We started with the digital footprint - your online activity. Now let's talk about your devices.
The task of organizing logins, passwords, and security questions and answers on your mobile phone, computer, tablet, and home security devices seems overwhelming at first.
So, as we often repeat - take a breath and just one step at a time.
Then, for a week, review and note down your password every time you use your electronic devices - mobile phone, computer, tablet, or your home security systems. Remember that each new site, most apps, and most software will probably have security - i.e. login, password, and sometimes security questions and answers.
And don't forget that all sites your vist have cookies!
Try to do this exercise over several weeks to ensure you cover 90% of your activities. There will always be sites, pages, subscriptions, etc. that you use quarterly or annually that may eventually need to be included, but you will gradually adjust to adding new or revised information to your password log.
You can also look at the browsing history in your computer or bookmarked pages for less often used sites. This is a great starting point if you are trying to clear out the online presence of a loved one who has passed.
These may include sites for paying bills, Wi-Fi access, checking/savings/investment statements, movie rentals, mortgage (or rent) payments, utilities, social media access or dashboards, holiday card sites, event registrations, etc.
Remember: Your Executor/Executrixor Person-in-Charge (PIC) will need the passwords to open your phone, tablet, computer or home security systems to access critical information.
Make sure someone besides yourself knows how to find those access codes.
How much you use technology in your daily life will dictate how many devices will need to be cleared and disengaged. We have listed the most common, but there are certainly others.
Personal Stories: Online Aids for the Elderly or Handicapped
I have a friend whose mother is blind. Her mother uses recent technology and apps to listen in lieu of reading everything. So Alexa (her electronic connection) can not only tell her what time to take her daily pills, the device also records needed shopping items and reads audio books out loud.
Another friend only uses a laptop computer to download and print a supersized copy of the NYT crossword puzzle each week. If her family is not aware of her crossword puzzle activity, they might forget that she has a computer!
When you record your login information, remember that sometimes, there will be security questions to answer prior to accessing some sites.
I know that I have been stymied many times when asked what my answer was - from first pet to favorite song. Too many times I have had to start all over again and write down my questions and answers. All this information should be entered in your password log.
While I wouldn't recommend following this advice, another friend of mine told me that he always used the same word - no matter if it was 'what was your mother's maiden name' or 'what is your favorite dessert'.
I found the suggestion an intriguing solution to avoid the headache of not remembering (or writing down) answers. However, I have never asked a security professional for an opinion.
I suspect the answer would be - DON'T EVEN THINK ABOUT IT!
Companies with remote workers may use security tokens or remote security devices (RSID) to enable secure access to business sites. This "device" or "token" generates a new security code every 30 to 60 seconds. In order to sign into proprietary systems, you must use the code generated by the token.
If you have one of these devices, it is a good idea to include the company name, department, and phone number in your file of security codes. These devices are the property of the company and should be returned to the place of business. The proprietary software (or portal program) will need to be removed from any personal computers.
The same would apply for an Executor/Executrix overseeing the business affairs for someone who has died. They will need the basic information to return company tokens and terminate the portal/software access.
Outside of the United States, tokens are often used by financial institutions internationally to access personal financial accounts and make online transactions. This practice has not caught on as quickly in the States.
Home Security Systems
Lastly, make sure a trusted friend, family member, or neighbor has the appropriate security codes for your home in case of emergencies.
There are times that someone may need to enter your home - like a car accident. You may be temporarily incapable of providing security information.
Hopefully, there will be someone who knows where a spare key is located and what sort of security must be bypassed.
These days that security is most likely to be on a mobile phone. Make sure there is a back-up person or plan if the security provider needs to be contacted. There may be an elderly person or pet that needs attention or similar situations that require timely action.
It is a good idea to put an ICE (In Case of Emergency) contact number in your phone. It is the first number someone will look for it anything happens to you.
Also, you might consider noting for your designated Person-In-Charge (PIC) how many devices you have, so that all your computers, tablets, tokens, or phones are collected and properly secured.
For example, I have three laptops. One hasn't been used in more than three years, but I haven't recycled it yet. That will mean several logins for different computers. This is important information for the PIC who will be tracking your devices.
Apps & Online Activity: from utility accounts to banking & credit cards; from digital news subscriptions to personal medical records
Representative examples, but certainly not all:
Again, some examples but not all:
Step-by-step guide to what to do first. Calls, Paperwork, Care Arrangements, etc.
Where do you start? Physical remains, funeral options, death certificates, memorial services and more...
Next hurdle - how to handle financial records and accounts
Key reminders on securing residences - owned or rented, apartments or houses - after a loved one's death
Funny, helpful and special stories that others have shard to help you through the process
For each section, dowload and personalize a pdf checklist
This website uses cookies. By continuing to use this site, you accept our use of cookies.