Account access

How to Access a Deceased Person's Online Accounts

The practical steps families take when passwords, provider policies, and legal authority all matter.

Illustration of a dove and a lock, representing compassionate account access.
Jonas Borchgrevink

Jonas Borchgrevink

Founder of Fort Legacy

Updated: 2026-04-02

United States context

This English guide is currently written for readers dealing with United States documents, provider processes, and support channels. Country-specific requirements can change elsewhere.

After a death, families often need access to online accounts for practical reasons. They may need billing records, financial statements, stored photos, or simply a way to close services respectfully and securely.

Access is rarely automatic. Providers protect privacy, devices may be locked, and even a known password may still depend on two-factor authentication, a backup email, a trusted device, or a stored passkey.

Access checklist

Start with structure, not guesswork.

  • Collect identification, a death certificate, and proof that you are authorized to act.
  • Build the account list before you start asking for access.
  • Check whether the person set up any built-in legacy features, such as a legacy contact or platform recovery tool.
  • Use the provider's official bereavement or privacy process.
  • Preserve important data and close services methodically if access is granted.

Why access matters

  • To identify active services and financial obligations
  • To preserve photos, documents, and messages the family wants to keep
  • To secure accounts against fraud or misuse
  • To close or memorialize services in line with the person's wishes

If the person planned ahead, the article How to Create a Digital Estate Plan shows what families should ideally be able to find.

What access usually looks like by account type

Scroll table sideways
Account type What families can often request What may still be denied
Email Closure, limited review, or case-by-case data release Full ongoing inbox access
Social media Memorialization, deletion, or limited account action Private messages or normal account control
Cloud storage Data review or device-based recovery where the provider allows it Broad access without the right documentation or setup
Financial accounts Institution-specific estate handling and record requests Normal online use without formal authority

Look for written instructions before you ask anyone for access

Before you open support cases, check whether the person left a digital will, a planning memo, a password-manager emergency feature, or notes inside their estate papers. Even a short written note can tell the family which accounts matter most, what should never be opened casually, and who was supposed to coordinate the work.

That search should include paper files, locked-document folders, password-manager emergency access settings, and the person's main device. Families sometimes spend days arguing with providers before realizing the person left a usable instruction sheet at home.

Common obstacles

Passwords and recovery methods

Even when a family knows a password, the login may still depend on a phone number, an authenticator app, a backup email, or a trusted device. That is why the phone and primary inbox often need to stay available a little longer.

Provider privacy rules

Many companies will not release account data just because someone is family. They usually want a death certificate, proof of authority, and a request submitted through a specific process.

Missing account inventory

Families often do not know which services exist. Start with statements, email receipts, devices, and saved logins. The article Do This First When a Loved One Dies: Managing Digital Accounts helps with that discovery phase.

Locked devices

Modern phones and laptops may stay inaccessible even when a family has physical possession of them. Treat the device as evidence and recovery infrastructure, not just hardware.

If you have the device but not the password

This is one of the most common real-life situations. The family may hold the phone or laptop, see notifications on the lock screen, and still be unable to open the account that matters. Do not treat that as failure. Treat it as partial access and preserve what it still reveals safely.

  • Note which services still send notifications, billing alerts, or sign-in prompts.
  • Keep the device charged and connected if it is still acting as a trusted approval device.
  • Photograph account names, merchant names, or recovery clues that are visible without opening private content.
  • Use those clues to build the provider list before you decide what formal requests to send.

A locked device can still tell the family what exists and what needs attention first. That information is often enough to prevent accidental account loss while the formal access work continues.

How to request access the right way

  1. Collect your documents: identification, death certificate, and proof that you are authorized to act.
  2. Build the account list: note emails, platforms, service names, and what each account may control.
  3. Check for legacy tools: Apple, Google, and some social platforms offer built-in options if the user set them up in advance.
  4. Use provider channels: submit the request through the correct bereavement or privacy process.
  5. Protect the account once access is granted: preserve important data, update recovery details if needed, and close services methodically.

