How to prepare your digital assets in case of death

Mac 911 has received a sadly unsurprising number of emails this year from people whose loved ones have passed away, and who are left with computers, mobile devices, and cloud accounts that contain memories, legal documents, and much more.

I have written previously about various aspects of survivorship for Apple products and its ecosystem, but it’s worth extending and collecting that in one place, given the number of questions many of you have.

Make a plan before it’s too late

Most of us feel macabre talking about death, but dealing with the fussy details ahead of time can solve endless problems later. It’s especially true with digital resources, as giant technology firms, including Apple, may not be responsive to your queries when someone’s gone.

Try to sort out with living relatives, partners, and the like a way for them to store their passwords so that you can have access if they die or are incapacitated. If you have enough trust in another person, you can exchange passwords in a secure way. My wife and I use 1Password, and each have an entry shared with the other person with critical information in case of emergency or death.

You could also hire a lawyer, or your loved one, business partner, or other person you have a connection to could. A lawyer can draft a simple document that would let them hold passwords in escrow for another party, and release them only under particular circumstances. (It’s critical to share that with other people so they know how to reach this lawyer or law firm.)

You can go one step further, too, and encrypt the information provided to the lawyer, providing the password only to authorized parties. That prevents your data being accessible if a firm had an untrustworthy employee or your files were stolen.

(An easy way to encrypt is to make an encrypted disk image on which you put files. Use Disk Utility: File > New Image > Blank Image, set a name and disk size, choose 256-bit from the Encryption pop-up menu, enter and record a password. Only Macs can decrypt and mount such a disk image.)

A trusted party could fulfill that intermediary role instead of a lawyer, too, if there’s someone who could be relied upon to release the encrypted information under the same restrictions.