Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Big Tech is going nuclear

      Big Tech is going nuclear

      10 April 2026
      Microsoft is sacrificing Edge on the altar of Copilot

      Microsoft is sacrificing Edge on the altar of Copilot

      10 April 2026
      5G expected to reshape South Africa's wireless broadband market

      5G expected to reshape South Africa’s wireless broadband market

      10 April 2026
      Warning that South Africa's digital competitiveness is in retreat

      Warning that South Africa’s digital competitiveness is in retreat

      10 April 2026
      South Africa's biggest banks are lining up behind Optasia - Salvador Anglada

      South Africa’s biggest banks are lining up behind Optasia

      10 April 2026
    • World
      Anthropic mulls building its own AI chips

      Anthropic mulls building its own AI chips

      10 April 2026
      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      4 April 2026
      Amazon in talks to buy satellite operator Globalstar

      Amazon in talks to buy satellite operator Globalstar

      2 April 2026

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » In-depth » Preparing for the digital afterlife

    Preparing for the digital afterlife

    By Editor11 May 2012
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Confronting mortality is a deeply personal quest that does not usually sit high on one’s to-do list. Death is scary so we avoid thinking about it.

    At some point, though, pragmatism usually wins. Those who can afford to call their lawyers and those who cannot pull out a notebook. It is decided: who inherits the house, which lucky friend gets the music collection, how to settle outstanding bills.

    As the divide between real and online identity dissolves, a necessary but morbid conversation is gaining traction on the Internet. What happens to your e-mail account when you die? What about your Facebook profile or your photo albums on Flickr? Who will get the few hundred rands in your PayPal account? How will your Twitter followers know you have passed on? In short, do you have a digital death plan?

    Popular Canadian blogger Derek  Miller did. The day after he died on 3 May last year, the 41-year-old delivered a poignant message from beyond the grave that went viral and had readers, including me, reaching for a Kleenex.

    “Here it is,” he wrote. “I am dead and this is my last post to my blog. In advance, I asked that once my body finally shut down from the punishments of my cancer, then my family and friends publish this prepared message I wrote — the first part of the process of turning this from an active website into an archive.”

    Miller, who started blogging in 1997, was proud of the archive he had built over a decade and gave considerable thought to managing his digital legacy. He would have been pleased to know that his final post has been “liked” more than 31 000 times on Facebook and has received more than 1 260 comments to date.

    Planning ahead
    Miller was a rarity. Most people have not planned ahead for their imminent digital death. A survey last year commissioned by cloud computing company RackSpace estimated that Britons could have at least £2,3bn worth of personal information such as videos, books and photos stored in the cloud. But only 11% of respondents surveyed had left or planned to leave passwords to their “digital treasures” in their will — not really smart of the remaining 89%.

    “It is a good idea to give a trusted person your primary access credentials and including them as part of a will is a good way to do it,” said Paul Jacobson, an SA digital media lawyer and director of web.tech.law. He suggests using a password management service such as LastPass or 1Password to manage your passwords for various accounts. “Aside from the security benefits, these services also offer a way for your family members to access your cloud services when you are gone.”

    I share a Google Docs file with my husband in which we keep an updated list of our important accounts — e-mail, social media, online banking. A spouse or partner is the most obvious choice to be your “digital executor”, but if yours has temperamental, scheming, Blair Waldorf or Brooke Forrester tendencies, do not even think about it.

    Instead, consider using a “digital estate planning” service such as AfterSteps, Legacy Locker or SecureSafe. They all work in a similar way: you upload your documents, photos and login details, specify what you would like to happen to those accounts posthumously and then appoint beneficiaries who will receive this data by e-mail after you die and, hopefully, carry out your wishes.

    Of course, these services need to know of your death before this can happen. Two of your beneficiaries must report it to them with a copy of your death certificate and their identity documents. Premium pricing plans offer unlimited data storage and password listings and cost between $4 and $12 a month. It is like Dropbox for death for a few dollars.

    Death policy
    You can go an eerie step further and use GreatGoodbye or Dead Man’s Switch to send e-mails to friends and family after your death. The concept is simple: sign up, write your heartfelt messages, select recipients and then log in periodically to verify that you are alive. If you do not do so after three e-mail reminders, Dead Man’s Switch will assume the worst has happened and release your e-mails. If you are travelling or without Web access for a while, it is possible to postpone the verification process so that the service does not contact you during that period.

    In recent years, the major social networking sites have put death policies in place to address concerns from users (and parents of teenage users) about what happens to their profiles after they pass on. If they leave behind login details, it is easy for family members to fulfil their wishes, but without this it can be a mission.

