Digital Assets and Estate Planning

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Digital Assets Presented by Sharon Rivenson Mark, Esq. and Shirley B. Whitenack, Esq. Adapted from Presentation by Catherine A. Seal, Esq.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
4. Intellectual Property and Ethics on the Web 59.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
Developing a Records & Information Retention & Disposition Program:
FARMINGTON AREA PUBLIC SCHOOLS SUMMER TECHNOLOGY ACADEMY AUGUST 18TH, 2010 Web 2.0 Tools.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Streamlined Sales Tax Governing Board. The Marketplace Fairness Act of 2015(MFA) Grants state and local jurisdictions the right to require the collection.
INTERNET and CODE OF CONDUCT
Class 7 Internet Privacy Law Your Digital Afterlife.
Estate Planning Maybe it is only death that is certain. Lara Daniel.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Digital Assets and Estate Planning MCLE Estate Planning Symposium 2015 June 17, 2015 Katie L. S. Von Kohorn, Esq. Casner & Edwards LLP 303 Congress St.,
Four tips to mitigate Mobile fraud in the future.
Presented By: Stephanie R. Taylor ESTATE PLANNING FOR DIGITAL ASSETS R ANDALL |D ANSKIN A Professional Service Corporation.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
HIPAA PRIVACY AND SECURITY AWARENESS.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Florida Information Protection Act of 2014 (FIPA).
Online banking security best practices Access via ‘transaction devices’
THE GIRLFRIENDS’ GUIDE TO FINANCIAL SAVVY Estate Planning Handout September 23, 2014 Kimberly B. McDermott Lewis, Rice & Fingersh, L.C. 600 Washington.
The Next Frontier of Guardianship: Locating, Collecting, and Safeguarding Digital Assets CHARLES P. GOLBERT, ESQ. DEPUTY PUBLIC GUARDIAN OFFICE OF THE.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Connecting for Health Common Framework: the Model Contract for Health Information Exchange Gerry Hinkley com July 18, 2006 Davis Wright.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Karin Prangley Brown Brothers Harriman Trust Co. Chicago, IL Estate Planning Council of Naples September 17, 2015 Estate Planning and Digital Assets: Weren’t.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Internet Service Providers’ Liability: Copyright enforcement and Free Speech Issues El Derecho de Autor: Nuevos Temas en el Entorno Digital Lima, October.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Nassau Association of School Technologists
An introduction to CIOs for Students’ Unions
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
Connectivity to bank and sample account structure
Chapter 9: Internet Law, Social Media, and Privacy
Forensic Computer Techniques
File Management in the Cloud
Estate planning for digital assets
Estate Planning Council of Lee County
Protection of CONSUMER information
The State of the TPRA (Recent updates)
Wyoming Statutes §§ through
Florida Information Protection Act of 2014 (FIPA)
Obligations of Educational Agencies: Parents’ Bill of Rights
Information Security Seminar
Amber Process Guide: Death Claim Process Financial Adviser Guide.
Florida Information Protection Act of 2014 (FIPA)
Legal Aspects of fund Management
Legal Aspects of Fund Management
Current Privacy Issues That May Affect Your Credit Union
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Namibia ICT Ministry and Data Protection Stakeholders.
Chapter 13 E-Commerce Contracts
Government Data Practices & Open Meeting Law Overview
Cyber Estate Planning and Administration
Digital Assets – What a Practical Planner Can Do!
Data Security Awareness
Student User Agreement and Policy 2022
Government Data Practices & Open Meeting Law Overview
AUP, EDP, & Centralized Printing
Student Data Privacy: National Trends and Wyoming’s Role
Colorado “Protections For Consumer Data Privacy” Law
Exemption AdministrationTraining Related to Accepting Certificates
State of florida tax information sharing Paula Barfield August 5, 2015
The Health Insurance Portability and Accountability Act
Presentation transcript:

Digital Assets and Estate Planning MCLE Estate Planning Symposium 2017 Katie L. S. Von Kohorn, Esq. Casner & Edwards LLP 303 Congress St., Boston MA 02210 vonkohorn@casneredwards.com @kszal 617.426.5900

Agenda Identifying digital assets Client wishes and privacy concerns Sample language Safeguarding digital assets Pending: Revised Uniform Fiduciary Access to Digital Assets Act Tips for fiduciaries: following TOS What’s next?

