Easily protect your online account information and sensitive data with 2DocLock™

Clear, simple steps that take just a few minutes.

2DocLock™ Security System logo

Online Account and Other Sensitive Information

When completing your Handbook. you have provision to include online account access and other sensitive information. In the interests of security, we highly recommend that you do not store all sensitive data together in your Handbook. Instead, we have created a unique security system whereby you can split confidential information across multiple documents using 2DocLock™. The 2DocLock™ Security System Pack explains all of your options and is included with every Handbook Kit.

How does 2DocLock™ work?

2DocLock = 2 documents locked: with optional decoder key

In conjunction with your Handbook, all customers receive 2 additional documents – an ICS List and a Security Manager. It’s the use of these 2 additional documents that are critical in maximising the protection of your data.

The 2DocLock™ Security System comprises of 2 protocols:

  1. Integrated Codes System Protocol
  2. Document Separation Protocol

They work together, piggy-backing off each other to offer maximum security of your confidential information.

Let’s explore each of these briefly so that you can see how they work.

But this all just looks way too complicated?

It won’t – once you have your Handbook Kit.

This page introduces 2DocLock™ and its Integrated Codes System and Document Separation Protocols. Without the actual Handbook, ICS List and Security Manager in front you, it can feel overwhelming but it will make immediate sense once you have the Handbook Kit and supporting documents in front of you.

Note from Founder: When creating my own Handbook it struck me how insecure it was to enter my usernames, passwords and 2-Factor Authentication information altogether in the handbook. So I solved that problem with 2DocLock™. Please keep an open mind – I guarantee once you understand how it works you will want to use it!

Integrated Codes System Protocol

The Handbook is organised by Parts, Sections and Sub-sections. You will see that many headings and/or sub-headings have a small code to the right of them. You will also note that all username, password and 2-Factor Authentication fields have a unique code to the right of each of those fields also. Keep this in mind as you read about the Essential and Enhanced methods below to protect your data.

Essential

Password-only in Security Manager

Using the “Essential” method:

  • Handbook: In the Handbook, complete the section as usual. For the login area, leave the Password field blank. (Using this method, you record the actual email/username and mobile in the fields provided). Note where you are in the Handbook – the Part, the heading code and the field code next to Password .
  • Security Manager: In the Security Manager, go to the same Part, find the relevant heading code, find that field code and enter the real password there.

Result: the Handbook never contains the password. A trusted person uses the email/mobile from the Handbook and the password from the Security Manager to log in.

Enhanced

Leaving Username, Password & 2-Factor Authentication fields blank in the Handbook

Using the “Enhanced” method:

  • Handbook: Fill the Handbook with general info only and leave Username/Email, Password and 2-Factor Authentication blank. Note where you are in the Handbook – the Part, the heading code and the field code next to Username/Email, Password and 2-Factor Authentication.
  • ICS List: Go to the ICS ListCreate neutral codes in the ICS List for the email/username and 2-Factor Authentication.
  • In the Security Manager, go to the same section (find the Part and heading code), find that relevant field codes and enter the user-created custom codes for username/email and 2-Factor Authentication and the real password there.

Result: the Handbook holds no login data; access requires the Security Manager + ICS List. This is the full 2DocLock™ Security System in action and the method we highly recommend that you use to maximise security of your data.

Document Separation Protocol

If using Integrated Codes System Protocol: Essential

The Handbook and the Security Manager are kept in separate locations and only brought together when needed for full data access.

If using Integrated Codes System Protocol: Enhanced

The Handbook and Security Manager OR the Handbook and ICS List can be stored together, with the remaining document stored separately. Or you can be really secure and store all 3 documents separately. It’s only when all 3 documents are brought together that someone has the full data.

NOTE: There is no value in using the Integrated Codes System Protocol (Essential or Enhanced) without deploying the Document Separation Protocol, because you need to ensure that sensitive data isn’t all housed together.

Handbook of Your Life – Complete Planning Handbooks Range

All handbook kits come professional printed, bound and ready to use – no setup required.
Choose the kit that fits your stage in life or current circumstances.