SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
THE BACK TO SCHOOL
SMARTPHONE GUIDE
By Lookout, Inc.
IT’S THE START OF A
NEW SCHOOL YEAR
While you probably
have backpacks and
lunches covered,
sending your kid to
school with a smartphone
is a trickier matter.
HOW DO YOU
KNOW WHEN
THEY’RE READY?
ASK YOURSELF
THESE QUESTIONS:
1
Does your child need the phone
to stay connected with you or for
emergency situations?
2
Does your child understand and
respect the time and usage limits
you have placed on other things
like television and video games?
3
Does your child understand what
types of apps are okay to download
and how to surf the Internet safely?
4
Does your child know how to use
the phone safely and appropriately?
!
Do they know whom and whom not to
communicate with? What they should and
shouldn’t share online? What sorts of words
and pictures NOT to send?
According to a previous Lookout study, parents are split on the issue:
22% of parents think
age 10 is the most
appropriate age
14% think 13 is the most
appropriate age
14% think 16 is the most
appropriate age
 Tweet @Lookout
#PhoneAt10 #PhoneAt13 #PhoneAt16
What age do you think is appropriate?
If you decide a smartphone is
right for your family, keep your
children safe with these tips:
****
This is your first line of defense against
unwanted prying eyes. The last thing you want
is a thief getting a hold of your kid’s personal
photos, texts, and emails.
SET A PASSCODE

With all the new apps kids hear about from their
peers, it’s important to check privacy settings and
have a malware scanning app before your child
downloads anything to your phone.
DOWNLOAD CONFIDENTLY

Once you connect to an unprotected network,
anyone using that network can see your data. When
using public WiFi, advise your child to avoid making
online purchases or providing personal info.
BE SMART IN PUBLIC

1 in10 smartphone owners fall victim to phone theft
and 2 in 5 of these people have their phone stolen
out of a personal belonging like backpacks or
messenger bags. Remind your child to keep their
school bag with them at all times and close zippers
when going to and from classrooms.
WATCH FOR PICKPOCKETS
Lookout’s Theft Alerts feature will automatically
alert you when your child’s phone may have been
stolen and email you a photo of the thief, allowing
you to alert teachers and administrators right away
as to who might have taken the device.
TO CATCH A THIEF,
TAKE A THEFTIE
For more mobile security tips, follow

Contenu connexe

Tendances

Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017Scott Burnett
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Scott Burnett
 
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee_UK
 
How to find stolen laptop
How to find stolen laptopHow to find stolen laptop
How to find stolen laptopsellalaptop.com
 
how to catch a cheater app for android
how to catch a cheater app for androidhow to catch a cheater app for android
how to catch a cheater app for androidSally_Savard
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 nFatimaAmin26
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersNetLockSmith
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2FatimaAmin26
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentationscriptalias
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupScott Burnett
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet Lingua Net
 
5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone AddictionHowtonia
 

Tendances (19)

Computer safety
Computer safetyComputer safety
Computer safety
 
Final project CTS 125-800
Final project CTS 125-800Final project CTS 125-800
Final project CTS 125-800
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
 
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalistsMcAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
McAfee - Bletchley Park Trust 'Design a Cyber Superhero' competition finalists
 
How to find stolen laptop
How to find stolen laptopHow to find stolen laptop
How to find stolen laptop
 
how to catch a cheater app for android
how to catch a cheater app for androidhow to catch a cheater app for android
how to catch a cheater app for android
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2
 
Olive Branch 2017
Olive Branch 2017Olive Branch 2017
Olive Branch 2017
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentation
 
Freedom of Speech
Freedom of Speech Freedom of Speech
Freedom of Speech
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet
 
5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction5 Ways to Reduce Smartphone Addiction
5 Ways to Reduce Smartphone Addiction
 

En vedette

3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol PresentationAkhil Agrawal
 
9 password security
9   password security9   password security
9 password securitydrewz lin
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and YouChris Stone
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorAllan Denot
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Mobile Learning Ideas and Options
Mobile Learning Ideas and OptionsMobile Learning Ideas and Options
Mobile Learning Ideas and OptionsJongpil Cheon
 
Smartphone industry analysis
Smartphone industry analysisSmartphone industry analysis
Smartphone industry analysisRishi Banshiwal
 

En vedette (18)

3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol Presentation
 
9 password security
9   password security9   password security
9 password security
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systems
 
Windows operating systems
Windows operating systemsWindows operating systems
Windows operating systems
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and You
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google Authenticator
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Mobile Learning Ideas and Options
Mobile Learning Ideas and OptionsMobile Learning Ideas and Options
Mobile Learning Ideas and Options
 
Smartphone industry analysis
Smartphone industry analysisSmartphone industry analysis
Smartphone industry analysis
 
