Protection de la vie privée

Secure your secrets

Keep it to yourself

Parent uses an home device to demonstrate where to look, and what to look for, when youʼre customizing your privacy settings


Customize privacy settings for the online services they use.

Make decisions about information sharing on the sites and services they use.

Understand what two-factor and two-step verifications mean and when to use them.

Let's talk

Privacy equals security

Online privacy and online security go hand in hand. Most apps and software offer ways to control what information weʼre sharing and how.

When youʼre using an app or website, look for an option like “My Account” or “Settings.” Thatʼs where youʼll find the privacy and security settings that let  you decide: •  What information is visible in your profile •  Who can view your posts, photos, videos, or other content that you share

Learning to use these settings to protect your privacy, and remembering to keep them updated, will help you manage your privacy, security, and safety. It’s important to know that your parents or guardian should always be making these decisions  with you.


Materials needed
  • One home device allowing to display an example account deemed appropriate for child demonstration (e.g. your own email account ot your children’s)

Review options

I have my laptop hooked up to the projection screen. Let’s navigate to the settings page of this app. We can see that our options include:

  • Changing your password
  • Getting alerts if someone tries to log in to your account from an unknown device
  • Making your online profile – including photos and videos – only visible to your chosen circles of family and friends
  • Enabling two-factor authentication or two-step verification

Additional verification options

Let’s talk about two-step and two-factor verification:

  • Two-step verification: When you log into your account, it will require two steps. For example, it may ask you to enter your password AND text you a code that has to be entered within 10 minutes before it expires.
  • Two-factor verification: The system will require two types of information to log you in. For example, it may ask for your normal password and your fingerprint.

Which privacy and security settings are right for you is something to discuss with your parent or guardian. But remember, the most important security setting is in your brain – you make the key decisions about how much of your personal info to share, when, and with whom.


Choosing a strong, unique password for each of your important accounts is a good first step. Now you need to remember them and also keep them safe.  

Writing down your passwords isn’t necessarily a bad idea. But if you do this, don’t leave a page with your passwords in plain sight, such as on your computer or desk. Safeguard your list, and protect yourself by hiding it somewhere safe.



Protecting people’s data and personal information (also called sensitive information).


Protecting people’s devices and the software on them.

Two-step verification (also called two-factor verification and two-step authentication)

A security process where logging in to a service requires two separate steps or two “factors,” such as a password and a one-time code. For example, you may have to enter your password and then enter a code that was texted to your phone or a code from an app.

Password or passcode

A secret combination used to access something. It may take different forms; for example, you may have a four-digit number-only code that you use for your phone lock and a much more complex password for your email account. In general, you should make your passwords as long and complex as you can while still being able to remember them.


The process of converting information or data into a code that makes it unreadable and inaccessible.


The goal when creating a secure password. For example, a password is complex when it has a mix of numbers, special characters (like “$” or “&”), and both lowercase and uppercase letters.


A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data.