How to Inventory and Protect Your Digital Assets
Most people today, especially young adults, have an active “digital life” with dozens, sometimes hundreds, of electronic records that include URLs, usernames, passwords, PINs, and other authentication protocols. What happens if their computer crashes, gets destroyed in a fire or natural disaster, or they pass away without leaving any instructions about how to access their accounts? This class will define digital assets and discuss key questions to consider about them. It will also describe different types of digital assets, review strategies to inventory and protect digital assets, and outline a five-step digital asset planning process. In addition, it will briefly describe RUFADAA, the Revised Uniform Fiduciary Access to Digital Assets Act, and digital asset planning resources.



Some Title
