We’re building this in the open. Support, sales, and service are fully live.
We plugged it in, clicked it on, and auto-logged-in to her user account. Fully browsable. Personal emails, photos, and saved accounts — wide open. That’s when it hit us...
Joan didn’t mean to leave behind her tax records, saved logins, or private chats — but that’s exactly what ended up on a thrift store shelf, one click away from a stranger.
The Joan Protocol is our response to this silent risk. It’s a secure digital offboarding service for families, caregivers, and estate managers who want peace of mind.
Each device is handled with care:
Fully wiped
Respectfully processed
Never blindly resold with data still inside
Whether your loved one’s computer is being donated, returned, or rehomed, we ensure full traceability, respectful handling, and documented assurance — every step of the way.
We found it — unlocked and unprotected — sitting on a shelf at a local Goodwill.
Since then, we’ve found this again and again from Goodwill Retail Stores and other secondhand outlets. The pattern is dangerously consistent:
Machines arrive unwiped and unencrypted
Many are still logged into personal accounts
They often contain emails, financial records, photos, medical info, and active browser sessions
Habitat for Humanity ReStores, Salvation Army shops, school surplus auctions, electronics donation bins, and community e-waste drives are all pipelines for devices full of personal data — handed over by people who assume someone downstream will “take care of it.”
These organizations are not trained, not equipped, and not obligated to wipe or verify devices before resale.
That’s how Joan’s digital life — and countless others — ended up one click away from the wrong hands.
We’re talking full access to the previous user’s digital identity:
Emails, photos, and medical records
Saved credit card and banking info
Autofill logins and full social accounts
Tax files, chats, and workplace documents
This isn’t a rare occurrence. It’s routine.
And once it’s out there — you can’t take it back.
In addition to protecting your loved one’s data, The Joan Protocol supports:
Digital estate management and executor duties
HIPAA/HITECH-conscious handling of personal records
Privacy requests aligned with the “Right to be Forgotten”
Full chain of custody tracking and optional certificates of data destruction
Certified Data Destruction
Complete full-drive erasure using NIST 800-88 standards. Includes certificate of destruction and logged serials (available upon request)
Optional Account Support
Help recovering, memorializing, or permanently removing accounts (e.g., Google, Facebook, iCloud)
Optional File Recovery
Secure retrieval of important photos, documents, or records before the data is erased — if requested
Return, Donate, Rehome, or Recycle
You choose. If donated, we ensure it goes to a vetted nonprofit, veteran, or student — never a blind resale outlet
Chain of Custody
Every machine is scanned, tracked, and documented from intake to final disposition. You’ll always know where it went and what was done
A prepaid shipping label or kit is sent to you
No charger, cables, or accessories required
Once received, we securely process the device and follow your return or donation instructions
You'll receive confirmation and documentation for your records