SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
CellSafety and WebSafetyPC
Mobile and PC Child Protection Software Applications
Contents

•   WebSafety

•   Advisory Board

•   CellSafety

•   WebSafetyPC

•   CellSafety.biz

•   Pricing

•   Troubling Statistics

•   Additional information and links
WebSafety
WEBSAFETY, INC. ANNOUNCES FIRST-TO-MARKET AVAILABILITY OF ANTI-BULLYING SOFTWARE APPLICATION ON
                                       ANDROID TABLETS

                                    --Patent-pending Software Application Expands User-base Platform

IRVING, TX February 7, 2011 (GLOBE NEWSWIRE) -- WebSafety, Inc. (OTCBB:WBSI), the leading provider of mobile and computer
software solutions that help to prevent incidences of cyber-bullying as well as explicit or degrading texting, sexting issues and unlawful
Internet behavior such as cyber predators today announced that it now supports two new Android tablets for the company’s patent-pending
software application.
“With compatibility on a total of 90 models of smartphones and now tablets powered by the Android, Blackberry and Symbian operating
systems we believe the WebSafety software application is the most widely available, feature-rich product in our marketplace today,” stated
Travis Bond, Chief Operating Officer. “Our software works on all of the major wireless carriers in the United States (AT&T, T-Mobile, Sprint
and Verizon) as well as the three wireless networks in Canada (Bell Mobility, Rogers and Telus).”
 WebSafety's full suite of services including the “No Texting While Driving Features”are available starting at $9.99 month, with multi-tier and
family pricing plans available. For additional information or to download the WebSafety software application, please visit www.websafety.com
and click on the red "BUY NOW" button.
About WebSafety, Inc.

WebSafety, Inc. is the leading provider of mobile and computer software solutions that help to prevent incidences of distracted driving as well
as unlawful Internet behavior such as cyber predators, explicit or degrading texting and cyber-bullying. The mobile software application works
on the major wireless operating systems, including Android, Blackberry and Symbian and on all four of the major wireless carriers in United
States and the three wireless networks in Canada.
For more information, please visit WebSafety's corporate website: www.websafety.com
For WebSafety investor relations material, including an executive summary and corporate presentation, please visit: http://ir.stockpr.com/
websafety/presentations
Free research report on WebSafety issued by Harbinger Research is available in Acrobat format at: www.harbingerresearch.com
CONTACT:

Casson Media Group, Inc. for WebSafety, Inc.
Mike Casson      mike@cassonmediagroup.com
Ethical Leadership
Blue-chip Advisory Board
Circle of Protection
                              How Does It Actually Work?

                                                               Install CellSafety &
 Child can take necessary                                     WebSafetyPC in only
 steps to eliminate risky                     1                      minutes
  behavior with parental
 guidance and WebSafety
  monitoring - Employee
  can modify actions per       5                               2
  corporate guidelines -                                            The apps monitor all inbound
  Employer is protected                                              & outbound communication
                                        360 degrees of                 for over 11,000 known
   from policy violations               mobile & online             keywords-also monitors speed
                                          protection                         & location


                                    4                     3
  Parents/employers take action                                    When nefarious activity is
based on the incident information                               detected, the apps send “danger
      provided by the apps -                                    alerts” via text (SMS) and email
          Administrator                                          while also blocking text, email,
 can override system if desired/                                  and web browsing at speeds
            required                                                     above 10 mph
‣ Utilizes GPS Technology                                                         Disable texting,
‣ Triggered when going 10MPH                                                      emailing & web surfing
‣ Service restored within 3 minutes upon stopping
‣ Driver can make or receive calls
                                                                                  while driving
‣ 911 access is available anytime
‣ Parental control available for passenger access                               Take a proactive approach
                                                                                to protecting your children
‣ Utilizes world’s largest word recognition library of 11,000+ key
    words, phrases & Net Lingo
                                                                                against cyber bullying and
‣   Monitors 100% of incoming and outgoing text and web browsing
    activity for drug, gun & suicide talk, cyber bullying, pornography,
                                                                                other mobile dangers
    sexting & more
‣   Sends parental “danger alerts” via text message and detailed email
    complete with offending party’s mobile number and/or IP address
‣   Set “virtual fences” for place and time
‣   Create “safe lists” for family & friends
‣   Where RU feature locates phone from any web browser



