
Comprehensive Guide to Digital Asset Planning in Hopewell, Tennessee
Digital asset planning involves identifying, organizing, and creating a strategy for managing online accounts, cryptocurrencies, digital photos, domain names, and other intangible property so that your wishes are honored and your heirs have clear instructions. In Hopewell and Bradley County, Jay Johnson Law Firm helps people understand what digital assets exist, how to allow trusted individuals to access them, and how to include those assets in broader estate planning documents. This introduction outlines why allocating time to digitally oriented planning today reduces uncertainty later and eases practical transitions for family and fiduciaries.
Many people assume that online accounts and passwords automatically pass to heirs, but digital platforms and state law can restrict access without proper planning. For residents of Hopewell, Tennessee, creating an organized plan for digital assets means cataloging accounts, naming trusted contacts, and documenting preferred directions for preservation or deletion. That work is part of a larger estate planning and probate approach tailored to family goals. Clear records and legal documents reduce disputes, speed administration, and ensure that sentimental or financial digital property is handled in line with the owner’s intentions.
Why Digital Asset Planning Matters for Hopewell Families
Digital asset planning protects both sentimental items and financial holdings by making arrangements for access and disposition before a capacity lapse or passing occurs. It provides heirs and fiduciaries with instructions to manage social media accounts, online photo libraries, email archives, cryptocurrency wallets, and access to subscription services. In practical terms, a clear plan prevents loss of memories, avoids unnecessary account suspensions, and helps preserve monetary value where applicable. For residents of Hopewell, having a documented strategy reduces family stress and expedites estate administration under Tennessee law.
About Jay Johnson Law Firm and Our Approach in Hopewell
Jay Johnson Law Firm, based in Hendersonville and serving Hopewell and surrounding communities, takes a practical approach to digital asset planning within estate planning and probate matters. The firm focuses on clear communication, careful documentation, and step‑by‑step guidance so clients know what to expect. We work with individuals to catalog digital holdings, draft necessary authority in wills or powers of attorney, and coordinate with online account providers when needed. The goal is to create plans that are manageable, legally sound in Tennessee, and aligned with each client’s personal and family priorities.
Understanding Digital Asset Planning and Its Scope
Digital asset planning is more than listing passwords; it involves identifying types of property, deciding how each should be managed or transferred, and documenting authority for fiduciaries to act. Common categories include financial accounts like online banking and cryptocurrency, content sites such as photo or video libraries, domain names and websites, email accounts, and social media profiles. Each category can have different rules set by platform providers and may require distinct instructions or legal authorizations. A thorough plan anticipates those differences and helps prevent lost value or inaccessible content.
A practical digital asset plan often includes an inventory, secure storage of account access information, named digital delegates or fiduciaries, and explicit directions for retention or deletion of materials. In Tennessee, combining these elements with conventional estate planning documents helps ensure that fiduciaries have authority recognized by institutions and providers. For families, the planning process saves time during probate or administration, reduces guesswork for loved ones, and allows the decedent’s preferences for privacy and disposition to be followed responsibly and respectfully.
Defining Digital Assets and How They Differ from Physical Property
Digital assets include any property that exists in digital form, whether it has sentimental or financial value. Unlike tangible property, digital assets often require usernames, passwords, or cryptographic keys for access. Some platforms permit account transfer or legacy contacts, while others bar access even to estate representatives. Understanding these distinctions is important because different management methods are required for each type. A clear plan accounts for access protocols, legal authorization, and the preferred method of disposition so that digital holdings are preserved or removed in line with the owner’s wishes.
Key Elements and Core Processes in Digital Asset Planning
Effective digital asset planning combines several components: a comprehensive inventory of accounts and items, secure storage of access information, legal documents granting authority to act, and clear disposition instructions. The process includes reviewing account provider policies, deciding who will be responsible for each task, and updating records periodically as accounts change. Coordination with other estate planning steps ensures that digital assets are addressed alongside wills, trusts, and powers of attorney. This integrated approach minimizes ambiguity and helps families carry out decisions smoothly after an owner is no longer able to manage affairs.
Key Terms and Glossary for Digital Asset Planning
A short glossary helps demystify terms encountered during digital asset planning. Knowing the meaning of terms such as digital delegate, access keys, and account provider policy can reduce confusion during planning and later when fiduciaries act. Familiarity with these concepts helps individuals create practical instructions and ensures communication with family and service providers is clearer. This descriptive section aims to give Hopewell residents a foundation of language that makes the planning process more approachable and lets them make informed choices about the handling of their digital property.
