Skip to main content
All CollectionsDigital Vault and Legacy Planning
How is the information about my assets shared with my loved ones?
How is the information about my assets shared with my loved ones?
Martin Pickrodt avatar
Written by Martin Pickrodt
Updated over a week ago

Teleskop's digital vault provides sophisticated tools and options to ensure that this process is secure, controlled, and aligns with your wishes. Here, we delve into how these features work, including the Lifebeat function, Multi-Key access, and the flexible sharing capabilities that allow for full or partial access at any time.

Lifebeat Function: Timed Information Release

The Lifebeat function serves as an automated system designed to release information about your assets only under specific conditions, typically related to your ability to interact with the system. If regular check-ins are missed, the system interprets this as a potential indication that you might be unable to manage your affairs. At this point, Teleskop activates your pre-set instructions for sharing asset information with designated individuals—your Trusted Angels. This ensures that your assets and their details are only disclosed when truly necessary, maintaining privacy and control until such a point.

Angel Access: Collaborative and Secure Release

The Angel Access feature enhances security by requiring multiple trusted individuals to agree collectively before access to the asset information is granted. This collaboration ensures that no single person can make unilateral decisions about your assets, fostering a transparent approach that ensures that all actions taken are deliberate and justified. Angel Access is particularly useful in urgent situations where immediate access to the vault is necessary. It allows for quick mobilization of the Trusted Angels, who can collectively decide to grant access, providing a rapid response capability that single-person access systems cannot match.

Customizable Sharing Options

Teleskop gives you the flexibility to manage how information about your assets is shared, allowing you to adapt to different needs or circumstances as they arise. This control is crucial for maintaining the privacy and security of your asset information while also ensuring that the right individuals have access when necessary.

Grant Full Access

There may be instances where you choose to grant full access to your entire portfolio. This option is useful for situations where a trusted individual, such as a family member, financial advisor, or legal executor, needs a comprehensive overview to make informed decisions or manage affairs on your behalf. Full access means that the individual can view all details related to all of your assets stored within Teleskop and your digital vault. This could be particularly relevant in emergency situations or when a strategic overview is required for estate planning or asset management.

Grant Partial Access

Alternatively, you might prefer to grant partial access to certain individuals. This selective access allows you to specify which assets or types of information are visible to whom, protecting the privacy of certain aspects of your portfolio while still sharing necessary details. Partial access is ideal for situations where you want to involve parties without exposing your entire financial landscape. For example, you may wish to allow your children to view details about specific inheritances without accessing your broader financial details, or you may want business partners to access only business-related assets.

Flexible Access Control

Both full and partial access can be adjusted at any time, providing you with ongoing control over your asset information. This flexibility ensures that as your relationships or circumstances change, your asset visibility settings can be updated to reflect your current wishes. Teleskop's user-friendly interface makes it easy to modify access permissions, ensuring that you can manage your legacy with precision and ease.

This customizable access approach empowers you to tailor information sharing to meet your specific needs, ensuring that the right people have the right level of access at the right time, all within a secure and controlled environment.

Did this answer your question?