IL Estate Planning Council of Naples September 17, 2015 Estate Planning and Digital Assets: Weren’t we supposed to get a uniform law that fixes everything?

Agenda –What are digital assets? –Why do we care about them? –Why is it a problem? –How are “They” trying to fix it? –How do we plan for it in the meantime?

What are Digital Assets? An electronic record. The term includes: –the catalogue of electronic communications; and –the content of electronic communications.

What are Digital Assets? Online Sales Accounts (eBay, Amazon, Etsy) Online Purchasing Accounts (PayPal) Online Storage / Cloud Storage Accounts (DropBox, Shutterfly, Google Drive) Webpages Domain Names Digital Media Collection (iTunes, Kindle) Blogs Social Networking Accounts (Facebook, Twitter, LinkedIn)

Agenda –What are digital assets? –Why do we care about them? –Why is it a problem? –How are “They” trying to fix it? –How do we plan for it in the meantime?

Why do we care about them? A digital asset can be the key to unlocking other assets (“hard assets”) with financial value. Digital assets themselves can also have significant financial value.

Financial Value of Digital Assets Domain Names: Porn.com sold for $8.8 million in February of Vacationrentals.com sold for $35 million in Blogging In November of 2011, The Atlantic reported that America’s top 10 most valuable blogs have an estimated aggregate value of $785 million. Gawker.com alone was worth $318 million.

Twitter Handles: Naoki Hiroshima had been offered as much as $50,000 for his before it was eventually extorted from him. Online Businesses: Former attorney and Ebay seller Linda Lightman, owner of the Ebay shop “Linda’s Stuff” has gross sales of approximately $25 million per year. Financial Value of Digital Assets

Preserving the Decedent’s Story: Online photo accounts Personal blogs accounts Twitter feeds Genealogical research accounts Non-financial Value of Digital Assets

Preventing Disclosure of Secrets/Reputation Preservation Helping a Grieving Family Protecting Against Identity Theft AARP estimates 250,000 deceased Americans are victims of identity theft each year. Protecting the Fiduciary Non-financial Value of Digital Assets

Agenda –What are digital assets? –Why do we care about them? –Why is it a problem? –How are “They” trying to fix it? –How do we plan for it in the meantime?

Why is it a problem? Obstacles to Access 1.Don’t know the asset exists; 2.Don’t have/can’t get username & password; 3.Passwords may not be sufficient; 4.Possibly illegal to access the account even with the password.

Federal and state laws criminalize certain types of unauthorized access or damage to computers or data. If the terms of service of the digital asset provider do not allow a fiduciary to access the deceased/disabled user’s account, then access is legally unauthorized. Did you say “illegal”?

The Computer Fraud and Abuse Act (18 USC §1030) criminalizes intentional access of a computer system without authorization or exceeding authorization and thereby obtaining financial data or information from a protected (e.g., private) computer. Unauthorized access is HACKING

Terms of Service of Digital Asset Providers Prohibit Fiduciary Access Yahoo! Terms of Service: No Right of Survivorship and Non-Transferability. You agree that your Yahoo! account is non-transferable and any rights to your Yahoo! ID or contents within your account terminate upon your death. Upon receipt of a copy of a death certificate, your account may be terminated and all contents therein permanently deleted. What “unauthorized” means

The U.S. Department of Justice has stated that violating a term of service on Facebook or Match.com is a federal crime under the CFAA, however it is not their intention to prosecute such “minor” violations. What constitutes a “non-minor” violation? DOJ prosecuted a mom under the CFAA who posed as a 17–year–old and cyber–bullied her daughter’s classmate, which prohibited MySpace’s terms of service that do not allow false identifying information, including age. U.S. v. Drew, 259 F.R.D. 449 (C.D. Cal. 2009) If TOS say “no,”…

Data privacy laws prohibit providers of electronic communication services from disclosing the contents of a user’s electronic communications with anyone other than the user (not even a legal fiduciary). Pressures to improve privacy protection for digital assets (in, e.g., employment and family law arenas) can interfere. Why don’t they just change TOS?