Digital Inventory
A digital inventory is a list of online accounts, storage locations, and items of value that a person maintains. It typically includes usernames, the type of account, and the provider, along with notes about importance and desired disposition. Creating and maintaining an inventory allows trusted individuals to locate assets and follow instructions without unnecessary delay. The inventory should be stored securely and updated regularly to reflect new accounts, changed passwords, or altered preferences. Clear labeling within the inventory also helps fiduciaries prioritize actions after incapacity or death.
Legacy Contact
A legacy contact is a person designated by an account holder to manage or receive information about an online account after the account owner dies or becomes incapacitated. Some providers offer built‑in legacy contact options; others require legal documentation or direct communication with the provider. Designating a legacy contact should be combined with clear written instructions so that the person knows how the owner wants the account handled. It is also important to verify the provider’s policy on what a legacy contact can and cannot do to avoid surprises during administration.
Access Authorization
Access authorization refers to the legal or practical means used to permit a fiduciary to access and manage digital accounts. This can include powers of attorney that explicitly mention digital assets, passwords stored in a secure vault with instructions, or provider‑specific settings that allow access. Since many online services restrict access without explicit authorization, ensuring that documents and account settings align is essential. Proper access authorization reduces the risk that platforms will refuse to cooperate with family members or estate administrators during an already sensitive time.
Cryptographic Keys and Wallets
Cryptographic keys and wallets are tools used to access and control cryptocurrency and other blockchain‑based assets. Unlike accounts secured by usernames and passwords, access to these assets often depends entirely on possession of private keys or seed phrases. Loss of those keys can result in permanent loss of the asset. Planning requires secure storage of keys, instructions for lawful transfer, and decisions about whether and how to grant fiduciaries the ability to transact. Proper handling is essential to preserve the monetary value of these holdings.
Comparing Limited and Comprehensive Digital Asset Approaches
When planning for digital assets, individuals often choose between a limited approach that addresses only specific accounts or a comprehensive approach that seeks to cover all categories and contingencies. A limited approach may be faster and less costly but can leave gaps if newly created accounts are not included. A comprehensive approach is more thorough, aiming to provide clear rules and authority across platforms, account types, and scenarios. The right choice depends on personal asset complexity, comfort with technology, and how much time one wants to invest in ongoing maintenance.
When a Limited Digital Plan May Be Appropriate:
Simple Account Portfolios
A limited digital asset approach can be adequate for individuals with only a few online accounts or modest digital holdings. If a person maintains primarily email, a single social media profile, and a couple of subscription services, focusing on those specific items can provide a workable path for heirs. The process typically involves providing clear login instructions, naming a local contact, and noting any sentimental materials that should be preserved. This pragmatic route can meet needs while keeping maintenance manageable over time.
Low Financial Exposure
When digital holdings have minimal financial value and the primary concern is access to memories or continuity of communication, a narrow plan may be sufficient. For example, a person whose online presence is largely personal photos, blog posts, and family messages can focus on ensuring those items are preserved or removed according to preference. Clear labeling and a trusted contact will often accomplish the client’s goals without the need for extensive legal structures or ongoing monitoring of new accounts or digital transactions.
When a Comprehensive Digital Asset Plan Is Advisable:
Complex Financial and Digital Holdings
A comprehensive planning approach is advisable when digital assets include financial accounts, multiple cloud services, cryptocurrency, or business‑related domains and content. These situations require careful coordination among legal documents, account provider policies, and secure storage methods. A full plan reduces the chance that valuable assets will be inaccessible, mismanaged, or lost. For families and fiduciaries, the assurance that every significant item has been considered reduces the administrative burden and helps ensure affairs are handled effectively under Tennessee law.
High Privacy or Confidentiality Concerns
When an account holder is particularly concerned about privacy, confidential records, or legacy wishes, a comprehensive plan allows detailed instructions about deletion, archiving, or controlled disclosure. It also enables selection of fiduciaries or trustees with clearly defined powers and responsibilities, and it clarifies how to interact with providers that may have strict rules. By considering these issues in advance, individuals can protect sensitive content while ensuring necessary access for legal, financial, or family purposes.