            30 days FREE ✧ No contracts ✧ No sign up/cancellation fees ✧ $9.99 - $14.99 ✧ Family Plan unlimited $39.99
Take a proactive
                                                                               approach to protecting
‣ Monitors 100% of incoming and outgoing information from child’s PC
                                                                               your children against
‣ Blocks pornography before it can be viewed
‣ Sends instant Danger Alerts to parents cell phone and email account          cyber bullying and other
‣
    with details of potential threat
    Translates Net Lingo into understandable language for parents              mobile dangers
‣   The only PC application that actively scans and monitors all of the
    following: Internet, email, IM, social networking sites, chat rooms, and
    documents (word, excel, PDF, etc)




                 Activity Features                     Setting Features           Privacy Features
                 ‣ “Smart” alerts                       ‣ Filter control           ‣ Private information
                 ‣ Blocked websites                     ‣ Banned sites             ‣ Protection From
                 ‣ Top programs                         ‣ Allowed sites               ‣ Sexting
                 ‣ Top visited websites                 ‣ Banned programs             ‣ Pedophiles
                                                        ‣ Custom “block”              ‣ Cyber bullying
                                                          messages                    ‣ Suicide talk
                                                                                      ‣ Gun talk
                                                                                      ‣ Drugs
Commercial
            Product

• Works on all carriers
• Easy to install using set up wizard
• 911 service always available
• Add/edit 1 to 100,000 employees
• Technical support provided
• Can be customized for client (select
  from no text - email - web browsing)

• Can be “white labeled” for your
  company and retail outlet
Pricing

Single device plan (one PC or smartphone): $9.99/m

Three device plan (any combination of 3 devices): $14.99/m

Family Plan (unlimited PCs and phones): $39.99/m
     ‣    First month FREE

     ‣    No signup or cancellation fees

     ‣    No contracts


CellSafety BIZ               Customized for each client
Additional information and links

Fox News interviews Manage Mobility (7/22/10)
http://video.foxbusiness.com/v/4291176/new-app-prevents-texting-while-driving/


Fox Dallas Andy Kahn interview
http://www.youtube.com/watch?v=BNaL2ydwZcs


WebSafety extends agreement with AAA
http://www.globenewswire.com/newsroom/news.html?d=212025


Dallas Cup Youth Soccer League endorses WebSafety
http://www.thestreet.com/story/10819163/dallas-cup-international-youth-soccer-tournament-endorses-
websafety8217s-suite-of-mobile-and-internet-safety-technologies.html
Contact



            Sean Graham
            678-905-4865
SGraham@CellPhoneSafetySolutions.com
  www.CellPhoneSafetySolutions.info

Contenu connexe

Tendances

Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devicesJ A Bhavsar
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMENNaval OPSEC
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Mattercaitystew
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Jisc
 
Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIRKelley Robinson
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
The internet---its not that innocent
The internet---its not that innocentThe internet---its not that innocent
The internet---its not that innocentEmily Thompson
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 

Tendances (20)

Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIR
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
The internet---its not that innocent
The internet---its not that innocentThe internet---its not that innocent
The internet---its not that innocent
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 

En vedette

Jp Overview
Jp OverviewJp Overview
Jp Overviewblock5
 
Transformational leadership ICTED 2012
Transformational leadership ICTED 2012Transformational leadership ICTED 2012
Transformational leadership ICTED 2012Elenita Que
 
Zagonetno Stubiste
Zagonetno StubisteZagonetno Stubiste
Zagonetno StubisteNela Krangle
 
Transformational leadership philippines 2012
Transformational leadership philippines 2012Transformational leadership philippines 2012
Transformational leadership philippines 2012Elenita Que
 

En vedette (6)