The Stored Wire and Electronic Communications and Transactional Records Access Act Default rule: Digital asset provider cannot disclose account information, UNLESS AN EXCEPTION APPLIES. Helpful Exception: if the user provides lawful consent to the disclosure, then the digital asset provider MAY voluntarily disclose account information. Privacy laws dictate TOS

The Stored Wire and Electronic Communications and Transactional Records Access Act Negro v. Navalimpianti USA, Inc., 230 Cal. App. 4th 870, 23 (Oct. 21, 2014), which essentially held that consent cannot be imputed, has caused some to believe that you can’t “stand in the shoes” of another for purposes of providing consent. Of course, there is no exception for fiduciary access upon death or disability (if there was, we wouldn’t be talking about this). Privacy laws dictate TOS

Agenda –What are digital assets? –Why do we care about them? –Why is it a problem? –How are “They” trying to fix it? –How do we plan for it in the meantime?

Increasingly, state legislatures are providing express statutory authority to allow Personal Representatives to access and control certain virtual assets of a deceased person. Eight states (Connecticut, Oklahoma, Idaho, Rhode Island, Indiana, Virginia, Delaware and Nevada) have statutes which give the fiduciary limited access to certain digital assets. None of these laws expressly supersede conflicting provisions in the terms and conditions and privacy policies of online providers. How are “They” trying to fix it? State Laws Grant Fiduciary Access

In the Spring of 2012, a Uniform Law Commission drafting committee was formed to craft a uniform act, applicable to POAs, Trusts, Wills and Guardianships, that would allow a fiduciary to access digital assets. The draft act was completed in March of 2014 and approved by the ULC and NCCUSL in July of This act is called the Uniform Fiduciary Access to Digital Assets Act (“UFADAA”). An earlier draft of UFADAA was enacted in 2014 in Delaware. UFADAA was introduced in 27 state legislatures this year. A Uniform Law Authorizing Fiduciary Access

StateBillSponsorStatus ArkansasHB 1362ShepherdIntroduced ColoradoHB 1189KeyserIntroduced ConnecticutSB 979 Introduced FloridaSB102/HB313Hukill/FantIntroduced HawaiiHB41/SB467Takayama/Keith-AgaraIntroduced IdahoSB 1055 Introduced IllinoisSB1376/HB4131Hastings/EvansIntroduced IndianaSB 368WaltzIntroduced KentuckySB 53WesterfieldIntroduced MaineLD 1177HobbinsIntroduced MarylandHB531/SB429Kramer/KlausmeierIntroduced MassachusettsHB 3422VelisIntroduced MinnesotaHF 200HilstromIntroduced MississippiHB 1217LamarIntroduced MontanaSB 266McNallyIntroduced NebraskaLB 463HarrIntroduced NevadaAB 434 Introduced New MexicoSB 59WirthIntroduced North DakotaSB 2106 Introduced OregonSB 369 Introduced PennsylvaniaSB 518PileggiIntroduced South CarolinaHB 3444McKnightIntroduced TennesseeSB 326NorrisIntroduced TexasHB 2183LeachIntroduced VirginiaHB 1477LeftwichIntroduced WashingtonSB 5029PedersenIntroduced

UFADAA provides that terms of service of a digital asset provider that restrict fiduciary access are void against strong public policy unless the user, in a manner that is separate and apart from the assent required to open the account (i.e., not merely “click-through”) opts to restrict access (or the user’s estate planning documents restrict access). Except for an agent acting under a power of attorney and a conservator acting on behalf of a ward, UFADAA compels service providers to disclose the content of communications protected by the Stored Communications Act to a fiduciary and provides that a fiduciary is deemed to have the consent of the account owner.. A Uniform Law Authorizing Fiduciary Access

Although many were involved with drafting UFADAA, representatives from certain large providers of electronic communications services to the public (e.g., Facebook, Yahoo! and Google), their lobbyists and trade associations publicly decried UFADAA, arguing that it: 1)Violates account owner’s privacy rights; 2)Violates federal data privacy laws; and 3)Improperly voids millions of existing contracts with account owners. The Providers Strike Back: Make PEAC, not UFADAA

The providers and their lobbyists fought hard to prevent UFADAA from enactment in all 27 states to which it was introduced. The providers often offered an alternative model legislation, the Privacy Expectations Afterlife Choices Act (“PEAC Act”), which provided an Executor, Personal Representative or Administrator with access to the electronic communications of a deceased account owner only with a court order. The Providers Strike Back: Make PEAC, not UFADAA