Identifying Digital Assets

Identifying Digital Assets Password-protected tangibles: mobile phones, computers, tablets Online financial information: Bank accounts, Mint.com, Quicken Email accounts Cloud storage: Dropbox, iCloud, Google Drive Social media: Facebook, Instagram, Snapchat, WhatsApp Mobile and online accounts: Apple Pay, online shopping, gaming sites, rewards programs (frequent flier miles, LevelUp, etc.) Media: iTunes, Netflix, Amazon Cryptocurrencies and P2P payments:bitcoin, Ethereum, Venmo Intellectual property: blogs, domain names, fanfiction, self-publishing, YouTube

Client wishes – estate planning Does client want anyone to have access? Fiduciary? Digital PR? Email: stored or deleted? Client-dependent: same as tangibles? Note: may be subject to CFAA and ECPA, and RUFADAA if adopted Online financial accounts: Fiduciaries’ chief concern Access to photos and videos: Dropbox, Google Drive, Flickr, Instagram Does client want archived profile? Facebook “legacy” page Shutting down other accounts: online shopping, gaming, AirBNB. May anyone else access digital media or rewards programs? Apple music, Kindle, frequent flier miles Virtual currency: Paypal will issue check for balance; Bitcoin needs unique key. Intellectual property: Should anyone operate or sell client’s blog or domain names?

Sample Language for Wills PLEASE NOTE: ALL SAMPLE LANGUAGE PROVIDED IS FOR INFORMATIONAL PURPOSES ONLY AND DOES NOT CONSTITUTE LEGAL ADVICE. Subject to any limitations imposed under federal, state, or contract law, my Personal Representatives shall have the power to locate, access, administer, distribute and dispose of my Digital Assets (defined below). The power to administer includes the power to obtain, access, and control my passwords and other electronic credentials associated with my Digital Assets, the power to transfer information and property, [and the power to delete information]. For the purposes of this will, “Digital Assets” include (1) any files stored on my electronic devices, including but not limited to desktops, laptops, tablets, peripherals, storage devices, mobile phones, and any similar digital device which currently exists or may exist at the time of my death, (2) any account owned by me or to which I have access governed by a terms-of-service agreement, including but not limited to email accounts, digital music, digital photographs, digital videos, software licenses, social network accounts, file sharing accounts, financial accounts, domain registrations, DNS service accounts, web hosting accounts, tax preparation service accounts, online stores, affiliate programs, other online accounts and similar digital items which currently exist or may exist at the time of my death, regardless of the ownership of the physical device upon which the digital information is stored. I authorize any person or entity who controls access to a Digital Asset to grant to my Personal Representatives full access to such Digital Asset, including without limitation any and all of my information pertaining to the Digital Asset, including passwords, access codes, the contents of all of my electronic communications, and any and all electronically stored information. This authorization shall be construed as my consent pursuant to the Electronic Communications Privacy Act of 1986, as amended, the Computer Fraud and Abuse Act of 1986, as amended, and any other federal or state privacy or criminal law. This authorization is also intended and should be construed to supersede any authorization given in account management services or online tools within my Digital Assets, including but not limited to Google’s Inactive Account Manager and Facebook’s Digital Legacy Contact. This authorization shall remain effective after my death. Include in powers section: My Personal Representatives may hire forensic accountants or other technical experts to assist them in obtaining access and control over my Digital Assets.

Safeguarding digital assets

Safeguarding digital assets Under-the-mattress storage? Protection from hackers? Travel issues Cloud password protection: Lastpass, Dashlane, Sticky Password Premium Access to photos and videos: Dropbox, Google Drive, Flickr Privacy: Does client want archived profile or blog? Facebook “legacy” page. Deleting blog? Shutting down other accounts: online shopping, etc. Access to digital media or rewards programs? Apple Music, Kindle, frequent flier miles, other points programs Virtual currency

Uniform Fiduciary Access to Digital Assets Act

Uniform Fiduciary Access to Digital Assets Act “Final” version of Uniform Act approved July 2014 Adopted in Delaware; introduced in 26 states Industry input in drafting BUT - industry opposition to enactment Privacy concerns? ACLU Concern over possible conflict with federal laws Google, Facebook, ISPs, involved in lobbying against UFADAA PEAC act – interim Act drafted by industry, 2015 Uniform Law Commission decided to revise UFADAA

REVISED Uniform Fiduciary Access to Digital Assets Act

REVISED Uniform Fiduciary Access to Digital Assets Act Final version of RUFADAA approved by ULC July 2015 Enacted in 32 states as of May 22, 2017 (not MA) Introduced in 12 additional states (5/12 have passed both houses) Additional industry input in drafting More restrictive – opt-in instead of opt-out MA has 3 bills pending – not RUFADAA. May adopt RUFADAA next year?