Finanzkrise
FinanzkriseFinanzkrise
Finanzkrise
 
Jp Overview
Jp OverviewJp Overview
Jp Overview
 
Hanging Mon
Hanging MonHanging Mon
Hanging Mon
 
Transformational leadership ICTED 2012
Transformational leadership ICTED 2012Transformational leadership ICTED 2012
Transformational leadership ICTED 2012
 
Zagonetno Stubiste
Zagonetno StubisteZagonetno Stubiste
Zagonetno Stubiste
 
Transformational leadership philippines 2012
Transformational leadership philippines 2012Transformational leadership philippines 2012
Transformational leadership philippines 2012
 

Similaire à Mobile and PC Child Protection Software Solutions

Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationGriffin LaFleur
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecNowSecure
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Content Watch - Company & Product Overview (Eng)
Content Watch - Company & Product Overview (Eng)Content Watch - Company & Product Overview (Eng)
Content Watch - Company & Product Overview (Eng)INSPIRIT BRASIL
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018NowSecure
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Deliveryiansadler
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 

Similaire à Mobile and PC Child Protection Software Solutions (20)

Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
 
MWC19 Presentation-Safepath
MWC19 Presentation-SafepathMWC19 Presentation-Safepath
MWC19 Presentation-Safepath
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
Pace IT - Secure Mobile Devices
Pace IT - Secure Mobile DevicesPace IT - Secure Mobile Devices
Pace IT - Secure Mobile Devices
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Content Watch - Company & Product Overview (Eng)
Content Watch - Company & Product Overview (Eng)Content Watch - Company & Product Overview (Eng)
Content Watch - Company & Product Overview (Eng)
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Delivery
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 

