A recent extension to the cultural relationship with death is the increasing number of people who die having created a large amount of digital content, such as social media profiles, that will remain after death. This may result in concern and confusion, because of automated features of dormant accounts (e.g. birthday reminders), uncertainty of the deceased's preferences that profiles be deleted or left as a memorial, and whether information that may violate the deceased's privacy (such as email or browser history) should be made accessible to family.
Issues with how this information is sensitively dealt with are further complicated as it may belong to the service provider (not the deceased) and many do not have clear policies on what happens to the accounts of deceased users. While some sites, including Facebook and Twitter, have policies related to death, others remain dormant until deleted due to inactivity or transferred to family or friends. The FADA (Fiduciary Access to Digital Assets Act) was set in place to make it possible to transfer digital possessions legally. [1]
More broadly, the heavy increase in social media use is affecting cultural practices surrounding death. "Virtual funerals" and other forms of previously physical memorabilia are being introduced into the digital world, complete with public details of a person's life and death. [2] [3] [4]
Gmail [5] and Hotmail [6] allow the email accounts of the deceased to be accessed provided certain requirements are met. Yahoo! Mail will not provide access, citing the No Right of Survivorship and Non-Transferability clause in the Yahoo! terms of service. [7] In 2005, Yahoo! was ordered by the Probate Court of Oakland County, Michigan, to release emails of deceased US Marine Justin Ellsworth to his father, John Ellsworth. [8]
In its early days, Facebook used to delete profiles of dead people, but does not anymore. [9] In October 2009, the company introduced "memorial pages" in response to multiple user requests related to the 2007 Virginia Tech shooting. [10] [9] After receiving a proof of death via a special form, the profile would be converted into a tribute page with minimal personal details, where friends and family members could share their grief. [9]
In February 2015, Facebook allowed users to appoint a friend or family member as a "legacy contact" with the rights to manage their page after death. [11] It also gave Facebook users an option to have their account permanently deleted when they die. [12]
As of January 2019, all 3 options were active. [13]
In 2013, BuzzFeed criticized Facebook for the lack of control over memorialization that resulted in a "Facebook death" prank aimed at locking users out of their own accounts. [14] [15]
In 2017, Reuters reported that a German court rejected a mother's demand to access her deceased daughter's memorialized account stating that the right to private telecommunications outweighed the right to inheritance. [16] In July 2018, Dubai's DIFC Courts ruling clarified that Facebook, Twitter and other social media accounts should be bequeathed in legally binding will. [17]
Social media networks have also been criticized for not responding to relatives' requests to alter information on memorialized accounts. [18] Another criticism is that Facebook users often are unaware that their content is ultimately owned not by them, but by Facebook. [19]
Dropbox determines inactive accounts by looking at sign-ins, file shares, and file activity over the previous 12 months. Once an account is determined inactive, Dropbox deletes the files on the account. [20] To request access to the account of a deceased person, heirs are required to send appropriate documents by physical mail. [21]
In April 2013, Google announced the creation of the 'Inactive Account Manager', which allows users of Google services to set up a process in which ownership and control of inactive accounts is transferred to a delegated user. [22] [23] [24]
Google also allows users to submit a range of requests regarding accounts belonging to deceased users. [5] Google works with immediate family members and representatives to close online accounts in some cases once a user is known to be deceased, and in certain circumstances may also provide content from a deceased user's account. [25]
Until 2010, Twitter (launched in July 2006) did not have a policy on handling deceased user accounts, and simply deleted timelines of deceased users. [26] In August 2010, Twitter allowed memorialization of accounts upon request from family members, and also provided them with an option of either deleting the account or obtaining a permanent backup of the deceased user's public tweets. [27]
In 2014, Twitter updated its policy to include an option to delete deceased user photographs. This policy was implemented after multiple Twitter trolls sent Zelda Williams, daughter of Robin Williams, photoshopped images of her father. [28]
As of January 2019, the only option that Twitter offered for the accounts of dead people was account deactivation. Previously published content is not removed. To deactivate an account Twitter requires an immediate family member to present a copy of their ID and a death certificate of the deceased. [13] Twitter specified that it does not provide account access to anyone, [29] but does allow people having account login information to continue posting. A prominent example is Roger Ebert's account maintained by his wife Chaz. [30] [31]
In 2012, The Next Web columnist Martin Bryant noticed that since Twitter, unlike Facebook, did not have a "one account per real person" emphasis, memorializing accounts presented a difficulty to the service. [32] He also criticized the service for the lack of control over hacking of such accounts and disapproved the practice of passing dead people's usernames to new owners after a certain period of inactivity. [32]
In 2013, Variety ran a feature about Cory Monteith's Twitter account that had 1.5 million followers at the moment on his death and gained almost 1 million new followers afterwards. Monteith's fans also launched #DontDeleteCorysTwitter campaign. [33] As of January 2019, the celebrity's account had 1.64 million followers. [34]
Various media reported awkward incidents related to automatic posting and account hacking. [35] [31]
iCloud and iTunes accounts are "non transferable" since the content is not owned — users only have a licence to access it. [36]
Users who have made at least several hundred edits or are otherwise known for substantial contributions to Wikipedia can be noted at a central memorial page. Wikipedia user pages are ordinarily fully edit-protected after the user has died, to prevent vandalism.
