
A Practical Guide to Digital Asset Planning in La Vergne
Digital assets are increasingly important components of modern estates, and planning for them protects your online accounts, digital files, and cryptocurrency. This page explains the steps residents of La Vergne can take to inventory and pass on digital property, create legally effective access instructions, and minimize friction for heirs. At Jay Johnson Law Firm we focus on clear, practical solutions tailored to Tennessee law so families can preserve value and privacy after an account holder’s death or incapacity. The goal is to provide a straightforward roadmap so you can make informed decisions about passwords, account authorizations, and legacy wishes.
Digital asset planning involves more than a list of logins. It includes identifying accounts tied to personal and financial life, deciding who may access or manage those assets, and documenting authority in legally recognized ways. This planning helps prevent loss of sentimental files, ensures access to funds held as digital currency, and reduces disputes over control of online presences. The guidance here applies to common situations in Rutherford County and Tennessee, including steps to coordinate with wills, powers of attorney, and trust documents so your digital affairs are managed consistently with your overall estate plan.
Why Digital Asset Planning Matters for La Vergne Residents
Planning for digital assets reduces uncertainty and expense for family members after a death or incapacity. By documenting access instructions and legal permissions in a durable, compliant way, you preserve financial value, sentimental materials, and professional records. This planning also helps maintain privacy and prevents frozen accounts that can block access to important documents or funds. In Tennessee, careful coordination with existing estate documents ensures beneficiaries and fiduciaries can carry out your intentions without delay. The result is greater peace of mind for you and less administrative burden on those you leave behind.
About Jay Johnson Law Firm and Our Approach to Digital Asset Planning
Jay Johnson Law Firm serves La Vergne and neighboring communities by helping clients anticipate and address modern estate planning needs, including digital assets. Our approach emphasizes practical documentation, compliance with Tennessee law, and clear instructions that work with wills, trusts, and powers of attorney. We assist clients in creating inventories, drafting authorization language, and establishing procedures that allow fiduciaries to act when necessary. The focus is on reducing friction, protecting privacy, and ensuring accounts and data are handled according to your wishes.
Understanding Digital Asset Planning Services
Digital asset planning is the process of identifying, organizing, and legally authorizing the management and transfer of online accounts and electronic property. This includes social media, email, cloud storage, digital photographs, domain names, loyalty programs, and forms of digital currency. Effective planning defines who can access assets, who may distribute or delete content, and how fiduciaries should proceed. The service includes drafting clear instructions, incorporating appropriate language into estate planning documents, and advising on secure ways to maintain access information over time so plans remain effective when needed.
This service also addresses practical and legal obstacles such as platform terms of service, privacy laws, and account security measures. Advisors help craft directives and legal authorizations that align with Tennessee statutes while taking into account the requirements of service providers. The process often involves creating an inventory, selecting a trusted access conduit, and using secure storage solutions for credentials. Proper planning reduces the risk that digital property will be lost, inaccessible, or mismanaged during transitions of incapacity or after death.
Defining Digital Assets and What They Include
Digital assets encompass a broad range of electronic records, accounts, and value stored online or in electronic form. Typical examples include bank and investment accounts accessed online, email accounts, social media profiles, cloud photo libraries, cryptocurrency wallets, digital business records, and domain registrations. Some assets have direct monetary value, while others carry sentimental or practical importance. Planning recognizes both tangible and intangible components and focuses on ensuring authorized people can access, manage, or distribute them under conditions you specify, while also protecting privacy and security.
Key Elements of a Digital Asset Plan
A reliable digital asset plan includes an up-to-date inventory of accounts, secure storage for access information, legal authorizations incorporated into estate documents, and instructions for handling each asset. It also involves naming a trusted person or fiduciary, specifying whether accounts should be preserved, transferred, or deleted, and coordinating instructions with the overall estate plan. The process may include periodic reviews to reflect new accounts or changing circumstances, and advice on technical choices such as password managers or legal access tools to balance accessibility with security.
Key Terms and Glossary for Digital Asset Planning
Understanding common terms helps you make better choices when planning for digital assets. This glossary covers the words and concepts you will encounter when documenting access instructions, coordinating with fiduciaries, and working with service providers. Familiarity with these terms makes it easier to decide what to keep, who should manage which assets, and how legal documents should be drafted. Clear definitions also reduce ambiguity for those who will act on your instructions in times of incapacity or after death.
