Consider a scenario that is becoming routine in estate administrations: a long-time client dies. Her will is well-drafted; it names her daughter as personal representative and incorporates the RUFADAA-compliant digital assets language your firm has used since 2017. The daughter obtains letters testamentary within ten days. And yet -- she cannot get into her mother's iPhone. The cellular carrier suspended the number, so SMS verification codes for the brokerage portal never arrive. The authenticator app for the decedent's cryptocurrency exchange lives on that locked device. Apple's Digital Legacy portal demands an "access key" that was never generated. Gmail's deceased-user request form returns an email two weeks later confirming the account will be closed -- and explicitly stating that Google "cannot provide passwords or other login details." Six months into administration, the estate is still inventorying assets it cannot reach.

This is the access gap. RUFADAA resolved a meaningful legal problem. It did not resolve an operational one. For estate planning attorneys whose clients increasingly live their financial, social, and professional lives online, understanding that distinction is no longer optional.

What RUFADAA Does -- and Where It Stops

The Revised Uniform Fiduciary Access to Digital Assets Act establishes a three-tier hierarchy of authority over digital accounts: (1) an online tool designated by the user (such as Apple's Legacy Contact or Google's Inactive Account Manager) controls if one was set; (2) absent that, the will, trust, or power of attorney controls -- provided it expressly addresses digital assets; (3) only in the absence of both does the service provider's terms of service govern. That framework is a material improvement over the pre-RUFADAA vacuum exposed in litigation such as Ajemian v. Yahoo!, Inc., where the Massachusetts Supreme Judicial Court spent eight years concluding only that the federal Stored Communications Act did not prohibit Yahoo from disclosing a decedent's emails -- not that it was required to do so.

As the court in Ajemian itself noted, the SCA "does not stand in the way" of voluntary release -- a far cry from compelling it. That distinction between may and must is the operational heart of the access gap, and RUFADAA preserved it in three custodian-friendly provisions attorneys often pass over:

  • Custodians may require a court order, even when letters testamentary would otherwise establish authority.
  • Custodians may decline requests deemed "unduly burdensome" or that fall outside what is "reasonably necessary" for estate administration; they may also decline content requests absent express consent to content disclosure by the decedent.
  • Custodians may impose their own identity-verification procedures and charge reasonable fees for compliance.

The practical consequence: even in a fully RUFADAA-compliant estate, accessing major digital accounts routinely takes three to six months and multiple rounds of documentation.

Platform-Specific Friction

Each major custodian operates under its own regime -- and the differences are material.

Apple

Apple's Legacy Contact is the most functional path available -- if the decedent configured it. The designated contact must produce both an access key (generated at the time of designation) and a certified death certificate. The resulting temporary account is available for three years before permanent deletion. Critically, even Legacy Contact access does not include the iCloud Keychain: saved passwords, passkeys, and payment credentials remain locked behind the decedent's device passcode. Where no Legacy Contact was designated, a U.S. executor must obtain a court order specifically naming the decedent and directing Apple to provide access.

Google

Google's Inactive Account Manager allows users to pre-designate up to ten trusted contacts to receive access to specific data products after a configurable inactivity period of 3, 6, 12, or 18 months. When that feature was never configured, executors fall back to Google's standard deceased-user request process -- and Google's published policy is unequivocal: it "cannot provide passwords or other login details." Google's support documentation further confirms there is no way to bypass two-step verification even for a deceased user.

Meta (Facebook / Instagram)

Meta's Legacy Contact is the most circumscribed of the major platform options. A designated contact may pin a tribute post, update a profile photo, accept new friend requests, and -- if pre-authorized by the account holder -- download a limited archive. The Legacy Contact cannot log in as the decedent and cannot read private messages. Without prior designation, the estate receives a memorialized profile or deletion; there is no path to account contents.

Microsoft

Microsoft occupies the most restrictive end of the spectrum. Its "Next of Kin" process for Outlook.com, Hotmail, Live, and MSN accounts delivers email content on a physical DVD -- not login access, and not a password reset. For content from personal email accounts, Microsoft's published policy requires a valid subpoena or court order before it will act. Families have publicly documented six-week response delays with no substantive progress through Microsoft's consumer support channels.

