SlideShare a Scribd company logo
INTERNET SAFETY
What is the Internet
&
Why is it important to be safe?
What are some of the names for
THE INTERNET
• CYBERSPACE
• THE WEB
• THE NET
• THE INFORMATION HIGHWAY
• THE WORLD WIDE WEB
• W3
How Do You Receive/Send
Information?
• By using a Browser
(shortened form for
Web Browser)
• It is a program installed
on your computer that
understands special
“internet language”
• There are MANY
Browsers. We use
Safari and Firefox.
Looking for Something?
• Looking up information
on the internet is called
browsing because you use
a browser.
• Some people call it
“surfing”
• If you know the address,
you can just type it in.
Rules for the Real World vs. the Net
• Stranger Danger
• Say you’re sorry when
you hurt someone
• Go to bed on time
• Share your toys and take
turns playing a game.
• Brush your teeth
• Don’t answer the door
when Mom’s in the
shower
• Never meet someone in
person you’ve met in the
cyber world.
• Limit time on the
computer. Have a social
life.
• Never give out personal
information
• Don’t respond to
messages that are
threatening or obscene.
MORE BASIC RULES TO KEEP SAFE
• Never share your name, age, phone number,
address, or even your school
• Never send any pictures to a stranger
• Keep passwords private - Don’t share even with
your school buddies.
• Never open an email from someone you don’t
recognize. It may contain a virus that will totally
shut down your computer OR let someone use your
computer without your knowing it.
• Visit age appropriate sites.
• Tell an adult you trust if you see something that
makes you feel uncomfortable.
INTERNET SAFETY AT HOME
• Schools or libraries must certify they have an
Internet safety policy that blocks or filters access
to pictures that are harmful to minors
• While at home, these same protections are not in
place so students could have access to
inappropriate content
• At home, families are expected to ensure Internet
safety measures. You may work with your Internet
providers, or cellphone carriers to provide specific
restrictions.
KEEPING YOUR CHILD SAFE AT
HOME
• CIPA laws for schools or libraries may not extend to the
home, but that doesn’t mean your child’s home internet
experience has to go unprotected.
• Educating your child on internet safety and creating a
list of the parental control options you need will help
you choose which internet service provider will work
best for you and your family.
• Keep your child informed about why internet safety is
important. By encouraging your child to make smart
choices while online, you’re helping them develop the
confidence to use the internet safely and respectfully.
WHAT YOU CAN DO AT HOME
• Set up Internet filtering
– Use your router or internet service provider’s security app to
configure child-safe internet filtering
• Block websites and keywords you don’t want your child to
access
– You can block websites and keywords through your router or
internet service provider’s security app
– Another way to configure internet filtering is by only allowing your
child access to certain websites and keywords
• Schedule when your child can access the internet
– You can set up access times through your router or internet service
provider’s security app
ARE YOU REALLY YOU?
• Some of your online
“friends may not be
who they say they
are.
• Someone who tells
you “she” is a
teenager could be a
40-year old man
posing as a teenager.
Gee, you sound
really cute and we
have the same
birthday! We must
be destined to meet!
Well, I don’t mind admitting I was
homecoming queen and maybe we could
celebrate our birthdays together.
Have You Given Out This Kind
of Information?
THINK BEFORE YOU POST
• To post or not to post, that is the
question. Think before you post.
DO NOT post something that
you would not want your
grandmother to read. Everything
that an individual posts no
matter how old or young you are
stays online.
• The places you visit and things
you say, leave a trail on the
internet that never goes away.
• All of this digital communication
is called your “digital footprint”.
The “trail” you leave in
cyberspace and on any
form of digital
communication is
called your
“digital footprint.”
Your digital foot-print
may reflect positively on you as a person ……
or it may not.
I T’S U P T O Y O U!
The words we say, the pictures we
post, the places we visit make
up our digital “reputations.”
They cannot be washed away
like footprints in the sand.
Don’t be a Cyber Bully
Just like there are bullies in the real world, there are
bullies in the cyber world. The words you say online
can hurt just as bad as being physically hurt.
In the Real world vs the Cyber world
a Bully uses Intimidation as their
favorite tool.
YOU ARE NOT ALONE!
How Do You
Stop a Cyber
Bully?
MORE TIPS
Tools for Families
• https://www.bark.us/blog/parental-control-
guide-apps-devices/
– Bark Features: Text Message and Email Monitoring,
Social Network Monitoring, Internet Monitoring,
Alerts, and Check-In Requests
• https://apps.apple.com/us/app/parental-control-
app-kidslox/id914825567
– Kidslox Features: Family Location Tracker, Screen
Time Controls, and Parental Controls
THE INTERNET CAN OPEN ALL KINDS OF NEW WORLDS,
BUT REMEMBER TO BE A “WEB WISE KID” AND BE SAFE!
Resources
• https://www.commonsense.org/education/toolkit/a
udience/family-engagement-online-privacy-safety
• https://www.allconnect.com/blog/keeping-kids-
safe-online
• https://rems.ed.gov/docs/Cyber_Safety_K-
12_Fact_Sheet_508C.PDF

