Digital Asset Estate Management: Social Media, Cloud Storage, Email, and Online Accounts
The probate inventory your client filed lists real property, vehicles, securities, and bank accounts. But what about the 47 online accounts your client's executor discovered on a sticky note? The $8,000 in cryptocurrency wallets no one knew existed? The photo library stored across three cloud services? The LinkedIn profile still drawing recruiter messages?
Digital assets now represent a substantial portion of any modern estate, yet they remain among the most misunderstood and mishandled elements of estate settlement. Unlike tangible property, digital assets sit at the intersection of contract law, privacy regulation, consumer protection, and state fiduciary doctrine. A single misstep can expose your firm to liability for unauthorized access, while inaction can leave beneficiaries unable to access legitimate inheritance.
This article covers the legal framework, platform-specific policies, and practical administration methods that will position your firm as competent digital asset stewards. We'll move beyond myths and into actionable compliance.
Understanding Digital Assets in Estate Law
Digital assets are the online accounts, data repositories, and financial instruments a person accumulates during their lifetime. These include social media profiles, email accounts, cloud storage services, cryptocurrency holdings, digital subscriptions, and online financial accounts.
The scope problem runs deep. Most estate plans written before 2015 contain no mention of digital assets. Many clients don't maintain a complete inventory of their online presence. Some assets are obvious (email, banking). Others are obscure (abandoned Snapchat accounts, NFT wallets, domain registrations). And some blur the line between asset and memorial: a Facebook profile containing irreplaceable photos and messages from deceased family members.
Valuation adds complexity. A cryptocurrency wallet has mathematical precision in its value, but it's vulnerable to market fluctuation and security compromise. A cloud storage account may contain documents of enormous legal importance (scans of deeds, insurance policies, medical records) or items of pure sentimental value (thousands of family photos). A domain name registered 15 years ago might be worthless or might be part of a small business. Digital subscriptions (streaming services, software licenses) have contract value but often zero liquidation value.
Privacy considerations cut in the opposite direction from tangible property law. When a decedent's executor seeks to access a house, there's a clear legal pathway rooted in property law and fiduciary duty. When an executor seeks to access a deceased person's email, they're asking to pierce privacy protections that the law has historically granted to the account holder alone. Many digital service providers treat the account holder's privacy as sacred, even after death, especially if the account contains sensitive personal information (mental health records, relationship communications, financial data).
The conflict between decedent intent and terms of service is also critical. A decedent may have explicitly stated in their will that all digital assets should be transferred to beneficiaries. But Google's terms of service may not permit that transfer. Meta may delete accounts rather than allow succession. A cryptocurrency exchange may require biometric authentication from the account holder. The executor can hold a court order in one hand and a denial letter from a tech company in the other, and still face a practical wall.
Finally, the question of what counts as an asset versus what's merely data requires attention. A Twitter account is not just account access; it's a publication platform and a financial asset if the account has substantial followers and advertising revenue. A photo album is not just data; it may contain family memories irreplaceable by any other means. Email containing legal correspondence may be essential to estate administration. Understanding these nuances informs strategy.
RUFADAA and State Fiduciary Access Laws
In 2015, the Uniform Law Commission introduced the Revised Uniform Fiduciary Access to Digital Assets Act (RUFADAA) to provide a framework for fiduciary access to digital assets. As of 2026, RUFADAA has been adopted in 51 jurisdictions, though with significant variations in implementation.
RUFADAA rests on a two-tier framework. The first tier addresses "digital asset ownership" and gives fiduciaries access to digital assets when they can establish that the decedent authorized such access. This is the simplest pathway: a will provision, a digital asset inventory, or other written evidence that the decedent intended for the fiduciary to manage these assets. The second tier is broader but weaker. It grants fiduciaries access to digital assets when they can establish a legitimate need and cannot obtain the asset through other means, but the service provider can still decline if the account is a key component of the decedent's digital identity (often defined as social media and email).
The distinction matters operationally. If your client's decedent left a memo naming the executor and listing cryptocurrency exchanges and cloud storage services, you're working in tier one: full, presumptive access. If your client's decedent left no such documentation, and you need to access the decedent's Gmail to find tax records, you're in tier two: you can request access, but the service provider can refuse.
