
Why Understanding Account Access Matters
It is important to understand and plan how access to your digital accounts works, especially in case of an emergency or unexpected event. Many essential services, such as email, banking, health portals, and home utilities, are now managed online and are often connected to one another. This resource explains why certain accounts are more important than others, how access is usually tied to your email and passwords, and why planning ahead matters.
By learning how your digital accounts are structured and taking steps to organize and protect them, you can ensure important information remains accessible when needed.
Check Out Our Downloadable Tipsheet
Download our tipsheet for visual explanation of how digital accounts are accessed.

The Importance Of Understanding Sign-In processes
Understanding the sign-in process helps you see where access can be blocked or controlled.
How Signing In to an Online Account Works
Understanding the sign-in process helps you see where access can be blocked or controlled.
Start
You open the app or website.
This might be on your phone, tablet, or computer. Some devices remember you and open directly to the sign-in page, while others may open you into the account if you were already signed in.
Identify
You enter your email address or username.
This tells the service who is trying to sign in. Your email address is often the main identifier and is commonly used to send password resets and security alerts.
Prove
You confirm it is really you.
This step may involve entering a password, using a passkey, or signing in with Face ID or fingerprint recognition.
- A password is something you know.
- A passkey uses your device’s built-in security, such as Face ID, fingerprint, or a device unlock code, instead of a password.
- Biometric options work only on the device they are set up on, which is why access may change when you switch devices.
Double Check
You approve a code or prompt using two-step verification.
Some accounts ask for an extra confirmation to improve security. This may be a code sent by text message, a notification on your phone, or a number from an authenticator app. Different accounts may use different methods, and many allow you to choose which option works best for you.
Session
The device stays signed in for a period of time.
Once you are signed in, the service may keep you logged in so you do not have to enter your information again each time. This is called a sign-in session. Sessions may end if you sign out, clear your browser, update security settings, or use a new device.
Finish
You are now in your account.
You can view information, make changes, or use the service. Understanding the steps that got you here helps you recognize where access might stop and what to do if something goes wrong.
Two-Step Verification: What To Know
Many accounts use two-step verification to add an extra layer of security. This means that after entering your password, you are asked to confirm your identity in another way. This extra step helps protect sensitive information if a password is guessed or stolen.
Banking and Government Accounts
Banking and government accounts often require stronger security because they contain financial and personal information. These accounts commonly use:
- A one-time code sent by text message
- A phone call with a spoken code
- A secure prompt or code within the organization’s official app
- In some cases, an authenticator app for added protection
These methods are designed to confirm that it is really you, especially when signing in from a new device or making important changes.
Different Ways Codes May Be Sent
Different accounts may use different types of two-step verification, including:
- A code sent by text message
- A phone call with a spoken code
- A prompt sent to an app on your phone
- An authenticator app that generates time-limited codes
- A trusted device, such as your phone or tablet
What You Should Check
It is helpful to know:
- Which two-step verification method each account uses
- Which phone number, email address, or device receives the codes
- Whether you have backup options if your phone is lost or unavailable
- That you can often change how you receive these codes in the account settings
Setting It Up Safely
Most accounts allow you to review or update two-step verification in the security or sign-in settings. You may be able to switch from a phone call to a text message, add an authenticator app, or register a new device. If you rely on someone else’s phone or device to receive codes, you may wish to update this so verification comes directly to you.
View the institution-specific instructions below on setting up 2FA for your bank accounts.
View the platform-specific instructions below on setting up 2FA for social media accounts.
Password Managers: What They Are and Why They Help
If you are not using a password manager, it is something to consider. A password manager is a secure tool that stores your passwords for you. Instead of remembering many different passwords, you only need to remember one main password to unlock the manager.
Password managers store passwords securely in one place and create strong, unique passwords for each account. They work by filling in passwords for you when you sign in.
How They Fit Into Sign-In
Password managers are used during the password step when signing in. They automatically enter the correct password, which is especially helpful for long or complex passwords.
Things to Keep in Mind
- Choose a strong main password you can remember
- Some password managers offer emergency access for a trusted person
- They work alongside two-step verification, not instead of it
Using a password manager can reduce frustration and help you stay organized when managing digital accounts.
Click the button below to download or password manager tipsheet.
Common Situations Where This Knowledge Helps
Your digital accounts are often set up and managed in different ways over time, sometimes with help from others and sometimes through shared responsibilities. As situations change, it can become unclear who has access, where important information is sent, or how to make updates. Understanding how account access works can help you recognize common situations where extra attention may be needed and support informed decisions about your digital accounts.
Resources
If someone has used technology or account access in ways that feel controlling, unsafe, or overwhelming, support is available. You are not alone, and help is available regardless of your situation or where you are in the process. The resources listed below offer confidential information and support for anyone experiencing harm, pressure, or abuse, including situations involving digital access or control.
Immediate help is available at the following national hotlines. All services are provided 24/7 and are free.
Government of Canada
https://www.canada.ca/en/public-health/services/mental-health-services/mental-health-get-help.htmlVictim Services in Ontario
- Victim Services in Ontario Government Page
- Sheltersafe.ca – map for shelters
- Youth and Young Adults call 1-800-668-6868 or text message CONNECT to 686868. 24/7 service.
- Indigenous People 1-855-242-3310 (toll-free) 24/7.
- Ontario Victim 24/7 Support Line: 1-888-579-2888
- Assaulted Women’s Helpline: 1-866-863-0511 www.awhl.org/home
- Older Adults Canadian Network for the Prevention of Elder Abuse (CNPEA) https://cnpea.ca/en/
- Additional Resources:
- Women’s Sheltershttps://sheltersafe.ca/
- Ontario Network of Sexual Assault and Domestic Violence Treatment Centers https://www.sadvtreatmentcentres.ca/find-a-centre
- Talk4Healing for Indigenous Women https://www.beendigen.com/programs/talk4healing/
- Trans Lifeline https://translifeline.org/
- Nisa Helpline for Muslim Women https://nisahelpline.com/
- Fem’aide for French-speaking women www.femaide.ca
- Federal government website that offers general information on family violence. https://justice.gc.ca/eng/cj-jp/fv-vf/help-aide.html
- List of community services by the Federal government. https://women-gender-equality.canada.ca/en.html
- Women’s Sheltershttps://sheltersafe.ca/
Download Our Digital Self Defense Guide!
This toolkit is a comprehensive guide designed to help individuals and organizations recognize and respond to technology abuse. While technology plays an important role in everyday life, it can also be misused to control, intimidate, or cause harm. The resource offers practical information, resources, and strategies to help people navigate these situations.

Resources
View our other tipsheets
Explore our resources on cybersafety, privacy protection, and educational content tailored for everyone. Our collection of tipsheets covers essential topics in cybersecurity, ensuring users of all backgrounds can navigate the digital world securely. Whether you’re safeguarding personal information, learning about privacy best practices, or seeking educational resources, our page equips you with practical insights to stay safe online. Dive into our resources and enhance your digital resilience today.