In May of 2015, representatives from the ULC and counsel for certain large providers of electronic communications services to the public (e.g., Facebook and Yahoo!) decided to re-group and re-work UFADAA to effectuate a compromise. That compromise lead to the drafting of the Revised UFADAA (“RUFADAA”).. Breaking the Stalemate

In May of 2015, representatives from the ULC and counsel for certain large providers of electronic communications services to the public (e.g., Facebook and Yahoo!) decided to re-group and re-work UFADAA to effectuate a compromise. That compromise lead to the drafting of the Revised UFADAA (“RUFADAA”).. RUFADAA

In May of 2015, representatives from the ULC and counsel for certain large providers of electronic communications services to the public (e.g., Facebook and Yahoo!) decided to re-group and re-work UFADAA to effectuate a compromise. That compromise lead to the drafting of the Revised UFADAA (“RUFADAA”).. RUFADAA

In May of 2015, representatives from the ULC and counsel for certain large providers of electronic communications services to the public (e.g., Facebook and Yahoo!) decided to re-group and re-work UFADAA to effectuate a compromise. That compromise lead to the drafting of the Revised UFADAA (“RUFADAA”).. RUFADAA

Agenda –What are digital assets? –Why do we care about them? –Why is it a problem? –How are “They” trying to fix it? –How do we plan for it in the meantime?

How do we plan for it in the meantime? Digital Assets in the Estate Planning Process Do you want to preserve digital assets following death or disability? Many people do not want ALL of their electronic communications available to the fiduciary.

Keep Out!! If the principal/testator does not want his fiduciary to have access, estate planning documents should expressly state this intent. Stay abreast of changing times—some TOS may soon allow users to direct that the digital asset should not be made available to a fiduciary. Use encryption and guess-proof passwords. Delete frequently. Consider appointing a special digital assets fiduciary with the task of destroying data. But query whether one should be allowed to “burn the Rembrandt”?

1)preserve transferability when possible by titling digital assets in the name of an entity; 2)catalog digital assets, usernames and passwords; 3)patronize only those digital asset providers that allow fiduciary access; and 4)add provisions to estate planning documents granting fiduciary access. Keep my stuff!

Titling Digital Assets to Preserve Usability After Death/Disability When possible, have LLC or revocable trust own digital assets. Digital asset providers are increasingly recognizing the importance of digital media/assets to a business. Some do allow digital assets to be owned by an entity. If principal/testator is a business owner, ensure all digital assets used in connection with the business are owned by the business entity.

Titling Digital Assets to Preserve Usability After Death/Disability When possible, have LLC or revocable trust own digital assets. Usually, free web-based accounts and individual social media profiles cannot be owned by an entity. Free web-based accounts are never appropriate for a client’s business activities. Individual social media accounts are never appropriate for a client’s business activities.

Create a list of digital assets stored on password-protected USB drive. Safeguard the password, and store it separately from the USB drive. Making a List of Digital Assets for the Fiduciary

Electronic List of Passwords: To be secure, the electronic file should be encrypted (complex password). Password protecting a MS Word or other Office document can be easily circumvented. Use software package designed to store confidential documents and passwords such as KeePass, SecuBox or Web Confidential. Use online storage such as Estate Assist or Password Box. Can back-up encrypted list to USB drive. Making a List of Digital Assets for the Fiduciary

Password to Electronic List of Digital Assets: Should be kept up-to-date If estate planning attorney does not have access to the electronic list of digital assets, the attorney can store the password. As with all client confidential information, password should be stored securely to avoid inadvertent or unauthorized disclosure. Making a List of Digital Assets for the Fiduciary

Use Only Those Digital Assets that Allow Fiduciary Access Google users can designate up to 10 individuals to receive the contents of their accounts in the event that such accounts are inactive for a designated period selected by the user. Google offers cloud storage, blog hosting, an e- book and digital music library, photo and video storage/sharing and social media.

CRUCIAL under RUFADAA. Our clients need to provide express consent to disclosure of their electronic communications to their fiduciaries to gain full access to their digital assets. Consent can be provided in the estate planning documents or in an online tool (i.e., account setting) offered by the account provider that is not “click-through.” Add Provisions to Estate Planning Documents Granting Fiduciary Access

Karin Prangley Brown Brothers Harriman Trust Co. Chicago, IL Estate Planning Council of Naples September 17, 2015 Estate Planning and Digital Assets: Weren’t we supposed to get a uniform law that fixes everything?