GSM fundamentals (Huawei)
GSM fundamentals (Huawei)GSM fundamentals (Huawei)
GSM fundamentals (Huawei)
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similaire à The Back to School Smartphone Guide

Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 
Fall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentationFall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentationRuth Doering
 
Educ 320 standard 1
Educ 320 standard 1Educ 320 standard 1
Educ 320 standard 1jscott615
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyTeenSafe
 
Mobile Phone Safety Guide for Parents
Mobile Phone Safety Guide for ParentsMobile Phone Safety Guide for Parents
Mobile Phone Safety Guide for Parentsmobilephonesafety
 
Mobile Phones Safety Guide for Parents [eBook]
Mobile Phones Safety Guide for Parents [eBook]Mobile Phones Safety Guide for Parents [eBook]
Mobile Phones Safety Guide for Parents [eBook]Family Orbit
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from VodaphoneKatherine Lyddon
 
Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Selva Orejón
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.Your eKavach
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their educationngarcia0620
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their educationatapia1044
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their educationatapia1044
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital ParentYour eKavach
 

Similaire à The Back to School Smartphone Guide (20)

Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Fall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentationFall 2017 digital safety savvy parent meeting presentation
Fall 2017 digital safety savvy parent meeting presentation
 
Educ 320 standard 1
Educ 320 standard 1Educ 320 standard 1
Educ 320 standard 1
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
 
Mobile Phone Safety Guide for Parents
Mobile Phone Safety Guide for ParentsMobile Phone Safety Guide for Parents
Mobile Phone Safety Guide for Parents
 
Mobile Phones Safety Guide for Parents [eBook]
Mobile Phones Safety Guide for Parents [eBook]Mobile Phones Safety Guide for Parents [eBook]
Mobile Phones Safety Guide for Parents [eBook]
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Smartphone Safety - tips for parents
Smartphone Safety - tips for parentsSmartphone Safety - tips for parents
Smartphone Safety - tips for parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
 
Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol: Guia de ciberseguridad para menores de Europol:
Guia de ciberseguridad para menores de Europol:
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their education
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their education
 
Do cell phones distract students from their education
Do cell phones distract students from their educationDo cell phones distract students from their education
Do cell phones distract students from their education
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent
 

Plus de Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise ProductsLookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for GoodLookout
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon ladyLookout
 
Dragon Lady
Dragon LadyDragon Lady
Dragon LadyLookout
 
History of Lookout
History of LookoutHistory of Lookout
History of LookoutLookout
 

Plus de Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

The Back to School Smartphone Guide

  • 1. THE BACK TO SCHOOL SMARTPHONE GUIDE By Lookout, Inc.
  • 2. IT’S THE START OF A NEW SCHOOL YEAR
  • 3. While you probably have backpacks and lunches covered, sending your kid to school with a smartphone is a trickier matter.
  • 4. HOW DO YOU KNOW WHEN THEY’RE READY?
  • 6. 1 Does your child need the phone to stay connected with you or for emergency situations?
  • 7. 2 Does your child understand and respect the time and usage limits you have placed on other things like television and video games?
  • 8. 3 Does your child understand what types of apps are okay to download and how to surf the Internet safely?
  • 9. 4 Does your child know how to use the phone safely and appropriately? ! Do they know whom and whom not to communicate with? What they should and shouldn’t share online? What sorts of words and pictures NOT to send?
  • 10. According to a previous Lookout study, parents are split on the issue: 22% of parents think age 10 is the most appropriate age 14% think 13 is the most appropriate age 14% think 16 is the most appropriate age  Tweet @Lookout #PhoneAt10 #PhoneAt13 #PhoneAt16 What age do you think is appropriate?
  • 11. If you decide a smartphone is right for your family, keep your children safe with these tips:
  • 12. **** This is your first line of defense against unwanted prying eyes. The last thing you want is a thief getting a hold of your kid’s personal photos, texts, and emails. SET A PASSCODE
  • 13.  With all the new apps kids hear about from their peers, it’s important to check privacy settings and have a malware scanning app before your child downloads anything to your phone. DOWNLOAD CONFIDENTLY
  • 14.  Once you connect to an unprotected network, anyone using that network can see your data. When using public WiFi, advise your child to avoid making online purchases or providing personal info. BE SMART IN PUBLIC
  • 15.  1 in10 smartphone owners fall victim to phone theft and 2 in 5 of these people have their phone stolen out of a personal belonging like backpacks or messenger bags. Remind your child to keep their school bag with them at all times and close zippers when going to and from classrooms. WATCH FOR PICKPOCKETS
  • 16. Lookout’s Theft Alerts feature will automatically alert you when your child’s phone may have been stolen and email you a photo of the thief, allowing you to alert teachers and administrators right away as to who might have taken the device. TO CATCH A THIEF, TAKE A THEFTIE
  • 17. For more mobile security tips, follow