Death ownership inheritance

From SIS Wiki
Jump to: navigation, search

Ownership and Digital Inheritance after Death

Author: Ashley George


Introduction

This project focuses on issues of ownership of personal digital content and its digital preservation in cases of deceased creators and owners. The most relevant subject headings used to retrieve the following resources were “digital preservation” and “copyright and digital preservation”. The databases that were searched for literature include Academic Search Complete, EBSCOhost, and JSTOR, with Academic Search Complete returning the most relevant results. Additional search terms were used with these databases to reveal additional items, and these included “legal issues in digital preservation,” “legal problems in digital preservation,” “death and digital preservation,” “digital legacy,” and “digital inheritance”. The search results using these terms also included irrelevant results, such as those on the topic of digital preservation of law. Many of these searches retrieved items focused on the issues of copyright, ownership, and licensing of digital preservation. This indicates that the biggest legal issues that occur in digital preservation usually involve copyright laws. The articles selected were those published between 2000-2020. Articles from most popular media such as newspapers and magazines were not examined.



Annotations

Antoine, H. (2016). Digital legacies: Who owns your online life after death? Computer and Internet Lawyer, 33(4), 15-20. http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=113775665&site=ehost-live&scope=site

Antoine, the founder of a law practice in Beverly Hills, California, focuses on the topics of internet law, privacy rights, copyright laws, and intellectual property as it pertains to digital assets. It is explained that digital assets are stored by online services, accounts, and third-party service providers. Due to the terms of service involved in these accounts, it is not always clear what can happen to the data or who can access the data after the death of the user. This article is useful in providing a legal breakdown of what happens to your personal information according to terms of agreements made with service providers, who will own the information, and actions that can be taken by internet service providers and social media platforms according to state laws and federal statutory limitations.

Bellamy, C., Arnold, M., Gibbs, M., Nansen, B., & Kohn, T. (2013). Life beyond the timeline: Creating and curating a digital legacy. In 10th Community Informatics Researchers Network (CIRN) Conference, October 28-30, 2013, Prato, Italy (pp. 1-11). https://www.researchgate.net/publication/263565169_Life_beyond_the_timeline_creating_and_curating_a_digital_legacy

The authors examine the topic of digital legacy, the importance of personal digital information to both families and historians, and the curation of current popular digital accounts like social media, digital music collections, emails, and documents. It is reasoned that these personal digital legacies are difficult to curate because of the large demand of the task and lack of programs and tools that can enable preservation of these types of information. This article serves to explain the purpose of preserving these particular forms of information and the current challenges in preserving and curating this type of information.

Brucker-Kley, E., Keller, T., Kurtz, L., Pärli, K., Pedron, C., Schweizer, M., & Studer, M. (2013). Passing and passing on in the digital world. In P. Kommers & P. Isaías (Eds.), Proceedings of the International Association for Development of the Information Society (IADIS) International Conference on e-Society, March 13-16, 2013, Lisbon, Portugal (pp. 248-256). IADIS Press. https://www.researchgate.net/publication/295860893_Passing_and_Passing_on_in_the_digital_world

This article focuses on the planning of digital estates and making arrangements for our data in anticipation of death. The problematic nature of the digital estate is discussed, including how our next of kin can have difficulty accessing our accounts and information and how, at the same time, the companies like social media platforms have their own actions or inactions in regards to accounts belonging to deceased persons. There are options presented that can assist in dealing with these digital estates like services aimed towards digital estate planning and specific actions that beneficiaries can take after the information owner’s death. This source is helpful in explaining the difficulties and actors involved in a person’s digital estate along with giving options that are available to those actors.

Byrd, G. (2016). Immortal bits: Managing our digital legacies. IEEE Annals of the History of Computing, 49(03), 100-103. DOI: 10.1109/MC.2016.71

Byrd showcases a new technology in the form of a website created by a university student and designed to manage and arrange personal digital assets like photos, videos, and documents. The program, My Digital Legacy, is explained in detail and includes functions for both the client, or legacy users, and beneficiaries, who can use access the digital assets after the legacy user’s death and utilize them according to after-death policies that the legacy user has set. These can include instructions like to delete specific accounts, emails, social media pages and profiles, or information or to give control to a specific person. This article shows a successful tool that has been developed to solve some issues in curating and preserving personal digital information and digital legacies.