Mobile and PC Child Protection Software Solutions

  • 1. CellSafety and WebSafetyPC Mobile and PC Child Protection Software Applications
  • 2. Contents • WebSafety • Advisory Board • CellSafety • WebSafetyPC • CellSafety.biz • Pricing • Troubling Statistics • Additional information and links
  • 3. WebSafety WEBSAFETY, INC. ANNOUNCES FIRST-TO-MARKET AVAILABILITY OF ANTI-BULLYING SOFTWARE APPLICATION ON ANDROID TABLETS --Patent-pending Software Application Expands User-base Platform IRVING, TX February 7, 2011 (GLOBE NEWSWIRE) -- WebSafety, Inc. (OTCBB:WBSI), the leading provider of mobile and computer software solutions that help to prevent incidences of cyber-bullying as well as explicit or degrading texting, sexting issues and unlawful Internet behavior such as cyber predators today announced that it now supports two new Android tablets for the company’s patent-pending software application. “With compatibility on a total of 90 models of smartphones and now tablets powered by the Android, Blackberry and Symbian operating systems we believe the WebSafety software application is the most widely available, feature-rich product in our marketplace today,” stated Travis Bond, Chief Operating Officer. “Our software works on all of the major wireless carriers in the United States (AT&T, T-Mobile, Sprint and Verizon) as well as the three wireless networks in Canada (Bell Mobility, Rogers and Telus).” WebSafety's full suite of services including the “No Texting While Driving Features”are available starting at $9.99 month, with multi-tier and family pricing plans available. For additional information or to download the WebSafety software application, please visit www.websafety.com and click on the red "BUY NOW" button. About WebSafety, Inc. WebSafety, Inc. is the leading provider of mobile and computer software solutions that help to prevent incidences of distracted driving as well as unlawful Internet behavior such as cyber predators, explicit or degrading texting and cyber-bullying. The mobile software application works on the major wireless operating systems, including Android, Blackberry and Symbian and on all four of the major wireless carriers in United States and the three wireless networks in Canada. For more information, please visit WebSafety's corporate website: www.websafety.com For WebSafety investor relations material, including an executive summary and corporate presentation, please visit: http://ir.stockpr.com/ websafety/presentations Free research report on WebSafety issued by Harbinger Research is available in Acrobat format at: www.harbingerresearch.com CONTACT: Casson Media Group, Inc. for WebSafety, Inc. Mike Casson mike@cassonmediagroup.com
  • 6. Circle of Protection How Does It Actually Work? Install CellSafety & Child can take necessary WebSafetyPC in only steps to eliminate risky 1 minutes behavior with parental guidance and WebSafety monitoring - Employee can modify actions per 5 2 corporate guidelines - The apps monitor all inbound Employer is protected & outbound communication 360 degrees of for over 11,000 known from policy violations mobile & online keywords-also monitors speed protection & location 4 3 Parents/employers take action When nefarious activity is based on the incident information detected, the apps send “danger provided by the apps - alerts” via text (SMS) and email Administrator while also blocking text, email, can override system if desired/ and web browsing at speeds required above 10 mph
  • 7. ‣ Utilizes GPS Technology Disable texting, ‣ Triggered when going 10MPH emailing & web surfing ‣ Service restored within 3 minutes upon stopping ‣ Driver can make or receive calls while driving ‣ 911 access is available anytime ‣ Parental control available for passenger access Take a proactive approach to protecting your children ‣ Utilizes world’s largest word recognition library of 11,000+ key words, phrases & Net Lingo against cyber bullying and ‣ Monitors 100% of incoming and outgoing text and web browsing activity for drug, gun & suicide talk, cyber bullying, pornography, other mobile dangers sexting & more ‣ Sends parental “danger alerts” via text message and detailed email complete with offending party’s mobile number and/or IP address ‣ Set “virtual fences” for place and time ‣ Create “safe lists” for family & friends ‣ Where RU feature locates phone from any web browser 30 days FREE ✧ No contracts ✧ No sign up/cancellation fees ✧ $9.99 - $14.99 ✧ Family Plan unlimited $39.99
  • 8. Take a proactive approach to protecting ‣ Monitors 100% of incoming and outgoing information from child’s PC your children against ‣ Blocks pornography before it can be viewed ‣ Sends instant Danger Alerts to parents cell phone and email account cyber bullying and other ‣ with details of potential threat Translates Net Lingo into understandable language for parents mobile dangers ‣ The only PC application that actively scans and monitors all of the following: Internet, email, IM, social networking sites, chat rooms, and documents (word, excel, PDF, etc) Activity Features Setting Features Privacy Features ‣ “Smart” alerts ‣ Filter control ‣ Private information ‣ Blocked websites ‣ Banned sites ‣ Protection From ‣ Top programs ‣ Allowed sites ‣ Sexting ‣ Top visited websites ‣ Banned programs ‣ Pedophiles ‣ Custom “block” ‣ Cyber bullying messages ‣ Suicide talk ‣ Gun talk ‣ Drugs
  • 9. Commercial Product • Works on all carriers • Easy to install using set up wizard • 911 service always available • Add/edit 1 to 100,000 employees • Technical support provided • Can be customized for client (select from no text - email - web browsing) • Can be “white labeled” for your company and retail outlet
  • 10. Pricing Single device plan (one PC or smartphone): $9.99/m Three device plan (any combination of 3 devices): $14.99/m Family Plan (unlimited PCs and phones): $39.99/m ‣ First month FREE ‣ No signup or cancellation fees ‣ No contracts CellSafety BIZ Customized for each client
  • 11.
  • 12.
  • 13. Additional information and links Fox News interviews Manage Mobility (7/22/10) http://video.foxbusiness.com/v/4291176/new-app-prevents-texting-while-driving/ Fox Dallas Andy Kahn interview http://www.youtube.com/watch?v=BNaL2ydwZcs WebSafety extends agreement with AAA http://www.globenewswire.com/newsroom/news.html?d=212025 Dallas Cup Youth Soccer League endorses WebSafety http://www.thestreet.com/story/10819163/dallas-cup-international-youth-soccer-tournament-endorses- websafety8217s-suite-of-mobile-and-internet-safety-technologies.html
  • 14. Contact Sean Graham 678-905-4865 SGraham@CellPhoneSafetySolutions.com www.CellPhoneSafetySolutions.info