Digital Asset Inventory
A digital asset inventory is a detailed list of online accounts, electronic files, and digital holdings that identifies where assets are located and how they may be accessed. The inventory typically includes account names, usernames, the method for recovering access, and the significance of each asset. Creating and updating this inventory is a central step in planning because it provides the practical information a fiduciary will need. It is often stored separately from the main estate documents in a secure manner that allows authorized access when necessary.
Digital Executor and Access Agent
A digital executor or access agent is a person appointed to manage or carry out instructions related to digital accounts and assets. Their role may be defined in a will, trust, or power of attorney, and the appointment should include clear authority and instructions. The individual should be someone you trust to handle sensitive information, follow your wishes, and take steps to preserve or transfer assets. Properly documenting this appointment helps avoid disputes and ensures a smoother transition when accounts need attention.
Authorization Language
Authorization language refers to the precise legal wording included in estate documents that grants permission for fiduciaries to access, manage, or transfer digital assets. This language must be consistent with Tennessee law and should anticipate common obstacles, such as service provider restrictions and account security. Carefully drafted authorization clarifies who can act, under what circumstances, and with what limitations, helping bridge the gap between a user’s wishes and the practical requirements of managing digital property.
Secure Access Tools
Secure access tools include password managers, encrypted documents, and other technological methods for storing and sharing credentials with authorized persons. These tools help maintain security while allowing designated fiduciaries to access accounts when needed. Choosing an appropriate tool involves balancing convenience, security, and legal considerations, such as how the stored information can be shared with a fiduciary consistent with platform rules and privacy protections. Recommendations often include backup plans and instructions for how and when access should be granted.
Comparing Approaches to Managing Digital Assets
Options for handling digital assets range from minimal documentation to fully integrated plans that coordinate with wills and trusts. A limited approach might rely on basic account lists and informal notes, while a comprehensive plan combines legal authorizations, secure credential storage, and explicit handling instructions. The right approach depends on the complexity and value of the assets, your concerns about privacy, and the desired level of control. Comparing options helps you balance cost and convenience against the risks of account loss, delayed access, or disputes among heirs.
When a Limited Digital Asset Plan May Be Adequate:
Simple Account Structures and Low Digital Value
A limited digital asset plan may suffice when online accounts are few, have low financial value, and personal representatives can reasonably rely on informal instructions. If most digital items are personal photos or nonfinancial accounts and you have a trusted contact who knows where to find important information, a basic inventory and clear verbal instructions may be adequate. Even in these cases, however, storing access details securely and documenting wishes in writing reduces the chance of confusion or delay when someone must act on your behalf.
Close-Knit Family or Accessible Account Controls
A limited plan can work when family members are already familiar with account access methods and you maintain account recovery options that trusted contacts can use. When people designated to manage affairs are nearby and technological hurdles are minimal, less formal arrangements may function well. However, even in close families, it is important to record clear intentions and consider legal authorizations for access to avoid disputes or violations of platform policies that could complicate retrieval of key information during difficult times.
Why a Comprehensive Digital Asset Plan Can Be Beneficial:
Protecting Financial and Sentimental Value
When digital accounts hold significant financial assets, such as online investment accounts or cryptocurrency, or when they contain irreplaceable personal content, a comprehensive plan helps preserve that value. Comprehensive planning ensures fiduciaries have the legal authority and practical instructions to access funds, transfer ownership where possible, and safeguard important files. It also reduces the risk that accounts will be inaccessible due to security measures or provider policies, and it provides a documented process for handling disputes and protecting privacy.
Complex Account Structures and Business Uses
Complex account arrangements, business-related digital assets, or interdependent services often require a thorough plan that coordinates with other estate documents. Business email, client records, domain names, and cloud-based systems can have operational impacts if unmanaged. A comprehensive approach identifies critical accounts, assigns clear management responsibilities, and incorporates legal instruments to enable continuity. This planning reduces interruption, helps maintain professional obligations, and ensures digital assets supporting business or income are transferred or managed as intended.