Decedent authorization is the pivot point. RUFADAA defines this broadly: it includes explicit instructions in a will, a separate digital asset inventory, a note in a digital legacy tool (like Google Inactive Account Manager), or even implicit authority when the nature of the fiduciary relationship and the nature of the digital asset make the decedent's intent clear. A business owner's spreadsheet of cryptocurrency addresses with a note "for executor" is decedent authorization. A parent who names an executor and discusses their password manager with that person is arguably creating implied authorization. A person who simply sets a Will without mentioning digital assets is not.
Executor authority under RUFADAA flows from the fiduciary's appointment and their court-authorized duties. Once an executor is appointed, they have authority to manage the decedent's property. RUFADAA extends that authority to digital assets, but with the limitations noted above. Some state variations also grant authority to successor trustees, agents under power of attorney, guardians, and conservators, depending on the jurisdiction.
The fiduciary doctrine itself has evolved in some state interpretations. Rather than waiting for explicit RUFADAA authorization, some courts now hold that a fiduciary's duty to collect and manage estate assets implies authority to access digital assets necessary to those duties. This is especially true when digital assets contain information essential to probate (financial records, account summaries, tax documents). Some courts have also recognized that a fiduciary's duty to manage the estate efficiently may require accessing digital assets to prevent loss or degradation (an iCloud account about to be deleted, a cryptocurrency account vulnerable to theft).
State variations are significant. Some jurisdictions have adopted RUFADAA almost verbatim. Others have modified it substantially. California's version (probate code 13200-13260) is more permissive and explicitly allows executors to access email and social media when necessary to administer the estate. Texas has adopted a narrower version that gives service providers more discretion to refuse access to social media. New York's adoption contains specific language about cryptocurrency and digital wallets. Always verify the specific rule in your state before advising clients or making access requests.
The practical implication is clear: the easiest path to digital asset access is through decedent planning and documentation. A will provision directing the executor to collect digital assets, combined with an inventory of accounts and access methods, is RUFADAA's intended use case. Without that documentation, access is more difficult and often depends on demonstrating necessity and the particular rules of the jurisdiction and service provider.
Platform-Specific Policies for Account Access After Death
Each major tech platform has its own policy for account access after death, and these policies often diverge from legal frameworks. Understanding the specific terrain for each platform is essential because you cannot rely on legal authority alone to obtain access; you must also navigate the platform's own procedures.
Facebook and Meta have evolved considerably. Meta allows verified family members to request either a Legacy Contact (a person designated by the account holder to manage the account as a memorial) or a complete transfer to a beneficiary if the decedent named someone in their will and provided documentation. Meta also has a process for requesting account information for estate purposes. The company requires a certified death certificate, a court order or will showing the requester's authority, and photo identification. Meta's review typically takes two to four weeks. Once approved, a Legacy Contact can update the profile picture and cover photo, write a pinned post, and respond to messages, but cannot access the full inbox or delete the account. Full account transfer is more restricted and depends on specific authorization language.
Google's Inactive Account Manager is one of the most sophisticated digital legacy tools available. The account holder can set rules for what happens if the account remains inactive for three, six, nine, or twelve months. The owner can designate a Legacy Contact and specify what data should be shared (all data, email only, photos only, etc.). This is the ideal scenario because the decedent has explicitly authorized access and delegated control. If no Legacy Contact was designated, a family member can request the account closure or a limited data download through a specialized form, but full account transfer is not possible. Google will provide access to the email account for estate administration purposes if you provide a death certificate and letters testamentary, but the process is slower and less certain than a pre-designated Legacy Contact.
Apple's Digital Legacy program allows account holders to designate a Legacy Contact who can access photos, documents, health records, and other iCloud data after the account holder's death. The Legacy Contact is named in Apple's system using a specific process and must use a special access code. The deceased's password is not shared; instead, the Legacy Contact receives access to specific data categories. This is particularly important for families seeking to access irreplaceable photos or documents. If no Legacy Contact was designated, Apple is more restrictive and typically requires a court order.
Microsoft has taken a tiered approach. Outlook.com and OneDrive accounts can be accessed by a family member with appropriate documentation (death certificate, proof of relationship, and in some cases a court order). Microsoft is relatively cooperative with legal requests because the company recognizes the estate administration necessity. A Microsoft account can also be transferred to another person if the decedent authorized this in the account settings or if you can demonstrate legal necessity.
