
A Practical Guide to Digital Asset Planning in Lawrenceburg
Digital asset planning addresses how online accounts, cryptocurrencies, social media, photos, and other electronic property are managed, accessed, and transferred after incapacity or death. In Lawrenceburg and across Tennessee, thoughtful planning ensures that family members can access important accounts and information without unnecessary delay or confusion. At Jay Johnson Law Firm, our approach to digital asset planning is practical and client-focused, aiming to preserve privacy, clarify access permissions, and integrate online property into a broader estate plan. This introductory overview explains common issues owners face and why a written plan for digital assets benefits you and those you leave behind.
Many people assume that traditional estate documents automatically cover online accounts and digital currencies, but platform rules and password protections can create obstacles. Digital asset planning identifies specific accounts, assigns directions for handling them, and provides lawful access paths where permitted. For residents of Lawrenceburg, Tennessee, incorporating digital asset instructions into wills, powers of attorney, and trust documents reduces administrative friction for heirs and fiduciaries. This guide outlines practical steps to inventory assets, designate responsible persons, and choose secure methods for preserving or transferring access according to your wishes and applicable state and platform rules.
Why Planning for Digital Assets Is Important
Proper planning for digital assets reduces stress, shortens administrative timelines, and protects privacy for family members who will manage your affairs. A clear plan helps avoid locked accounts, inaccessible financial holdings, and loss of sentimental items such as photos or correspondence. For those holding online financial accounts or digital currency, planning prevents value loss and ensures a lawful transfer to successors. Beyond access, preparing digital asset instructions can limit exposure to identity theft and clarify how business-related online assets should be handled, creating a smoother transition and preserving the intended value and legacy of digital property.
About Jay Johnson Law Firm and Our Practice
Jay Johnson Law Firm serves clients in Lawrenceburg and throughout Tennessee with services focused on estate planning and probate. Our practice emphasizes clear communication, practical planning solutions, and hands-on guidance to help individuals create plans that reflect their goals and family circumstances. The team works to integrate digital asset considerations into wills, powers of attorney, and trust documents, coordinating with clients to produce a cohesive plan that accounts for online accounts, access credentials, and digital property. We prioritize an approachable process that helps clients make informed decisions about protecting their digital and physical assets.
Understanding Digital Asset Planning Services
Digital asset planning covers a range of tasks, from listing online accounts and passwords to drafting legal instructions that give trusted persons authority to access or close those accounts. The service often includes reviewing platform policies, advising on secure storage of credentials, and integrating digital directives into traditional estate documents. Clients receive guidance on balancing privacy and accessibility, choosing who will act on their behalf, and setting clear directions for handling digital property. The goal is to reduce uncertainty for family members and appointed agents while preserving the value and intent of online holdings.
A complete digital asset plan considers types of accounts and content, potential monetary value, sentimental items, and any business-related online presences. It may recommend digital inventory tools, instructions for account closure or memorialization, and how to manage recurring subscriptions. By mapping accounts and specifying authority, clients help fiduciaries complete necessary tasks efficiently. In Tennessee, planning also involves ensuring that instructions align with state law and service provider policies so that access and transfers occur with minimal legal friction and in accordance with the account owner’s wishes.
Defining Digital Asset Planning
Digital asset planning means creating a documented approach to the management and disposition of electronic property and online accounts. This includes identifying the accounts, deciding how each should be handled, and naming the person who will act on those decisions. Planning can cover social media profiles, cloud storage, email, cryptocurrency wallets, online banking, and domain names. The process attempts to bridge the gap between platform restrictions and legal authority, providing practical instructions to reduce the burden on family members and fiduciaries and to preserve the value and integrity of the account owner’s digital presence.
Key Elements and Typical Processes in a Digital Asset Plan
A comprehensive digital asset plan typically includes an inventory of accounts, secure instructions for access, a named agent such as a trustee or attorney-in-fact, and written directives integrated into estate planning documents. The process may involve use of password managers, secure physical records, and legal forms such as powers of attorney that specifically reference digital assets. It also measures the value of accounts and decides whether assets should be preserved, transferred, closed, or deleted. Effective planning balances privacy concerns with operational needs so fiduciaries can carry out the owner’s intentions responsibly.
