⏰Activation Methods
Inheriti® employs several activation methods as an extra security layer for controlled opening of protection plans.
Last updated
Inheriti® employs several activation methods as an extra security layer for controlled opening of protection plans.
Last updated
Inheriti® is equipped with sophisticated activation methods designed to safeguard your protection plans by controlling the precise conditions under which they can be opened.
These methods ensure a high level of security and personal control over your protection plans.
Employed in Data Backup Plans, Plan Triggers require explicit actions to authorize access to the data.
These are customizable and can be set to respond to various secure actions, providing flexibility and control over data accessibility.
Used in Digital Inheritance Plans, this method helps ensure that assets are transferred only under specific conditions, typically related to the plan owner's inability to manage their affairs.
It serves as a crucial safety mechanism, activating automatically under predefined conditions.
Both types of activation methods are designed with your security in mind, allowing you to tailor your protection plans according to your specific needs and circumstances.
Plan Trigger | Dead Man Switch | |
---|---|---|
Requires users to authenticate by logging into their account to approve or abort the merging process.
Users must click a link sent via email or other secure means to approve or abort the merging process.
Involves receiving a phone call where a unique code is provided. The user must enter this code to either approve or abort the merging process, ensuring a higher level of verification.
Similar to the phone call, a unique code is sent via SMS which the user must enter to approve or abort the merging process.
Purpose
Requires explicit actions and approval to access data.
Ensures asset transfer under specific, passive/non-responsive conditions.
Use Case
Best for data backup plans needing controlled access at specific times.
Ideal for digital inheritance plans where asset transfer is intended after the user's incapacitation or death.
Activation
Manually triggered by specific user actions such as entering a code or clicking a link.
Automatically triggered based on non-action within a set timeframe.
Security
High. Allows users to maintain tight control over when data is accessed.
High. Provides robust protection ensuring assets are only accessed when truly necessary.
Ease of implementation
Requires setup of specific actions which must be followed precisely for access.
Simple to set up with minimal action required once conditions are set.