LinkedIn has specific policies for memorialization. The site allows a family member or friend to request account memorialization (which locks the profile and prevents login) or to request download of the account data. LinkedIn does not allow account transfer to another person. If the account was used for business or contained valuable business contacts, this limitation can be problematic. The best strategy is to export connection lists and messages before the account is memorialized, if possible.
Cryptocurrency and blockchain assets operate in an entirely different ecosystem with no platform-level support for succession. Access depends entirely on technical factors: Do you have the private keys? Are they stored in a centralized exchange (where company policy determines succession) or a self-custody wallet (where a private key is literally the only path to the assets)? Is the key secured through a hardware wallet, a software wallet, or a paper wallet? Can the heir use a genetic database to reconstruct biometric authentication? Some major exchanges like Coinbase have added account succession features, but many have not. Some family offices are now using specialized digital asset custodians who integrate with estate planning tools. The technological and legal status quo in cryptocurrency remains fractured, and it's the single most important area where decedent planning and documentation directly determines whether assets are recoverable or permanently lost.
This fragmentation across platforms means your strategy must be platform-specific. A single email cannot accomplish access to all digital assets. You'll need to prepare platform-specific requests, often with platform-specific documentation, following platform-specific timelines and procedures.
Email and Privacy Issues in Digital Access
Email access represents the most legally complex digital asset category because it sits at the intersection of privacy law, property rights, and fiduciary duty.
The Stored Communications Act (18 U.S.C. 2701-2711), part of the Electronic Communications Privacy Act, restricts unauthorized access to stored electronic communications. Generally, a service provider cannot disclose stored communications without either the consent of the account holder or a valid legal process (subpoena, warrant, court order). The complication is that when the account holder is deceased, they cannot give consent. This creates a legal gap.
Some courts have interpreted RUFADAA and state fiduciary law as providing sufficient basis for an executor to request email access as part of estate administration. Courts have recognized that an executor may need access to email to locate financial accounts, find tax documents, identify creditors, or locate the decedent's will. Some jurisdictions (like California) have explicit statutory language stating that email access for estate administration does not violate the Stored Communications Act.
However, service providers are not required to honor these requests. Most major providers (Gmail, Outlook, Yahoo) have policies allowing requests for email access from executors with appropriate documentation. They typically require a death certificate, letters testamentary or other proof of fiduciary authority, and identification of the requester. Google can take six to eight weeks to respond. Smaller providers or those with strict privacy orientations may refuse entirely, arguing that email is deeply personal and that privacy interests survive death.
A practical workaround involves searching the decedent's physical effects for passwords, recovery codes, or authentication tokens. This is not "hacking" and carries no legal risk for the executor. If the decedent left a password manager accessible to the executor, or if the executor can use recovery methods (security questions, recovery email) with information the executor knows, account access becomes straightforward. This is why client planning should include a will clause directing executors to search for digital access information.
State privacy laws add another layer. California's probate code is executor-friendly. Florida's is less clear. Some states have specific statutes addressing fiduciary access to email. Others leave it to general contract and property law. This variation matters, and jurisdiction-specific research is essential before making access requests.
The practical strategy is: (1) search physical documents and devices for access credentials, (2) use account recovery methods if available (security questions, recovery phone), (3) for necessary emails (financial records, tax correspondence), make a formal request to the provider with complete documentation, expecting a multi-week delay, (4) if the provider refuses, consult with an estate attorney about obtaining a court order, (5) consider whether the email content is necessary or merely convenient, and whether reasonable alternatives exist (bank statements from the bank, tax documents from the IRS).
Sensitive content in email requires additional care. An executor may have legal authority to access email but ethical obligations regarding what they do with that information. A decedent's medical correspondence, therapy notes, or relationship exchanges may be legally accessible but need to be handled with discretion. An executor might be required to keep such information confidential, share it only with relevant beneficiaries, or prevent its disclosure entirely if the decedent's privacy interest is paramount. This is where professional judgment intersects with legal right.
Cloud Storage, Photos, and Digital Memorials
Cloud storage services (iCloud, Google Drive, OneDrive, Dropbox) often contain the most valuable digital assets from an executor's perspective: family photos, medical records, financial documents, and irreplaceable personal files. Yet the legal and practical pathways to access vary widely.
