Digital legacy planning
How do I plan for my digital accounts and data after I die?
Projekt-Plan
{{whyLabel}}: You cannot protect what you haven't documented; your heirs need a map of your digital existence.
{{howLabel}}:
- List all categories: Financial (banking, crypto), Social Media, Communication (email), Cloud Storage (photos, docs), and Subscriptions.
- Use a simple spreadsheet or a secure note in a password manager.
- Do not write down passwords here; only the service name and the associated email address.
{{doneWhenLabel}}: A complete list of at least 15-20 primary digital services is documented.
{{whyLabel}}: Not all accounts are equal; some require immediate action (banking) while others are sentimental (photos).
{{howLabel}}:
- Label each item as 'Critical' (Financial/Legal), 'Sentimental' (Photos/Videos), or 'Disposable' (Shopping/Forums).
- Identify which accounts have monetary value (e.g., PayPal balances, Reward points, Crypto wallets).
- Mark accounts that will cause identity theft risks if left unattended.
{{doneWhenLabel}}: Every item in your inventory has a priority tag and a basic 'action intent' (e.g., 'Delete' or 'Transfer').
{{whyLabel}}: Google provides a native way to share data or delete your account after a period of inactivity.
{{howLabel}}:
- Go to 'myaccount.google.com' and search for 'Inactive Account Manager'.
- Set a timeout period (e.g., 3 or 6 months of inactivity).
- Add up to 10 trusted contacts who will receive a link to download specific data (Drive, Photos, Gmail).
- Decide if the account should be deleted after the data is shared.
{{doneWhenLabel}}: The Inactive Account Manager status is 'On' with at least one verified contact.
{{whyLabel}}: Apple's 'Digital Legacy' program allows designated people to access your iCloud data after your passing without needing your passcode.
{{howLabel}}:
- On iPhone/Mac: Go to Settings > [Your Name] > Password & Security > Legacy Contact.
- Choose a trusted person and share the unique Access Key with them.
- Inform them that they will need this key and your death certificate to request access.
{{doneWhenLabel}}: A Legacy Contact is added and the Access Key is securely shared or printed.
{{whyLabel}}: This allows someone to manage your memorialized profile, pin a final post, or respond to new friend requests.
{{howLabel}}:
- Go to Settings & Privacy > Settings > Accounts Center > Personal Details > Account Ownership and Control.
- Select 'Memorialization' and choose a friend or family member.
- Decide whether to allow them to download a copy of your Facebook data.
{{doneWhenLabel}}: A Legacy Contact is selected and notified via the platform.
{{whyLabel}}: A password manager is the single most effective tool for digital legacy, as it holds the 'keys to the kingdom'.
{{howLabel}}:
- Choose a reputable service (e.g., Bitwarden for open-source, or 1Password).
- Import all credentials from browsers or old lists.
- Ensure every account has a unique, strong password.
{{doneWhenLabel}}: All primary accounts from your inventory are stored in the password manager.
{{whyLabel}}: This feature allows a trusted person to request access to your entire vault if you don't respond within a set timeframe.
{{howLabel}}:
- In Bitwarden or 1Password, navigate to 'Emergency Access' or 'Family Organizer' settings.
- Invite your digital executor via their email address.
- Set a 'Wait Time' (e.g., 7 days) before access is granted to prevent unauthorized access while you are alive.
{{doneWhenLabel}}: An emergency contact has accepted the invitation and the wait period is configured.
{{whyLabel}}: Two-Factor Authentication (2FA) can lock out heirs even if they have your password. Recovery codes are the only bypass.
{{howLabel}}:
- For every critical account (Email, Finance), go to Security settings and 'Download Recovery Codes'.
- Store these codes digitally in your password manager's 'Secure Notes' or print them for a physical folder.
- Do not rely on SMS 2FA, as phone lines are often disconnected quickly after death.
{{doneWhenLabel}}: Recovery codes for at least your primary email and banking accounts are secured.
{{whyLabel}}: In case of total digital failure or immediate need, a physical backup provides a tangible starting point for your family.
{{howLabel}}:
- Print a 'Master Sheet' containing: Your Master Password (if not shared via Emergency Access), device PINs, and a list of your most important accounts.
- Include instructions on where to find your legal Will.
- Store this in a fireproof safe or with a trusted legal professional.
{{doneWhenLabel}}: A physical folder exists in a secure, known location.
{{whyLabel}}: A traditional executor may not be tech-savvy; a digital executor specifically handles your online presence.
{{howLabel}}:
- Choose someone who is technically competent and trustworthy.
- Formally name them in your Will or a 'Codicil' (legal amendment).
- Ensure they know where your 'Emergency Folder' or Password Manager access is located.
{{doneWhenLabel}}: A person is chosen and has verbally agreed to the role.
{{whyLabel}}: A Will is a public document; a private letter provides the 'how-to' details without exposing sensitive info to the public record.
{{howLabel}}:
- Write clear instructions for each priority account (e.g., 'Close my LinkedIn', 'Keep my Google Photos for the kids').
- Specify what to do with hardware (laptops, external drives, encrypted USBs).
- Mention how to handle subscription cancellations to save the estate money.
{{doneWhenLabel}}: A written document (digital or physical) exists and is attached to your estate planning papers.
{{whyLabel}}: Digital lives change rapidly; passwords expire, new accounts are created, and platforms change their legacy policies.
{{howLabel}}:
- Set a recurring calendar invite for every 6 months (e.g., Jan 1st and July 1st).
- Review your inventory for new accounts.
- Verify that your Emergency Contacts in Google/Apple/Password Manager are still the people you want.
- Update any physical 'Master Sheets' if passwords have changed.
{{doneWhenLabel}}: A recurring calendar event is created with a checklist in the description.