Key Terms and a Short Glossary for Digital Asset Planning
Understanding key terms helps people make informed decisions about their digital property. This glossary explains common phrases and concepts encountered during planning, including what constitutes a digital asset, the roles of named agents, and commonly used tools for secure access. Clear definitions reduce confusion when integrating digital instructions into wills, powers of attorney, and trust documents. The items below are explained to help clients communicate their wishes distinctly and to ensure appointed persons have the guidance needed to act on those wishes effectively.
Digital Asset
A digital asset is any file, account, credential, or online presence stored electronically that has personal, financial, sentimental, or business value. Examples include email accounts, cloud photo libraries, social media profiles, digital currency wallets, online banking interfaces, domain names, and subscription services. In planning, it is important to identify which digital items are valued and to decide whether they should be preserved, transferred, closed, or deleted. Labeling assets clearly helps fiduciaries take consistent actions aligned with the account owner’s wishes.
Access Credentials
Access credentials are the user names, passwords, security questions, two-factor authentication devices, and recovery keys that allow someone to log into an online account. Securely documenting credentials is a sensitive matter because it touches on privacy and security. Plans often recommend secure storage methods such as password managers or sealed physical records with clear instructions about who may retrieve them, and under what circumstances. Proper handling of credentials helps fiduciaries carry out instructions without compromising continuing account security.
Digital Directive
A digital directive is a written instruction that explains how specific online accounts and electronic property should be handled at incapacity or after death. It can indicate whether certain content should be preserved, transferred to a family member, closed, or archived. Digital directives are often included in wills, powers of attorney, or as standalone documents, and they should be drafted so they are accessible, understandable, and consistent with platform rules and state law.
Digital Fiduciary
A digital fiduciary is the person named to manage digital assets on behalf of the account owner, such as a trustee or attorney-in-fact. This individual is tasked with following the owner’s written instructions, retrieving necessary credentials when permitted, and taking appropriate steps to preserve, transfer, or close accounts. Selecting a fiduciary involves considering trustworthiness, technical comfort, and willingness to follow formal directions while protecting privacy and complying with applicable rules.
Comparing Limited and Comprehensive Digital Asset Planning Options
When planning for digital assets, clients generally choose between limited approaches that address a few specific accounts and comprehensive strategies that cover a wide range of digital property and contingencies. Limited plans are quicker and focus on immediate priorities, while comprehensive plans take longer but reduce ambiguity and future disputes. The best choice depends on account complexity, family situation, presence of business accounts, and the owner’s desire for ongoing management or preservation of digital content. An informed comparison helps clients select the level of planning that matches their needs and resources.
When a Limited Digital Asset Plan May Be Appropriate:
Simple Online Holdings
A limited approach often suits individuals who have a small number of online accounts with minimal financial value, such as a single personal email, a couple of low-balance retail accounts, and basic social media profiles. If the accounts are straightforward to identify and manage, a short inventory and basic instructions for a trusted person can resolve likely issues without more extensive planning. This approach can be cost-effective and provide immediate peace of mind while leaving room to expand the plan later if circumstances change.
Low Asset Complexity
Individuals with few devices, no significant online financial holdings, and limited cloud storage needs may find a concise plan sufficient. When account structures are simple and the owner’s wishes are straightforward, a focused set of directives integrated into a power of attorney or a short digital memorandum can be effective. The limited route prioritizes essential steps to avoid immediate access problems without the time and expense that come with a broader, ongoing management plan.
Why a Comprehensive Digital Asset Plan Is Sometimes Recommended:
Multiple Accounts and Complex Holdings
A comprehensive plan is often recommended when an individual maintains many online accounts across platforms, uses cloud storage for important documents and photos, or holds accounts with significant financial value. Multiple logins, overlapping subscriptions, and various service providers increase the risk of overlooked assets or inaccessible information. A thorough plan maps each account, sets out clear handling instructions, and coordinates those instructions with traditional estate documents to reduce confusion and ensure a coordinated approach to asset management and distribution.
Business or Cryptocurrency Holdings
When digital assets include business accounts, domain names, online storefronts, or cryptocurrency wallets, comprehensive planning becomes important to preserve value and ensure continuity. These asset types often require careful technical and legal coordination to transfer access securely and follow platform or network procedures. A comprehensive plan documents recovery keys, addresses multi-signature arrangements, and coordinates with business succession or trust instruments so that the owner’s business operations and financial holdings are handled in a controlled and legally effective way.
