In some U.S. states and other jurisdictions, it is possible to grant a springing power of attorney; i.e., a power that takes effect only after the incapacity of the grantor or some other definite future act or circumstance.[10] After such incapacitation the power is identical to a durable power, but cannot be invoked before the incapacity. This power may be used to allow a spouse or family member to manage the grantor's affairs in case illness or injury makes the grantor unable to act.[17] If a springing power is used, the grantor should specify exactly how and when the power springs into effect. As the result of privacy legislation in the U.S., medical doctors will often not reveal information relating to capacity of the principal unless the power of attorney specifically authorizes them to do so.
There are several identify theft protection services that help people avoid and mitigate the effects of identity theft. Typically, such services provide information helping people to safeguard their personal information; monitor public records, as well as private records such as credit reports, to alert their clients of certain transactions and status changes; and provide assistance to victims to help them resolve problems associated with identity theft.
One relatively new aspect of estate planning is digital assets. Things like email accounts, social media pages, blogs, websites, and media stored in the Cloud all qualify as digital assets, and you’ll need to decide who gets which assets after you pass away. Many of us now use Cloud services to store our family photos and videos instead of traditional photo albums and physical videos, so your family will want to be able to access these cherished memories. 

Privacy researcher Pam Dixon, the founder of the World Privacy Forum,[16] coined the term medical identity theft and released the first major report about this issue in 2006. In the report, she defined the crime for the first time and made the plight of victims public. The report's definition of the crime is that medical identity theft occurs when someone seeks medical care under the identity of another person. Insurance theft is also very common, if a thief has your insurance information and or your insurance card, they can seek medical attention posing as yourself.[17] In addition to risks of financial harm common to all forms of identity theft, the thief's medical history may be added to the victim's medical records. Inaccurate information in the victim's records is difficult to correct and may affect future insurability or cause doctors relying on the misinformation to deliver inappropriate care. After the publication of the report, which contained a recommendation that consumers receive notifications of medical data breach incidents, California passed a law requiring this, and then finally HIPAA was expanded to also require medical breach notification when breaches affect 500 or more people.[18][19] Data collected and stored by hospitals and other organizations such as medical aid schemes is up to 10 times more valuable to cybercriminals than credit card information.
Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form of information security control known as risk avoidance). This implies that organizations, IT systems and procedures should not demand excessive amounts of personal information or credentials for identification and authentication. Requiring, storing and processing personal identifiers (such as Social Security number, national identification number, driver's license number, credit card number, etc.) increases the risks of identity theft unless this valuable personal information is adequately secured at all times. Committing personal identifiers to memory is a sound practice that can reduce the risks of a would-be identity thief from obtaining these records. To help in remembering numbers such as social security numbers and credit card numbers, it is helpful to consider using mnemonic techniques or memory aids such as the mnemonic Major System.
Both a Medical Power of Attorney and a Living Will act in the same way in that both cater towards a person’s medical wishes. A Living Will specifically handles end-of-life health care situations whereas a medical power of attorney covers a broad range of healthcare decisions and only goes into effect when a person becomes incapacitated (unable to think for themselves).
Most living wills have the option of adding a health care agent to carry out the patient’s intended wishes. This is helpful in the event that there is a gray area where maybe the agent selected feels there is a good chance for survival and will opt against a decision made in the living will. Otherwise, the Principal can choose to neglect this portion of the document and have doctors and medical staff specifically adhere to what is written in the living will.
In Canada, Privacy Act (federal legislation) covers only federal government, agencies and crown corporations. Each province and territory has its own privacy law and privacy commissioners to limit the storage and use of personal data. For the private sector, the purpose of the Personal Information Protection and Electronic Documents Act ( 2000, c. 5 ) (known as PIPEDA) is to establish rules to govern the collection, use and disclosure of personal information; except for the provinces of Quebec, Ontario, Alberta and British Columbia where provincial laws have been deemed substantially similar.
A living will can be created by an individual within one (1) day. It does not need to be made with an attorney or filed with a government office. All that is required is for the Principal (the patient) to enter their end-of-life treatment options and have the living will signed in the presence of a notary public and/or witnesses (depending on State Laws).
In a widely publicized account,[79] Michelle Brown, a victim of identity fraud, testified before a U.S. Senate Committee Hearing on Identity Theft. Ms. Brown testified that: "over a year and a half from January 1998 through July 1999, one individual impersonated me to procure over $50,000 in goods and services. Not only did she damage my credit, but she escalated her crimes to a level that I never truly expected: she engaged in drug trafficking. The crime resulted in my erroneous arrest record, a warrant out for my arrest, and eventually, a prison record when she was booked under my name as an inmate in the Chicago Federal Prison."
The Texas general power of attorney form grants broad powers to an individual selected to handle business affairs, representation, and all real personal and property actions on another’s behalf. The form grants the exact same powers to the agent as the Durable form except that this document does not remain in effect if the principal should become incapacitated and unable to think for themselves. For…
Under English law (which extends to Wales but not to Northern Ireland or Scotland), the deception offences under the Theft Act 1968 increasingly contend with identity theft situations. In R v Seward (2005) EWCA Crim 1941[49] the defendant was acting as the "front man" in the use of stolen credit cards and other documents to obtain goods. He obtained goods to the value of £10,000 for others who are unlikely ever to be identified. The Court of Appeal considered a sentencing policy for deception offenses involving "identity theft" and concluded that a prison sentence was required. Henriques J. said at para 14:"Identity fraud is a particularly pernicious and prevalent form of dishonesty calling for, in our judgment, deterrent sentences."
Next, start adding your non-tangible assets to your list, such as things you own on paper or other entitlements that are predicated on your death. Items listed here would include brokerage accounts, 401(k) plans, IRAs, bank accounts, life insurance policies, and other policies such as long-term care, homeowners, auto, disability, and health insurances.
Seek legal counsel in the creation of a will. A will can be effective in an estate transfer and other legal proceedings after death, but there are drawbacks of which you should be aware. Your estate will become part of the public record, for example, and anything left by a will must go through probate court. Also, probate attorneys can be expensive and cannot be avoided, except in California and Wisconsin.

Keep the original forms in a safe place. In Texas, you do not have to submit the power of attorney forms to any agency for it to be valid. You just have to keep an original or copies with you at all times in case you may need it in the future. You might want to keep the original document in a safe at home or in a safe deposit box at a bank. If a lawyer drafts a power of attorney for you, they will automatically keep the original documents on file in their office.


A variation of identity theft which has recently become more common is synthetic identity theft, in which identities are completely or partially fabricated.[14] The most common technique involves combining a real social security number with a name and birthdate other than the ones associated with the number. Synthetic identity theft is more difficult to track as it doesn't show on either person's credit report directly but may appear as an entirely new file in the credit bureau or as a subfile on one of the victim's credit reports. Synthetic identity theft primarily harms the creditors who unwittingly grant the fraudsters credit. Individual victims can be affected if their names become confused with the synthetic identities, or if negative information in their subfiles impacts their credit ratings.[15]

As a licensed Texas attorney, I’m proud to serve residents of our great state by providing cost-effective solutions to legal matters. I frequently work with on-the-go professionals, families and everyday people just like you to create estate plans that provide peace of mind. My firm relies on the same technology used by online banking and government institutions to keep your data secure. Additionally, all communications we exchange is bound by strict professional standards.

×