Digital legacy planning

How to Create a Digital Estate Plan

A practical guide to organizing accounts, digital assets, and trusted contacts before anything goes wrong.

A person organizing digital estate planning documents on a laptop and tablet.
Jonas Borchgrevink

Jonas Borchgrevink

Founder of Fort Legacy

Updated: 2026-04-02

United States context

This English guide is currently written for readers dealing with United States documents, provider processes, and support channels. Country-specific requirements can change elsewhere.

A digital estate plan gives your loved ones a usable map of your online life. It tells them what accounts exist, what should happen to them, who should act, and what must be preserved before anything is closed.

That is especially important for families who are older, grieving, or not very technical. If the plan is clear, they do not have to guess their way through passwords, phones, subscriptions, cloud storage, and platform rules while under pressure.

Quick start

A workable plan does not need to be complicated, but it does need to answer the practical questions another person will ask first.

  • List your important accounts, devices, subscriptions, and digital assets.
  • Document where secure access lives, including your password manager, backup codes, and passkeys.
  • State what should be preserved, deleted, memorialized, or reviewed before closure.
  • Name the people who should coordinate the work, and tell them where the plan and legal documents are stored.
  • Review the plan after major changes to your phone number, email, security setup, or family contacts.

What this plan is, and what it is not

A digital estate plan is not just a password sheet. It is a decision document. It should explain what each account is for, why it matters, and whether it contains money, records, memories, or access to something else.

It is also not a substitute for legal advice. Your plan should work alongside your will, powers of attorney, and estate documents. It should help the right people act more efficiently inside the rules that providers and local law already set.

Start with the accounts that control everything else

Most families should begin with the accounts that unlock other accounts. That usually means primary email, the phone number tied to security codes, the password manager, cloud storage, and the devices used for sign-in approvals.

If those pieces are missing, even a willing and organized family may get stuck. That is why your plan should say not only what you use, but also which accounts depend on two-factor authentication, which ones rely on a passkey, and which phone number receives recovery texts.

The articles What Happens to a Phone Number When Someone Dies? and How to Access a Deceased Person's Online Accounts show why these dependencies matter so much later.

Build an inventory that another person can understand quickly

Create a simple, readable inventory. Include the account name, the login email, what is stored there, and why the account matters. A grieving spouse or adult child should not have to decode your system.

Your inventory should usually include:

  • Email and messaging: primary inboxes, backup inboxes, and any service that receives account recovery or billing records.
  • Financial accounts: banks, investment platforms, payment apps, credit-card logins, and subscriptions with recurring charges.
  • Cloud and file storage: photos, backups, family documents, medical records, and business files.
  • Social and memorial accounts: profiles that may need memorialization, deletion, or a record-preservation decision.
  • Devices and security tools: phones, tablets, laptops, authenticator apps, security keys, and backup devices.

Decide what belongs in the plan, and what does not

Some people make the mistake of putting raw passwords in a normal document or inside a will. That can create both security and privacy problems. A will may become easier for other people to access later, and passwords may change long before the document is updated.

A safer approach is to record where secure access lives and how trusted people should reach it. For example, you can note the password manager you use, who should know how to access it, where recovery codes are stored, and which backup device can approve sign-ins.

You should also document where your important files live, what should happen to them, and who should receive them. That is different from exposing every secret in plain text.

Document passkeys, backup codes, and device-based security

Modern accounts increasingly rely on passkeys, biometrics, security keys, and approval prompts on another device. These systems can be excellent for security, but they can confuse families if no one knows where they are stored.

Your plan should answer practical questions such as these:

  • Which accounts rely on a passkey stored on your phone, laptop, browser, or password manager?
  • Where are backup codes or hardware security keys kept?
  • Which device receives sign-in approvals?
  • What is the recovery path if the primary phone is lost, locked, or canceled?

If you use Google's Inactive Account Manager or a platform-specific legacy contact, document that too. These settings can help, but they rarely replace the need for a full plan.

Write instructions by account, not just by category

Families do better when the plan states what should happen to each important account. That prevents overcorrection, such as deleting something that should have been preserved or keeping a risky account open longer than necessary.

Scroll table sideways
Decision type What to record in the plan Examples
Preserve first State what files, records, or messages should be saved before any closure request is sent. Photos, family documents, tax records, business files, purchase receipts
Review before closure Note why the account still matters and what should be checked before anyone cancels it. Email, banking, subscriptions, payment apps
Memorialize Say whether the profile should remain visible as a memorial and who should handle the request. Facebook and Instagram profiles
Delete for privacy Mark accounts that should be removed once records and dependencies are cleared. Old social accounts, low-value shopping accounts, unused apps

Name people, and define their roles clearly

Your plan is easier to follow if it names people, not vague groups. One person may act as the main coordinator, which many families describe as a digital executor. Another person might receive key documents. A spouse may handle financial notifications. An adult child may be the one who understands devices and password managers.

Be specific about who should do what:

  • Who should coordinate the overall digital work?
  • Who should communicate with providers?
  • Who should receive preserved photos, files, or records?
  • Who already has legal authority, and who does not?

Choose at least one backup person when possible. A second contact reduces the risk that knowledge or access disappears if the first person is unavailable.

Connect the plan to your legal documents

Your plan should point to your will, power of attorney, and any other estate documents, but it should not try to replace them. For example, you can note where the documents are stored, who has authority to act, and which accounts may require formal paperwork.

If your digital life includes online income, a business, cryptocurrency, valuable domains, or unusually sensitive records, get legal advice specific to your situation. The planning article should stay practical, not pretend every legal question has one simple answer.

Store the plan so the right person can actually use it

A good plan is still useless if nobody can find it or if the secure details are mixed carelessly with the instruction sheet. Tell your main coordinator where the working guide lives, where the secure access method lives, and where the signed estate documents sit. Those are often three different locations.

  • Keep the plain-language instruction sheet somewhere a trusted person can locate quickly.
  • Keep raw credentials, recovery codes, and security-key details in a more secure location.
  • State who can open each layer and what device, code, or paperwork may be needed.
  • If you use a digital will or estate memo, note which version is current and where the latest signed copy lives.

The handoff matters as much as the writing. Preparation becomes real only when another person can find the right document, understand it quickly, and move to the secure layer without guessing.

Make the plan usable for someone under stress

Many people overestimate how much a family member will remember in a crisis. Keep the layout simple, use plain language, and avoid technical shorthand that only makes sense to you.

A good test is this: if your family had to act tomorrow, would they know where to start in the first 15 minutes? If the answer is no, simplify the plan and add clearer first steps.

Review it regularly, especially after device and security changes

Accounts change, phones get replaced, and security methods evolve. Review your digital estate plan at least once a year. Update it sooner if you change your main email, phone number, password manager, passkey setup, or family contacts.

You should also review the plan after a death, divorce, remarriage, business change, or major move. These events often change both who should act and what records matter most.

Use the planning path, not a last-minute scramble

If you want a guided way to organize instructions, use this article as the starting checklist and review it regularly. If your family will likely need hands-on help after a loss, Digital Estate Care explains how Fort Legacy supports the practical work.

For the after-loss side of the process, keep the articles Do This First When a Loved One Dies: Managing Digital Accounts and How to Secure a Loved One's Online Banking and Subscription Accounts close by. They show what families often have to do when the plan is incomplete or when time matters immediately.

Clarity is the goal

The best digital estate plan is not the most technical one. It is the one your family can actually use. It should reduce uncertainty, protect privacy, and help the right people make calm decisions at the right time.

If your loved ones would know what exists, what to preserve, what to close, and who should lead, then the plan is doing its job.