Legacy Access Collaborators
Play an Important Role

Legacy Access Collaborators
Play an Important Role

Legacy Access Collaborators
Play an Important Role

Have you been chosen for Legacy Access to someone else's Trustworthy account?
Here's what that involves.

Your Role as a Legacy Access Collaborator

Your Role as a Legacy Access Collaborator

Your Role as a Legacy Access Collaborator

Your selection reflects that you are part of someone’s innermost circle. If you accept this responsibility, you’ll be entrusted with all of their important information after they pass away — ensuring their wishes are carried out. 

This includes access to such details as financial accounts, tax records, insurance policies, and estate documents.

You’ll be empowered to step in and request access when it’s needed most.

What Happens if You Need to Access the Account

What Happens if You Need to Access the Account

What Happens if You Need to Access the Account

If the time comes when you need access to the Trustworthy account, you will need to go through a secure identity verification process. This process ensures only authorized individuals can gain access to the sensitive information stored within Trustworthy.

Until then, you’ll receive a one-click email to verify your contact information every year.

Submit a request for access through the Trustworthy support platform.

Provide proof of identity, which includes a government-issued ID.

Upload a copy of the death certificate.

Trustworthy’s team will review and validate the documents.

Once approved, you’ll be granted full access to the account.

Curious About Using Trustworthy for Your Family?

Curious About Using Trustworthy for Your Family?

Curious About Using Trustworthy for Your Family?

Curious About Using Trustworthy for Your Family?

Support for your family in case something happens to you

98% of Trustworthy members are the primary “operational” manager in the family.

Stress relief from managing multiple systems

71% of members juggled 5+ paper and digital management systems before joining Trustworthy.

71% of members juggled 3+ paper and digital management systems before joining Trustworthy.

Smooth estate transitions for families with aging parents

23% of members worry about managing their parents’ caregiving and estates as they get older.

Keep Your Information Safe

Keep Your Information Safe

Keep Your Information Safe

World-class security and compliance that ensures your family information remains private and protected

World-class security and compliance that ensures your family information remains private and protected

World-class security and compliance that ensures your family information remains private and protected

Multi-factor authentication

Multi-factor authentication

For enhanced account security, Trustworthy requires two-factor authentication to protect against unauthorized access and phishing attacks.

Tokenization

Tokenization

Tokenization removes sensitive data from the database and replaces it with a corresponding token, which keeps the sensitive information protected and separate from your account.

Stolen-password alerts

Stolen-password alerts

Trustworthy scans anonymized password data against dark web databases to detect breaches, then prompts you to change your account password.

Threat detection

Threat detection

Trustworthy employs user entity behavior analytics to monitor anomalies and unusual activities.

Data encryption

Data encryption

Trustworthy data is encrypted in transit and at rest using 256-bit AES encryption keys.

Biometric authentication

Biometric authentication

Trustworthy employs facial recognition and fingerprint authentication on our mobile and desktop applications.

Frequently Asked Questions

Frequently Asked Questions

Frequently Asked Questions

What happens if I don’t verify my contact information?

What happens if I don’t verify my contact information?

What happens if I don’t verify my contact information?

What happens if I don’t verify my contact information?

How is my role different from that of other collaborators?

How is my role different from that of other collaborators?

How is my role different from that of other collaborators?

How is my role different from that of other collaborators?

What steps do I need to take in the event of an emergency?

What steps do I need to take in the event of an emergency?

What steps do I need to take in the event of an emergency?

What steps do I need to take in the event of an emergency?

What documents are needed to verify my identity and gain access?

What documents are needed to verify my identity and gain access?

What documents are needed to verify my identity and gain access?

What documents are needed to verify my identity and gain access?

How long does the identity verification process take?

How long does the identity verification process take?

How long does the identity verification process take?

How long does the identity verification process take?

Ready to Secure Your Family’s Future?

Ready to Secure Your Family’s Future?

Ready to Secure Your Family’s Future?

Getting started with Trustworthy is quick and easy. Create your Family Operating System®, upload key documents, set reminders, and invite trusted collaborators. In just a few steps, you’ll have peace of mind knowing your family’s vital information is secure and organized.