Gulotta, R., Gerritsen, D. B., Kelliher, A., & Forlizzi, J. (2016). Engaging with death online: An analysis of systems that support legacy-making, bereavement, and remembrance. In Proceedings of the 2016 Association for Computing Machinery Conference on Designing Interactive Systems (pp. 736-748). DOI: 10.1145/2901790.2901802

The authors of this article conducted an incredibly useful and in-depth survey and analysis of digital systems meant to assist in the processes of digital legacy and remembrance after a person’s death. This survey and analysis is unique in that it examines not only the tool’s usefulness in managing the deceased’s information in terms of programs for storage, file transfer, and password vaults, but it also focuses on programs that assist the bereaved in mourning and remembrance with programs and functions like creating a memorial online. The paper analyzes a total of seventy-five systems and identifies four categories to define the different content and functionality of these technologies. This source is helpful in identifying the personal digital information management technologies available and the many different purposes these digital systems may need to meet.

Harvard Law Review. (2018). ). Massachusetts supreme judicial court holds that personal representatives may provide lawful consent for release of a decedent’s emails. Harvard Law Review, 131(7), 2081-2088. https://harvardlawreview.org/2018/05/ajemian-v-yahoo-inc/

This article details legal acts, including the Stored Communications Act, that can be applied to situations of digital inheritance and digital estate planning. The privacy of the deceased is weighed against the necessity of managing the deceased’s digital estate when the person’s records are increasingly more digital and less paper. This resource is useful as an example of legal action that has been taken involving a deceased person’s representatives having the ability to legally consent to the release of the person’s digital assets and a court ruling upholding the action of the representatives.

Kneese, T. (2017). Mediating mortality: Transtemporal illness blogs and digital care work. In Death in the early twenty-first century (pp. 179-213). Palgrave Macmillan, Cham. DOI:10.1007/978-3-319-52365-1_7

This chapter explores the many things that can happen to an individual’s personal digital information after death, including it being passed to a family member, being deleted or destroyed, or in some cases being continued by another individual. The author conducts interviews of individuals who are in possession of a deceased family member’s digital accounts to examine their experiences with the platforms and the actions the individuals took regarding the deceased’s digital assets. This article takes a different view of digital assets and digital inheritance by presenting a situation in which a deceased’s digital asset included a blog and specific issues are discussed that involve these types of digital assets which are located in public spaces on the internet where it is accessible by anyone.

Pfister, J. (2017). " This will cause a lot of work." Coping with Transferring Files and Passwords as Part of a Personal Digital Legacy. In Proceedings of the 2017 Association for Computing Machinery Conference on Computer Supported Cooperative Work and Social Computing (pp. 1123-1138). DOI: 10.1145/2998181.2998262

Pfiester focuses on the topic of digital legacy as it relates to personal information management, security, and storage and the difficulty of shaping a digital legacy. Issues of digital legacy are discussed and largely attributed to reasons such as fragmentation of the information across platforms, password security and sharing, and the failure to back up cloud-based storage. The author is incredibly detailed in describing the research methods used. Because of the thorough explanation of data collection and the inclusion of interview questions, interested researchers could easily replicate the study. This article is useful as it contains research and an interview study on issues of data inheritance and digital legacy due to user actions that affect information security.

Sudan, A., & Sabharwal, M. (2019) Digital Legacy: Posterity Rights Analysis and Proposed Model for Digital Memorabilia Adoption using Machine Learning. (IJACSA) International Journal of Advanced Computer Science and Applications. 10(5) DOI: 10.14569/IJACSA.2019.0100512

This article focuses on the topic of Digital memorabilia and the use of a deceased’s social media accounts as a tool of remembrance. Sudan provides an analysis of a potential model involving machine learning to predict which social media users would desire a digital memorial in the event of their death. The model would make these predictions based on reliable and easily accessible information like the age and amount of access and posting and individual makes to their social media profile. The author has conducted through research and presents an extensive literature review supporting the potential for use of this model. This article serves as an example of research that is currently underway in the areas of digital asset and digital legacy.

Waagstein, A. (2014). An exploratory study of digital legacy among death aware people. Thanatos, 3(1), 46-67. https://thanatosjournal.files.wordpress.com/2012/12/waagstein_digitallegacy2.pdf

Waagstein explores the knowledge of the idea of digital legacy and the preservation of personal information through a study conducted by interview of people who are described as death aware individuals. The subjects of the interview are a rather niche area, with the author having chosen to interview hospice employees and terminally ill patients. The author gives in-depth details of the interview process used in the study, which is useful for researchers who would like to replicate the study. Also included is the respondent answers to the interview questions, which emphasizes even further the findings of the study. This article is helpful in defining digital inheritance and digital legacy and useful in demonstrating the baseline of knowledge that exists of the concept of digital legacy and the preservation of personal information in specific individuals.