Benefits of Taking a Comprehensive Approach
A comprehensive digital asset plan reduces uncertainty by covering a wide range of accounts and scenarios. It supports continuity for business-related digital property, preserves sentimental content like photos and messages, and helps prevent value loss for digital financial holdings. Comprehensive planning creates clear directions for appointed agents, which can shorten administration time and reduce friction between family members. By taking a thorough approach, owners create a road map that fiduciaries can follow, minimizing delay and protecting privacy while aligning actions with the account owner’s wishes.
Comprehensive plans also enhance security by recommending secure storage practices for credentials, offering contingency steps for lost tokens, and advising on how to grant access without exposing ongoing accounts to undue risk. They allow for periodic review and updates, keeping the plan current with changing technology and platform rules. For families and agents, the result is clarity and fewer surprises during a difficult time, helping them focus on carrying out the owner’s intentions rather than resolving avoidable technical or administrative problems.
Centralized Access and Organized Records
One key benefit of a comprehensive approach is centralized documentation, which organizes account information, access instructions, and legal directives in one place. Centralization reduces the time needed by agents to locate accounts and minimizes the risk of missed or forgotten holdings. Organized records can include a secure inventory, instructions for handling each account, and contact information for service providers. The clarity provided by centralization helps appointed persons act quickly and consistently in carrying out the account owner’s wishes.
Reduced Disputes and Smoother Administration
Comprehensive planning can reduce family disagreement by spelling out clear instructions about the treatment of digital property, who has authority, and how sensitive content should be handled. When roles and processes are defined in writing, appointed agents have a guide to follow that supports fair and transparent administration. This helps prevent misunderstandings and keeps administrative tasks moving forward, allowing family members to focus on personal matters rather than prolonged legal or technical disputes over digital assets.

Practice Areas
Estate Planning and Probate Services
Top Searched Keywords
- digital asset planning Lawrenceburg
- digital estate planning Tennessee
- online account succession Lawrenceburg
- crypto estate planning Tennessee
- password management for estate planning
- social media legacy planning Lawrenceburg
- digital fiduciary Tennessee
- estate planning and probate Lawrenceburg
- how to plan digital assets Tennessee
Practical Pro Tips for Managing Digital Assets
Inventory Your Digital Accounts
Start by creating a secure inventory of your online accounts, including email, cloud storage, financial platforms, social media, and any subscriptions. Record the account name, the associated email or login, and whether multi-factor authentication is in place. For security, avoid keeping plain text passwords in unsecured locations; instead note what type of access method is used and where credentials are stored. Regularly update the inventory as accounts are added or closed so it remains a reliable resource for appointed agents and reduces confusion during administration.
Secure and Share Access Carefully
Keep Documents Updated
Review digital asset records and related legal documents periodically, especially after major life changes such as marriage, divorce, new business ventures, or the acquisition of significant online holdings. Update named agents and access instructions to reflect current wishes and account configurations. Periodic review ensures that device changes, altered login methods, and new accounts are captured, maintaining the plan’s practicality. A current plan reduces surprises for family members and supports orderly handling of digital property when your directions are needed.
Why You Should Consider Digital Asset Planning
Digital asset planning is increasingly important as more personal and financial life moves online. Without clear instructions, heirs and fiduciaries may face obstacles accessing accounts, leading to lost assets, missed notifications, subscription charges, and prolonged administration. Planning helps preserve sentimental items such as photos and messages, supports smooth handling of financial accounts, and reduces the administrative burden on loved ones. By documenting wishes and naming individuals to act, you create a practical pathway for managing and settling digital property when you cannot do so yourself.
In Tennessee, providing instructions for digital assets also helps align actions with service provider rules and state law, which can be important for lawful access and transfer of value. Planning reduces the likelihood of disputes and can prevent delays that erode account value or hamper business continuity. Whether your digital footprint is modest or extensive, taking time to plan increases certainty for those who will manage your affairs and protects the legacy and privacy of your online presence.
Common Circumstances That Call for Digital Asset Planning
People seek digital asset planning for many reasons: the desire to preserve family photos, to ensure access to online financial accounts, to pass on business-related digital property, or to manage cryptocurrency holdings. Life events such as retirement, starting a business, significant account growth, or changes in family structure often trigger a need to formalize digital instructions. Planning is also advisable for anyone who relies on online services for critical communications and finances, as it reduces administrative burden and helps appointed agents act according to the owner’s preferences.