Photo ownership in the cloud raises an interesting question: who owns a photo uploaded to Google Photos or iCloud? Legally, the uploader retains copyright and ownership, but the service provider retains rights to the account and data access. The decedent's beneficiaries have an interest in accessing family photos, but the service provider controls the account. This is a clear case where legal ownership (the beneficiary's interest in family photos) and contractual access (the account holder's agreement with the provider) diverge.
Shared accounts complicate this further. A family Google Drive used by spouses, adult children, and sometimes extended family may contain assets that are technically in the decedent's account but genuinely belong to multiple people. In such cases, other account members can often access their own files without intervention. But if documents are encrypted or access controls are locked, the situation becomes more complex.
Subscription services tied to cloud storage add another layer. Some people maintain premium iCloud storage because of storage needs for family photos. When the account holder dies, the subscription typically ceases. But the photos may still be accessible through shared links or download before the account is shut down. Planning should include a decision about whether photos should be downloaded, moved to a free storage service, or transferred to a beneficiary's account before the paid subscription lapses.
Digital memorial services (Eterneva, Legacy.com, Ancestry memorial sites) are becoming more common. These are distinct from the social media memorials discussed above because they are purpose-built by families or friends to preserve memories and information. If the decedent left instructions about such services (or if family members want to create them), this becomes part of digital asset administration. Some of these services integrate with social media profiles and use photos or messages from the decedent's accounts, which brings us back to the question of platform access.
Website and blog administration is another practical category. If the decedent operated a personal website, small business website, or active blog, the domain registration, hosting account, content management system (like WordPress), and any associated email or payment accounts all need transition planning. A small business website might be generating revenue through ads or be essential to client relationships. Letting it lapse or lose access can have economic consequences. This is particularly true if the website is part of a family business or creative practice.
The strategy for cloud storage is similar to email: (1) determine what's in it through legitimate means (asking family members, reviewing bank statements for subscription charges), (2) use shared access or designated account access methods when possible, (3) request data downloads or account transfer from the provider when necessary, and (4) plan for preservation of critical data (photos, documents) before access expires.
Cryptocurrency, NFTs, and Digital Collectibles
Cryptocurrency and blockchain-based assets represent the most novel and challenging category for estate administration, combining extreme technical complexity with rapidly evolving law and no standardized inheritance mechanisms.
Cryptocurrency custody models determine inheritance practicality. In the centralized exchange model, the decedent holds an account with a company like Coinbase, Kraken, or FTX (historically). Access to the account is controlled by the exchange's login and authentication systems. In this model, the account holder's password and two-factor authentication method determine whether an executor can access the assets. Some exchanges have begun integrating with estate preparation tools and allow designation of beneficiaries, similar to beneficiary designations on financial accounts. In the self-custody model, the decedent controls a private key (a long alphanumeric string that functions as ultimate authorization). Without the private key, no one can access or transfer the assets, ever. Self-custody is secure from company interference but creates a single point of failure: if the private key is lost, the assets are permanently inaccessible.
Valuation volatility presents a secondary challenge. A $50,000 Bitcoin holding might be worth $25,000 or $150,000 by the time an estate closes. Unlike real property or securities, there's no appraisal standard. Most courts defer to market value at the date of death, but volatile assets complicate tax reporting and may affect probate and tax outcomes. An estate attorney may need to document the decedent's cryptocurrency holdings with dated screenshots and exchange confirmations.
Inheritance tax treatment of cryptocurrency remains unsettled in some respects. The IRS treats cryptocurrency as property, not currency, for tax purposes. Inherited cryptocurrency receives a stepped-up basis, meaning that if the decedent's Bitcoin was worth $10,000 at acquisition but $50,000 at death, the beneficiary's basis is $50,000 and immediate sale incurs no capital gains tax. But if the beneficiary holds the cryptocurrency and it appreciates further before sale, that subsequent appreciation is taxable. Additionally, mining and staking activities may generate taxable income for the estate or beneficiaries, depending on the facts. Tax planning for crypto-rich estates requires specialized knowledge.
NFTs (non-fungible tokens) and digital collectibles are even more complex because the "asset" is not just the token itself but the metadata, the marketplace, and the social context. An NFT might have significant value in a bullish market and near-zero value in a bear market. Some NFTs are tied to membership rights or intellectual property licensing. Others are purely collectible. The legal characterization of NFTs for inheritance purposes is still evolving. Some courts have treated them as intangible personal property. Others have classified them within existing property law categories (chattel, account, or security). Until more uniform guidance emerges, courts may need to make individual determinations.
