Inheritance of Virtual Accounts

Document Type : Scientific Research

Author

Abstract

 
Today, the use of cyberspace has become increasingly common.  This space naturally leads to its own legal issues. Undoubtedly, one of the main issues is that, after the death of users, what fate awaits their accounts, and the contents of these accounts? In answering this question: The account belongs to the company that creates it and allows the user to use it only. So, after the death of the user, the account will be lost But information is a creature of the user, so it belongs to him. Some authors compare virtual information with material property and believe that the property will be inherited, like material property, but the fact is that the analogy of material property with the virtual information is contemplating. Material property, less can Reveal the owner's privacy, especially third parties, while the information in the cyberspace is not so. Accordingly, and in the interests of privacy, it appears that the only information that the user publicly publishes and makes available to everybody, as well as those information that is financially valuable, Will be transferred with inheritance. As a rule, other information that discloses of them violates the privacy of the person will be destroyed, However, given that this information will be a valuable source for the future to know about the lifestyles of our people, it can be suggested to the legislator that the virtual information after a long time, is public And made available to the public.
  key words:

Keywords


منابع
انصاری، مرتضی (1420). کتاب المکاسب. کنگره جهانی بزرگداشت شیخ اعظم انصاری.
جعفری لنگرودی، محمدجعفر (1372). ترمینولوژی حقوق. چاپ ششم. تهران: انتشارات گنج دانش.
کاتوزیان، ناصر (1376). قواعد عمومی قراردادها. چاپ دوم. تهران: شرکت انتشار با همکاری بهمن برنا.
ــــــــــــــ (1382). وصیت. تهران: دانشگاه تهران.
ــــــــــــــ (۱۳۷۶). ارث. تهران: دادگستر.
حسینی شیرازی، محمد (1385). إیصال الطالب إلی المکاسب. مؤسسة کتاب‌سرای اعلمی.
مجلسی، محمدباقر (1406). ملاذالاخیار فی فهم تهذیب الاخبار. قم: کتابخانة عمومی حضرت آیت الله مرعشی.
محمدی، پژمان؛ شرقی، مرضیه (1394). «نگرشی بر ماهیت آفریده‌های فکری پس از تعلق به قلمرو عمومی». مطالعات حقوق تطبیقی. دورة 6. شمارة 1.
منصورزاده، یوسف (۱۳۹۲). «تحلیلی بر ماهیت نقاشی‌های غاری پیش از تاریخ اروپا». نشریة هنرهای زیبا- هنرهای تجسمی.
میرشکاری، عباس (1396). رسالة عملی در مسئولیت مدنی. چاپ سوم. بی‌جا.
 
 
Atwater, Justin (2006). Who owns e-mail? Do you have the right to decide the disposition of your private digital life?, utah l. Rev., pp. 397-404.
Banta, Natalie M. (2014). “Inherit the cloud: the role of private contracts in distributing or deleting digital assets at death”. fordham law review, volume 83, issue 2, p. 12-25.
Banta, Natalie, M. (2016). “Death and privacy in the digital age”. north carolina law review, vol. 94, pp. 928-990.
Beyer, Gerry, W. & Naomi Cahn (2011). “when you pass on, don’t leave the passwords behind: planning for digital assets”. probate & property, vol.26, No.1, pp.40-65.
Beyer, G. W. and N. Cahn (2013). “Digital planning: the future of elder law”. National academy of elder law attorneys journal, vol. 9, pp.135-138.
Brubaker, JR.; Dombrowski, AM. Gilbert, N. Kusumakaulika and GR. Hayes (2014). “Stewarding a legacy: Responsibilities and relationships in the management of post-mortem data”. in proceedings of the Sigchi conference on human factors in computing systems, pp. 4157-4180.
Buitelaar, J. C., (2017). “Post-mortem privacy and informational self-determination”. Ethics Inf Technol, vol.19, pp.129–142.
 