Benefits of a Full Digital Asset Strategy
A comprehensive approach to digital asset planning increases predictability and reduces the likelihood of disputes during estate administration. By cataloging assets, documenting access methods, and providing explicit disposition instructions, families can avoid the confusion that leads to delays or contention. This kind of plan also ensures that monetary assets and sentimental materials are not inadvertently lost due to inaccessible credentials or platform restrictions. Across Hopewell and Bradley County, planning like this can save time and emotional strain when organizing a loved one’s affairs.
Comprehensive planning supports continuity for personal and business digital presence by making sure domain names, websites, and online business tools are managed according to the owner’s wishes. It provides fiduciaries with clearer authority and instructions, which can encourage cooperation from service providers and reduce friction in administration. Routine updates to the plan mean new accounts are not overlooked, and regular review keeps the strategy aligned with changes in technology and provider policies. The result is a more resilient and transparent path forward for families.
Peace of Mind and Reduced Administration Burden
One major benefit of a comprehensive plan is the ease it creates for loved ones tasked with administration. With clear documents, an updated inventory, and designated authority, fiduciaries can act without searching for missing information or guessing the decedent’s intentions. This reduces the emotional strain and time required to settle affairs. In addition, well‑documented plans often speed the administrative process and help preserve the value and integrity of digital holdings, which is especially helpful when multiple accounts and providers are involved.
Protection of Financial Value and Sentimental Assets
A comprehensive plan helps prevent complete loss of valuable digital property by ensuring keys, passwords, and instructions are accessible to the right people under the right conditions. For cryptocurrency and online accounts with monetary balances, access is the key to value. For sentimental assets like photos and messages, planning ensures those items are preserved according to the owner’s preferences. This protection reduces the chance of irreversible loss and provides a documented path for heirs and fiduciaries to follow.

Practice Areas
Estate Planning and Probate Services
Top Searched Keywords
- digital asset planning Hopewell
- digital estate planning Tennessee
- cryptocurrency estate planning Hopewell
- online account legacy planning
- how to leave digital assets
- estate planning for digital assets Bradley County
- password and digital asset inventory
- digital fiduciary authority Tennessee
- Jay Johnson Law Firm digital assets
Practical Tips for Managing Digital Assets
Create and Maintain a Secure Inventory
Start with a single, secure document that lists accounts, service providers, usernames, locations of backup keys, and the preferred disposition for each item. Keep the inventory in an encrypted file or a trusted physical safe and update it when passwords or accounts change. Include notes about sentimental items and any business‑related credentials. A maintained inventory makes it far easier for a named fiduciary to locate accounts and follow instructions, limiting delays and confusion during administration.
Use Provider Legacy Tools Where Available
Coordinate with Traditional Estate Documents
Include digital asset provisions within wills, trusts, and powers of attorney so fiduciaries have a clear legal basis for managing accounts. Explicitly reference digital property and give instructions about access, preservation, or deletion. Because account providers sometimes have their own rules, coordinate legal documents with provider settings and the inventory. Regularly review these documents to keep pace with technological and personal changes, ensuring the plan remains effective and follows your preferences over time.
Reasons to Consider Digital Asset Planning in Hopewell
Digital assets are increasingly integral to personal and financial life, and planning helps ensure a smooth transition of those assets according to the owner’s desires. Whether the main concern is preserving family photos, transferring domain names, or ensuring access to online accounts with monetary value, a plan reduces uncertainty. For residents of Hopewell, Tennessee, taking steps now makes administration easier for loved ones and helps prevent disputes or accidental loss of important materials when the time comes to settle affairs.
Another reason to plan is to reduce administrative delays and costs. When accounts are organized and authority is clear, fiduciaries can act more efficiently with fewer obstacles from providers or third parties. Planning also allows you to set privacy preferences and legacy directions, stating whether content should be preserved, shared, or removed. These decisions provide peace of mind and protect both sentimental and financial assets from being overlooked or mishandled at a difficult time.
Common Situations That Lead People to Plan Their Digital Assets
People often begin digital asset planning after life changes such as marriage, the birth of a child, retirement, or following the creation of new online financial accounts. Other triggers include starting an online business, acquiring cryptocurrency, or realizing that important family photos and documents are stored only in cloud accounts. Planning is also prompted by concerns about incapacity and the desire to have clear instructions in place. These circumstances highlight the value of addressing digital assets alongside traditional estate planning steps.
