Managing guardians and trusted contacts who can access your information.
How to invite trusted people as guardians.
Understanding guardian permissions and access levels.