YouTube grants access to accounts of deceased persons under certain conditions. [37] It is one of the data options that one can select to give access to a trusted contact with Google's Inactive Account Manager. [38]
As of the COVID-19 pandemic, Instagram has notified its users of a delay in time of reviewing reports of deceased users due to the limited staff the pandemic has caused. [39] Users that submit a report on a deceased user on Instagram can either memorialize the account or remove it from Instagram's platform. [39] Through memorializing the account, Instagram secures and protects a platform of a deceased user, but per their policy, they do not supply any of the login credentials to the account. [40] For both memorializing or removing a deceased users account, a verified user needs to submit a tangible document that shows proof of death of the user. [39] However, to fully remove an account, the user must be a close or direct family member to the deceased person, and show proof of credibility as well. [39]
Per Microsoft's policies, they do not supply any of the login credentials to a deceased user's Microsoft account. [41] A user does not have to contact or notify Microsoft of the deceased user, as the related user is able to close the account themselves. At default, Microsoft removes accounts after 2 years of inactivity. [42] If the user does not have access to the deceased user's account, Microsoft recommends that the user deletes all bank accounts linked to the one of the deceased to ensure no subscriptions are still going through. [41] If the user wants to request to gain access to the deceased user's account, a court order or a subpoena has to be provided to Microsoft, but does not guarantee access to the deceased user's account. [41]
For users that live in Germany, more documentation is needed to gain access of a deceased user's account, including the deceased user's death certificate, a form of ID, and a documentation of consent from the deceased. [41] The requesting user needs to provide a form of ID as well. [41]
Digital inheritance is the process of handing over personal digital assets to human beneficiaries. These digital assets include digital estates and the right to use them. It may include bank accounts, writings, photographs, and social interactions.
There are several services which store account passwords and send them to selected individuals after death. Some of these periodically send the customer an email to confirm that that person is still alive; after failure to respond to multiple emails, the service provider assumes that the person has died and will thereafter distribute the passwords as arranged. [43] The Data Inheritance function from SecureSafe gives an "activator code" that the customer transfers to a trusted individual, and in the event of death that individual enters the code into Secure Safe's system to get access to the deceased person's digital inheritance. [44] Legacy Locker and SafeBeyond require two persons to confirm the death, together with the presentation of a death certificate, before any passwords are distributed. [43]
Aimed at those concerned with their online privacy, platforms like LifeBank store a customer's Internet account passwords offline while ensuring that a trusted person is given permission to access the stored passwords upon the customer's death.
In July 2018, the Michigan Court of Appeals found that an Evernote document the decedent had typed into his phone shortly before committing suicide was enforceable as valid will. [45]
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.
The following tables compare general and technical information for a number of notable webmail providers who offer a web interface in English.
In computing, a private message, personal message, or direct message refers to a private communication sent or received by a user of a private communication channel on any given platform. Unlike public posts, PMs are only viewable by the participants. Though long a function present on IRCs and Internet forums, private channels for PMs have recently grown in popularity due to the increasing demand for privacy and private collaboration on social media.
A Google Account is a user account that is required for access, authentication and authorization to certain online Google services. It is also often used as single sign-on for third party services.
Facebook is a social media and social networking service owned by American technology conglomerate Meta Platforms. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, and Chris Hughes, its name derives from the face book directories often given to American university students. Membership was initially limited to Harvard students, gradually expanding to other North American universities. Since 2006, Facebook allows everyone to register from 13 years old, except in the case of a handful of nations, where the age limit is 14 years. As of December 2022, Facebook claimed 3 billion monthly active users. As of October 2023 Facebook ranked as the 3rd most visited website in the world with 22.56% of its traffic coming from the United States. It was the most downloaded mobile app of the 2010s.
In computer security, logging in is the process by which an individual gains access to a computer system or program by identifying and authenticating themselves. The user credentials are typically some form of username and a password, and these credentials themselves are sometimes referred to as alogin. In practice, modern secure systems often require a second factor such as email or SMS confirmation for extra security. Social login allows a user to use an existing cell phone number, or user credentials from another email or social networking service to sign in to or create an account on a new website.
Outlook.com, formerly Hotmail, is a free personal email service offered by Microsoft. This includes a webmail interface featuring mail, calendaring, contacts, and tasks services. Outlook can also be accessed via email clients using the IMAP or POP protocols.
Dropbox is a file hosting service operated by the American company Dropbox, Inc., headquartered in San Francisco, California, U.S. that offers cloud storage, file synchronization, personal cloud, and client software. Dropbox was founded in 2007 by MIT students Drew Houston and Arash Ferdowsi as a startup company, with initial funding from seed accelerator Y Combinator.
Digital inheritance is the passing down of digital assets to designated beneficiaries after a person’s death as part of the estate of the deceased. The process includes understanding what digital assets exist and navigating the rights for heirs to access and use those digital assets after a person has died.
