The Next Frontier of Guardianship: Locating, Collecting, and Safeguarding Digital Assets CHARLES P. GOLBERT, ESQ. DEPUTY PUBLIC GUARDIAN OFFICE OF THE.

Slides:



Advertisements
Similar presentations
Confidentiality Tutorial Family Education Rights and Privacy Act (FERPA)
Advertisements

Protection of privacy for all Students!
Digital Assets Presented by Sharon Rivenson Mark, Esq. and Shirley B. Whitenack, Esq. Adapted from Presentation by Catherine A. Seal, Esq.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
The Public Records Act The Public Records Act W.S et. seq.
Family Educational Rights and Privacy Act What you need to know...
11 Power of Attorney (POA) MT199001HR February 2012.
Privilege, Privacy, and Waiver. Privilege Attorney/Client In the law of evidence, a client's privilege to refuse to disclose, and to prevent any other.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
FERPA: Family Educational Rights and Privacy Act.
Chapter 20 Estate Planning. Copyright ©2014 Pearson Education, Inc. All rights reserved.20-2 Chapter Objectives Explain the use of a will Describe estate.
2/16/2010 The Family Educational Records and Privacy Act.
Patty Bartlett Logan County Treasurer / Public Trustee.
FERPA 2008 New regulations enact updates from over a decade of interpretations.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Estate Planning Basics Melissa Dalla, Esq. Dufford & Brown, P.C Broadway, Suite 2100 Denver, CO (303)
Chapter Nineteen Accounting for Estates and Trusts Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Class 7 Internet Privacy Law Your Digital Afterlife.
Estate Planning Maybe it is only death that is certain. Lara Daniel.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Legislation, Regulation, Guidelines
CPS Acceptable Use Policy Day 2 – Technology Session.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Confidentiality and Public Information Act LISD Special Education Department Training SY
Sunshine Center of the N.C. Open Government Coalition Feb. 27, 2015 NORTH CAROLINA SUNSHINE LAWS & GIS.
707 KAR 1:360 Confidentiality of Information. Section 1: Access Rights 1) An LEA shall permit a parent to inspect and review any education records relating.
Who’s Who Despositary Bank – the first to take check. Payor Bank – the bank that pays the issuer’s check. Intermediary Bank – any bank that handles a.
Privacy and the Civil Commitment Process Allyson K. Tysinger Assistant Attorney General June 4-5, 2008.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
Calloway County Schools CONFIDENTIALITY TRAINING Protection of Personal Information School Year
And Policy on Confidentiality of Records for The University of Alabama.
Public Review Committee Linda Sullivan-Colglazier Assistant Attorney General July 28, 2011.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
PROTECTING CLIENT DATA HIPAA, HITECH AND PIPA PART 1B.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
FACULTY DIRECTOR TRAINING OFFICE OF EDUCATION ABROAD 1 Legal Issues and Education Abroad.
ETHICS: CONFIDENTIALITY OF IFTA DATA IFTA ATTORNEYS’ SECTION MEETING October 7, :30-10:00 a.m. Jim Clark Motor Carrier Services Attorney Indiana.
Elected Officials and Health Department Records Indiana Public Health Foundation February 27, 2008.
Partnerships and Limited Liability Partnerships Chapter 30.
Indiana’s Access to Public Records Act Heather Willis Neal Public Access Counselor Brownsburg Police Department Brownsburg Police Department February 26,
Texas Open Meetings Act Documents at Meetings What are the Rules? Becky P. Casares Assistant Attorney General Opinion Committee.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Vs. Family Educational Rights and Privacy Act (FERPA) How do these laws impact Educational Settings?
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
BASICS OF ESTATE PLANNING AND PROBATE Margie Connolly, Attorney at Law MARGARET McCULLOUGH CONNOLLY, PLLC Sugar Land TX Mmconnollylaw.com.
“Kids First, New Mexico Wins!” NMPED Data Conference Spring 2016 Dan Hill General Counsel, Public Education Department Randi Johnson General Counsel, State.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Connectivity to bank and sample account structure
Indiana Access to Public Records Act (APRA) Training
Estate Planning Council of Lee County
Wyoming Statutes §§ through
PERSONAL DATA PROTECTION ACT 2010
Move this to online module slides 11-56
Current Privacy Issues That May Affect Your Credit Union
Chapter 9 Internet Law and Intellectual Property
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Digital Assets – What a Practical Planner Can Do!
State of florida tax information sharing Paula Barfield August 5, 2015
Presentation transcript:

The Next Frontier of Guardianship: Locating, Collecting, and Safeguarding Digital Assets CHARLES P. GOLBERT, ESQ. DEPUTY PUBLIC GUARDIAN OFFICE OF THE COOK COUNTY PUBLIC GUARDIAN 69 WEST WASHINGTON STREET, SUITE 700 CHICAGO, IL (312)

Background  More than half of Americans age 65 and older use the Internet or .  This is the fastest-growing population on the Internet.  In the near future, we will have people under our guardianship with substantial digital assets, including digital assets with monetary and sentimental value.

Digital Assets with Monetary Value  Online bank and investment accounts.  Collectibles, such as music and books.  Online credits.  Intellectual property.  Important Documents, such as deeds, wills, advanced directives, tax documents.

Digital Assets with Sentimental Value  Cherished Photographs.  Letters.  Diaries.

Why is it Important to Quickly Locate and Collect Digital Assets?  To fulfill fiduciary and statutory obligations to locate, inventory, collect and manage assets.  To prevent financial exploitation and identity theft.  To prevent loss to the estate.

