Getting Your (Digital) Affairs In Order

Let's face it. Any one of us, regardless of age, can face an untimely departure from this world. In such an event, what would your digital legacy say about you for generations to come?
|
This post was published on the now-closed HuffPost Contributor platform. Contributors control their own work and posted freely to our site. If you need to flag this entry as abusive, send us an email.

Let's face it. Any one of us, regardless of age, can face an untimely departure from this world. In such an event, what would your digital legacy say about you for generations to come? To ensure that you will be memorialized online according to your wishes, it is best to prepare for the day you won't be around to manage your digital reputation for yourself.

Many internet service providers don't allow for accounts to be transferred to heirs, even when people indicate so in their wills. As technology continues to evolve, lawmakers attempt to establish digital property legislation. Today, access to a deceased loved one's digital property typically requires a court order.

Alex Kilian, a wealth manager at AKT Wealth Advisors in Portland, OR, advises that individuals consult with an estate planning attorney about establishing their specific digital legacy in their wills. "Every state is different in regard to the treatment of digital assets, and the legislation continues to evolve as estate planning tries to first catch up, then keep pace, with the myriad of different kinds of digital assets," he said.

There are, however, a few steps you can take without an attorney that will start getting your online reputation in shape.

Choose your Legacy Contact.
Think about what you would like to happen with your online accounts after you have passed. Facebook gives you options to select a legacy contact to have limited access to manage your profile page on your behalf, including authorization to respond to new friend requests, update the profile picture, and delete the page altogether.

Consolidate Your Information.
Access to your digital information almost always requires an email address and password. By streamlining these and organizing access to your phone where much of your digital life likely lives, you will make it much easier to manage for anyone doing it on your behalf some day.

Email
If you are like most people who have more than one email account, be sure to list your email accounts and passwords with your will so your lawyer or executor can access them if needed. This can be especially important for security access to social media profiles and online financial accounts such as PayPal or the like.

Also, do not use only your work email address for personal social media accounts, including your LinkedIn account, since that address and all your online accounts associated with it will likely be inaccessible very quickly.

Passwords
Make sure your usernames and passwords for select digital accounts are safely kept with your will if you want your heirs to be able to access private information after your passing. This is especially true for sentimental digital assets such as genealogy research, photos, and videos.

Consider streamlining the variety of passwords you have for such accounts by creating a "password formula" ― a set structure for how you compose your password that you can then amend regularly. Create one that includes at least eight characters, one symbol, and a capital letter to ensure that the formula will work for the picky sites that require such things.

For example, July@2016 can be revised to be August@2016, etc. This allows you to change your password regularly and share a formula, if not the password itself. If your executor doesn't have your most updated password, at least it would be easier to narrow down options to figure it out when they need it.

Phone
If you are the only person who knows your Apple or Android account information, it will be nearly impossible for your executor or lawyer to access your iCloud or iTunes once you are deceased. While Apple's policy indicates that you cannot transfer your account to someone else, a more immediate concern after your passing may be accessing information your phone, such as your friends' contact information. Keep a printed contact list with your will.

Use a Little Black Book.
It may be controversial for some people to think of writing down passwords, but for those of us who appreciate having something tangible for back-up, I recommend using a Little Black Password Book to keep track of your various usernames and passwords and then keeping it in an ultra-safe place with your will, like a safety deposit box.

Alternatively, if you and your executor are more comfortable with a digital approach, you could try out a password app such as Dashlane or LastPass for one master password to access all.

Your name and reputation will outlive you indefinitely in the hearts of your loved ones and online. It has the potential to be seen by many generations to come. What will the internet say about you long after you've passed? To start getting your digital affairs in order, download the complimentary copy of the Legacy Checklist .

Earlier on Huff/Post50:

Top 5 Scams That Target Older Adults
Advance Fee Fraud(01 of05)
Open Image Modal
The Scam: The con artist sends a letter or email -- purportedly only to a few recipients but actually to several thousand -- making an offer that would result in a large payoff for the victim. The details vary, but generally the story is that a person, often the wife or son of a deposed African dictator, knows about some unclaimed fortune that they are willing to share with the scam victim in return for an advanced fee (e.g. bail money for the imprisoned millionaire). Once money starts coming in, the con artist will continue asking for more, claiming that problems have arisen.How To Protect Yourself: The FBI advises that if you "receive a letter from Nigeria asking you to send personal or banking information, send the letter to the U.S. Secret Service, your local FBI office or U.S. Postal Inspection Service." You can also register a complaint with the Federal Trade Commission's Complaint Assistant here. (credit:Alamy)
Craigslist Scams(02 of05)
Open Image Modal
The Scam: Criminals set up craigslist accounts advertising the sale of desirable items (e.g. cars, computers, iPhones) at too good to be true prices. A meeting is set up with the victim in a remote location where they're robbed upon arrival.How To Protect Yourself: Detective Frank Avila of the West Valley LAPD advises "good places to meet are local police stations or malls. Criminals are less likely to conduct crimes or illegal activity in public areas where lots of people are present." (credit:Alamy)
Prize And Sweepstakes Fraud(03 of05)
Open Image Modal
The Scam: The victim is contacted and informed that they've won some sort of free gift, vacation or prize but that they have to pay "postage and handling" or some sort of tax before they receive their reward. How To Protect Yourself: If you've legitimately won something, you should never have to pay any sum to receive it. It's almost impossible to get your money back if you've been cheated over the phone, so before you buy anything by telephone, remember not to buy from unfamiliar companies, always ask for and wait until you receive written material about an offer and always check out unfamiliar companies with your local consumer protection agency. From the FBI: "Legitimate businesses understand that you want more information about their company and are happy to comply." (credit:Alamy)
Low-Risk, High-Return Scams(04 of05)
Open Image Modal
The Scam: The con artist, acting on behalf of a fake company, promises a sage investment with ridiculous returns for the victim. The fake company takes the money, but no investment is made. Instead the money goes into their pockets -- and disappears just as quickly as the company soon will. The old adage holds true: If it sounds too good to be true, it probably is.How To Protect Yourself: According to the FBI: "Do not invest in anything unless you understand the deal. Con artists rely on complex transactions and fault logic to 'explain' fraudulent investment schemes." Always be wary of any investment that offers the promise of extremely high yields. (credit:Alamy)
Ruse Burglaries(05 of05)
Open Image Modal
The Scam: Homeowners are distracted by an individual while other sneak into their homes, stealing valuables, cash and jewelry. The ruse burglary can take place under the guise of a gas leak that needs to be stopped, a tree next door that needs trimming but must be reached fromt he angle of a neighbor's lawn, or indeed anything that will result in the preoccupation of a resident while they are unknowingly robbed by other accomplices. Ruse burglaries sometimes lead to home invasion situations that can pose the risk of assault or other violent crimes taking place. How To Protect Yourself: If someone is asking you to step outside of your home for any reason, don't. Instead, offer to call 911 for them. If someone claims they need to do urgent work on behalf of a utility company, call the utility company and verify the work. (credit:Alamy)

Our 2024 Coverage Needs You

As Americans head to the polls in 2024, the very future of our country is at stake. At HuffPost, we believe that a free press is critical to creating well-informed voters. That's why our journalism is free for everyone, even though other newsrooms retreat behind expensive paywalls.

Our journalists will continue to cover the twists and turns during this historic presidential election. With your help, we'll bring you hard-hitting investigations, well-researched analysis and timely takes you can't find elsewhere. Reporting in this current political climate is a responsibility we do not take lightly, and we thank you for your support.

to keep our news free for all.

Support HuffPost