After a Major Life Change
Major life events like marriage, divorce, the birth of a child, or retirement often prompt a reassessment of digital asset arrangements. Such changes can alter who should have access or how accounts should be handled. Revisiting digital asset instructions at these moments helps ensure that appointed agents, access procedures, and account dispositions match current family relationships, financial realities, and privacy preferences, making future administration more consistent with the account owner’s intentions.
When You Hold Cryptocurrency
Cryptocurrency holdings present unique planning needs because access often depends on private keys or recovery phrases that must be handled securely. Without clear instructions and secure storage, these holdings can become irretrievable. Planning for crypto requires documenting where keys are kept, whether multi-signature arrangements exist, and how transfers should be authorized. Including these instructions in a broader estate plan helps ensure that value is preserved and transferred in accordance with the owner’s wishes while maintaining appropriate security measures.
If You Run an Online Business
Business owners with online sales platforms, domain names, or social media driven operations need planning that accounts for continuity, succession, and access to business systems. Digital asset planning for businesses addresses access to administrative accounts, hosting services, payment processors, and customer data, with the aim of preserving operations and minimizing disruptions. Clear directives about who may manage or transfer business-related accounts help prevent operational downtime and protect customer relationships during transitions.
Digital Asset Planning Attorney Serving Lawrenceburg, Tennessee
Jay Johnson Law Firm is available to help Lawrenceburg residents assess their digital estate needs and integrate those plans with existing estate and probate documents. We assist with inventory creation, drafting clear instructions, recommending secure storage methods, and coordinating access directives with wills, powers of attorney, and trusts. Clients receive practical recommendations tailored to account types and family circumstances. To schedule a consultation or discuss specific concerns, callers in the Lawrenceburg area may reach the firm at the listed phone number to begin the planning process.
Why Choose Jay Johnson Law Firm for Your Digital Asset Planning
Choosing legal counsel for digital asset planning means working with a firm that understands both the legal and practical dimensions of online property. Jay Johnson Law Firm focuses on clear communication and practical solutions that align digital directives with broader estate plans. We assist clients in identifying accounts, naming appropriate fiduciaries, and crafting written instructions that reduce uncertainty. Our work emphasizes actionable steps that help appointed agents carry out their duties while protecting privacy and complying with relevant rules and procedures.
The firm’s process includes a review of account types, consideration of security measures for storing access information, and coordination with traditional estate documents so plans operate smoothly. We aim to provide clients with usable documents and a straightforward implementation plan rather than abstract recommendations. For Lawrenceburg clients, this coordinated approach helps ensure that both digital and physical assets are managed together in a way that reflects the client’s priorities and minimizes administrative friction for family members.
Clients can expect assistance in balancing privacy with the need for access, guidance on dealing with complex holdings such as cryptocurrencies or business accounts, and ongoing recommendations for periodic review. The firm supports clients through the planning process and provides clear instructions to ensure that appointed agents have the tools they need to carry out the owner’s wishes effectively and respectfully. Practical planning today reduces uncertainty and makes future administration more efficient.
Ready to Review Your Digital Asset Plan?
How the Digital Asset Planning Process Works at Our Firm
Our process begins with an intake to identify the scope of digital holdings and client goals, followed by drafting documents that incorporate digital instructions into estate plans. We provide guidance on secure storage methods for credentials and recommend practical ways to communicate access procedures to appointed agents. After drafting, we review the plan with the client, make necessary adjustments, and provide final documents for execution and safe storage. We also advise on periodic reviews to keep plans current with account changes and platform policies.
Step 1: Initial Consultation and Digital Inventory
The first step collects information about online accounts, devices, and access methods. During the consultation we ask about email providers, social media, cloud storage, financial platforms, cryptocurrency holdings, and any business-related accounts. This inventory helps us identify priorities and potential legal or technical obstacles. The goal during this phase is to build a clear picture of the digital landscape so that subsequent documents can specify practical instructions and name appropriate persons to act when needed.
Collecting Account Information
Collecting account information involves listing account names, associated emails, account purposes, and the presence of multi-factor authentication or recovery options. We help clients decide which details to include in a secure inventory and how to store that information safely. This step aims to balance the need for accessible directions with the security of sensitive credentials, recommending storage and retrieval procedures that protect privacy while enabling appointed agents to follow written instructions.
