A commitment to safe internet use
We constantly review apps and changes to existing apps and usage to determine what is allowed or not. We are also guided by leading eSafety and Cyber policy makers, advisors and general industry experts.

Age based
These apps, sites and functions are blocked for various age groups across device types.
Roblox
Experience the fusion of imagination and expertise with Études Architectural Solutions.
KIK
It allows strangers to chat to each other via a “meet new people” feature.
SnapChat
Identified as problematic for developing minds and noted risks of ‘disappearing messages’ creating a false sense of privacy as they can be saved/recorded.
Identified as problematic for developing minds with algorithms designed to keep people scrolling despite content. Also known to present fake sense of reality and curated profiles leading to comparison and low self-esteem.
Messenger
Browser embedded allows linking off to Facebook Reels and YouTube.
YouTube Shorts, Instagram Reels and Facebook Reels
Doomscrolling and algorithms again designed for dopamine rather than education or real social connection.
Adult Sites
We use global providers that constantly update their databases of adult sites which are blocked. This is managed at the device level so no browser or app work around is possible.
Flagged Malware Sites
We use global providers that constantly update their databases of risky and known malware sites which are blocked. This is managed at the device level so no browser or app work around is possible.
AI
We monitor the evolution of AI and the ethics and controls in place behind the providers. AI allowed to create deepfakes for example is blocked and known ethical AIs allowed.
Javascript
An older web development language not widely used nor required. Due to its risk it is blocked for lower age groups until they develop more cyber awareness.
Autofill
Browsers that capture, store and autofill your personal data place your privacy at risk. We turn off autofill for the younger ages to avoid risk of personal information being stolen or shared accidentally.
Cookies
A general privacy risk in terms of tracking and building profiles. This again is turned off for the younger users which may prevent some websites but protects privacy.
In Private Browsing
A common work around for the tech savvy teen. In-Private browsing can bypass other apps and plugins pretty easily. We just disable the ability so young people are required to use profiles and if they log out then tougher lockdowns are defaulted until they log back in.
Flash
Another old web technology very rarely used. It is path used for malware and as such has been disabled.
Developer Tools and Mode
Another avenue for the tech savvy youth. Developer Tools and Modes in browsers and systems open up tools that allow users to bypass or change browser settings and blocks commonly put in place by schools for example. They just don’t have access with us.
Safe mode
Another method to bypass security and privacy controls for the most dedicated. Safe mode switches off a lot of layers in Windows when something is going wrong. This can allow disabling of a lot of the controls and protections provided.
USB Drives
Plugging in random USB drives or drives with viruses is still a very common exploit. These days getting files on and off, or shared is easy via the web so this vulnerability is shutoff with low impact to users.
Public WIFI
WIFI spoofing or connecting to public WIFI routers is another high risk and popular exploit for modern devices to steal data or install malware. We disable the feature for young people until they are more tech savvy on the risks.
VPNs
The newest and perhaps most common work around for pretty much all the ‘social media delays’, country-based website restrictions and general backdoor for young people to get access to places we really don’t want them to be. They can’t create or use VPNs with us.
Bluetooth Data Transfers
Less common and probably not going to be missed by most people, you can connect and transfer files via bluetooth. Like USB it just opens up another non-essential vulnerability to pick-up malware or viruses.
Tethering (USB / Bluetooth)
Not as common but still possible, tethering is like using a phone as a hotspot but it’s done via USB cable or Bluetooth. We turn this off in younger profiles so they join known WIFI networks or use 4G/5G built into the device.
Calls, MMS and SMS
In our younger profiles we find there is no need for actual phone calls, MMS and SMS. Trusted apps on the device with defined contacts are the safer way to go to avoid hoax and scam callers.
Modifying Date/Time
When using parental apps or apps that utilise date/time then being able to change it from the actual date/time can be an effective work around. Devices will update themselves based on internet clocks and mobile networks.
Stopping System Apps
Killing the apps that are protecting the users and device is another easy work around which we block.
HotSpotting / Internet Sharing
For the younger profiles we have this turned off to avoid young people picking up new devices and piggy backing them onto the safe and secure devices. It also help manage uncontrolled data use and the social pressure of sharing data with peers.
Application Installs
We start with known application lists and move up to ‘store apps only’ before unrestricted access based on age. Known application lists are curated based on age and store apps provide some freedom while keeping the protection of Store published apps.