Cahn, Naomi (2011). “Postmortem life on-line”. probate & property, vol.25, No.4, p.36-56.
Conner, John (2011). “Digital life after death: the issue of planning for a person's digital assets after death”. Plan. & cmty. Prop. L.j., vol3, pp. 301-354.
Carroll, Evan & John Romano (2011). “Your digital afterlife: when facebook”. Flickr and twitter are your estate, what's your legacy?, Vol. 39-40, p. 1-25.
Evan Carroll (2012). Digital assets: a clearer definition, digital estate Resource, available:
http://commcns.org/1 3ijil5, jan. 30, 2012.
Cha, Ariana E. (2005). After death, a struggle for their digital memories, the washington post, feb.3, available at: http://www.washingtonpost. Com/wp-dyn/articles/a58836-2005feb2.html.
Cummings, Rebecca, G. (2014). “The case against access to decedents’E-mail: password protection as an exercise of the right to destroy”. minn. J. L. Sci. & tech., vol. 15:2, p. 898-912.
Conway, H. & Grattan, S. (2017). The new new property: dealing with digital assets on death. In h. Conway & r. Hickey (eds.), modern studies in property law, Hart publishing, oxford, vol. 9, pp. 99-115.
Darrow, Jonathan, J. & Gerald R. Ferrera (2007). “Who owns a decedent’s e-mails: inheritable probate assets or property or the network?”. N.y.u. J. Legis. & pub. Pol’y, vol. 10, pp. 281-291.
Darrow, Jonathan J. & Gerald R. Ferrera (2008). Email is forever... or is it?, j. Internet, Vol. 11, pp.1-15.
Debatin, Bernhard, Jennette P. Lovejoy (2009). “facebook and online privacy: attitudes, Behaviors, and unintended consequences”. journal of computer-mediated communication, vol.15, vol. 83–108.
Dickens, Robert Lee (2007). “finding common ground in the world of electronic contracts: the consistency of legal reasoning in clickwrap cases”. marq. Intellectual property l. Rev., No. 11, pp.379-400.
Feinberg, J. (1984). Harm to Others. Vol. 1, Oxford University Press.
Feinberg, Joel (1980). Harm And Self-Interest, In Rights, Justice And The Bounds Of Liberty: Essays In Social Philosophy, pp.40-56.
Feinberg, J. (1987). “The Moral Limits of The Criminal Law”. Harm To Others.University Press Scholarship Online, Vol. 1. pp. 80-100.
Gaied, Melissa (2016). “data after death: an examination into heirs’ access to a decedent’s private online account”. suffolk university law review, vol. Xlix, pp. 281-300.
Gross, R. & Acquisti, A. (2005). Information revelation and privacy in online social Networks. Workshop on privacy in the electronic society (wpes). Retrieved october 2, 2007, from: http://privacy.cs.cmu.edu/dataprivacy/projects/facebook/facebook1.pdf
Haworth, Samantha (2014). “Laying your online Self to rest: evaluating the uniform fiduciary access to digital assets act”. university of miami law review, vol. 68: 535, pp. 536-570.
Harbinja, E. (2013). “Does the EU data protection regime protect postmortem privacy and what could be the potential alternatives?”. Scripted, 10(1), pp. 19–38.
Hetcher, Steven (2008). “user-generated content and the future of copyright: part Two-agreements between users and mega-sites”. santa clara computer & high Tech. L.j., vol. 24, pp. 829-843.
Hollon, Jason R. (2013). “tweets from the grave: social media Life after death”. ky. L.j., Vol. 102, pp. 1031-1050.
Hopkins, Jamie P. (2013). “afterlife in the cloud: Managing a digital estate”. hastings sci. & tech. L.j., Vol5, pp. 209 -246.
Jones, Victoria & Alastair Wilson (2007). “photographs, privacy and public places”. Eur. Intell. Prop. J., vol. 29, pp. 357- 358.
Kalven JR. Harry (1966). “privacy in tort law: were warren and brandeis wrong?”. law & Contemp. Probs, Vol. 31, pp. 326-350.
Karim, Jawed and Anisa Daftary (2005). “facebook Jonathan bick, inheriting deceased’s e-mail”. n.j. L.j., mar. 7, pp. 29-56.
Maev Kennedy, Undelivered Letters Shed Light on 17th Century Society, Guardian, available at: http://www.theguardian.com/world /2015/nov/ 08/ undelivered-letters-17th-century-dutchsociety? CMP=fbgu.
Kutler, Noam (2011). “protecting your online you: a new approach to handling your Online persona after death”. berkeley tech. L.j., vol. 26, pp. 1641-1651.