Establishing Access Instructions
Establishing access instructions means specifying who should act for each account and detailing the steps they should take, such as preserving data, transferring ownership, or closing accounts. Instructions also address whether access should be immediate upon incapacity or only after certain conditions are met. Clear, written access directions help appointed persons avoid missteps and reduce delays, while ensuring actions align with the account owner’s intentions and applicable laws or platform policies.
Step 2: Drafting Legal Documents and Directives
In this step we draft or update estate documents to incorporate digital asset instructions, including powers of attorney that specifically reference digital accounts and trustees or wills that address post-death disposition. Drafting ensures that directives are legally coherent and practically implementable, taking into account platform requirements and state law. The documents provide appointed agents with the authority and guidance needed to carry out the owner’s wishes, and they reduce the potential for disputes or administrative obstacles during execution.
Creating Access Directives and a Logins Plan
Creating access directives and a logins plan organizes how credentials will be stored and retrieved, outlining whether a password manager, encrypted file, or physical record will be used. The plan defines who may retrieve credentials, under what conditions, and how multi-factor authentication should be handled. By documenting these procedures, the plan gives appointed agents a clear roadmap for gaining lawful access and taking the appropriate actions for account management.
Coordinating with Estate and Business Documents
Coordinating digital directives with wills, trusts, and business succession plans ensures a unified approach to asset disposition and continuity. This coordination addresses how digital assets interact with broader estate goals, such as transferring online businesses, preserving family photos, or distributing digital financial holdings. Consistent documentation across instruments reduces ambiguity and gives fiduciaries a single set of directions to implement in a legally coherent manner.
Step 3: Implementation, Storage, and Periodic Review
After documents are executed, implementation includes securing copies, instructing fiduciaries about retrieval procedures, and setting up secure storage for inventories and recovery keys. The process also includes establishing a review schedule so plans remain current as accounts and technologies change. Periodic reviews help maintain the plan’s effectiveness and allow for updates following major life events or the acquisition of new assets, ensuring continuity and reducing future administrative burdens for appointed persons.
Implementing Secure Storage
Implementing secure storage involves choosing methods that balance accessibility with security, such as reputable password managers with emergency access features, encrypted local storage, or sealed physical records kept with legal documents. We help clients decide which storage approach fits their needs and how to document retrieval protocols for appointed agents. Proper storage safeguards credentials while ensuring that authorized persons can act when necessary, reducing the risk of irretrievable digital property.
Scheduling Updates and Ongoing Support
Scheduling updates involves setting reminders to review the digital asset plan periodically, typically after major life events or when new accounts are created. Ongoing support can include assistance with updates, guidance on changing platform rules, and recommendations for improved security practices. Regular attention keeps the plan aligned with current accounts and access methods, preserving its usefulness and helping appointed agents follow instructions easily when they are called upon to act.
Frequently Asked Questions About Digital Asset Planning
What exactly counts as a digital asset?
Digital assets include any electronically stored account, file, or credential that has personal, sentimental, or financial value. Common examples are email accounts, cloud storage for photos, social media profiles, online banking, investment accounts, cryptocurrency wallets, domain names, and business-related online platforms. Identifying which items matter to you helps prioritize what to include in a plan and how each should be handled by appointed persons. When building an inventory, note account purposes, associated contact information, and whether accounts have multi-factor authentication or recovery options. This information helps appointed agents understand the nature and priority of each asset and prepares them to take appropriate action consistent with your wishes.
How do I securely store login information for my fiduciary?
Secure storage of login information should balance accessibility with protection. Options include reputable password managers that offer emergency access, encrypted digital vaults, or sealed physical records kept with legal documents. Each option has trade-offs regarding convenience and security, and the choice should reflect the sensitivity of the accounts and the reliability of the designated fiduciary. When documenting storage methods, include clear instructions about who may retrieve credentials and under what circumstances. Avoid unsecured plain text records, and consider splitting access details so that no single unsecured source exposes all critical credentials, reducing the risk of unauthorized use.
Can a power of attorney include authority over online accounts?