    Take the case of Anthony “TJ” Cannata. Before he committed suicide last December, the 20-year-old posted a new Facebook profile picture — of himself holding a gun to his mouth. His friends and family e-mailed Facebook to take down the traumatic photo immediately, but it was removed only a month later after persistence from Cannata’s family and growing media attention.

    Facebook requires that a family member provide a copy of the death certificate and proof that he or she is a legally recognised representative of the deceased. According to figures floating around the Web, anywhere between 2m and 5m Facebook profiles belong to dead users. But the social network has yet to come up with an automated way to identify them.

    For now, it relies on memorial profiles to keep the site from turning into a digital graveyard. To memorialise a profile, a friend or family member of a dead user must fill out a request form and provide Facebook with a copy of the deceased’s death certificate or obituary.  Once a profile is memorialised, it is converted into a tribute page where only existing friends can view it and post messages of condolence. It will not appear in non-friends’ search results or under “people you may know”. But be prepared to wait — it could take two weeks or longer for a removal or memorial request to be honoured.

    If I die
    Social networks have also become the go-to gathering place for users to grieve or champion a cause, such as “Free photographer Anton Hammerl”. The Facebook campaign was set up by family friends Bronwyn Friedlander and Anso Thom on 12 April last year, a week after the award-winning photographer was captured by Gaddafi loyalists in Libya.

    Curiosity got the better of me so I recently installed Facebook’s If I Die app. A short video urged me to write or record my final words to be published to my Facebook profile. I was asked to choose three Facebook friends as “trustees” who will be responsible for notifying Facebook of my death, thereby giving the network the go-ahead to post my last words. Mine is: “Testing, testing. How can I tell if it works?”

    Twitter will not hand over a deceased user’s password under any circumstances because of privacy rules. To close a Twitter account, a verified family member or executor must submit paperwork including his or her identity document, the deceased’s death certificate and a signed statement requesting that the account be deactivated. Twitter can provide a copy of the deceased’s public tweets on request.

    Google offers everything from e-mail to blogging and social networking but, except for Gmail, it has no clear death policy in place. Google warns that gaining access to a dead user’s e-mail account is a lengthy process even for a verified family member or legal representative.

    You will need to provide a copy of your identity document, the deceased’s death certificate and the header and entire contents of any e-mail you received from the deceased’s account to prove you knew them or were in contact with them. That is not all: as with Yahoo, you will need to submit a court order to access the account.

    Web kids
    SA has no existing legislation that provides clarity on digital death, but lawmakers in the US are working on theirs. According to tech authority mashable.com, only five states — Oklahoma, Idaho, Rhode Island, Indiana and Connecticut — have laws governing digital property management after death, but they need to be updated to cover social media, electronic payments and online banking. The uniform law commission is also considering legislation for fiduciary access (trusting another party with powers) to digital property and assets.

    These may not be worth much, but as we increasingly share and store our lives online they are accruing enormous sentimental value. I, for one, would choose my blog over my jewellery box any day, but there is more to it than that. You see, I am one of them: the “Web kids” — as Polish writer Piotr Czerski calls us — who “grew up with the internet and on the Internet … the Internet to us is not something external to reality but a part of it: an invisible yet constantly present layer intertwined with the physical environment. We do not use the Internet, we live on the Internet and along it.”

    Preparing for a digital afterlife is not just practical; it is necessary. I do not know when or how I am going to die, but I know I do not want my last status update to be: “Eating muesli. So yum.” Do you?

    • Image: L Marie/Flickr
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleAcross Africa with two smartphones
    Next Article Infraco plans giant network overhaul

    Related Posts

    Big Tech is going nuclear

    Big Tech is going nuclear

    10 April 2026
    Microsoft is sacrificing Edge on the altar of Copilot

    Microsoft is sacrificing Edge on the altar of Copilot

    10 April 2026
    5G expected to reshape South Africa's wireless broadband market

    5G expected to reshape South Africa’s wireless broadband market

    10 April 2026
    Company News
    What South African parents look for in an online school - CambriLearn

    What South African parents look for in an online school

    9 April 2026
    Modernising legacy systems - without the downtime - BBD Software

    Modernising legacy systems – without the downtime

    9 April 2026
    M-KOPA's 2025 impact: women at the heart of digital inclusion

    M-KOPA’s 2025 impact: women at the heart of digital inclusion

    9 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Big Tech is going nuclear

    Big Tech is going nuclear

    10 April 2026
    Microsoft is sacrificing Edge on the altar of Copilot

    Microsoft is sacrificing Edge on the altar of Copilot

    10 April 2026
    5G expected to reshape South Africa's wireless broadband market

    5G expected to reshape South Africa’s wireless broadband market

    10 April 2026
    Warning that South Africa's digital competitiveness is in retreat

    Warning that South Africa’s digital competitiveness is in retreat

    10 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}