Appendix A: Account Inventory Template
Use this template to track all your accounts during initial setup and ongoing maintenance.
Fort Knox ACCOUNTS (5-10 total)
| Account Name | Username/Email | Password Hint | 2FA? | Recovery Method | Last Updated | |--------------|----------------|---------------|------|-----------------|--------------| | Primary Email | | | | | | | Main Bank | | | | | | | Primary Credit Card | | | | | | | Government Services | | | | | | | Healthcare Portal | | | | | | | Work System | | | | | | | Investment Account | | | | | | | | | | | | | | | | | | | | | | | | | | |
Good Locks ACCOUNTS (20-30 total)
Categories: Financial, Shopping, Social Media, Utilities, Subscriptions, Family
| Account Name | Category | Username/Email | Password Pattern | Last Updated | |--------------|----------|----------------|------------------|--------------| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | [Continue for 20-30 rows]
Basic Security ACCOUNTS
Track only if helpful - these are low-priority accounts
| Account Name | Username/Email | General Password Used | Still Needed? | |--------------|----------------|----------------------|---------------| | | | | | | | | | | | | | | |
Appendix B: Emergency Access Card Templates
Card 1: Wallet Card (Business card size)
[Front] EMERGENCY DIGITAL ACCESS If found, please return to: [Your Name] [Phone Number]
[Back] Emergency Contact: [Name & Phone] Password Doc Location: [Hint only] Critical Accounts: See sealed envelope Updated: [Date]
Card 2: Family Emergency Sheet (Full page)
DIGITAL EMERGENCY ACCESS INFORMATION
In Case of Emergency:
1. Immediate Needs - Email: [Provider only, not address] - Bank: [Bank name only] - Insurance: [Company name] Location of passwords: [Secure location]
2. Key Contacts - Lawyer: [Name & Phone] - Financial Advisor: [Name & Phone] - Tech Support Friend: [Name & Phone]
3. Critical Instructions - Password notebook in: [Location] - Recovery codes in: [Location] - Two-factor phone: [Number]
4. Do NOT - Share passwords via email - Give info to anyone calling you - Panic - everything is documented
Updated: [Date] Next Update Due: [Date]
Appendix C: Password Strength Guidelines
Fort Knox Password Requirements - Minimum 12 characters (prefer 15+) - Mix of upper and lowercase letters - Include numbers - Include symbols (!@#$%^&*) - No dictionary words alone - No personal information - Unique to that account - Changed if compromised
Good Locks Password Requirements - Minimum 10 characters - Pattern-based for categories - Some variation between accounts - Avoid obvious personal info - Updated annually
Basic Security Password Requirements - Minimum 8 characters - Can reuse across similar sites - Focus on remembering email used - Delete account if unused 1+ year
Creating Strong Memorable Passwords
Method 1: Sentence System "I met my wife at Starbucks in Denver 2009!" Password: ImwaSiD2009!
Method 2: Story Blend First car + Honeymoon spot + Year Honda + Maui + 2018 Password: Honda#Maui2018
Method 3: Personal Algorithm Site(3 letters) + Birth month + Pet + Year Amazon = Ama07Fluffy2023
Appendix D: Family Password Policy Template
[FAMILY NAME] HOUSEHOLD PASSWORD POLICY
Purpose: Keep our family's digital life secure while respecting privacy
Shared Accounts These accounts are shared by all/specific family members: - Netflix: [Who has access] - Utilities: [Who has access] - Family Photos: [Who has access]
Individual Accounts These remain private unless emergency: - Personal email - Social media - Banking (unless joint)
Kid Account Rules - Ages 0-12: Parents have all passwords - Ages 13-17: Sealed envelope system - Age 18+: Full privacy, emergency plan
Emergency Access - Location of password document: [Place] - Who can access: [Names] - When to access: Medical emergency, death, or incapacitation
Maintenance Schedule - Monthly check: First Sunday - Who participates: [Names] - Annual review: [Month]
Consequences - Sharing passwords outside family: [Consequence] - Not updating security: [Consequence] - Compromising family security: [Consequence]
Agreed to by: _________________ Date: _____ _________________ Date: _____ _________________ Date: _____
Appendix E: Digital Estate Planning Checklist
DIGITAL ESTATE PLANNING CHECKLIST
Legal Documents ✓ - [ ] Will mentions digital assets - [ ] Power of Attorney includes digital clause - [ ] Named digital executor - [ ] Instructions for digital assets
Account Preparation - [ ] Complete account inventory - [ ] Legacy contacts set where available - [ ] Recovery methods documented - [ ] Two-factor backup plans
Platform-Specific Legacy Settings - [ ] Google: Inactive Account Manager set - [ ] Facebook: Legacy Contact chosen - [ ] Apple: Legacy Contact added - [ ] LinkedIn: Preferences noted - [ ] Other platforms checked
Documentation - [ ] Emergency envelope created - [ ] Instructions written clearly - [ ] Contacts list current - [ ] Location shared with trusted person
Financial Accounts - [ ] Bank knows about estate planning - [ ] Investment accounts have beneficiaries - [ ] Crypto wallet instructions clear - [ ] Payment app access documented
Sentimental Assets - [ ] Photo storage access provided - [ ] Email archive instructions - [ ] Social media wishes stated - [ ] Creative work ownership clear
Business Accounts - [ ] Succession plan for access - [ ] Client information protected - [ ] Business continuity ensured - [ ] Intellectual property addressed
Review Schedule - [ ] Annual review date set - [ ] Life change triggers noted - [ ] Family members informed - [ ] Documents location known
Appendix F: Glossary of Terms (In Plain English)
2FA/two‑factor authentication (2FA): Needing two things to log in (like both a key and a code for a safe)
Authentication App: Phone app that generates login codes every 30 seconds
Backup Codes: Emergency codes to use if you can't receive regular 2FA codes
Biometric: Using your body to log in (fingerprint, face, voice)
Browser: The program you use to visit websites (Chrome, Safari, Firefox)
Cloud Storage: Saving files on the internet instead of just your computer
Compromised: When someone who shouldn't have access gets into your account
Data Breach: When a company's security fails and password information gets stolen
Digital Assets: Anything you own online (accounts, photos, documents, money)
Digital Estate: All your online accounts and what happens to them when you die
Encryption: Scrambling information so only authorized people can read it
Fort Knox: Our term for your most important, highly secured accounts
Good Locks: Our term for important but not critical accounts
Identity Theft: When someone pretends to be you online (or offline)
Legacy Contact: Person you choose to manage your account after death
Login/Log In: The process of entering username and password to access account
Master Password: The one password that unlocks a password manager
Password Manager: Software that stores and fills in all your passwords
Phishing: Fake emails trying to steal your password
Recovery Method: Way to get back into account if locked out (email, phone, questions)
Security Questions: Questions only you should know answers to (but often others can guess)
Strong Password: Long, unique, hard-to-guess password
Two-Step Verification: Another name for two‑factor authentication (2FA)
Username: The name or email you use to identify your account
VPN: Virtual Private Network - makes your internet connection more secure
Remember: If you don't understand a term, ask! There's no shame in learning.
---
End of Book
Thank you for taking this journey. Your digital life is now more secure, your family is protected, and you have a system that actually works. Keep this book handy for reference, share it with others who need help, and remember: progress beats perfection, always.