Benefits of Taking a Comprehensive Approach to Digital Assets
A comprehensive approach provides clarity about who can access accounts, how those accounts should be handled, and what actions are authorized. It minimizes delays, prevents the loss of financial value, and protects sentimental items from accidental deletion. Comprehensive planning also reduces legal uncertainty by aligning authorization language with Tennessee law and by anticipating obstacles imposed by service providers. Overall, the approach aims to make transitions smoother for fiduciaries and loved ones, and to ensure your wishes about privacy, access, and disposition are followed.
Comprehensive planning also includes secure storage solutions and regular reviews to keep access information current. By documenting procedures and backup preferences, you lower the likelihood of disputes and eliminate guesswork for those who will manage your affairs. This is particularly valuable for households with multiple digital accounts, online subscriptions, or forms of digital currency. Maintaining an updated plan can save time and expense for family members while protecting sensitive information from unauthorized access or misuse.
Reduced Administrative Burden for Loved Ones
One of the main advantages of thorough planning is that it reduces the administrative load on family members tasked with settling affairs. Clear instructions, accessible inventories, and authorized access prevent prolonged searches for account information and reduce the need for court interventions. This leads to quicker resolution of financial matters and less emotional stress for heirs. By providing a coherent plan, you help those who act on your behalf complete necessary tasks efficiently and with confidence that actions taken align with your wishes.
Protection of Privacy and Sensitive Data
A comprehensive plan includes measures to protect privacy and limit exposure of sensitive information. By defining who may access certain accounts and under what conditions, you can prevent unnecessary disclosure of personal communications, financial details, or medical records. The plan can also outline steps to securely transfer or delete content, and specify how digital legacies should be handled. These safeguards help preserve dignity and privacy while enabling authorized management of your digital footprint.

Practice Areas
Estate Planning and Probate Services
Top Searched Keywords
- digital asset planning La Vergne
- Tennessee digital estate planning
- digital inheritance planning
- cryptocurrency estate planning La Vergne
- online account legacy instructions
- password management for estates
- digital executor Tennessee
- cloud data estate planning
- social media legacy planning
Practical Tips for Managing Digital Assets
Start with a secure inventory
Begin by creating a secure and regularly updated inventory of your digital accounts and storage locations. Include account names, the purpose of each account, recovery methods, and the level of importance. Store this inventory in a protected manner, such as an encrypted file or a reputable password manager that allows emergency access by an authorized person. Regular reviews are important because new accounts and changes in technology can affect access. Maintaining this information reduces the risk of losing valuable or sentimental items when quick action is required.
Define clear authorization and instructions
Balance security with accessibility
While protecting account credentials is essential, plan for controlled accessibility by trusted individuals when needed. Use secure tools and established recovery methods, and document backup procedures so authorized parties can follow the steps without compromising security. Consider how to update credentials over time and how an authorized person will receive access in the event of incapacity or death. Thoughtful planning prevents both unauthorized access and the permanent loss of important digital property.
Reasons to Consider Digital Asset Planning in La Vergne
Digital assets are increasingly intertwined with financial, personal, and business life, so failing to plan can result in lost funds, inaccessible documents, and family disputes. Planning helps protect online investments, preserves important memories like photographs and messages, and sets clear instructions for online accounts. Using legal documentation that works within Tennessee law ensures designated persons can carry out your intentions without unnecessary legal delays. This kind of preparation reduces the burden on loved ones and secures the value of your digital estate.
Even if digital accounts seem minor today, their importance can grow over time as new services and assets appear. Planning now creates a flexible framework that adapts to new accounts and changing preferences. It also helps protect privacy and reduces the possibility of unauthorized access when management is necessary. For small business owners and those with online financial holdings, a proactive plan supports continuity and the orderly transfer of assets that might otherwise be difficult to access or administer.
Common Situations That Make Digital Asset Planning Important
People seek digital asset planning when they hold online financial accounts, operate businesses that depend on digital systems, or have extensive personal digital records and social media legacies. Planning is also important for those concerned about privacy, families with out-of-state beneficiaries, and anyone who wants to reduce administrative burdens after incapacity or death. Changes in technology, evolving platform policies, and the growth of digital currencies make planning an important part of an up-to-date estate plan for many households.
Ownership of Cryptocurrency or Online Investments
If you hold cryptocurrency, online brokerage accounts, or other digital financial assets, planning is essential to preserve value and allow transfer. These assets often require specialized access methods and recovery procedures that can be lost if credentials are unavailable. Documenting secure storage for keys or access instructions and integrating this information with legal authorizations enables fiduciaries to access funds in accordance with your wishes. Without planning, these resources can become permanently inaccessible.
