Chapter 14

Appendices

6 min read

Appendix A: Account Inventory Template

Use this template to track all your accounts during initial setup and ongoing maintenance.

Fort Knox ACCOUNTS (5-10 total)

| Account Name | Username/Email | Password Hint | 2FA? | Recovery Method | Last Updated | |--------------|----------------|---------------|------|-----------------|--------------| | Primary Email | | | | | | | Main Bank | | | | | | | Primary Credit Card | | | | | | | Government Services | | | | | | | Healthcare Portal | | | | | | | Work System | | | | | | | Investment Account | | | | | | | | | | | | | | | | | | | | | | | | | | |

Good Locks ACCOUNTS (20-30 total)

Categories: Financial, Shopping, Social Media, Utilities, Subscriptions, Family

| Account Name | Category | Username/Email | Password Pattern | Last Updated | |--------------|----------|----------------|------------------|--------------| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Continue for 20-30 rows]

Basic Security ACCOUNTS

Track only if helpful - these are low-priority accounts

| Account Name | Username/Email | General Password Used | Still Needed? | |--------------|----------------|----------------------|---------------| | | | | | | | | | | | | | | |

Appendix B: Emergency Access Card Templates

Card 1: Wallet Card (Business card size)

[Front] EMERGENCY DIGITAL ACCESS If found, please return to: [Your Name] [Phone Number]

[Back] Emergency Contact: [Name & Phone] Password Doc Location: [Hint only] Critical Accounts: See sealed envelope Updated: [Date]

Card 2: Family Emergency Sheet (Full page)

DIGITAL EMERGENCY ACCESS INFORMATION

In Case of Emergency:

1. Immediate Needs - Email: [Provider only, not address] - Bank: [Bank name only] - Insurance: [Company name] Location of passwords: [Secure location]

2. Key Contacts - Lawyer: [Name & Phone] - Financial Advisor: [Name & Phone] - Tech Support Friend: [Name & Phone]

3. Critical Instructions - Password notebook in: [Location] - Recovery codes in: [Location] - Two-factor phone: [Number]

4. Do NOT - Share passwords via email - Give info to anyone calling you - Panic - everything is documented

Updated: [Date] Next Update Due: [Date]

Appendix C: Password Strength Guidelines

Fort Knox Password Requirements - Minimum 12 characters (prefer 15+) - Mix of upper and lowercase letters - Include numbers - Include symbols (!@#$%^&*) - No dictionary words alone - No personal information - Unique to that account - Changed if compromised

Good Locks Password Requirements - Minimum 10 characters - Pattern-based for categories - Some variation between accounts - Avoid obvious personal info - Updated annually

Basic Security Password Requirements - Minimum 8 characters - Can reuse across similar sites - Focus on remembering email used - Delete account if unused 1+ year

Creating Strong Memorable Passwords

Method 1: Sentence System "I met my wife at Starbucks in Denver 2009!" Password: ImwaSiD2009!

Method 2: Story Blend First car + Honeymoon spot + Year Honda + Maui + 2018 Password: Honda#Maui2018

Method 3: Personal Algorithm Site(3 letters) + Birth month + Pet + Year Amazon = Ama07Fluffy2023

Appendix D: Family Password Policy Template

[FAMILY NAME] HOUSEHOLD PASSWORD POLICY

Purpose: Keep our family's digital life secure while respecting privacy

Shared Accounts These accounts are shared by all/specific family members: - Netflix: [Who has access] - Utilities: [Who has access] - Family Photos: [Who has access]

Individual Accounts These remain private unless emergency: - Personal email - Social media - Banking (unless joint)

Kid Account Rules - Ages 0-12: Parents have all passwords - Ages 13-17: Sealed envelope system - Age 18+: Full privacy, emergency plan

Emergency Access - Location of password document: [Place] - Who can access: [Names] - When to access: Medical emergency, death, or incapacitation

Maintenance Schedule - Monthly check: First Sunday - Who participates: [Names] - Annual review: [Month]

Consequences - Sharing passwords outside family: [Consequence] - Not updating security: [Consequence] - Compromising family security: [Consequence]

Agreed to by: _________________ Date: _____ _________________ Date: _____ _________________ Date: _____

Appendix E: Digital Estate Planning Checklist

DIGITAL ESTATE PLANNING CHECKLIST

Legal Documents ✓ - [ ] Will mentions digital assets - [ ] Power of Attorney includes digital clause - [ ] Named digital executor - [ ] Instructions for digital assets

Account Preparation - [ ] Complete account inventory - [ ] Legacy contacts set where available - [ ] Recovery methods documented - [ ] Two-factor backup plans

Platform-Specific Legacy Settings - [ ] Google: Inactive Account Manager set - [ ] Facebook: Legacy Contact chosen - [ ] Apple: Legacy Contact added - [ ] LinkedIn: Preferences noted - [ ] Other platforms checked

Documentation - [ ] Emergency envelope created - [ ] Instructions written clearly - [ ] Contacts list current - [ ] Location shared with trusted person

Financial Accounts - [ ] Bank knows about estate planning - [ ] Investment accounts have beneficiaries - [ ] Crypto wallet instructions clear - [ ] Payment app access documented

Sentimental Assets - [ ] Photo storage access provided - [ ] Email archive instructions - [ ] Social media wishes stated - [ ] Creative work ownership clear

Business Accounts - [ ] Succession plan for access - [ ] Client information protected - [ ] Business continuity ensured - [ ] Intellectual property addressed

Review Schedule - [ ] Annual review date set - [ ] Life change triggers noted - [ ] Family members informed - [ ] Documents location known

Appendix F: Glossary of Terms (In Plain English)

2FA/two‑factor authentication (2FA): Needing two things to log in (like both a key and a code for a safe)

Authentication App: Phone app that generates login codes every 30 seconds

Backup Codes: Emergency codes to use if you can't receive regular 2FA codes

Biometric: Using your body to log in (fingerprint, face, voice)

Browser: The program you use to visit websites (Chrome, Safari, Firefox)

Cloud Storage: Saving files on the internet instead of just your computer

Compromised: When someone who shouldn't have access gets into your account

Data Breach: When a company's security fails and password information gets stolen

Digital Assets: Anything you own online (accounts, photos, documents, money)

Digital Estate: All your online accounts and what happens to them when you die

Encryption: Scrambling information so only authorized people can read it

Fort Knox: Our term for your most important, highly secured accounts

Good Locks: Our term for important but not critical accounts

Identity Theft: When someone pretends to be you online (or offline)

Legacy Contact: Person you choose to manage your account after death

Login/Log In: The process of entering username and password to access account

Master Password: The one password that unlocks a password manager

Password Manager: Software that stores and fills in all your passwords

Phishing: Fake emails trying to steal your password

Recovery Method: Way to get back into account if locked out (email, phone, questions)

Security Questions: Questions only you should know answers to (but often others can guess)

Strong Password: Long, unique, hard-to-guess password

Two-Step Verification: Another name for two‑factor authentication (2FA)

Username: The name or email you use to identify your account

VPN: Virtual Private Network - makes your internet connection more secure

Remember: If you don't understand a term, ask! There's no shame in learning.

---

End of Book

Thank you for taking this journey. Your digital life is now more secure, your family is protected, and you have a system that actually works. Keep this book handy for reference, share it with others who need help, and remember: progress beats perfection, always.