2021 Colorado Code
Title 15 - Probate, Trusts, and Fiduciaries
Article 1 - Fiduciary
Part 15 - Revised Uniform Fiduciary Access to Digital Assets Act
§ 15-1-1503. Applicability

Universal Citation: CO Code § 15-1-1503 (2021)
  1. This part 15 applies to:
    1. A fiduciary acting under a will or power of attorney executed before, on, or after August 10, 2016;
    2. A personal representative acting for a decedent who died before, on, or after August 10, 2016;
    3. A conservatorship proceeding commenced before, on, or after August 10, 2016; and
    4. A trustee acting under a trust created before, on, or after August 10, 2016.
  2. This part 15 applies to a custodian if the user resides in this state or resided in this state at the time of the user's death.
    1. This part 15 does not apply to a digital asset of an employer used by an employee in the ordinary course of the employer's business.
    2. This part 15 does not apply to a digital asset of an entity used by a manager, owner, or other person in the course of the conduct of the internal affairs of the entity. The terms “entity”, “manager”, and “owner” in this paragraph (b) have the same meaning as defined in section 7-90-102, C.R.S.

History. Source: L. 2016: Entire part added,(SB 16-088), ch. 71, p. 181, § 1, effective August 10.


OFFICIAL COMMENT

This act does not change the substantive rules of other laws, such as agency, banking, conservatorship, contract, copyright, criminal, fiduciary, privacy, probate, property, security, trust, or other applicable law except to vest fiduciaries with authority, according to the provisions of this act, to access or copy digital assets of a decedent, protected person, principal, settlor, or trustee.

Subsection (1)(b) covers the situations in which a decedent dies intestate, so it falls outside of subsection (1)(a), as well as the situations in which a state's procedures for small estates are used.

Subsection (2) states that custodians are subject to the act if the custodian's user was a resident of the enacting state. This includes out-of-state custodians, who must respond to requests for access in the same way that out-of-state banks or credit card companies must respond to requests from a fiduciary requesting access to a customer's account.

Subsection (3) clarifies that the act does not apply to a fiduciary's access to an employer's internal email system.

D dies, employed by Company Y. Company Y has an internal e-mail communication system, available only to Y's employees, and used by them in the ordinary course of Y's business. D's personal representative, R, believes that D used Company Y's e-mail system to effectuate some financial transactions that R cannot find through other means. R requests access from Company Y to the e-mails.

Example 1--Fiduciary access to an employee e-mail account.

Company Y is not a custodian subject to the act. Under Section 1502(8), a custodian must carry, maintain or store a user's digital assets. A user, under Section 1502(26) must have an account, and an account, in turn, is defined under Section 1502(1) as a contractual arrangement subject to a terms-of-service agreement. Company Y, like most employers, did not enter into a terms-of-service agreement with D, so Y is not a custodian.

D dies, employed by Company Y. Company Y is an electronic-communication service provider. Company Y has an internal e-mail communication system, available only to Y's employees and used by them in the ordinary course of Y's business. D used the internal Company Y system. When not at work, D also used an electronic-communication service system that Company Y provides to the public. D's personal representative, R, believes that D used Company Y's internal e-mail system as well as Company Y's electronic- communication system available to the public to effectuate some financial transactions. R seeks access to both communication systems.

Example 2--Employee of electronic-communication service provider.

As is true in Example 1, Company Y is not a custodian subject to the act for purposes of the internal email system. The situation is different with respect to R's access to Company Y's system that is available to the public. Assuming that Company Y can disclose the communications under federal law and R meets the other requirements of this act, Company Y must disclose them to R.


Disclaimer: These codes may not be the most recent version. Colorado may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.