Starting an Online Business or Website
When someone creates a website, domain, or online business, digital assets can have ongoing commercial value that should be preserved and transferred according to a plan. Business credentials, hosting accounts, and payment processors need documented access paths. Failure to plan can interrupt operations or result in loss of customers and revenue. For business owners, integrating digital asset provisions into broader succession planning helps ensure continuity and reduces the risk of disruption to clients and partners after the owner is no longer able to participate.
Accumulation of Significant Digital Media
Many people accumulate large libraries of photos, videos, and other sentimental files stored across multiple platforms. Without instructions, loved ones may not know which items to preserve and how to retrieve them. A planning process that catalogs the media, notes storage locations, and gives retention preferences will preserve family history and memories. Including these details during estate planning avoids the loss of irreplaceable content and provides a roadmap for the care of digital keepsakes.
Ownership of Cryptocurrency or Digital Investments
Cryptocurrency and blockchain assets require special handling because access depends on possession of private keys or seed phrases. If keys are lost or not properly documented, those assets may be permanently inaccessible. Planning should include secure key storage, instructions for transfer, and clear assignment of responsibility to a trusted person. Proper documentation protects the economic value of such holdings and prevents families from facing complex technical hurdles during estate administration.
Digital Asset Planning Services for Hopewell Residents
Jay Johnson Law Firm provides guidance for Hopewell residents seeking to organize and protect their digital assets as part of a comprehensive estate planning portfolio. The firm helps clients identify accounts and document wishes for disposition, while also advising on provider policies and secure storage options. Services include drafting language for wills and powers of attorney that address online accounts and working with clients to develop an ongoing maintenance routine. The aim is to leave a clear path for loved ones to follow when managing digital property.
Why Choose Jay Johnson Law Firm for Digital Asset Planning
Choosing legal guidance for digital asset planning should focus on clear communication, practical documentation, and an approach that fits individual needs. Jay Johnson Law Firm prioritizes creating plans that are simple to follow and legally appropriate for Tennessee. We work with clients to inventory accounts, design secure storage of access information, and include necessary provisions in wills or powers of attorney so fiduciaries can act. The emphasis is on reducing administrative burdens for loved ones and ensuring that wishes for digital property are respected.
The firm takes time to explain provider policies and how they interact with legal documents so clients understand the limitations and possibilities for each account. We help clients choose practical solutions for legacy contacts, instructions for deletion or preservation, and methods for keeping records current. Our goal is to produce plans that are actionable and aligned with client priorities, giving family members the tools they need to manage digital assets with minimal confusion when the time comes.
Working together, we tailor each plan to the client’s technology use and family structure, whether the needs are modest or involve complex financial holdings. For residents of Hopewell and Bradley County, we aim to provide a sensible, sustainable plan that reduces the likelihood of lost assets or disputes. Clients receive clear documentation and guidance on maintaining the plan over time, ensuring confidence that their digital assets will be handled appropriately in the future.
Get Started with Your Digital Asset Plan Today
How Digital Asset Planning Works at Our Firm
Our process begins with a consultation to identify the digital accounts and assets that matter to you, followed by the creation of an inventory and discussion of preferred disposition. We then recommend appropriate legal language to include in wills, powers of attorney, or trusts and help implement secure storage solutions for access information. Finally, we review and update the plan periodically. This structured approach ensures your instructions are documented, providers are accounted for, and fiduciaries have the information necessary to act when needed.
Step One: Account Identification and Inventory
In the first step we work to identify all relevant digital accounts and locations where digital property is stored. This includes financial accounts, email, cloud storage, social platforms, domain names, and any blockchain wallets. We help clients gather essential details and organize them in a secure inventory that can be referenced by designated fiduciaries. Accurate identification is essential because it forms the basis for the instructions and authorizations included in subsequent planning documents.
Cataloging Financial and Access Details
During cataloging, we focus on accounts with financial value and the access credentials that control them. For cryptocurrency and similar assets, we identify key storage methods and provide guidance on secure retention. Clients are encouraged to store backup keys or seed phrases in a secure place with clear directions to fiduciaries. This part of the process reduces risk of permanent loss and ensures that monetary holdings are discoverable and transferable according to the owner’s intentions.