Lastowka, F. Gregory & Dan Hunter (2004). “the laws of the virtual worlds”. calif. L. Rev.I, vol. 92, pp. 50 -75.
leibowitz, Catherine (2013). “a right to be spared unhappiness: images of death and the expansion of the relational right of privacy”. cardozo arts & ent. L.j., vol. 32, pp. 347-350.
Levenbook, Barbara Baum (1984). “Harming Someone After His Death”. Ethics, Vol. 94, No.3, pp.400-427.
Lilian, Edwards, Edina Harbinja (2013). “protecting post-mortem privacy: reconsidering the privacy interests of The deceased in a digital world”. cardozo arts & entertainment, vol. 32:1, pp.103-150.
Mccullagh, Declan, facebook fights for deceased beauty queen's privacy, available at: http://news.cnet.com/8301 -135783 -57518086-38/facebook-fights-for-deceased-beauty-queens-privacy/.
Mccallig, Damien (2014). Facebook after death: an evolving policy in a social network. International journal of law and information technology, vol. 22, no.2, pp. 107–140.
Mccullough, Colleen (2016). “unconscionability as a coherent legal concept”. university of pennsylvania law review, vol.164, pp. 779-795.
Mazzone, Jason (2013). “the right to die online". j. Internet l., vol.16, pp.13-35.
Natasha Chu (2015). “protecting privacy after death”. northwestern journal of technology and intellectual property, vol. 13, issue 2, pp. 45-65.
Obenshain, Mark, Jay Leftwich (2015). “protecting the digital afterlife: virginia’s privacy expectation afterlife and choices act”. richmond journal of law and the public interest, vol. Xix:i, pp.41-75.
Pinch, Rachel (2015). “protecting digital assets after death: Issues to consider in planning for your digital estate”. wayne l. Rev., vol. 60, pp.545-570.
Perrone, Maria (2012). “what happens when we die: estate planning of digital assets”. commlaw conspectus, vol. 21, pp. 86-100.
Preston, Cheryl B. & Eli W. Mccann (2011). “unwrapping shrinkwraps, clickwraps and Browsewraps: how the law went wrong from horse traders to the law of the horse”. byu j. Pub. L. 1, vol.26, pp.17-18.
Ray, Chelsea (2013). “til death do us part: a proposal for handling Digital assets after death”. real prop. Tr. & est. L.j., vol. 47, pp.583- 586.
Ray, M. Madoff (2010). immortality and the law: the rising power of the american dead. Vol. 1, pp. 6-7.
Rösler, Hannes (2008). “dignitarian posthumous personality rights—an analysis of u.s. And german constitutional and tort law”, berkeley j. Of int’l l., vol. 26, pp.153-180.
Rosen, Jeffrey (2012). “the right to be forgotten”. stan. L. Rev. Online, vol. 64, pp. 88-90.
Roy, Michael D. (2011). “beyond the digital asset dilemma: will online services revolutionize estate planning”. quinnipiac prob. L.j., vol. 24, pp. 376-381.
Schneider, Nicole (2013). “social media wills: Protecting digital assets”. j. Kan. B. Ass’n, vol. 82, pp. 16-36.
Tarney, Tyler G. (2012). “comment, a call for legislation to permit the transfer of digital assets at death”. cap. U. L. Rev., vol. 40, pp. 773-795.
Truong, Olivia Y. (2009). “virtual inheritance: assigning more virtual property rights”. syracuse sc. & tech. L. Rep., vol. 21, pp.57-83.
Varnado, Sandi S., (2014). “your digital footprint left behind at death: an illustration of technology leaving the law behind”. louisiana law review, vol. 74, No. 3, pp.710-730.
Wilkens, Molly (2011). “privacy and security during life, access after Death: are they mutually exclusive?”. hastings l.j., vol. 62, pp.1037- 1039.
Watkins, Ashley F. (2014). “digital properties and death: what will your heirs have access to after you die”. buffalo law review, vol. 62, pp. 193-210.
Winter, S. (2010). “Against posthumous rights”. Journal of Applied Philosophy, 27(2), pp. 86–199.
 
Http://ispa.ir
Https://www.facebook.corn
Http://www.instagram.com
Https://www.linkedin.com
www.dropbox.com
http://www.google.com
http://windows.microsoft.com
https://twitter.com
http://consumerist.com
http://www.apple.com
http://answers.microsoft.com
http://www.lexology.com
https://www.delta.com
http://www.marriott.com
http://www.kiplinger.com
http://www.utexas.edu
http://www.picofile.com/terms