Have you been chosen for Legacy Access to someone else's Trustworthy account?
Here's what that involves.
Your selection reflects that you are part of someone’s innermost circle. If you accept this responsibility, you’ll be entrusted with all of their important information after they pass away — ensuring their wishes are carried out.
This includes access to such details as financial accounts, tax records, insurance policies, and estate documents.
You’ll be empowered to step in and request access when it’s needed most.
If the time comes when you need access to the Trustworthy account, you will need to go through a secure identity verification process. This process ensures only authorized individuals can gain access to the sensitive information stored within Trustworthy.
Until then, you’ll receive a one-click email to verify your contact information every year.
Submit a request for access through the Trustworthy support platform.
Provide proof of identity, which includes a government-issued ID.
Upload a copy of the death certificate.
Trustworthy’s team will review and validate the documents.
Once approved, you’ll be granted full access to the account.
For enhanced account security, Trustworthy requires two-factor authentication to protect against unauthorized access and phishing attacks.
Tokenization removes sensitive data from the database and replaces it with a corresponding token, which keeps the sensitive information protected and separate from your account.
Trustworthy scans anonymized password data against dark web databases to detect breaches, then prompts you to change your account password.
Trustworthy employs user entity behavior analytics to monitor anomalies and unusual activities.
Trustworthy data is encrypted in transit and at rest using 256-bit AES encryption keys.
Trustworthy employs facial recognition and fingerprint authentication on our mobile and desktop applications.
Getting started with Trustworthy is quick and easy. Create your Family Operating System®, upload key documents, set reminders, and invite trusted collaborators. In just a few steps, you’ll have peace of mind knowing your family’s vital information is secure and organized.