Article, August 2006
Accessing Family Accounts in Cases of Emergency
By Gabriel Goldberg,
APCUG Advisor; Columnist, AARP Computer & Technology Website
firstname.lastname@example.org (click to email author)
We know it's important to maintain current wills, powers of attorney, medical directives, and other such documents. With much data now stored electronically, emergency preparedness includes planning for family members, trusted friends, and advisors to access personal information stored online, on computers, and in electronic gadgets. More >>>
Access Family Accounts in Emergencies
It's clear how important it is for each of us to maintain current wills, powers of attorney, medical directives, and other such documents. And family members, trusted friends, and advisors such as lawyers need quick access to them. In their absence, at stressful times, important actions and decisions become needlessly difficult.
With much data now stored electronically, emergency preparedness requires that loved ones or advisors can access personal information stored online, on computers, and in electronic gadgets like cell phones and PDAs (personal digital assistants, Palms and Pocket PCs). This preparation merely adds our electronic lives to a readiness checklist. It's no more exotic or worrisome than opening joint bank accounts or giving a house key to a trusted neighbor.
Actions we should take are as unique as our legal, medical, and financial profiles. Preparation is especially important because laws and business practices don't match today's technologies.
News stories highlight some of today's challenges and risks. A soldier in Iraq used e-mail and a Web site to communicate with the world. When he was killed, his parents wanted to preserve what he had created. But his ISP refused to allow access or provide the data, citing privacy concerns. Similarly, when a Texas man's wife died, he cancelled her cell phone. The company also disconnected his phone, which had been on the same account. He couldn't reactivate it, leaving him isolated at a difficult time.
Where to begin? Many such legal and logistical problems can be avoided by simply including two names on accounts such as online banking and investing, mortgage service, bill paying, e-mail, and Web services. This way either person can deal with accounts on the other's behalf. But ensure that both names aren't required for routine actions.
Then record account names, passwords, and Web addresses for family members, trusted friends, or a lawyer, accountant, or executor. They needn't have the list until it's to be used so just ensure that they can find it and that it's kept updated.
Those of us in the baby boomer "sandwich generation" may have parents and children to look out for and with whom to share our technology preparation information. Preparation requires replacing the common mindset of independence with one of readiness and collaboration. An estate attorney can be a valuable resource, providing legal documents, objective advice, and what-if scenarios.
Commercial services are arising to help. Denver-based Family Matters USA [http://www.familymatters.com] claims to have "identified, researched and solved over 120 tasks that an estate executor or family could perform". They believe that while privacy issues affect all sorts of accounts, proper legal forms, a legitimate need, and perseverance (sometimes escalating to a supervisor) will yield the desired information.
While organizations typically handle employees' work information during emergency situations, supervisors and individuals should inventory what they use on the job and how others might need to access it.
At home or at work, the largest obstacle to emergency preparation is the wealth of information we use from memory. You can start an inventory by noting details of online accounts, Web site bookmarks saved, and passwords stored. Then make a list to share with someone who may need to follow in your electronic footsteps. Remember to safeguard your list, whether it's on paper, a PC, or a USB drive [http://www.aarp.org/learntech/computers/hardware/secure_usb_drives.html]. But don't hide the list itself behind a secret password!
Finally, there's a very tangible step to take. Emergency responders encourage using a high-tech replacement for traditional wallet contact-list cards [http://www.macmillandictionary.com/New-Words/050808-ICE-number.htm]. They commonly check victims' cell phones or PDA directories for entries filed under "ICE" ("in case of emergency") to determine whom to call.
This article originated on AARP's Computers and Technology Web site, http://www.aarp.org/computers, and is copyrighted by AARP. All rights are reserved; it may be reproduced, downloaded, disseminated, or transferred, for single use, or by nonprofit organizations for educational purposes, with attribution to AARP. It should be unchanged and this paragraph included. Please e-mail Gabe Goldberg at email@example.com when you use it, or for permission to excerpt or condense. There is no restriction against any non-profit group using this article as long as it is kept in context with proper credit given the author. The Editorial Committee of the Association of Personal Computer User Groups (APCUG), an international organization of which this group is a member, brings this article to you.Click here to return to top