Extensive Personal or Family Digital Archives
Large collections of digital photographs, videos, and communications have sentimental value that families may wish to preserve. Clear instructions on how to handle such archives—whether to preserve, share, or delete content—prevent unintended loss. A plan also establishes who should receive access and what privacy safeguards should be observed. Proper documentation helps ensure that these memories are passed on in line with your preferences rather than being lost to account closures or forgotten passwords.
Business Accounts and Continuity Needs
Small business owners and professionals who rely on cloud-based systems, client databases, or domain names should include digital asset planning in their continuity planning. Identifying key accounts, delegating management authority, and documenting recovery options helps maintain operations during transitions. This reduces disruption to clients and preserves the value of digital assets that support ongoing business functions. Clear guidance protects business relationships and eases the process of transferring operational control when needed.
Digital Asset Planning Services for La Vergne Residents
We help La Vergne residents create clear, legally sound plans for their digital assets, including inventories, authorization language, and secure storage recommendations. Our services are tailored to local needs in Rutherford County and reflect Tennessee law so that appointed fiduciaries can act effectively. Whether you have modest online accounts, significant digital investments, or business-related systems, we assist in documenting instructions and preparing the legal tools that reduce uncertainty and support orderly management and transfer of your digital property.
Why Choose Jay Johnson Law Firm for Digital Asset Planning
Jay Johnson Law Firm focuses on practical legal solutions that address the realities of modern estate administration. We work with clients to assess the scope of digital holdings, recommend secure and maintainable solutions for storing access information, and draft authorization language that coordinates with existing estate documents. Our goal is to make digital asset transition smoother for families by anticipating common obstacles and documenting clear procedures for fiduciaries to follow under Tennessee law.
We provide hands-on guidance that translates legal requirements into steps you can follow, from compiling an initial inventory to integrating instructions across wills, powers of attorney, and trusts. Our process emphasizes communication, reviewing documents with clients to reflect their preferences for privacy, preservation, or deletion of digital content. We also advise on technical tools and routines that keep plans current and accessible to authorized individuals when necessary, helping clients maintain control over their digital legacies.
Throughout the planning process we focus on clarity and enforceability, avoiding vague directives that can cause confusion. We help you select appropriate fiduciaries, document compensation or limits if desired, and provide recommendations for secure storage of credentials. Our approach aims to reduce legal hurdles for those who manage your affairs and to protect the value and privacy of your digital assets so your instructions are carried out with confidence and care.
Ready to Plan Your Digital Legacy in La Vergne? Contact Us Today.
How We Handle Digital Asset Planning
Our process begins with a consultation to identify the types of digital assets you hold and the priorities you have for handling them. We create an inventory template, recommend secure storage options, and draft or revise legal documents to provide the necessary authority for fiduciaries. We review the plan with you, answer questions about platform policies and practical steps, and provide ongoing review suggestions. The goal is a tailored plan that reduces uncertainty and provides clear instructions for those who will manage your digital affairs.
Step 1: Inventory and Assessment
The initial step focuses on compiling a comprehensive inventory of digital holdings and assessing the level of planning required. We identify accounts with financial value, business implications, or sentimental importance and evaluate existing access options and recovery mechanisms. This assessment informs the scope of the legal documents and practical measures needed. By understanding account complexity and risks, we can recommend an appropriate balance of documentation and security to protect your digital estate.
Gathering Account Details
Gathering account details involves listing digital service providers, usernames, account purposes, and recovery options. We help you determine what information is necessary to enable an authorized person to locate and, when appropriate, access each account. This step also identifies accounts that require additional attention, such as those tied to financial assets or critical business functions. A careful inventory minimizes surprises and forms the foundation for reliable instructions and legal authorizations.
Evaluating Security and Access Risks
Evaluating security and access risks means reviewing how your accounts are protected and how access can be recovered. We identify threats such as single-factor authentication vulnerabilities, lack of recovery contacts, or provider restrictions that could impede access. Based on this evaluation, we recommend technical and procedural safeguards, backup plans for credential access, and clear instructions for fiduciaries. Addressing these risks early helps ensure that assets remain accessible when authorized persons need to act.