Practical Steps  As this issue and the law evolve, so will best practices.  Add “non-brick and mortar” financial institutions to the distribution list for asset inquiry letters.  Asset inquiry letter should request information about online accounts.  Freeze orders should include online accounts.  Consider closing and deactivating online accounts to prevent hacking and identity theft.  Credit reports.  If there is a computer in the home, assume that the person has digital assets and/or important information stored digitally.  Important legal caveat regarding computer-fraud and unauthorized- computer-access laws.

The Law-Background  In theory, the guardian should be able to step into the shoes of the person under guardianship and do anything that person could do.  Treating access to digital assets the same as tangible assets is known as “asset neutrality.”

Hurdles to Asset Neutrality  However, the practical extension of fiduciary laws to digital assets is just beginning to be tested.  Terms of service (TOS) agreements often purport to limit access to accounts.  Federal laws arguably limit providers. Section 2702 of the Stored Communications Act (SCA) prohibits providers from “knowingly divulge[ing]… the contents of a communication which is carried or maintained on that service.” But the provider may (not shall) disclose information with the lawful consent of the subscriber.  Providers have been reluctant to provide information and risk liability.

State Law  State law is in flux, and is different in every state.  “Three generations” of state laws.  First generation. Covers only accounts.  Second generation. Recognizing how rapidly technology is changing, use broad definitions of digital assets. This allows the law to remain relevant, but has created confusion as to what assets are covered.  Third generation. More specific and contemporary definitions, but are at risk of becoming obsolete.

Revised Uniform Fiduciary Access to Digital Assets Act (RUFADAA)-Background  The Uniform Law Commission (ULC) adopted the Uniform Fiduciary Access to Digital Assets Act in  Within 1 year the Act was introduced in 23 states. However, it was enacted in only one state, Delaware. The Act was killed in the other 22 states due to lobbying by providers.  On July 22, 2015, the ULC adopted the Revised Uniform Fiduciary Access to Digital Assets Act (RUFADAA).  On September 25, 2015, the ULC released RUFADAA with Official Comments.

Substance of RUFADAA  The preface states that RUFADAA is intended to give fiduciaries legal authority to manage digital assets in the same way as tangible assets, to the extent possible, while respecting the user’s reasonable expectations of privacy for personal communications.  The comments explain that RUFADAA is intended to include the types of electronic records currently in existence, and those yet to be invented.  Applies to all types of fiduciaries, including conservators and estate guardians. However, there are different requirements depending on the type of fiduciary.  Allows a user to utilize an online tool to give directions to the custodian regarding disclosure of digital assets.

RUFADAA (con’t)  A user may also give such directions in a will, trust, power of attorney, or other document. Such direction will supersede any contrary provision in a TOS agreement.  When disclosing digital assets, the custodian may, at its sole discretion, grant the fiduciary full access to the user’s account; or grant partial access sufficient for the fiduciary to perform her duties. This can be problematic for guardians.  The custodian need not disclose digital assets deleted by the user, even if recoverable, based on presumed intent of the user. Analogous to throwing a tangible asset in the garbage.  The custodian may assess a reasonable administrative charge.

RUFADAA (con’t)  Disclosure to a guardian or conservator is governed by § 14.  After an opportunity for a hearing under the state’s guardianship law, the court may grant a guardian access to the digital assets of the protected person.  Unless otherwise ordered by a court or directed by the user, a custodian shall disclose to a guardian the catalogue of electronic communications sent or received by the protected person and any digital assets in which the protected person has a right or interest, other than the contents of electronic communications.  Note that administrators and executors can, under certain circumstances, receive the actual contents of electronic communications.  Not having access to the content can be problematic for guardians, for example, there might be evidence of undue influence or financial exploitation. But the civil discovery tools should still apply.

RUFADAA (con’t)  The guardian must provide a written request for disclosure; and a certified copy of the court order allowing access to digital assets.  If requested by the custodian, the guardian must provide a number, username, or address assigned by the custodian to identify the protected person’s account; or evidence linking the account to the person.  A fiduciary acting within the scope of his duties is an authorized user for purposes of computer-fraud and unauthorized-computer-access laws.  The guardian may request the custodian to suspend or terminate an account.  The fiduciary’s authority is subject to the TOS agreement, is limited by the scope of the fiduciary’s duties, and may not be used to impersonate the account holder.

RUFADAA (con’t)  The Act does not give a fiduciary new or expanded rights beyond those held by the user.  The fiduciary must act consistent with the duty of care, loyalty, and confidentiality.  The custodian has 60 days to comply with the fiduciary’s request.  The custodian may notify a user that a request for disclosure of digital assets or account termination was made.  A custodian may deny a fiduciary’s request for disclosure or account termination if the custodian is aware of any lawful access to the account after the request. This is to protect joint account holders, but can be problematic for guardians.

The Future...

Additional Resources  In 2013, in celebration of the 25 th anniversary of the specialty of elder law, the Journal of the National Academy of Elder Law Attorneys (NAELA Journal) published a two-part symposium on the future of elder law. The symposium contains an excellent article about digital assets. See G. Beyer and N. Cahn, “Digital Planning: The Future of Elder Law,” 9 NAELA J. 1, p. 135 (Spring 2013).  J. Lamm, C. Kunz, D. Riehl and P. Rademacher, “The Digital Death Conundrum: How Federal and State Laws Prevent Fiduciaries from Managing Digital Property,” 68 U. Miami L.R. 385 (2014).

Questions