The practical path for cryptocurrency access is: (1) search for evidence of holdings (exchange confirmations, crypto portfolio apps, hardware wallet receipts, private key storage locations), (2) determine the custody model (centralized exchange versus self-custody), (3) for exchange accounts, use the same account access procedures as any other online account (password recovery, account transfer requests, or court order), (4) for self-custody wallets, identify the private key location (hardware wallet, paper wallet, encrypted file, password manager), (5) verify that the private key is accessible and functional before assuming the asset is recoverable, (6) work with a crypto-specialized custodian or exchange for inheritance purposes if the amount is significant, and (7) coordinate with a tax professional for basis reporting and potential income generation from mining or staking.
The single most important point about cryptocurrency: without either the account password/recovery mechanism (for exchanges) or the private key (for self-custody), the assets are unrecoverable and functionally lost forever. This creates an enormous planning incentive for crypto-holding clients to document their holdings and access methods clearly.
Practical Digital Asset Administration Framework
Translating legal frameworks and platform policies into operational steps requires a systematic approach that you can implement for every estate in your practice.
Begin with inventory. An executor cannot manage what they don't know about. The initial step is a thorough search for evidence of digital assets. This includes reviewing the decedent's physical files for account statements, password lists, and notes. It includes examining devices (computers, tablets, phones) for open accounts, bookmarks, email history, and documents. It includes interviewing family members about accounts they know of. It includes searching the decedent's email (if accessible) for password reset confirmations, account notifications, subscription receipts, and correspondence with service providers. It includes checking financial statements and credit card bills for recurring charges (cloud storage subscriptions, cryptocurrency exchange fees). Only then is the inventory reasonably complete.
Document that inventory. Create a spreadsheet (or use estate management software) listing each digital asset with: account name, service provider, account holder's username or email, last known access date, type of asset (financial account, social media, cloud storage, cryptocurrency), estimated value, location of password or access method, and status (accessible, access pending, inaccessible). This inventory becomes part of the estate record and helps the executor track progress and explain decisions to beneficiaries.
Establish authorization documentation. For each digital asset the executor intends to access, determine the authorization basis. Is there a will provision? A digital asset inventory signed by the decedent? A designated Legacy Contact in the platform? A court order? Written documentation that the decedent authorized the executor to manage digital assets? Record this basis because you'll need to cite it when making access requests to service providers.
Prioritize access methods by practical feasibility. The easiest access path is always through means the executor already has: if the decedent's password is in a will envelope or a shared password manager, use it directly. The next easiest is account recovery through legitimate means: security questions, recovery email addresses, or recovery phone numbers that the executor knows. The next tier is requesting account access from the service provider with appropriate documentation. The final tier is obtaining a court order, which is necessary only for the most valuable assets or when service provider cooperation is unavailable.
Implement security practices throughout the process. Digital assets are security targets. An executor handling a deceased person's cryptocurrency or online banking credentials is potentially handling high-value targets. Use secure communication (encrypted email) when discussing credentials. Avoid storing passwords in unencrypted files. Change passwords after accessing accounts to prevent unauthorized continued access. For sensitive financial assets, use two-factor authentication or account alerts to monitor activity. For shared family accounts, establish clear rules about access by multiple executors or beneficiaries.
Communicate with beneficiaries strategically. Beneficiaries have an interest in digital assets, but some digital assets contain sensitive information the executor should not share widely. If an email account contains personal correspondence the decedent kept private, an executor might refuse to give beneficiaries full inbox access while still confirming that important financial or legal correspondence has been preserved. If a social media account contains private messages, the executor might ensure that important messages are documented without exposing the full history to all beneficiaries. This balances transparency with respect for privacy.
Create a transition plan for each digital asset. For assets with commercial value (a website generating ad revenue, a social media account with a significant following), establish ongoing access and revenue collection mechanisms. For sentimental assets (photo libraries, email archives), determine whether to preserve them indefinitely, download and distribute to beneficiaries, or allow them to be deleted. For subscription services, determine whether to continue or cancel. For cryptocurrency, establish whether to hold for appreciation or sell for liquidity. Document these decisions and the authority for them.
