Handover protocol: deliver the right file to the right person, at the right time.
Preparing a file is a good start. Planning how it is handed over, to whom, and under what conditions is what prevents delays and misuse.
THE PROBLEM
Without a protocol, the handover becomes a risk
“Who is entitled to receive what?”
“When does it get triggered?”
“How do you avoid handing it over too early or too broadly?”
“What if the trusted person changes?”
What we identify with you
1) Authorized recipients
proposed liquidator, representative, family caregivers, professional (according to your choices)
2) Trigger conditions
event (e.g., death, incapacity, personal decision)
validation (who confirms the event, if required)
3) Content delivered (by levels)
“essential” level (contacts, index, access)
“complete” level (inventory, documents, consolidated index)
exclusions (what must never be handed over without conditions)
4) Handover modalities
channel, access, proof of handover, and appropriate security measures
Deliverable: a clear protocol and a review plan
Handover protocol (recipients, triggers, content levels, modalities)
Review plan (e.g., annual review: “Is this still the right person?”)
Important: the handover is not a legal act in itself
The protocol organizes the transfer of information.
If legal acts are required (e.g., a protection mandate, a will, etc.), they must meet the applicable requirements and be handled within the appropriate framework (professional, separate mandate).
FAQ
Can I change my trusted person?
Yes. The protocol includes an update logic.
Can I hand over only part of the file?
Yes. Levels (essential vs. complete) and exclusions can be defined.
Who confirms the trigger?
Depending on your choices: automatic triggering or validation by a person or a third party.
Does the liquidator have to be chosen now?
No, but identifying a proposed recipient helps make the protocol concrete.
How do you avoid handing it over "too early"?
Through trigger conditions and content levels.
Is it confidential?
Yes. The protocol is specifically designed to limit and frame access.
How much does it cost?
$160/hour/person; milestone-based.
Can I do only the protocol without a complete inventory?
Yes. It is a standalone module.
