A runbook your family can already reach.
Built from your actual financial map.
Always current. Always reachable.
Your household runbook. Always available.
A living document, generated from your live financial map. Every account, every professional, every document, every next step. Accessible to your family the moment they need it.
What it holds.
- Account inventory across every institution, with titling and access paths.
- The estate document index, with named roles and the people who hold them.
- Insurance policies, with carriers, coverage amounts, and policy numbers.
- Professional contacts, with the role each plays and how to reach them.
- The "what to do first" checklist for your spouse.
When you open it. The night before a trip, when you find yourself wondering whether anyone would know what to do. After a life change, an exit, a new policy, an inheritance. When a new attorney or CPA needs the full picture in a single read. Any morning when something already has happened, and someone in your family is the one who has to act.
The runbook is the document you wish existed every time someone asks, "Where do we stand?"
The right information at the right time.
At the moment of activation, the last thing your family needs is a wall of information. Vigil releases what is needed first, then waits. Each step verified. Each step recorded.
First Steps
IMMEDIATEYour designated spouse authenticates and receives the first essentials: where your originals are stored, professional contacts, trusted contacts, the first-things-first checklist, document index, and the estate-document index with named roles. Enough to steady the next 24 hours.
24 hours · verification required
Operational Detail
+24 HOURSAfter verification: account-by-account information, authority chains, document downloads, detailed runbook scripts. The operational playbook for the first weeks.
Cumulative: 72 hours from start
Where to Look
+72 HOURSAfter additional verification: safe deposit box identifiers, sensitive access locations, restricted notes, and anything you flagged for the highest verification tier. Locations only. Vigil stores where to look and who to call. Never how to get in.
Verified by the people you trust.
Vigil doesn't rely on a single point of authentication. You designate the trusted contacts you choose: people who know you, who can verify events, and who answer questions only you would have set.
When activation triggers, your trusted contacts receive a secure link. They answer the memory-based questions you configured. They attest to what they know. Their responses, combined with your designated spouse's authentication and supporting evidence, gate each level of access.
If something doesn't add up (a verifier denies the event, or attestations conflict) the system pauses and escalates. Your trusted contacts and professionals are the verification layer, not an algorithm.
Tested before it's needed.
The first run of an activation system should never be the real one. Vigil includes full simulation:
- ✓ You initiate from your dashboard. The simulation runs end-to-end without contacting your trusted contacts.
- ✓ You step through every level in sequence, with the waiting periods skipped so you see the full flow in minutes instead of days.
- ✓ When complete, you receive a summary report: what passed, what would block real activation, and what to fix.
Vigil recommends a successful simulation before relying on real activation. Re-run the simulation any time your map changes.
Even partial setup is protected.
If you mapped your financial life but never configured trusted contacts, Vigil still delivers first steps to your family immediately. Operational detail comes after an extended delay with operator review. Full access requires human approval.
The system degrades gracefully. It never fails silently.
Every action recorded. Nothing erased.
Every activation event is timestamped and append-only: who triggered activation, every attestation received, evidence uploaded, every level unlocked, and how the request was closed. Each entry is SHA-256 hash-chained to the previous one for tamper evidence. Database constraints prevent edits or deletes.
If there is ever a question about what happened and when, the answer exists.
Nothing breaks if you are gone tomorrow.
That's the promise, to each other.
Start with the map. Build the system together. Test it before it matters.