Listing Personal and Sentimental Files
We also catalog items of sentimental value, such as photo libraries, videos, and personal correspondence stored online. Identifying these items and indicating whether they should be preserved, shared, or deleted gives clear guidance to those who will manage digital legacies. This step helps prevent the accidental deletion of irreplaceable memories and provides families with the clarity needed to make decisions consistent with the owner’s preferences.
Step Two: Drafting Legal Authority and Instructions
Once the inventory is in place, we draft or amend wills, powers of attorney, and other documents to include clear instructions about digital assets and designation of authority. The documents reference relevant accounts where appropriate and provide fiduciaries with the authority needed to interact with providers. This step also addresses privacy preferences and specific disposition instructions. Proper drafting reduces the chance that service providers will deny access due to unclear documentation and helps families follow the owner’s intentions.
Integrating Digital Provisions into Estate Documents
Integrating digital provisions into estate documents means explicitly naming or describing digital assets and granting fiduciaries the power to access, preserve, or dispose of them. Language is crafted to work with Tennessee law and to reflect the practical realities of various providers. By placing these provisions within standard estate documents, fiduciaries’ authority is more likely to be recognized by third parties, reducing the friction that can otherwise arise during administration.
Addressing Provider Policies and Limitations
We review major providers’ policies to understand what permissions they grant to legacy contacts and estate representatives. Where providers impose limitations, we advise on alternative steps such as preserving copies of content or elevating legal documentation. This proactive review helps set realistic expectations and shapes the instructions included in legal documents so that fiduciaries are better prepared to navigate provider requirements when acting on behalf of the account holder.
Step Three: Implementation and Ongoing Maintenance
The final step involves implementing secure storage for access information, educating named fiduciaries, and scheduling periodic reviews to keep the plan current. We help clients choose secure options for storing credentials and provide guidance on when to update inventory entries or legal documents. Ongoing maintenance is critical because new accounts and services frequently appear. Regular check‑ins ensure that the plan remains aligned with the client’s wishes and technological developments.
Secure Storage and Communication with Fiduciaries
We advise on secure methods for storing login information and keys, such as encrypted files or safe deposit boxes, and recommend a plan for communicating with fiduciaries without exposing sensitive details prematurely. Training or a simple walkthrough with the designated person can improve readiness and reduce delays. Clear instructions about when and how fiduciaries should act help ensure that accounts are handled responsibly and that privacy preferences are respected throughout the transition.
Periodic Review and Updates
Because digital lives evolve, periodic review of inventories and legal documents is important. We recommend scheduled check‑ups to add new accounts, update access information, and revise disposition choices as circumstances change. This practice keeps the plan functional over time and reduces the chance that valuable assets will be missed. Regular updates also allow incorporation of changes in provider policies and emerging best practices for secure digital asset management.
Common Questions About Digital Asset Planning
What exactly counts as a digital asset?
Digital assets include online accounts, electronic files, digital media, domain names, and blockchain assets such as cryptocurrencies. They also encompass subscription services, email accounts, cloud storage, photo libraries, and any data or content that exists primarily in digital form. While some of these items have clear economic value, others are valuable for sentimental reasons, and a planning approach should account for both. Clarifying which items matter to you helps shape a practical plan for access and disposition.Because providers have varying rules, a thorough planning process also documents where accounts are stored, who should have access, and the preferred handling of each item. This helps reduce confusion for family members and administrators and creates a roadmap for preserving important content and financial value after incapacity or death.
How can I let someone access my online accounts after I’m gone?
Allowing someone access to online accounts can be achieved through a combination of provider settings, secure storage of access information, and legal authorization. Some services provide legacy contact options that permit limited posthumous access; others require a court order or explicit legal documentation. Recording where credentials are stored and naming a trusted person in account settings where possible helps with immediate access when needed.Legal documents such as powers of attorney and wills can include provisions granting fiduciaries authority to manage digital property. Combining these documents with a private, secure inventory and clear instructions helps ensure that fiduciaries have both the practical means and legal basis to act on your behalf when access is necessary.
Do wills and powers of attorney cover digital assets in Tennessee?
