Data Inheritance


Data Inheritance

Data inheritance helps loved ones, who have lost a family member or a person close to them to manage important digital documents and login data, which belonged to the deceased. This way, the loved ones can delete or deactivate profiles of the departed from social media or other account.

Learn more

How it works

  1. Log in to the SecureSafe Web App.
  2. Click on “inheritance” in the bottom-left menu.
  3. Click on the settings icon next to “Inactive digital inheritance”.
  4. Follow the instructions to prepare the digital inheritance.
  5. Turn on the digital inheritance function and assign files and passwords to the beneficiaries.

Data inheritance helps loved ones, who have lost a family member or a person close to them to manage important digital documents and login data, which belonged to the deceased. This way, the loved ones can delete or deactivate profiles of the departed from social media or other accounts

How it works

  1. Log in to the SecureSafe Web App.
  2. Click on “inheritance” in the bottom-left menu.
  3. Click on the settings icon next to “Inactive digital inheritance”.
  4. Follow the instructions to prepare the digital inheritance.
  5. Turn on the digital inheritance function and assign files and passwords to the beneficiaries.

Quicklink

SecureSafe needs your contact information so that in the event the inheritance process is mistakenly or improperly triggered, you will be notified and able to react by logging into your account and stopping the inheritance process.

What information is needed?

In order for the data inheritance to be activated, you must enter your cell number and your email address. To be on the safe side, add a second email address.

SecureSafe needs your contact information so that in the event the inheritance process is mistakenly or improperly triggered, you will be notified and able to react by logging into your account and stopping the inheritance process.

What information is needed?

In order for the data inheritance to be activated, you must enter your cell number and your email address. To be on the safe side, add a second email address.


Quicklink

A beneficiary is the heir to the files and passwords assigned to him or her. The activator is a person of trust who triggers the inheritance process by entering the activation code. The activator and beneficiary can also be the same person.

What do I have to enter?

You must enter at least one beneficiary. A name, cell number and at least one email address must be entered for each beneficiary. The maximum number of beneficiaries depends on your type of subscription.

A beneficiary is the heir to the files and passwords assigned to him or her. The activator is a person of trust who triggers the inheritance process by entering the activation code. The activator and beneficiary can also be the same person.

What do I have to enter?

You must enter at least one beneficiary. A name, cell number and at least one email address must be entered for each beneficiary. The maximum number of beneficiaries depends on your type of subscription.


Quicklink

If you lose your password, you will need the recovery code to log in. This is only for you. The activation code on the other hand must be given to someone you trust; it is required to trigger the data inheritance process.

How do I pass on the activation code?

Download the PDF with the activation code, print it out and give the printout to the person of trust. If there is more than one person of trust, simply pass on the same activation code several times.

If you lose your password, you will need the recovery code to log in. This is only for you. The activation code on the other hand must be given to someone you trust; it is required to trigger the data inheritance process.

How do I pass on the activation code?

Download the PDF with the activation code, print it out and give the printout to the person of trust. If there is more than one person of trust, simply pass on the same activation code several times.


Quicklink

The blocking period is the period of time between entering the activation code and the data being transferred. During the blocking period, you can stop an inheritance process yourself by logging into your SecureSafe account.

What do I have to consider when setting the blocking period?

Choose a blocking period that gives you enough time to stop an inheritance process that has already been triggered – for example, if the inheritance process was triggered accidentally.

The blocking period is the period of time between entering the activation code and the data being transferred. During the blocking period, you can stop an inheritance process yourself by logging into your SecureSafe account.

What do I have to consider when setting the blocking period?

Choose a blocking period that gives you enough time to stop an inheritance process that has already been triggered – for example, if the inheritance process was triggered accidentally.


Quicklink

Once you have entered your own contact details, determined beneficiaries and assigned files and passwords, you can activate the data inheritance: in the settings, move the main switch to the “On” position with a click of the mouse.

Will the files be transferred immediately afterwards?

No. Now the function is only “on standby”. The inheritance process is only triggered when the person of trust enters the activation code – moreover, the blocking period must first expire before your data can be transferred.

Once you have entered your own contact details, determined beneficiaries and assigned files and passwords, you can activate the data inheritance: in the settings, move the main switch to the “On” position with a click of the mouse.

Will the files be transferred immediately afterwards?

