diff --git a/helios/tests.py b/helios/tests.py
index b39c3a87a09f4591d35a5dda0db68ed12d853eed..edab958e81289827df49fcc8afb5e833d140449c 100644
--- a/helios/tests.py
+++ b/helios/tests.py
@@ -486,7 +486,7 @@ class ElectionBlackboxTests(WebTest):
                 "election_type" : "referendum",
                 "use_voter_aliases": "0",
                 "use_advanced_audit_features": "1",
-                "private_p" : "0"})
+                "private_p" : "False"})
 
         self.assertRedirects(response, "/auth/?return_url=/helios/elections/new")
     
@@ -527,7 +527,7 @@ class ElectionBlackboxTests(WebTest):
             "election_type" : "referendum",
             "use_voter_aliases": "0",
             "use_advanced_audit_features": "1",
-            "private_p" : "0"}
+            "private_p" : "False"}
 
         # override with the given
         full_election_params.update(election_params)
@@ -757,7 +757,7 @@ class ElectionBlackboxTests(WebTest):
 
     def test_do_complete_election_private(self):
         # private election
-        election_id, username, password = self._setup_complete_election({'private_p' : "1"})
+        election_id, username, password = self._setup_complete_election({'private_p' : "True"})
 
         # get the password_voter_login_form via the front page
         # (which will test that redirects are doing the right thing)
@@ -788,10 +788,10 @@ class ElectionBlackboxTests(WebTest):
                 "election_type" : "election",
                 "use_voter_aliases": "0",
                 "use_advanced_audit_features": "1",
-                "private_p" : "0"})
+                "private_p" : "False"})
 
         election_id = re.match("(.*)/elections/(.*)/view", response['Location']).group(2)
-        
+
         # update eligiblity
         response = self.client.post("/helios/elections/%s/voters/eligibility" % election_id, {
                 "csrf_token" : self.client.session['csrf_token'],