Step 2: Drafting Authorization and Storage Plans
After inventory and assessment, we draft the authorization language to be included in wills, powers of attorney, or trusts, and we recommend secure storage methods for access information. This phase ensures legal permission aligns with practical steps for sharing credentials with appointed persons. The documentation clarifies roles and responsibilities, specifies handling instructions, and anticipates common provider requirements to reduce friction during administration. The result is a cohesive plan that fiduciaries can implement when necessary.
Creating Legal Authorization
Creating legal authorization involves drafting clear language that gives designated individuals permission to access and manage digital assets within the scope you set. This may require tailored provisions in estate documents that consider Tennessee statutes and common platform policies. The aim is to reduce ambiguity about authority and to provide practical instructions fiduciaries can rely on. Well-drafted authorization prevents unnecessary disputes and supports timely administration of digital holdings.
Choosing Secure Storage and Access Methods
Choosing secure storage and access methods includes recommending encrypted password managers, secure document storage, and emergency access protocols that fit your needs. We evaluate options that provide reliable access for appointed individuals while maintaining strong security controls. The plan includes guidance on how and when to share access, procedures for updating credentials, and steps to take if an account provider changes policies. Thoughtful selection of tools reduces long-term maintenance burdens and preserves account integrity.
Step 3: Implementation and Ongoing Review
Implementation combines execution of updated estate documents with placing access instructions in secure storage and communicating roles to designated individuals as appropriate. Ongoing review is recommended because accounts and technologies change over time. We advise clients on a review schedule and provide updates to documents and instructions as circumstances evolve. Regular maintenance ensures that the plan remains current and that fiduciaries can act effectively when the time comes.
Executing Documents and Storing Instructions
Executing documents and storing instructions means formalizing the authorizations in legally recognized papers and ensuring the inventory and access information are stored securely. We guide clients through proper execution steps under Tennessee rules, and we advise on best practices for secure storage and controlled sharing of credentials. Proper execution and storage are key to making the plan usable by fiduciaries while protecting sensitive data from unauthorized disclosure.
Periodic Reviews and Updates
Periodic reviews and updates keep the plan aligned with your current accounts and intentions. We recommend regular check-ins to add new accounts, change access instructions, and revise legal language as needed. These reviews help adapt the plan to changes in technology, platform policies, and family circumstances. Maintaining an updated plan reduces the risk of inaccessible assets and ensures your digital legacy is handled consistent with your wishes over time.
Frequently Asked Questions About Digital Asset Planning
What counts as a digital asset in an estate plan?
Digital assets include a broad set of items such as email accounts, social media profiles, cloud-stored photographs, online banking or investment accounts, domain names, digital contracts, and forms of digital currency. Anything that exists in electronic form or depends on online access for value or functionality can be considered a digital asset. The significance of each asset depends on its financial, sentimental, or operational value and should guide how it is handled in an estate plan.When preparing an estate plan, list accounts and describe their importance so fiduciaries know which assets require immediate attention. Not all digital items need the same treatment; some should be preserved, some transferred, and some deleted. Clear instructions and legal authorizations help ensure that assets are handled according to your preferences without unnecessary delay or dispute.
How can I provide secure access to passwords and keys?
Providing secure access requires balancing confidentiality with accessibility for authorized individuals. Recommended methods include using reputable, encrypted password managers that support emergency or legacy access, maintaining an encrypted record with instructions on how to decrypt and use it, or entrusting information to a trusted fiduciary with secure custody instructions. It is important to avoid unsecured lists of passwords and to plan for how access will be granted if you are incapacitated.Legal documentation should accompany technical steps to authorize fiduciaries to access accounts when needed. Pairing secure storage with clear legal permission reduces the risk that service providers will refuse access or that well-meaning individuals will inadvertently violate privacy expectations. Periodically updating stored credentials and access protocols ensures that the approach remains effective over time.
Will a power of attorney cover my online accounts?
A properly drafted power of attorney can include authorization for an agent to access and manage online accounts during incapacity, but its effectiveness may depend on how service providers interpret their terms of service and on statutory law in Tennessee. It is important to include explicit digital asset authorization language in the power of attorney and to ensure it aligns with other estate documents so agents have clear authority to act on your behalf.Because provider policies vary, the power of attorney should be paired with practical instructions and a secure method for sharing credentials. In some cases, additional documentation or steps may be needed to comply with platform requirements. Consulting about the specific wording and coordination with other estate instruments helps avoid ambiguity and supports smoother administration.