No. Now the function is only “on standby”. The inheritance process is only triggered when the person of trust enters the activation code – moreover, the blocking period must first expire before your data can be transferred.


Quicklink

The person who received the activation code from you is called an activator. In the event of your death or loss of your capacity to act, the activator enters the activation code at securesafe.com/activate and thus triggers the inheritance process.

Will data be transferred immediately? What is the blocking period?

The files and passwords are not transferred immediately after entering the activation code. The blocking period (a security waiting period) must first elapse. During this period, you as the account holder can stop the inheritance process.

The person who received the activation code from you is called an activator. In the event of your death or loss of your capacity to act, the activator enters the activation code at securesafe.com/activate and thus triggers the inheritance process.

Will data be transferred immediately? What is the blocking period?

The files and passwords are not transferred immediately after entering the activation code. The blocking period (a security waiting period) must first elapse. During this period, you as the account holder can stop the inheritance process.


Quicklink

Nobody can access your account. The files and passwords intended for the data inheritance are made available for download in a separate safe for each beneficiary. Beneficiaries only have access to this download.

Who receives what?

Your beneficiaries will only receive the files and passwords that you have assigned to them. Files and passwords that you have not assigned to anyone will not be shared.

Nobody can access your account. The files and passwords intended for the data inheritance are made available for download in a separate safe for each beneficiary. Beneficiaries only have access to this download.

Who receives what?

Your beneficiaries will only receive the files and passwords that you have assigned to them. Files and passwords that you have not assigned to anyone will not be shared.


Quicklink

Once the blocking period has expired, the assigned files and passwords are made available to the respective beneficiaries as downloads. Beneficiaries now have 90 days to download them. After this period the account will be permanently blocked.

What if the subscription has expired?

If a SecureSafe subscription has expired, the inheritance process cannot be triggered for that account. To trigger the inheritance process for an expired subscription, please contact Turn on Javascript!.

Once the blocking period has expired, the assigned files and passwords are made available to the respective beneficiaries as downloads. Beneficiaries now have 90 days to download them. After this period the account will be permanently blocked.

What if the subscription has expired?

If a SecureSafe subscription has expired, the inheritance process cannot be triggered for that account. To trigger the inheritance process for an expired subscription, please contact Turn on Javascript!.


Quicklink

With automatic assignment you can assign all files and passwords to one or more beneficiaries with just a few clicks of the mouse. All files and passwords saved in the future will automatically be assigned to this beneficiary.

How can I deactivate automatic assignment?

By clicking on the on / off button (see right) for a beneficiary, automatic assignment can be switched off. All assignments for this beneficiary will be revoked and automatic assignment

will be disabled.

Once the blocking period has expired, the assigned files and passwords are made available to the respective beneficiaries as downloads. Beneficiaries now have 90 days to download them. After this period the account will be permanently blocked.

What if the subscription has expired?

If a SecureSafe subscription has expired, the inheritance process cannot be triggered for that account. To trigger the inheritance process for an expired subscription, please contact Turn on Javascript!.


Quicklink

In today’s world, we use social media, emails, blogs and other cloud solutions on a daily basis. Whether consciously or unconsciously, we are building up a complex digital legacy through our use of various digital services over the years. For this reason, SecureSafe offers a special feature, which helps loved ones put the digital ghost of a deceased family member to rest – data inheritance.

Data inheritance helps loved ones, who have lost a family member or a person close to them to manage important digital documents and login data, which belonged to the deceased. This way, the loved ones can delete or deactivate profiles of the departed from social media or other accounts.

In today’s world, we use social media, emails, blogs and other cloud solutions on a daily basis. Whether consciously or unconsciously, we are building up a complex digital legacy through our use of various digital services over the years. For this reason, SecureSafe offers a special feature, which helps loved ones put the digital ghost of a deceased family member to rest – data inheritance.

Data inheritance helps loved ones, who have lost a family member or a person close to them to manage important digital documents and login data, which belonged to the deceased. This way, the loved ones can delete or deactivate profiles of the departed from social media or other accounts.


Quicklink
Cookies – please make your selection
Cookies
This website uses cookies to ensure you get the best experience on our website.

Essential cookies – essential for the use of the website
Off On
Preference cookies – enable the website to remember the user preferences of the user, such as language and region
Off On
Statistical cookies – anonymised gathering of information to evaluate the use of the website by the visitor
Off On