Categories: Cyber SecurityTech

Digital Inheritance: What Happens to your Data After you Die?

E-mail, online shops, social media – in our lives, leave behind vast amounts of data. Few people care what happens to it after they die. This article will determine why you should take care of your digital inheritance estate and what you need to consider.

Inheritance Law also Applies to Digital Inheritance

According to a ruling by the Federal Court of Justice (BGH), the digital estate is to be treated like the inheritance of objects: After your death, all your rights and obligations towards online services automatically pass to your heirs, who then have all of your personal data – in E-Mail services as in social networks.

The personal digital communication of a deceased is entirely accessible to heirs. If you want to decide what to do with your data after your death, you have to look after your digital estate while still alive.

Managing your Digital Estate: step by step

The consumer advice center has collected numerous tips on its website that should help you to regulate the most important points relating to your digital estate:

Create an overview of all accounts, including user names and passwords. It is best to save the list on an encrypted or password-protected USB stick and keep it in a safe place, for example, in a safe or a safe deposit box.

A person you trust should take care of all tasks related to your digital estate. For this purpose, of course, a power of attorney is required, which must be valid “beyond death.” Your trusted person should at least have a complete list of all your user accounts. It is best to determine in detail what will happen to each account after your death. Besides, determine how to proceed with your end devices (computer, smartphone, tablet) and the data stored on them.

Hand over a power of attorney to your confidant. Also, inform your family members that you have managed your digital estate this way. Let your trusted person know where they can find the access data for your accounts.

Always keep the list of your accounts up to date.

A Testament for More Legal Certainty

The digital estate can also be regulated in a will, containing all access data for online services. You can define that only specific people can see your data.

The will must be handwritten, precisely formulated, and signed. Because self-formulated wills can quickly become ineffective, the Federal Government recommends engaging a specialist lawyer for inheritance law or a notary.

Be careful with Estate Administration for Money

According to the consumer advice center, some companies take care of your digital estate administration for money. However, it is difficult to assess the security of these providers. Anyone considering hiring a commercial estate administrator should find out more about the scope of services and the costs.

The consumer advice center also warns: “Under no circumstances should you trust a company with passwords! You should also not hand over your computers, smartphones, or tablets to commercial providers who search the devices for the digital estate. Too much personal data may be leaked to unauthorized persons. ”

Digital Heritage on Social Networks

Facebook and Google offer the possibility to determine contacts who can access your content after your death. The consumer advice center has described exactly how this works in two videos.

Besides, Facebook can put accounts in the so-called “memorial state.” There is also the option of either naming an estate contact who should take care of the memorial account or stipulate that it be permanently deleted.

Also Read: Shadow Tech – A Gaming PC from the Cloud in the Test

Helpful Resource: Techiesguardian

Searches Related to Digital Inheritance

  • [digital inheritance laws]
  • [digital assets]
  • [digital death]
  • [value of digital assets]
  • [digital legacy]
  • [types of digital assets]
  • [assets for digital graphics]
  • [managing digital assets]

Review Digital Inheritance: What Happens to your Data After you Die?. Cancel reply

tech stacy

Share
Published by
tech stacy

Recent Posts

Principles of a Good API Architecture

Good API Architecture: Applications Programming Interfaces (API) are the major software applications building blocks that… Read More

July 27, 2021

SoD Violation vs. SoD Case – The Differences

Separation-of-Duties, or SoD, is an internal control that prevents conflicts by using role-based access controls.… Read More

July 24, 2021

How To Apply These 7 Telemarketing Strategies Into Your Business

Have you been dealing with numerous challenges in your business operations lately? If so, then… Read More

July 22, 2021

How To Build A Data Storage And Backup Strategy

Having data backup for your business is indispensable to ensure your business continuity in case… Read More

July 21, 2021

What Types of Organizations Are Most Vulnerable to Hacks and Data Breaches?

Cybercrime and data breaches are unfortunately on the rise, and many different types of businesses… Read More

July 20, 2021

Top 10 Proven Product-Page Ideas To Increase Your Ecommerce Conversion Rate

Product Page Ideas: The product page of any eCommerce website plays a pivotal role in… Read More

July 20, 2021