The MFA Trap

The technical chokepoint that defeats even perfect paperwork is multi-factor authentication (MFA). The decedent's phone is typically the second factor for every meaningful financial and personal account. Once a carrier suspends the line -- which most carriers do shortly after notification of death -- SMS verification codes stop arriving. Time-based one-time password (TOTP) authenticator apps such as Google Authenticator are bound to a specific device and generally cannot be transferred without a prior encrypted backup. Biometric authentication is, by definition, irreproducible post-mortem. And a passcode-protected iPhone cannot be unlocked without a full device wipe -- which destroys the very authenticator seeds needed to access the accounts behind it.

Practical mitigation starts before death, not after: counsel clients to keep the decedent's phone number active during administration, to generate and securely store 2FA backup codes alongside the password vault, and to export or print authenticator seed phrases at setup.

Password Managers and Cryptocurrency: The Hard Edges

Password Managers

Password managers are part of the solution -- and part of the problem. LastPass and Bitwarden offer Emergency Access features built on asymmetric cryptography: a designated contact submits a request, a user-configurable waiting period runs during which the account holder may deny it, and if the period expires, the vault is released. The design is sound, but useless if the account holder never enrolled a contact.

1Password, by design principle, holds no server-side encryption keys. Its recommended practice is the printed Emergency Kit -- a document containing the Secret Key and master password -- which the client must physically transmit to the executor or store with estate documents. No legal process compels these companies to release a vault they cryptographically cannot decrypt.

Cryptocurrency

Exchange-custodied holdings (e.g., Coinbase, Kraken, Gemini) are broadly amenable to RUFADAA-style fiduciary access because there is a counterparty with KYC records and an internal process. Self-custodied assets present an entirely different category of problem. The 2018 collapse of QuadrigaCX -- following the death of CEO Gerald Cotten, which left approximately C$215 million in customer obligations and roughly 76,000 affected users without recourse -- became the canonical cautionary tale, notwithstanding the Ontario Securities Commission's subsequent finding that Cotten had operated an underlying fraud.

Chainalysis has estimated that between 2.78 and 3.79 million bitcoin -- roughly 17 to 23 percent of all mined supply -- are permanently lost, principally to forgotten or destroyed private keys. No court order, anywhere, reconstructs a 256-bit private key. For clients with any meaningful self-custody position, a documented key-recovery protocol (multi-signature architecture, Shamir secret-sharing, or a custodial wrapper) is not optional estate planning -- it is the asset itself.

The Scale of the Problem

A 2019 Harris Poll commissioned by Google found the average American manages 27 password-protected online accounts. A Bitdefender consumer survey found roughly two-thirds of users manage between three and ten active accounts, with approximately 6.6 percent of U.S. respondents reporting more than ten. For the typical estate planning client -- an affluent or business-owning individual with decades of digital footprint -- the number is almost certainly higher and will grow. Financial portals, cloud storage, email history, subscription services with recurring billing, social media, business platforms, and increasingly substantial cryptocurrency positions all sit behind login screens that legal documents alone cannot open.

What Comprehensive Planning Now Requires

The well-drafted digital assets provision is a necessary starting point -- not a finish line. In practical terms, the comprehensive digital estate plan addresses three operational stages:

At intake and plan execution:

  • Confirm that Apple Legacy Contact, Google Inactive Account Manager, and Meta Legacy Contact have been designated -- and complete them in the office if they have not.
  • Confirm the client's password manager has an emergency-access contact enrolled, or that a printed Emergency Kit is stored with original estate documents.
  • For clients with cryptocurrency, require evidence of a working key-recovery scheme before closing the engagement.
  • Draft RUFADAA language that expressly grants both catalog and content access to electronic communications; silence under the statute defaults to no content disclosure under federal law.

In a separately maintained inventory document (never embedded in the will, which is a public record):

  • A current list of account types and platform names, updated at least annually.
  • The location of the password vault and the name of the designated emergency-access contact.
  • Instructions for preserving the decedent's phone line during administration.

On plan review triggers:

  • Any new cryptocurrency or self-custody position.
  • Any change of primary phone number or carrier.
  • Any migration between platform ecosystems (Apple to Android, or vice versa).
  • The twenty-four-month mark, by which point custodian policies and online-tool features have typically changed enough to revisit.

RUFADAA opened the courthouse door. The keys to the accounts still belong to the client -- until the client gives them, in advance and in usable form, to someone else. The role of estate planning counsel has always been to translate legal rights into practical outcomes for families at their most vulnerable. In 2026, that translation increasingly runs through a login screen.

