Why a “compliance” checklist for seed phrases in the EU?
Your seed phrase (recovery phrase) is the master key to your crypto wallet. If someone gets it, they can move assets; if you lose it, you may lose access permanently. In the EU, “compliance” in this context is less about registering your seed phrase (don’t) and more about handling it responsibly: minimizing data exposure, creating resilient backups, and keeping records suitable for audits, incidents, or estate planning—without compromising security.
This checklist is designed to be neutral and practical. It is not financial advice, and it does not replace professional legal, tax, or security guidance.
EU seed phrase compliance checklist (practical + privacy-first)
1) Define scope: what you will (and won’t) record
- Do not store the seed phrase in any digital system (notes apps, cloud drives, email drafts, password managers, screenshots, photos).
- Record non-sensitive metadata only: wallet type, creation date, and where the backup is stored (e.g., “sealed envelope in safe deposit box”).
- Document who is allowed to know about the location (not the seed itself) and under what conditions (e.g., two-person rule).
Related reading: [[LINK:101|Self-custody basics: what a seed phrase really is]]
2) Choose an offline backup method suitable for EU risk realities
- Paper backup: acceptable if stored properly (fire/water risk mitigated).
- Steel/metal backup: better resilience against fire/flood; ensure it’s corrosion-resistant and stored discreetly.
- Two backups minimum: one primary, one geographically separated (e.g., different building). Balance resilience with increased exposure risk.
- Don’t create too many copies: each copy is another attack surface.
3) Storage location controls (privacy + physical security)
- Use sealed, tamper-evident packaging (signed across seal) so you can detect unauthorized access.
- Limit who knows: location details should be shared on a strict need-to-know basis.
- Separate from identifiers: don’t store the backup next to documents that link it to you (passport copies, full address lists).
- Plan for cross-border realities: if you travel/move within the EU, decide whether backup stays in one jurisdiction or follows you; avoid carrying seed phrases during travel unless absolutely necessary.
4) “Data protection by design” mindset (GDPR-adjacent)
Even though a seed phrase is not a typical customer database field, the GDPR principles of data minimization and security are still a useful lens:
- Minimize personal data linkage: don’t label backups with your name or wallet balances.
- Access controls: treat the seed phrase like the highest sensitivity secret.
- Incident readiness: define what you will do if you suspect exposure (see section below).
See also: [[LINK:102|GDPR for crypto users: practical privacy habits]]
5) Avoid “shadow custody” with third parties
- Be cautious with anyone offering to “hold a copy” for you (friends, advisers, print shops, photo services).
- If you use a safe deposit box or storage service, ensure the provider cannot access the contents (you control keys/seals), and understand the provider’s access policies.
- Don’t share seed phrases with customer support—legitimate services will never ask for it.
6) Consider advanced options (only if you can operate them correctly)
- Passphrase (25th word): adds protection if the seed is found, but increases the risk of owner error. Store passphrase separately and securely.
- Shamir / secret sharing: splits recovery into multiple shares. Use only if you can test recovery and manage share distribution securely.
- Multisig: reduces single-point-of-failure; may complicate recovery and inheritance. Document procedures clearly.
Deep dive: [[LINK:103|Passphrases vs multisig: security trade-offs explained]]
7) Test recovery (without leaking secrets)
- Perform a recovery drill on a spare device or in a controlled environment.
- Verify that the written words are correct and in order.
- Ensure no cameras, smart speakers, or screen recording are active nearby.
8) Incident response plan (EU-friendly, practical)
If you suspect the seed phrase was exposed (photo taken, envelope opened, someone had access):
- Assume compromise.
- Create a new wallet with a new seed phrase.
- Move assets to the new wallet as soon as you can do so safely.
- Invalidate old procedures: update records, storage, and any inheritance notes.
- Document the incident for your own records (date, what happened, what you changed). Keep this record free of sensitive data.
9) Recordkeeping & audits (what’s reasonable to document)
- Seed phrase itself: never in digital logs.
- Process documentation: “created wallet on hardware device; seed written and sealed; stored in location A; backup in location B.”
- Change log: when you rotated wallets, changed storage, or performed recovery tests.
- Role-based access: who is authorized to access the backup container (not the words).
More guidance: [[LINK:104|Crypto recordkeeping in the EU: what to track (and what not to)]]
10) Estate & continuity planning (without handing over the keys)
- Write an instructions letter that explains where to find the backup and how to use it, without including the seed phrase in the letter itself.
- Consider a two-step access model: one party knows location; another holds a separate required element (e.g., passphrase or one multisig key).
- Keep it updated after moves, life events, or wallet changes.
Common pitfalls to avoid (quick EU checklist)
- Storing seed words in cloud notes “temporarily”
- Taking a photo “just in case”
- Labeling backups with your full name, address, or “Bitcoin wallet”
- Making too many copies and losing track of them
- Skipping recovery tests until it’s too late
FAQ
Is it legal in the EU to self-custody crypto using a seed phrase?
In general, self-custody is legal across EU member states, but related obligations (tax reporting, consumer rules, and service-provider regulations) vary. This checklist focuses on safer handling, not legal conclusions.
Should I store my seed phrase in a password manager to be “secure”?
As a rule, avoid storing seed phrases digitally because it increases exposure (cloud sync, device compromise, account recovery attacks). If you choose any digital approach, understand it can materially change your risk profile and requires expert-grade operational security.
What should I do if I think someone saw my seed phrase?
Assume it’s compromised. Create a new wallet and move assets to it, then replace your backup process. Also document what happened (without sensitive details) so you can improve controls.
Key takeaways
- Treat the seed phrase as the highest-sensitivity secret: keep it offline and minimally exposed.
- Use resilient backups (paper/metal), sealed storage, and limited knowledge of locations.
- Document processes and changes without ever digitizing the seed words.
- Test recovery safely and have an incident plan to rotate wallets after suspected exposure.
- Plan continuity/estate access with separation of duties rather than sharing the seed.