Agent’s access to other digital assets. COMPARISON OF THE UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (ORIGINAL UFADAA), THE PRIVACY EXPECTATIONS AFTERLIFE AND CHOICES ACT (PEAC ACT), AND THE REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (REVISED UFADAA) Issue Original UFADAA PEAC Act Revised UFADAA Agent’s access to other digital assets. Permitted under a grant of general or specific authority. Not addressed. Permitted under a grant of general or specific authority. Custodian may require specific identification of the account and evidence linking the account to the principal. Trustee’s access to the contents of electronic communications of a trust account. Permitted unless prohibited by the user, trust, or court. Permitted when trustee is the original user. Also permitted when the trustee is not the original user if authorized by the trust. Custodian may require specific identification of the account and evidence linking the account to the trust. Trustee’s access to other digital assets of the trust. Permitted unless prohibited by the user, trust, or court. Custodian may require specific identification of the account and evidence linking the account to the trust. 2

Effect of boilerplate term-of- service prohibiting fiduciary access. COMPARISON OF THE UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (ORIGINAL UFADAA), THE PRIVACY EXPECTATIONS AFTERLIFE AND CHOICES ACT (PEAC ACT), AND THE REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (REVISED UFADAA) Issue Original UFADAA PEAC Act Revised UFADAA Effect of boilerplate term-of- service prohibiting fiduciary access. A blanket prohibition on fiduciary access is void as against public policy. Not specifically addressed, but terms of service arguably enforceable by the reference to “other applicable law” (i.e. contract law) in Sec. 3(c). Three tiered approach: 1. A user’s direction using an online tool prevails over an offline direction and over the terms-of-service if the direction can be modified or deleted at all times. 2. A user’s direction in a will, trust, power of attorney, or other record prevails over the boilerplate terms-of-service. 3. If a user provides no direction, the terms-of-service control, or other law controls if the terms-of-service are silent on fiduciary access. Effect of other terms-of- service. Not addressed. Recipient has no greater rights than the user. Unless they conflict with a user’s direction, terms- of-service are preserved and the fiduciary has no greater rights than the user. 3

Procedure for disclosing digital assets. COMPARISON OF THE UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (ORIGINAL UFADAA), THE PRIVACY EXPECTATIONS AFTERLIFE AND CHOICES ACT (PEAC ACT), AND THE REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (REVISED UFADAA) Issue Original UFADAA PEAC Act Revised UFADAA Procedure for disclosing digital assets. Not addressed, but use of the term “access” throughout the act arguably contemplates the fiduciary logging on to the user’s account. Provider not required to allow a requesting party to assume control of a deceased user’s account. The custodian has three options for disclosing digital assets: Allow the requestor to access the user’s account. Allow the requestor to partially access the user’s account if sufficient to perform the necessary tasks. Provide the requestor with a “data dump” of all digital assets held in the account. Administrative fees. Not addressed. A custodian may assess a reasonable administrative charge for the cost of disclosing a user’s digital assets. Deleted assets. Deleted assets need not be disclosed. Unduly burdensome requests. Court shall quash an unduly burdensome order. A request for some, but not all, of a user’s digital assets need not be fulfilled if segregation is unduly burdensome. Instead, either party may petition the court for further instructions. Fiduciary duties. Incorporated by a generic reference to “other law.” Expressly incorporated. 4

Custodian not liable for COMPARISON OF THE UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (ORIGINAL UFADAA), THE PRIVACY EXPECTATIONS AFTERLIFE AND CHOICES ACT (PEAC ACT), AND THE REVISED UNIFORM FIDUCIARY ACCESS TO DIGITAL ASSETS ACT (REVISED UFADAA) Issue Original UFADAA PEAC Act Revised UFADAA Account termination. Not addressed. If termination would not violate a fiduciary duty, the fiduciary may request account termination rather than disclosure of assets. A custodian may require specific identification of the account and evidence linking the account to the user. Joint accounts. Custodian need not disclose if aware of any lawful access to the account following the death of the user. Custodian need not disclose if aware of any lawful access to the account after receipt of the disclosure request. Timely compliance. Required within [60] days, or fiduciary may request an order of compliance. Required within [60] days, or fiduciary may request an order of compliance. The order must contain a finding that disclosure does not violate 18 U.S.C. § 2702. Custodian immunity. Custodian is immune from liability for an act or omission done in good faith compliance with the act. Custodian not liable for compliance in good faith with a court order issued pursuant to the act. 5

Tips for fiduciaries: following TOS

Tips for fiduciaries: following TOS Facebook: Legacy contact User can request deletion of profile upon user’s death or designate legacy contact . If no legacy contact is named, account is locked when Facebook is notified of death. Google: Inactive Account Manager Gmail, google drive, etc. May provide access to data if user has so requested; manager can download data for 3 months after notification. Twitter: deactivate only Request to deactivate may come from PR or “verified immediate family member”; can only request deletion of account or removal of photos, and Twitter “may not honor every request.” Yahoo: close account only Ajemian case: TOS will not govern forum selection. TOS does not allow access to contents of email – instead account will be terminated and contents “permanently deleted.” Ajemian siblings currently sponsoring bill in MA which would allow access. Instagram: memorialize or delete Upon notification of death, memorializing account locks it, cannot be edited. “Verified immediate family members” may request removal; may be a PR or family member.

What’s next?

What’s next? Keep an active list of digital assets as assets change over time Clients should know where passwords are Privacy: clients’ and fiduciaries’ interests may be in conflict Professional fiduciaries have fewer options RUFADAA: look for passage in Massachusetts 2017-2019