References

  1. Uniform Law Commission, Revised Uniform Fiduciary Access to Digital Assets Act (2015). As of 2026, enacted in 47 states, the District of Columbia, and the U.S. Virgin Islands.
  2. Ajemian v. Yahoo!, Inc., 478 Mass. 169, 83 N.E.3d 437 (2017), cert. denied, 138 S. Ct. 1327 (2018). The court held that the Stored Communications Act, 18 U.S.C. Section 2701 et seq., does not prohibit voluntary disclosure by an electronic service provider but does not compel it.
  3. RUFADAA Section 9 (Custodian compliance with fiduciary request): a custodian may require a court order where it determines the request to be unduly burdensome, and may charge a reasonable administrative charge for compliance.
  4. Apple Support, "If you're a Legacy Contact for an Apple Account," support.apple.com/en-us/102631 (visited May 2026). Legacy Contact access explicitly excludes iCloud Keychain contents, health data, and payment information.
  5. Apple Support, "Request access to a deceased family member's Apple account," support.apple.com (visited May 2026). Where no Legacy Contact is designated, a U.S. executor must obtain a court order specifically naming the decedent and directing Apple to provide access.
  6. Google Account Help, "Submit a request regarding a deceased user's account," support.google.com/accounts/troubleshooter/6357590 (visited May 2026). Google's policy: "For privacy and security reasons, we can't provide passwords or other login details."
  7. Google Account Help, "About Inactive Account Manager," support.google.com/accounts/answer/3036546 (visited May 2026). Inactivity windows configurable at 3, 6, 12, or 18 months.
  8. Meta, "Adding a Legacy Contact," about.fb.com/news/2015/02/adding-a-legacy-contact (Feb. 12, 2015). Legacy Contact cannot log in as the decedent or read private messages.
  9. Microsoft Learn, "Microsoft's Next of Kin Process -- Accessing Emails," learn.microsoft.com/en-us/answers/questions/4527410 (visited May 2026). Email content delivered on physical DVD; login credentials not provided; court order or subpoena required.
  10. LegalClarity, "Can You Unlock a Deceased Person's Phone?" legalclarity.org (visited May 2026). Apple's platform security model prevents passcode bypass without device wipe.
  11. LastPass Emergency Access feature documentation; Bitwarden, "Emergency Access," bitwarden.com/help/emergency-access (visited May 2026). Both implement an asymmetric cryptographic waiting-period model.
  12. 1Password Community, "1Password Access after Death, Legacy Contacts," community.1password.com (visited May 2026). 1Password does not hold decryption keys; Emergency Kit must be physically transmitted by the account holder.
  13. Ontario Securities Commission, Staff Notice 11-739: QuadrigaCX: A Review by Staff of the Ontario Securities Commission (June 2020). Cotten died December 2018; exchange collapsed with approximately C$215 million in obligations to ~76,000 users; OSC concluded Cotten had operated a Ponzi scheme.
  14. Chainalysis, Crypto Crime Report (2020 ed.); Jeff John Roberts & Nicolas Rapp, "Exclusive: Nearly 4 Million Bitcoins Lost Forever, New Study Says," Fortune (Nov. 25, 2017). Estimated 2.78-3.79 million bitcoin permanently lost to forgotten or destroyed private keys.
  15. Harris Poll commissioned by Google (2019), as reported in Inc.com, "Google Says 66% of Americans Still Do This 1 Thing That Puts Their Personal Information at a Huge Risk" (visited May 2026). Average American manages 27 password-protected accounts.
  16. Bitdefender, "Most People Juggle Between 3 and 10 Online Accounts, Bitdefender Survey Finds," bitdefender.com/en-us/blog/hotforsecurity (visited May 2026).

Disclaimer

This article is prepared by Digital Estate Advisors, a fictitious name / DBA of Maco Strategy LLC, for informational and educational purposes only. It does not constitute legal advice and does not establish an attorney-client relationship. Platform policies cited herein -- including those of Apple, Google, Meta, and Microsoft -- are subject to change; practitioners should verify current procedures directly with each custodian before advising clients. RUFADAA adoption and state-specific variations should be confirmed under the applicable jurisdiction's current statutes. Cryptocurrency estimates are based on blockchain analytics research and involve inherent uncertainty.