Finally, maintain records of everything. Each email requesting account access, each platform response, each password change, each authorization letter, each court order. These records protect the executor by demonstrating that they acted in compliance with the law and with proper fiduciary care. They also help if a beneficiary later questions whether digital assets were handled appropriately.
Frequently Asked Questions
Q: Does RUFADAA require service providers to grant access to digital assets?
A: No. RUFADAA gives fiduciaries the right to request access and establishes conditions under which requests should be honored, but it does not mandate that service providers comply. Service providers can refuse requests if they determine that the account is a key component of the decedent's digital identity (usually defined as social media and email accounts) or if they believe the request doesn't meet their internal standards. Many providers have developed their own policies that are more permissive than RUFADAA requires, but they're not legally obligated to exceed RUFADAA's framework. The best outcome comes from decedent planning that designates fiduciaries within the platform's own mechanisms (like Google's Legacy Contact or Meta's account transfer authorization).
Q: Can an executor access the decedent's email without the password?
A: Only through the account recovery features (security questions, recovery phone, recovery email) if the executor knows the answers, or by requesting account access from the email provider with appropriate documentation (death certificate, letters testamentary, identification). The provider will typically take weeks to respond and may require a court order. The easiest path is finding the password in the decedent's physical files or a shared password manager. If the executor searches the decedent's devices and files and finds a written password, using it is lawful and avoids delays.
Q: What if a Facebook account was memorialized and I need to access the account?
A: A memorialized Facebook account cannot be logged into. But the account owner can designate a Legacy Contact before death who will have access after memorialization. If that wasn't done, you'll need to request the account information (not full login access, but specific data downloads) through Facebook's legal request process. You provide a death certificate, proof of your authority (will, court order, or letters testamentary), and identification. The request takes two to four weeks. Alternatively, if you can identify specific people who are Facebook friends with the deceased or have the deceased's messages, you might ask them to preserve or share relevant information through their own accounts.
Q: How is cryptocurrency inheritance taxed?
A: Inherited cryptocurrency receives a stepped-up basis to its fair market value on the date of the decedent's death. This means that if the decedent's Bitcoin was worth $10,000 when acquired but $50,000 at death, the beneficiary's tax basis is $50,000. If the beneficiary sells immediately at $50,000, there is no capital gains tax. If the beneficiary holds it and it appreciates to $70,000 before sale, the $20,000 appreciation is long-term capital gain on the beneficiary's tax return. Additionally, if the cryptocurrency generates income during the estate's administration (through staking, mining, or transfer fees), that income is taxable to the estate or the beneficiary. For large cryptocurrency holdings, consult a tax professional to structure the inheritance efficiently.
Q: What happens if the executor cannot find the private key for a self-custody cryptocurrency wallet?
A: The assets in that wallet are permanently inaccessible. A private key is the only way to access or transfer self-custody cryptocurrency. Without it, no password reset, no account recovery, no court order will restore access. The assets remain in the wallet on the blockchain but cannot be moved or liquidated. For planning purposes, this means that clients holding significant self-custody cryptocurrency must document the location of private keys clearly, store them securely, and ensure that executors know where to find them. Some families use multi-signature schemes where multiple private keys are required for access, distributed among trusted parties, to prevent permanent loss while also preventing individual theft. Others use hardware wallets specifically designed for inheritance planning that can be accessed through recovery phrases if the device is lost.
How Afterpath Helps
Digital asset administration is complex, and errors carry real consequences: beneficiaries miss out on inheritance, estates face legal liability, service providers withhold assets, or assets are permanently lost. But you don't have to manage this alone.
Afterpath Pro is built for professionals managing complex digital estates. The platform provides tools to inventory digital assets, track access requests and timelines, coordinate with service providers, document authorization, and maintain secure records of all activity. Our platform integrates with RUFADAA workflows, helps you track state-specific requirements, and creates an audit trail that protects both the estate and the executor.
Whether you're managing a straightforward social media memorial request or a multi-million dollar cryptocurrency portfolio, Afterpath centralizes the information and workflows so your clients can focus on executor duties rather than digital logistics.
Ready to streamline digital asset administration for your practice? Explore Afterpath Pro for professional estate teams, or join our waitlist to be among the first to access new digital asset features.
Your clients face digital complexity they rarely planned for. With the right tools, you can manage it confidently.
For Professionals
Streamline Your Estate Practice
Join professionals using Afterpath to manage estate settlements more efficiently. Early access is open.
Save My Spot