Klout was a website and mobile app that used social media analytics to rate its users according to online social influence via the "Klout Score", which was a numerical value between 1 and 100. In determining the user score, Klout measured the size of a user's social media network and correlated the content created to measure how other users interact with that content. Klout launched in 2008.
The Web 2.0 Suicide Machine is a service that helps users tired of MySpace, LinkedIn and Twitter, to "commit suicide in social networks", by automatically "removing their private content and friend relationships". The service is part of the non-profit foundation WORM, based in Rotterdam, Netherlands.
Censorship of X, formerly known as Twitter, refers to Internet censorship by governments that block access to X. X censorship also includes governmental notice and take down requests to X, which X enforces in accordance with its Terms of Service when a government or authority submits a valid removal request to X indicating that specific content is illegal in their jurisdiction.
Instagram is an American photo and video sharing social networking service owned by Meta Platforms. It allows users to upload media that can be edited with filters, be organized by hashtags, and be associated with a location via geographical tagging. Posts can be shared publicly or with preapproved followers. Users can browse other users' content by tags and locations, view trending content, like photos, and follow other users to add their content to a personal feed. A Meta-operated image-centric social media platform, it is available on iOS, Android, Windows 10, and the web. Users can take photos and edit them using built-in filters and other tools, then share them on other social media platforms like Facebook. It supports 32 languages including English, Spanish, French, Korean, and Japanese.
Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and Snapchat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age.
A user profile is a collection of settings and information associated with a user. It contains critical information that is used to identify an individual, such as their name, age, portrait photograph and individual characteristics such as knowledge or expertise. User profiles are most commonly present on social media websites such as Facebook, Instagram, and LinkedIn; and serve as voluntary digital identity of an individual, highlighting their key features and traits. In personal computing and operating systems, user profiles serve to categorise files, settings, and documents by individual user environments, known as ‘accounts’, allowing the operating system to be more friendly and catered to the user. Physical user profiles serve as identity documents such as passports, driving licenses and legal documents that are used to identify an individual under the legal system.
Digital wills are wills, often called a "Last Will and Testament", that determine the fate of a person's digital presence once they die. In the digital age, people have been wondering what happens to their digital presence once they die. These archives encompass any online account that a person may have such as social media, shopping sites, and gaming sites. Many websites now have a set of guidelines and procedures that can be followed to remove a deceased person's account from their servers. These procedures may vary from site to site. However, a digital will is a way to determine the fate of your online presence in one location instead of having to make arrangements with each site individually.
Pyrus is a cloud-based workflow automation and document management system developed by Simply Good Software, Inc. Pyrus comes as SaaS and offers a web-based interface to launch workflows, assign tasks, and manage documents. It is a unified corporate communication environment, accessible from any device. Mobile versions are available for all platforms, including iOS, Android, and Android Wear. Users are able to set up and route workflows without coding and IT assistance.
Criticism of Dropbox, an American company specializing in cloud storage and file synchronization and their flagship service of the same name, centers around various forms of security and privacy controversies. Issues include a June 2011 authentication problem that let accounts be accessed for several hours without passwords; a July 2011 privacy policy update with language suggesting Dropbox had ownership of users' data; concerns about Dropbox employee access to users' information; July 2012 email spam with reoccurrence in February 2013; leaked government documents in June 2013 with information that Dropbox was being considered for inclusion in the National Security Agency's PRISM surveillance program; a July 2014 comment from NSA whistleblower Edward Snowden criticizing Dropbox's encryption; the leak of 68 million account passwords on the Internet in August 2016; and a January 2017 accidental data restoration incident where years-old supposedly deleted files reappeared in users' accounts.
Post-mortem privacy is a person's ability to control the dissemination of personal information after death. An individual's reputation and dignity after death is also subject to post-mortem privacy protections. In the US, no federal laws specifically extend post-mortem privacy protection. At the state level, privacy laws pertaining to the deceased vary significantly, but in general do not extend any clear rights of privacy beyond property rights. The relative lack of acknowledgment of post-mortem privacy rights has sparked controversy, as rapid technological advancements have resulted in increased amounts of personal information stored and shared online.
Meta Platforms Inc., or Meta for short, has faced a number of privacy concerns. These stem partly from the company's revenue model that involves selling information collected about its users for many things including advertisement targeting. Meta Platforms Inc. has also been a part of many data breaches that have occurred within the company. These issues and others are further described including user data concerns, vulnerabilities in the company's platform, investigations by pressure groups and government agencies, and even issues with students. In addition, employers and other organizations/individuals have been known to use Meta Platforms Inc. for their own purposes. As a result, individuals’ identities and private information have sometimes been compromised without their permission. In response to these growing privacy concerns, some pressure groups and government agencies have increasingly asserted the users’ right to privacy and to be able to control their personal data.
This paper discusses a solution to Splinternet a.k.a. Internet balkanization issue and different efforts underway for a resolution. It provides a 3-minute crisp Internet history, and the paper is designed for both tech and non-tech readers.