More Related Content

Similar to iiiii.ppt

Dont delete.pptx
Dont delete.pptxDont delete.pptx
Dont delete.pptx
SukreetiShrestha1
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
LiftPotential
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
14071828
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
Marian Merritt
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
itmadesimple
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
Patrick Laverty
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th gradeBelinda Larson
 
Social Media Safety for K-8 audience
Social Media Safety for K-8 audienceSocial Media Safety for K-8 audience
Social Media Safety for K-8 audience
LiftPotential
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
Amit Pal Singh
 
Central middle school protecting online reputation - 4-22-13
Central middle school   protecting online reputation - 4-22-13Central middle school   protecting online reputation - 4-22-13
Central middle school protecting online reputation - 4-22-13
Kathy Day
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
Pepper It Marketing ~ Time on Task Virtual Assistant Services
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
Staci Trekles
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital CitizenshipAnja Junginger
 
Gd prnts-en
Gd prnts-enGd prnts-en
Gd prnts-en
JannahAboulhassan
 
Raising Kids in an Electronic Age
Raising Kids in an Electronic AgeRaising Kids in an Electronic Age
Raising Kids in an Electronic Age
Adam Walker Cleaveland
 
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 

Similar to iiiii.ppt (20)

Dont delete.pptx
Dont delete.pptxDont delete.pptx
Dont delete.pptx
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
Social Media Safety for K-8 audience
Social Media Safety for K-8 audienceSocial Media Safety for K-8 audience
Social Media Safety for K-8 audience
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Central middle school protecting online reputation - 4-22-13
Central middle school   protecting online reputation - 4-22-13Central middle school   protecting online reputation - 4-22-13
Central middle school protecting online reputation - 4-22-13
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Internet safety
Internet safetyInternet safety
Internet safety
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
 
Gd prnts-en
Gd prnts-enGd prnts-en
Gd prnts-en
 
Raising Kids in an Electronic Age
Raising Kids in an Electronic AgeRaising Kids in an Electronic Age
Raising Kids in an Electronic Age
 
Internet security
Internet securityInternet security
Internet security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

Recently uploaded

Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 

Recently uploaded (20)

Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 

iiiii.ppt

  • 1.
  • 2. INTERNET SAFETY What is the Internet & Why is it important to be safe?
  • 3. What are some of the names for THE INTERNET • CYBERSPACE • THE WEB • THE NET • THE INFORMATION HIGHWAY • THE WORLD WIDE WEB • W3
  • 4. How Do You Receive/Send Information? • By using a Browser (shortened form for Web Browser) • It is a program installed on your computer that understands special “internet language” • There are MANY Browsers. We use Safari and Firefox.
  • 5.
  • 6. Looking for Something? • Looking up information on the internet is called browsing because you use a browser. • Some people call it “surfing” • If you know the address, you can just type it in.
  • 7.
  • 8. Rules for the Real World vs. the Net • Stranger Danger • Say you’re sorry when you hurt someone • Go to bed on time • Share your toys and take turns playing a game. • Brush your teeth • Don’t answer the door when Mom’s in the shower • Never meet someone in person you’ve met in the cyber world. • Limit time on the computer. Have a social life. • Never give out personal information • Don’t respond to messages that are threatening or obscene.
  • 9. MORE BASIC RULES TO KEEP SAFE • Never share your name, age, phone number, address, or even your school • Never send any pictures to a stranger • Keep passwords private - Don’t share even with your school buddies. • Never open an email from someone you don’t recognize. It may contain a virus that will totally shut down your computer OR let someone use your computer without your knowing it. • Visit age appropriate sites. • Tell an adult you trust if you see something that makes you feel uncomfortable.
  • 10. INTERNET SAFETY AT HOME • Schools or libraries must certify they have an Internet safety policy that blocks or filters access to pictures that are harmful to minors • While at home, these same protections are not in place so students could have access to inappropriate content • At home, families are expected to ensure Internet safety measures. You may work with your Internet providers, or cellphone carriers to provide specific restrictions.
  • 11. KEEPING YOUR CHILD SAFE AT HOME • CIPA laws for schools or libraries may not extend to the home, but that doesn’t mean your child’s home internet experience has to go unprotected. • Educating your child on internet safety and creating a list of the parental control options you need will help you choose which internet service provider will work best for you and your family. • Keep your child informed about why internet safety is important. By encouraging your child to make smart choices while online, you’re helping them develop the confidence to use the internet safely and respectfully.
  • 12. WHAT YOU CAN DO AT HOME • Set up Internet filtering – Use your router or internet service provider’s security app to configure child-safe internet filtering • Block websites and keywords you don’t want your child to access – You can block websites and keywords through your router or internet service provider’s security app – Another way to configure internet filtering is by only allowing your child access to certain websites and keywords • Schedule when your child can access the internet – You can set up access times through your router or internet service provider’s security app
  • 13.
  • 14. ARE YOU REALLY YOU? • Some of your online “friends may not be who they say they are. • Someone who tells you “she” is a teenager could be a 40-year old man posing as a teenager. Gee, you sound really cute and we have the same birthday! We must be destined to meet! Well, I don’t mind admitting I was homecoming queen and maybe we could celebrate our birthdays together.
  • 15.
  • 16. Have You Given Out This Kind of Information?
  • 17.
  • 18. THINK BEFORE YOU POST • To post or not to post, that is the question. Think before you post. DO NOT post something that you would not want your grandmother to read. Everything that an individual posts no matter how old or young you are stays online. • The places you visit and things you say, leave a trail on the internet that never goes away. • All of this digital communication is called your “digital footprint”.
  • 19. The “trail” you leave in cyberspace and on any form of digital communication is called your “digital footprint.” Your digital foot-print may reflect positively on you as a person …… or it may not. I T’S U P T O Y O U!
  • 20. The words we say, the pictures we post, the places we visit make up our digital “reputations.” They cannot be washed away like footprints in the sand.
  • 21. Don’t be a Cyber Bully Just like there are bullies in the real world, there are bullies in the cyber world. The words you say online can hurt just as bad as being physically hurt. In the Real world vs the Cyber world a Bully uses Intimidation as their favorite tool.
  • 22. YOU ARE NOT ALONE!
  • 23. How Do You Stop a Cyber Bully?
  • 25. Tools for Families • https://www.bark.us/blog/parental-control- guide-apps-devices/ – Bark Features: Text Message and Email Monitoring, Social Network Monitoring, Internet Monitoring, Alerts, and Check-In Requests • https://apps.apple.com/us/app/parental-control- app-kidslox/id914825567 – Kidslox Features: Family Location Tracker, Screen Time Controls, and Parental Controls
  • 26. THE INTERNET CAN OPEN ALL KINDS OF NEW WORLDS, BUT REMEMBER TO BE A “WEB WISE KID” AND BE SAFE!