Digital Asset Planning

An interview with Prof. Naomi R. Cahn

Today, most people own digital assets, which include everything from social media accounts, email and online banking accounts, cloud-stored photos, airline miles, blogs, to virtual currencies. As our communications and financial assets have become more digitized, ensuring loved ones and estate fiduciaries are able to gain access once the account holder dies or becomes incapacitated is critical. Without access, fiduciaries may have difficulty winding down accounts and disposing of assets, and the accounts may be left vulnerable to hacks. Loved ones may be unable to memorialize social media accounts or close them down. Professor Naomi Cahn of UVA Law explains some of the impediments to fiduciary access, including online platforms’ terms of service agreements and laws that prohibit internet service providers from disclosing the contents of its users’ communications. She explores the tools and best practices for digital asset planning, including the Revised Uniform Fiduciary Access to Digital Assets Act now adopted in over 45 states.


  • Attorney CLE accreditation 

Michelle A. Reed discusses After the Data Breach
After the Data Breach
Michelle A. Reed discusses Cyber Defense: Private Funds & Banks
Cyber Defense: Private Funds & Banks
Michelle A. Reed discusses Cyber Defense: Private Funds & Banks (Part 2)
Cyber Defense: Private Funds & Banks (Part 2)
Ira Kustin and Sherrese Smith discusses Cyber Risk at Private Funds
Cyber Risk at Private Funds
Judge Andrew Napolitano discusses Domestic Spying and the NSA
Domestic Spying and the NSA
James Anderson discusses Driverless Cars—A Shift in Risk
Driverless Cars—A Shift in Risk
Prof. Nadine Strossen discusses Free Speech in a Social Media World
Free Speech in a Social Media World
Prof. Jeffrey Rosen discusses Government Surveillance: Privacy & Technology
Government Surveillance: Privacy & Technology
Prof. Neil Richards discusses Human Information Privacy
Human Information Privacy
Prof. Neil Richards discusses Human Information Privacy (Part 2)
Human Information Privacy (Part 2)
Prof. Emily Murphy discusses Memory Evidence (Part 2)
Memory Evidence (Part 2)
Hina Shamsi discusses Military Drones and Targeted Killing
Military Drones and Targeted Killing
Prof. Daniel Capra discusses Police Power and Personal Rights
Police Power and Personal Rights
Prof. Daniel Capra discusses Police Power and Personal Rights (Part 2)
Police Power and Personal Rights (Part 2)
Prof. I. Bennett Capers discusses Police Technology - From Body Cameras to Facial Recognition
Police Technology - From Body Cameras to Facial Recognition
Prof. Amy Gajda discusses Press Freedom vs. Privacy
Press Freedom vs. Privacy
Prof. Amy Gajda discusses Press Freedom vs. Privacy (Part 2)
Press Freedom vs. Privacy (Part 2)
Prof. Joel Reidenberg discusses Privacy & Technology in Today's Schools
Privacy & Technology in Today's Schools
Prof. Jeffrey Rosen discusses Privacy vs. Government Tech
Privacy vs. Government Tech
Chairman Christopher Giancarlo discusses Regulating Cryptocurrency after FTX
Regulating Cryptocurrency after FTX
Scott Skinner-Thompson discusses Sexual Privacy and Government "Outing"
Sexual Privacy and Government "Outing"
John Heitmann and Jameson Dempsey discusses The Internet of Things – The Latest Frontier
The Internet of Things – The Latest Frontier
John Heitmann and Jameson Dempsey discusses The Internet of Things – The Latest Frontier (Part 2)
The Internet of Things – The Latest Frontier (Part 2)
Prof. Eric Goldman discusses The Law of Deplatforming
The Law of Deplatforming