Between Dec 19, 2024 and Jan 2, 2025, datasets can be submitted to DRUM but will not be processed until after the break. Staff will not be available to answer email during this period, and will not be able to provide DOIs until after Jan 2. If you are in need of a DOI during this period, consider Dryad or OpenICPSR. Submission responses to the UDC may also be delayed during this time.
 

The Case Against Access to Decedents’ E-mail: Password Protection as an Exercise of the Right to Destroy

Loading...
Thumbnail Image

View/Download File

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Title

The Case Against Access to Decedents’ E-mail: Password Protection as an Exercise of the Right to Destroy

Published Date

2014-05

Publisher

Minnesota Journal of Law, Science and Technology

Type

Article

Abstract

There is currently substantial national momentum in state legislatures to grant personal representatives access to decedents’ e-mail as a part of a larger grant of access to all digital assets. In this Article, I make the case against such a default rule granting access to decedents’ e-mail. In the past nine years, Yahoo has not softened its position towards those who seek access to a Yahoo user’s e-mail post mortem. However, the other two largest e-mail service providers have more lenient policies on access to decedents’ e-mail. In this Article, I examine the service providers’ perspectives on access to decedents’ e-mail. Commentators are overwhelmingly supportive of access by personal representatives. They typically position Internet service providers, those providers’ terms of service, and secret passwords chosen by the deceased as stumbling blocks to efficient estate administration, the preservation of unique and irreplaceable sentimental and historical data, and the transfer of valuable property into the hands of deserving family members. Beginning with Connecticut in 2005, seven states have enacted statutes granting personal representatives some level of access to decedents’ digital assets, including e-mail. As of October 2013, about a dozen additional states have pending legislation that grants personal representatives access to decedents’ e-mail. Additionally, in January 2012, the Uniform Law Commission created a committee to “study the need for a feasibility of state legislation on fiduciary powers and authority to access digital information.” The committee is now operating with the mission to draft an act that “will vest fiduciaries with at least the authority to manage and distribute digital assets, copy or delete digital assets, and access digital assets,” and has developed a working draft that grants personal representatives access to password-protected e-mail accounts of the deceased (the Draft Uniform Act). I highlight the problems with, and new issues raised by, the access laws, proposed laws, and the Draft Uniform Act, and explore the problems with the arguments for access to decedents’ e-mail. I then assert that the commentary, statutes, and proposed legislation fail to adequately consider decedents’ intent, or probable intent, which is the bedrock of estate jurisprudence. I argue that storing e-mail in a password-protected account, coupled with nondisclosure of that password by the deceased, is an exercise of a decedent’s right to destroy his or her own property. Further, I maintain that state law and the Draft Uniform Act granting access to decedents’ e-mail inappropriately infringe upon this right. I conclude in Part V with a recommendation for an alternative default rule.

Description

Related to

Replaces

License

Series/Report Number

Funding information

Isbn identifier

Doi identifier

Previously Published Citation

15 Minn. J. L. Sci. & Tech. 897 (2014)

Other identifiers

Suggested citation

Cummings, Rebecca. (2014). The Case Against Access to Decedents’ E-mail: Password Protection as an Exercise of the Right to Destroy. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/163821.

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.