The Safe Memory Standard

A living standard for trustworthy memorial technology.

The Safe Memory Standard exists to guide the design and evaluation of memorial products. It focuses on family agency, long-term access, and measurable trust commitments rather than slogans.

Safe Memory is designed to make memorial technology legible before a family has to trust it.

Standard summary

Built around measurable commitments, not reassuring language alone.

Safe Memory is designed to help both users and builders understand what good memorial technology looks like in practice.

Ownership

Ownership

Ownership asks whether a platform clearly recognises that memorial media, stories, and family contributions remain the family's materials.

When ownership is blurry, families cannot judge whether they are building an archive for themselves or feeding one for the provider.

What good looks like

  • Terms that clearly state families retain ownership of uploaded material.
  • No vague language implying broad provider claims over memorial content.
  • Plain explanations of what the platform may store, process, or display.

What weak practice looks like

  • Broad rights language that reads like default platform control.
  • Policies that make families guess whether they still own what they uploaded.
  • No distinction between hosting access and ownership rights.

Portability

Portability

Portability measures whether families can recover their archive in a usable form if they want or need to leave.

A memorial archive is not ordinary account data. The family should be able to take it with them without friction or uncertainty.

What good looks like

  • Download paths for photos, videos, text, and metadata.
  • Clear explanation of what exports include and how long they take.
  • Recoverable archive structure rather than partial, fragmented exports.

What weak practice looks like

  • No export path or one that excludes important family contributions.
  • Download rights that disappear once billing changes.
  • Exports described vaguely without enough detail to trust them.

Transparency

Transparency

Transparency asks whether the platform explains its storage model, access conditions, and product boundaries in language a family can follow.

Families should not need to reverse-engineer a memorial service to understand what will happen to their memories later.

What good looks like

  • Plain-language policies and product explanations.
  • Visible information about access, payment effects, and archive treatment.
  • Transparent answers to common long-term trust questions.

What weak practice looks like

  • Important information buried in legal boilerplate.
  • Critical archive conditions omitted from product pages.
  • Policies that answer formal legal questions while avoiding practical ones.

Contribution Control

Contribution Control

Contribution control covers how submissions from friends or relatives are invited, reviewed, approved, and later recoverable.

Shared memorials often involve multiple contributors, and the boundary between contribution and archive inclusion should be deliberate.

What good looks like

  • Review-first flows before content becomes part of the memorial.
  • Clear distinctions between invited contribution and archival inclusion.
  • Recoverable contribution records where appropriate.

What weak practice looks like

  • Automatic inclusion of submissions without clear approval steps.
  • No visibility into who added what or when.
  • Contribution content that cannot be recovered later.

Access Continuity

Access Continuity

Access continuity measures whether a memorial remains meaningfully reachable over time, including after billing changes or account transitions.

Memorial systems should be designed with continuity in mind because they often outlast ordinary software relationships.

What good looks like

  • Clear post-subscription access rules.
  • Continuity pathways that avoid abrupt archive loss.
  • Practical information on who can maintain or inherit access.

What weak practice looks like

  • Hard service cliffs that leave the archive uncertain.
  • No explanation of what families retain if a plan changes.
  • Continuity dependent on opaque provider discretion.

Privacy and Permission Clarity

Privacy and Permission Clarity

This category evaluates whether the platform handles access, privacy, and contribution permissions in understandable ways.

Grief and remembrance involve sensitive materials. Access should be chosen, not guessed at.

What good looks like

  • Clear privacy states and access roles.
  • Understandable invitations and permission boundaries.
  • Visible distinctions between public, private, and shared memorial spaces.

What weak practice looks like

  • Confusing defaults or ambiguous sharing rules.
  • Permission states that only make sense to technical users.
  • Policies that speak abstractly about privacy without operational clarity.

Dignified Memorial Use

Dignified Memorial Use

Dignified use asks whether the platform's architecture and incentives respect remembrance rather than treating memorial activity as extractive product engagement.

Memorial archives deserve design choices that reflect care, restraint, and context.

What good looks like

  • Product choices that prioritise stewardship over coercion.
  • Communication that feels calm, explicit, and non-extractive.
  • Features shaped around remembrance and family control.

What weak practice looks like

  • Manipulative engagement mechanics in grief-adjacent contexts.
  • Pressure tactics that turn continuity concerns into lock-in leverage.
  • Product copy that treats memorial data as a generic growth asset.
An older man and child on a bench looking out to sea at sunset

Long-term stewardship

The standard is ultimately about whether a family remains in control over time.

Ownership, portability, permissions, and continuity need to be clear enough that trust is not based on guesswork.

Living framework

The standard is intended to evolve as memorial technology evolves.

Safe Memory is structured to remain transparent about its categories, methodology, and revisions rather than pretending to be fixed by authority.