How should cryptocurrency be handled in a plan?
Cryptocurrency presents unique challenges because access typically depends on private keys or recovery phrases rather than traditional account credentials. To preserve value, it is important to document secure storage of keys and provide legally appropriate instructions for their transfer. Designating a trusted person and detailing the method for accessing wallets are critical steps, and the plan should address backup procedures and the consequences of loss or theft of keys.Legal documents should reflect the special nature of these assets, and secure technical custody arrangements should be chosen carefully. Combining strong technical safeguards with clear legal instructions reduces the risk that cryptocurrency holdings will become inaccessible or misappropriated during transitions of incapacity or after death.
Can social media accounts be transferred or memorialized?
Many social media platforms offer options for memorialization, deletion, or transfer of certain account features, but policies differ and some accounts cannot be fully transferred. Planning should document your preferences for how social media accounts should be handled and identify a person authorized to request the preferred action. Including clear instructions in your estate documents helps align expectations and provides a practical roadmap for handling online presences.Because platform rules change, include contact methods and any login or recovery information in a secure inventory. This makes it easier for authorized persons to follow your wishes, whether you want an account preserved as part of a digital legacy or closed to protect privacy. Coordination between your instructions and platform procedures reduces friction in executing those wishes.
What if I don’t want anyone to see certain online content?
If you have content you do not want others to see, your plan should specify that such material remain private or be deleted and should provide instructions on how to identify and securely remove it. Communicate your wishes clearly in writing and pair them with secure storage for any content or credentials that would enable authorized persons to act. Protecting privacy also involves choosing trustworthy fiduciaries and outlining limits on access.It is important to understand that absolute guarantees are difficult when accounts are governed by third-party policies. Still, clear legal instructions and careful selection of access methods can strongly reduce the likelihood that unwanted material becomes public. Regularly reviewing privacy settings and removing sensitive content proactively are practical complements to legal planning.
How often should I update my digital asset inventory?
You should update your digital asset inventory whenever you open or close significant accounts, change access credentials, or alter your wishes about how assets should be handled. A periodic review at least once a year is a practical rule of thumb, but more frequent checks may be appropriate if you add new services or adopt new technologies. Regular updates ensure that fiduciaries have accurate information when it is needed.Reviews should also include checking that legal documents remain aligned with current accounts and platform policies. Updating authorization language and secure storage arrangements as circumstances change reduces the risk of inaccessible assets and keeps your plan effective and reliable for those who may need to act on your behalf.
Do online service providers recognize digital executors?
Online service providers vary in whether and how they recognize appointed digital fiduciaries. Some platforms offer formal legacy contact or memorialization options, while others restrict access and require probate or specific documentation. Because of this variability, it is important to include legal authorizations in your estate planning documents and to document practical access instructions that align with platform procedures where possible.To reduce the chance of denial of access, pair authorization language with supporting documentation and follow platform-specific steps when available. Preparing for likely provider responses and having clear records ready can speed the process and make it easier for designated persons to act within the bounds of both the law and platform rules.
Is it safe to store credentials in a password manager?
Reputable password managers can be a secure method for storing credentials while allowing emergency access arrangements for trusted individuals. They provide encryption and controlled sharing features that balance security and accessibility. When using a password manager, choose one with strong security practices and set up emergency access protocols that comply with your wishes for who may retrieve credentials and under what circumstances.Regardless of the chosen tool, document the approach in your estate plan and provide instructions for authorized persons. Avoid keeping unencrypted lists in easily accessible places, and consider backup measures to ensure that critical credentials are not lost if the primary method becomes unavailable. Pairing technical safeguards with legal documentation strengthens reliability.
How do I coordinate digital asset planning with my will or trust?
Coordinating digital asset planning with your will or trust ensures consistency across your estate documents and avoids contradictory instructions. Include explicit authorization language in the appropriate documents and reference where the digital inventory and access instructions are stored. This helps fiduciaries locate the necessary information and clarifies the scope of their authority in managing digital assets.Additionally, align powers of attorney and trustee powers with your wishes about digital assets so that agents can act during incapacity and trustees can manage assets after death. Regularly review all documents together to ensure they remain synchronized as accounts change and new considerations arise.