$0 Digital Legacy Kit Quick Start Checklist

How to Access a Deceased Person's Phone, Computer, and Email

The first thing most families try to do after a parent dies is unlock their phone. The phone holds the contacts needed to notify people. It has the authenticator app needed for two-factor verification on other accounts. It might be the only place where certain photos, notes, or messages exist.

And most of the time, it's locked behind a passcode, Face ID, or fingerprint that went to the grave.

Getting into a deceased person's devices is the most common and most frustrating challenge families face. Every other digital task — accessing email, closing accounts, managing finances — depends on getting past this first barrier.

Here's how to approach it, step by step.

iPhones and iPads

If you know the passcode

Enter it. This is the simplest scenario and the reason why documenting the device passcode is the single most important step in digital estate planning.

Once you're in, you can access everything on the device: photos, messages, notes, email, the authenticator app, browser saved passwords, and any installed apps. You can also check Settings > Passwords to see all saved website credentials.

Important: do not update the device or change the Apple Account password until you've extracted everything you need. Some changes can trigger additional security lockouts.

If you don't know the passcode

Apple will not bypass the passcode for family members. Apple's privacy and security architecture is built around the principle that no one — not even Apple — can access a locked device.

Your options are:

  • Apple Legacy Contact — if the deceased set up a Legacy Contact through their Apple Account, the designated contact can access iCloud data (photos, documents, notes). However, this provides access to cloud data, not the physical device itself.
  • Court order — in some jurisdictions, a court can order Apple to provide assistance. However, Apple's ability to assist with passcode-locked devices is limited by the device's encryption. Apple cannot decrypt a device with an unknown passcode on modern iPhones.
  • Third-party forensic tools — some data recovery companies claim to be able to bypass iPhone passcodes. Results vary significantly depending on the device model and iOS version. These services are expensive ($500-$3,000+) and not guaranteed.

The biometric window

Face ID and Touch ID stop working shortly after death because they require a live biological interaction. This means even if the deceased's face or fingerprint could theoretically unlock the phone, the window of opportunity is extremely short and ethically complex.

The numeric passcode is the only reliable long-term access method.

Android phones

If you know the passcode, PIN, or pattern

Enter it. Android devices store a significant amount of data locally, including photos, messages, files, and app data. Once unlocked, you can also access the Google Account through the Settings menu.

If you don't know the credentials

  • Google Find My Device — if the deceased had Find My Device enabled, you can remotely locate, lock, or erase the device. You cannot use it to unlock the device without the Google Account credentials.
  • Google Account recovery — if you know the Google Account credentials (or can access them through Google Inactive Account Manager), you may be able to reset the device and access the Google-synced data. However, Factory Reset Protection (FRP) may require the original Google credentials after a reset.
  • Samsung Find My Mobile — Samsung devices have an additional remote management tool. If the deceased had a Samsung account, you can attempt to unlock the device remotely through Samsung's portal — but you need the Samsung account credentials.
  • Third-party data recovery — similar to iPhone, some services claim to bypass Android screen locks. Success depends on the device manufacturer, model, and security patch level.

Computers (Windows)

If you know the login password

Log in normally. Check the browser's saved passwords (in Chrome: Settings > Passwords; in Edge: Settings > Profiles > Passwords) for a treasure trove of account credentials.

If you don't know the password

Windows computers are generally easier to access than phones:

  • Microsoft Account reset — if the computer uses a Microsoft Account for login, and you have access to the recovery email or phone number, you can reset the password online.
  • Password reset disk — if the user created a password reset disk, it can be used to create a new password.
  • Another administrator account — if another user account on the computer has administrator privileges, it can reset the locked account's password.
  • Local account workarounds — for local (non-Microsoft) accounts, there are legitimate recovery tools that can reset the Windows password. This doesn't bypass encryption but does get you past the login screen.

Free Download

Get the Digital Legacy Kit Quick Start Checklist

Everything in this article as a printable checklist — plus action plans and reference guides you can start using today.

Computers (Mac)

If you know the login password

Log in and check the Keychain Access app (in Applications > Utilities) for stored passwords. Also check Safari's password manager (Safari > Preferences > Passwords).

If you don't know the password

  • Apple Account password reset — if the Mac uses an Apple Account for login, resetting that password online may allow you to reset the Mac login.
  • Recovery Mode — Macs can boot into Recovery Mode (hold Command + R during startup on Intel Macs, or hold the power button on Apple Silicon Macs). From there, you can use Terminal to reset the login password for local accounts. This does not work if FileVault full-disk encryption is enabled with an unknown password.
  • FileVault — if FileVault is enabled and you don't have the password or recovery key, the data on the Mac is encrypted and inaccessible. The recovery key is a 24-character code generated when FileVault was first enabled. It may be stored with Apple (if that option was chosen during setup).

Email accounts

Email access is often the key that unlocks everything else. The approach depends on the provider:

  • Gmail — use Google Inactive Account Manager (if configured) or submit a formal request to Google with legal documentation
  • Outlook — submit a Next of Kin request to Microsoft
  • Yahoo — limited options; having the credentials documented is essentially the only reliable path
  • iCloud Mail — use Apple Legacy Contact (if configured) or submit legal documentation to Apple

Each provider has its own process, timeline, and requirements. Having the credentials in a family password system eliminates the need for any of these processes.

The lesson: document the basics now

Every one of these scenarios — the locked phone, the encrypted computer, the inaccessible email — is preventable with five minutes of documentation:

  1. Write down the phone passcode
  2. Write down the computer login password
  3. Write down email credentials
  4. Set up platform legacy tools (Google, Apple, Facebook)
  5. Store everything in a secure location your family can access

This is the core of what the Digital Legacy Kit helps you organize: device access, account credentials, platform settings, and family communication — all in one structured, printable format.

Get Your Free Digital Legacy Kit Quick Start Checklist

Download the Digital Legacy Kit Quick Start Checklist — a printable guide with checklists, scripts, and action plans you can start using today.

Learn More →