A properly drafted power of attorney can include explicit authority over online accounts and digital assets, provided the language clearly identifies the scope of access and actions the attorney-in-fact may take. Including specific digital asset language helps ensure that financial institutions and service providers recognize the appointed person’s authority. It is important to reference digital assets and provide practical instructions so the agent can manage accounts effectively. Because some platforms have their own rules, coordination between the power of attorney language and platform policies can be important. Drafting precise, actionable directives reduces confusion and supports lawful access by the person you designate to act on your behalf.
What should I do if I own cryptocurrency?
Cryptocurrency ownership requires special attention because access often depends on private keys or recovery phrases rather than account credentials stored by a central provider. Planning should document where keys are stored, whether multi-signature protections are in place, and how transfers are authorized. Securely storing keys and providing clear retrieval instructions to a trusted person or trustee helps preserve the value of these holdings. It is also advisable to consider legal and tax implications, coordinate with estate planning documents, and, when appropriate, involve technical support to ensure continuity. Clear documentation that aligns with secure storage keeps the assets both accessible to authorized persons and protected from unauthorized access.
Will social media accounts be accessible after death?
Social media platforms differ in their policies on account access and memorialization, so whether an account is accessible after death depends on the provider’s rules and the presence of documented instructions. Some platforms offer legacy contact features or memorialization settings, while others restrict access without specific legal procedures. Including social media instructions in your plan clarifies whether you want accounts deleted, preserved, or passed to someone else when allowed. A practical plan documents account intent, identifies the desired outcome for each social profile, and provides the necessary legal or account-specific steps agents should follow. This reduces the likelihood of account lockouts and helps carry out your wishes consistent with platform policies.
How often should I update my digital asset inventory?
You should review your digital asset inventory and instructions whenever major life changes occur, such as marriage, divorce, starting or selling a business, moving, or acquiring new financial accounts. Additionally, periodic reviews every one to two years help catch changes in platform rules, new accounts, and evolving security practices. Regular updates ensure that the plan remains accurate and practical for appointed agents. Keeping documents current prevents surprises for fiduciaries and reduces the administrative burden when directions must be followed. A scheduled review process also provides an opportunity to strengthen security measures and confirm that appointed persons are still appropriate to carry out your wishes.
Can I use a password manager as part of my plan?
A password manager can be a practical component of a digital asset plan because it centralizes credentials and often offers secure sharing or emergency access features. If a password manager is used, the plan should document which manager is employed, how emergency access is granted, and any recovery procedures. This approach reduces the need to store sensitive information in unprotected formats and helps appointed agents retrieve necessary credentials when authorized. When relying on a password manager, ensure that the chosen service’s emergency access features align with your intentions and that the named person understands how to use them. Also include fallback instructions in case the manager’s access procedures change or prove insufficient for a particular platform.
How do I choose who should manage my digital assets?
Choosing who should manage your digital assets requires thinking about trustworthiness, technical comfort, and willingness to follow written instructions. The ideal person is reliable, organized, and able to follow procedures while respecting privacy and confidentiality. You might choose a family member, a trusted friend, or a professional fiduciary, and it’s often useful to name backups in case the primary person is unavailable. Communicate your choice and basic expectations with the person you name so they understand the responsibilities involved. Providing clear written directives and training or walkthroughs of the plan can reduce confusion and ensure they are prepared to act when needed.
What happens to subscriptions and recurring payments?
Subscriptions and recurring payments require planning to avoid unexpected charges and service interruptions. The plan should identify active subscriptions, indicate whether they should be canceled, transferred, or maintained, and include instructions about which payment methods to use for outstanding balances. This reduces unwanted expenses and ensures that services tied to important accounts are handled appropriately. For business-related subscriptions, continuity considerations may justify keeping services active until a transfer is complete. For personal subscriptions, clear directives prevent family members from incurring unnecessary charges and provide a straightforward process for closing accounts when appropriate.
Do platform policies override my written instructions?
Platform policies govern how service providers respond to requests for access or account changes, and in some cases those policies may limit the ability to transfer or access accounts even with written instructions. Because of this, it is important to draft directives that are compatible with provider rules and to include practical steps for meeting any evidentiary or legal requirements platforms may insist upon. Coordination with a legal plan increases the likelihood that directives can be implemented smoothly. When platform rules create restrictions, the plan can suggest alternative actions, such as preserving content by downloading important files or using memorialization features. Documenting fallback steps helps appointed persons know what to do if direct access is not possible.