What documents usually make provider conversations easier

Scroll table sideways
Document or detail Why it helps Typical source
Death certificate Shows the provider there is a valid bereavement case. Civil registry, funeral director, or official copies already held by the family
Photo identification for the requester Confirms who is making the request. Passport, driver's license, or other government ID
Executor or estate paperwork Shows why you can act beyond being a relative. Court, solicitor, probate file, or estate packet
Exact account details Reduces delays caused by vague or mistaken account identification. Saved logins, bills, profile URLs, or prior emails
A narrow written request Makes it easier for the provider to respond to a specific lawful need. Prepared family notes or an estate coordinator's log

Providers do not always ask for exactly the same packet, but they usually respond better when the family can show identity, death, authority, and a precise request instead of a broad appeal for total access.

Work outward from the accounts that unlock the rest

Not every account should be handled in random order. Start with the systems that control recovery for everything else, then move outward to lower-risk accounts.

  • First layer: primary email, phone number, password manager, Apple or Google account, and the main trusted devices.
  • Second layer: banking, cloud storage, subscriptions, and shopping accounts tied to statements or receipts.
  • Third layer: social profiles, older apps, and accounts with mostly sentimental value.

This order matters because the first layer often decides whether the second and third layers are recoverable at all. Families who skip straight to deletion or memorialization sometimes remove the evidence they needed to understand the rest of the digital estate.

Keep a provider-response log from the start

Access work becomes much easier when every provider contact is documented. Without a log, families repeat the same request, forget which documents were already sent, and lose track of deadlines or case numbers.

  • Record the date, channel, and name of the provider or agent.
  • Note what documents were sent and what the provider said they would review.
  • Write down whether the result was closure, limited review, denial, or a request for more proof.
  • Keep the next action visible so another family member can continue if needed.

This sounds simple, but it is one of the best protections against wasted time. A grieving family should not have to rediscover the same answer three times because no one wrote it down the first time.

Know what access may actually mean

In some cases, "access" means data release. In others, it means account closure, memorialization, or a limited response from the provider. Full ongoing access is often the exception, not the rule.

Email is one of the most sensitive examples. Use the guide How to Close or Transfer a Deceased Person's Email Account for the provider-specific issues around Gmail, Outlook, and Yahoo.

Know when to stop chasing access and switch to preservation

Sometimes the provider is telling you, as clearly as it can, that full access will not be granted. At that point, families should stop treating the inbox or profile itself as the only answer and ask what practical goals can still be met another way.

  • Preserve local data from a device that is already accessible.
  • Use bank statements, card records, and paper mail to identify recurring services.
  • Request formal records or closure confirmation instead of full login rights.
  • Memorialize or close social profiles after the family saves what matters.

That shift often lowers stress. The family may not get broad access, but it can still reduce fraud risk, preserve memories, and finish the estate work responsibly.

What not to do

  • Do not guess passwords repeatedly until the account locks.
  • Do not use unofficial unlockers, data brokers, or third-party recovery tools you cannot verify.
  • Do not share recovered credentials casually in group chats or loose notes.
  • Do not close the phone number or primary inbox before you understand what else depends on them.

Protect privacy while you work

Use one trusted coordinator when possible. Keep a secure record of what was requested, what was granted, and what has already been preserved or closed. Families should move carefully because privacy does not stop mattering after a death.

Where this fits in the larger process

Access is only one part of the after-loss workflow. Financial services, phone numbers, subscriptions, and social profiles each create their own next steps.

If the workload is urgent or scattered across many providers, Support and Digital Estate Care can help the family move through the process with better structure.

Clarity beats improvisation

The safest path is structured, documented, and patient. Gather proof, follow provider rules, preserve what matters, and keep every step organized.

Families do not need perfect technical knowledge. They need a clear process. That is what makes access safer and more achievable.