_Part 18 of 18 in the Digital privacy for board directors series._
This is the last post in the series. The first one promised eighteen specific pieces of work, four children-focused posts (we ended up with five), three categories of environment, and a synthesis. Almost two years later, here we are. Thank you for reading.
I want to end on something more useful than a recap. The work the series has asked you to do — the home network, the smart-home audit, the children conversations, the financial controls, the public-exposure choices, the board-portal discipline, the travel posture, the AI-era updates — only matters if it outlives you in the role. The next director who joins your board, the assistant who replaces yours, the children who become adults, the partner who is still working out their own digital posture: each of them will inherit some part of what you have built. The question is whether you have made it inheritable.
This post is about how.
What the next person actually needs
When I have helped a successor take over from a director, the things they have needed have been remarkably consistent.
**The list of what is set up the way.** The router that has been configured deliberately. The Companies House service address. The Cifas registration. The board portal MFA arrangement. The travel kit. Not a full audit report. A one-page note of here are the deliberate choices we made and why. Half an hour to write.
The relationships and the standing rules. The assistant knows the rule about payment-change verification. The household manager knows about the calendar-detail discipline. The grandparents have agreed to the social-media posture. None of this is written down anywhere except in the relationships themselves. The note for the successor needs to include here are the people who hold the rules, and here is what the rules are.
The passwords and the encrypted notebook. Where the family password manager lives, who has emergency access, how to recover the master credential if something happens to you. This is the single most under-prepared area in most households. The 1Password Emergency Kit, Bitwarden Emergency Access, and equivalent are the modern bank-box of last resort. Set them up.
The list of where to go for help. The IT support firm you use. The privacy-focused lawyer if you have one. The travel-security advisor. The forensic specialist whose number you have noted down for emergencies. The professional contacts the successor will need.
The format that works
A four-page document. Not a glossy slide deck, not a long policy, not a wiki. A four-page document, in a file format that will still open in twenty years.
- Page one: the five sentences from the synthesis, in your own words for your own household.
- Page two: the list of deliberate choices — service address, biography, registrations, settings — with the date each was last reviewed.
- Page three: the standing rules and who holds them. The assistant's payment-change rule. The household manager's calendar discipline. The grandparents' social-media agreement. The school-fee verification rule. Each named, briefly described, with the person who is its primary owner.
- Page four: the contacts. The IT support firm. The lawyer. The travel advisor. The emergency contacts. Where the password manager lives. Where the encrypted notebook lives. How to recover them.
Print it. Put it in the file box where the will lives. Update it once a year. That is the inheritance.
The conversation with your spouse
The most important conversation of this series, and the one most easily ducked.
Your spouse is, in almost all cases, the primary inheritor of the household's privacy posture in the event you can no longer maintain it. If they have been participating throughout the two years of this series, they are already inside the posture. If they have not — and in many households the privacy work falls largely on one person — the inheritance gap is significant.
The conversation, ideally over a weekend with no distractions: walk through the four-page document together. Make sure they know where everything is, who holds each standing rule, how the password manager works, what the emergency-access pathway looks like, who they would call if you were not available.
This is not a morbid conversation. It is the normal conversation that financially-organised households have about wills, life insurance, and access to bank accounts. The digital version is newer; it is the same in shape.
The conversation with your adult children
A separate paragraph for directors whose children are now adults or near-adults.
The privacy posture you have built around them has, by the time they are eighteen, become their posture more than yours. They take over their own social media. They take over their own financial identity. They take over their own digital footprint. The five years between sixteen and twenty-one are when the posture transfers, deliberately or by default.
The conversation worth having: here is what we have done for you, here is what we did and did not share publicly, here is how to take this over for yourself. Sit them down with the same four-page document. Add a page that is theirs. Their LinkedIn settings, their primary email, their password manager, their hardware MFA key. The conversation is awkward and they will roll their eyes; it is the right conversation anyway.
The conversation with your successor on the board
A short paragraph for the director leaving a role.
If you have done the public-exposure work properly, your successor is inheriting a position with a deliberately-shaped exposure. The Companies House record, the corporate biography, the public profile. They may want to keep the same choices, or change them. Either is fine; what matters is that they know what was deliberate and what was default.
A fifteen-minute conversation with the successor at handover — here is what I set up, here is why, here is what you may want to revisit — is one of the small professional courtesies that pays back across the next person's tenure.
The thing I have not been able to write
There is one thing this series cannot do, which I want to acknowledge in the last post.
Privacy is, ultimately, a relational practice rather than a technical one. The five sentences in the synthesis depend on the household having functioning relationships. The standing rules depend on having staff who trust you and who you trust. The children's posture depends on the conversations being held in a household where the conversation is possible.
For households where those relationships are themselves strained — and there are many such households — the privacy work this series describes is harder, and in places impossible, until the relationships are repaired. I do not have an answer for that. It is the limit of what writing about privacy can do.
If you are in that position and the series has highlighted it for you, the most useful thing I can say is that the privacy work is not the urgent thing. The relationships are.
The end
That is the eighteen-post series. Thank you again for reading, for the messages many of you have sent over the last two years, and for the patience of letting me write about your children in a way that, I hope, has been useful rather than alarming.
The posture you have built over two years is durable. The annual audit is the maintenance. The conversations are the work that pays back longest.
I will write the occasional update when something genuinely changes — the regulatory environment shifts, the AI capabilities take another step, a new platform changes the shape of children's digital lives. Those will appear here when they are warranted.
For now: see you in the boardroom. Look after the household.