Wills and powers of attorney can include language that addresses digital assets and grants authority to fiduciaries to access and manage online accounts. In Tennessee, it is wise to specify digital property in these documents and to coordinate them with provider policies. A will typically takes effect after death, while a power of attorney can authorize action during incapacity. Both documents should be carefully drafted to avoid ambiguity and support interaction with service providers.Because platform rules differ, it is helpful to pair legal documents with an up‑to‑date inventory and any account settings that delegate limited access. This combination increases the likelihood that fiduciaries will be able to carry out the account holder’s instructions with minimal friction from providers or third parties.
What should I do about cryptocurrency and private keys?
Cryptocurrency requires clear planning because access depends on private keys or seed phrases rather than usernames and passwords. Securely storing keys in an encrypted vault, a physical safe, or an institution that supports secure custody can prevent permanent loss. Documenting where keys are located and how fiduciaries are to proceed is essential to preserving any monetary value associated with blockchain assets.Consider whether keys should be entrusted to a fiduciary or held in a managed custody solution if long‑term preservation is a priority. Whatever approach is chosen, it should be described in planning documents and the inventory so that successors are not left guessing about technical steps required to access the assets.
Can service providers refuse to give account access to family members?
Yes, service providers can refuse access to account content unless there is an appropriate legal basis or provider procedure that permits it. Each service has its own terms and methods for handling requests from family members or estate representatives. That is why it is important to combine provider legacy tools, where available, with legal documentation that supports access.When providers decline requests, families may need to rely on formal legal processes to obtain access, which can be time consuming and costly. Planning ahead by documenting preferences, using provider options, and including clear authorizations in estate documents reduces the risk that providers will deny access outright.
How often should I update my digital asset inventory?
It is recommended to review a digital asset inventory at least annually or whenever major life events occur, such as creating a new financial account, acquiring cryptocurrency, or changing key passwords. Technology and account landscapes change frequently, and regular reviews ensure that new accounts are added and outdated entries are removed. Maintaining currency in the inventory reduces the chance that important items will be overlooked during administration.Periodic review also gives the opportunity to update legal documents and storage methods. Updating powers of attorney, wills, and trustee designations when circumstances change keeps the overall plan coherent and aligned with current preferences, which is essential for effective administration.
Is it safe to store passwords in a digital file?
Storing passwords in a digital file can be safe when appropriate security measures are used, such as strong encryption and multi‑factor protection for the storage location. Many people use reputable password managers that encrypt entries and provide controlled sharing options. If a digital file is used, it should be encrypted and access limited to trusted individuals to protect privacy and prevent unauthorized access.Physical backup options, like a sealed note in a safe deposit box, can complement encrypted digital storage. Whatever method is chosen, it should be clearly documented in the inventory with instructions about when and how fiduciaries can access the information to avoid delays while protecting sensitive data from casual exposure.
Should I list usernames and passwords in my will?
It is generally not advisable to list usernames and passwords directly in a will because a will becomes a public record when filed with the probate court in many cases. Including sensitive access details in a public document could expose private information. Instead, keep credentials in a separate, secure, and private inventory and reference that inventory in your estate documents so fiduciaries know where to find them without publishing the information.Estate documents can authorize fiduciaries to access digital assets and identify where a secure inventory is stored. This approach balances the need for access with the protection of sensitive information and reduces the risk of exposing credentials through public probate filings.
What happens to social media accounts after death?
Social media providers handle accounts differently; some allow memorialization or transfer to a legacy contact, others allow deletion, and some restrict access entirely. The account holder’s settings and the provider’s policies determine what actions are available after death. Specifying preferences in an inventory and using available platform options helps ensure social media content is handled as desired.Including explicit instructions in estate documents can guide family members in how to request actions from providers, but those instructions may be limited by the provider’s policies. Planning ahead lets you take advantage of any provider tools and gives loved ones a clearer path to manage accounts respectfully and in line with your wishes.
How do I protect sentimental digital items like photos?
Protect sentimental items by cataloging them, indicating their importance, and providing clear directions for preservation. Backing up photos and videos to multiple secure locations, such as encrypted cloud storage and an external hard drive kept in a safe place, reduces the risk of total loss. Stating preferences for who should receive copies or how items should be archived helps heirs prioritize their care.Combining storage practices with written instructions and legal authorization gives fiduciaries the means to retrieve and protect sentimental content. Periodic review ensures that newly created items are included in the inventory and that storage methods remain secure and accessible over time.