How to Take Back Control of Your Kids’ Devices

You may have your device access sorted in the classroom, but feel like you have lost control of the devices in your household or know parents who feel this way. Here are some tricks that gave me back control of the devices in my home and restored my sanity.

Step-by-Step Instructions

The type of devices you have in your household will dictate how you set up controls for your children or the entire house. 

Apple devices may be more expensive, but they do offer parents a lot more control. Most other devices can be controlled through your internet system settings.

Apple iPad/iPhone

Most people set these up for their children using their own Apple ID. However, the easier way to do this which is better, in the long run, is to set up a Family Sharing account. 

I stumbled onto this handy trick during one of the 2021 lockdowns and the instant control I took back from the constant iPad drain was amazing! Setting up this way does take a little bit of time, but it’s worth it.

How to set up a Family Sharing account on your own Apple device:

1 Go to Settings 

2 Click on your name which will take you to your Apple ID information

3 Click on Family Sharing

4 Follow these instructions and create an Apple ID for each of your children.

Once each of your children has their Apple ID, then use it as the main Apple ID for each device. They will feel in control of their device, but secretly, you have more!

5 Add limits and controls to your children’s devices by going to Settings > Screentime

6 Click on each of your children’s names to make personalised rules for each Apple ID. These rules can be easily changed as and when it’s needed.

The controls you will now have over your child’s iPhone or iPad include:

Setting a Downtime; schedules when the devices can be used so during the hours you schedule, the apps will not be able to be opened unless you add them to the Always Allowed apps. I used this to turn off the apps at shower time to stop my kids from getting up early and going straight onto games before the sun rises.

Creating App Limits; time limits are set for certain apps or bulk app types like games. I set an hour limit on gaming per day and once it is up, my kids are locked out of those apps and have to ask for more time, which I can deny or approve for a set time.

Managing Communication Limits; allows you to see and accept the contacts for your children. You can be in control of all contacts or allow them to control these as they get older.

Setting the Always Allowed Apps; these are the apps that can be always accessed even when the Downtime is enabled. I have enabled messaging, phone calls and maps for my children as safety measures, and I add a couple of apps to this list during the school holidays, which are then removed again during term time.

Content & Privacy Restrictions; this is where you can set rules around how they use the device. You can apply rules to App Store purchases, the Apple Apps they are allowed, location sharing settings, passcode and account changes, Background app activities, and a few more essential services. This gives you control over what they can do and put on the device.

Setting a Screentime Password; this is a passcode for you to access the Screentime settings and can be different from your phone passcode. It also can be used on children’s devices to allow more time so make sure it is one that only you know. I have set this separately from my phone passcode as my kids know my phone passcode in case of emergency. 

Another great setting to control is which apps they can purchase on the App Store. Go to Settings > Apple ID (click your name) > Family Sharing > Ask to Buy and turn it on for each child.  

With this on, each time my children want to download an app, they have to ask first and I get a notification on my phone to accept or deny this. This has been amazing for stopping my youngest from loading his iPad with useless apps.

Internet Control Apps 

Internet control applications can be the best way to keep control of the internet flow throughout your home. The first step is to log in to your internet service provider’s router if you haven’t already. Instructions to do this should be in or on the box or your ISP website. 

Most router logins will allow you to change the password on the WiFi access and the name you call your home WiFi. Many also allow you to see the devices that are connected to the internet and you can manage or remove these from here. This is great for when your teenager is grounded and you don’t want them to have WiFi access. Some systems will also let you set times when the internet is available for certain devices.

The next steps from here do require a bit of investment. Upgrading to a Mesh system not only gives you greater internet coverage but most come with a handy app that you can track the usage of your household internet. Some of these are Deco, Nest, Orbi, and Ero, to name a few. 

I have an Orbi system in my home and can turn individual devices’ internet off with the swipe of my finger on my phone. Additionally, you can add parental apps to some of these systems to give you even more control over your kid’s devices, but these do come with the extra cost of a monthly subscription. It is worth spending the time to look at what will work for your home. 

Another way to add parental control without upgrading the whole system is to use a parental control product like Intego, FamilyZone, Norton Parental Controls, MSpy, Kaspersky, or BullGuard, to name a few. These are subscription products that allow you to manage the activity of your children on the internet and set limits.

A little bit of time now looking for the best options for your home will give you peace of mind later.

Messenger Kids

For those of you who are not yet up with this, Messenger has created a kids’ version, Messenger Kids that can be monitored by parents. Follow the instructions here to set this up for your children through your Facebook account. 

Messenger Kids has extra controls around sharing photos and links, setting time limits, seeing and approving the contacts of your children, seeing the number of messages they are sending, and seeing every photo posted to or from your children. Because it is linked to your Facebook account, you get a message each time your child changes major settings or adds new contacts. My 10 year old loves being able to contact his friends that have moved to other schools.

Remember, you don’t need to be a tech wizard to keep control of your kids’ devices, you just need to have the right tools and information. 

Discover more about how to use the iPad effectively with our Getting started with iPad Learn on Demand course.

Related Post

The right ways to enable AI at work – Tips for IT Lead

In today’s fast-paced workplace, maximizing efficiency while minimizing time spent on repetitive tasks is crucial. However, many staff members may feel unsure about integrating AI effectively, leading to missed productivity opportunities. As the IT lead, you can guide your team in harnessing AI’s power to streamline operations and save time. By providing clear guidance and

VIEW POST

Apple for Business: from Survive to Thrive series

Unveiling Apple’s Hidden AI: The Power of On-Device Machine Learning In an era dominated by data, information, and images, the ability to efficiently navigate through vast digital libraries is paramount. Apple, known for its innovation in both hardware and software, has quietly introduced a game-changing feature in its Photos app, harnessing the prowess of artificial

VIEW POST

How well do you use the
Apple Apps Google Workspace Microsoft 365
tools in your workplace?

Find out if you’re working with the tools OR if you’ve got the
tools working for you.

What Industry Are You In?

Using Apple Apps, Google Workspace or Microsoft 365?

What Type of user are you?

🫣 Entry User | 🤹 Skilled User | 👑 Elite User

Take the quiz to find out. 

Privacy Policy

Using Technology Better Privacy Commitment

Introduction

We hold the privacy of your personal information in the highest regard.

Using Technology Better regards customer privacy as an important part of our relationship with our customers. The following privacy policy applies to all Using Technology Better users, and conforms to Internet privacy standards.

This policy will be continuously assessed against new technologies, business practices and our customers’ needs.

If you have questions or concerns regarding this statement, you should first contact the support team on our Contact Us Page.

Collection of Information

In order to use the Using Technology Better website, we may require information from you in order to provide the best service possible.

All correspondence may also be collected and stored, particularly in regard to sales, support and accounts, including Email.

Any information collected by Using Technology Better is collected via correspondence from you or your company. This may be via the telephone, Email, mail, fax or directly through our website.

Visitors and customers of japan.usingtechnologybetter.com will have their information shared back to DAIWABO INFORMATION SYSTEM CO., LTD. and DIS Service & Solution Co., Ltd.

Use of Collection Information

Any details collected from Using Technology Better customers is required in order to provide you with our

products and/or services, and a high level of customer service.

Correspondence is recorded in order to provide service references, and to assist in our staff development.

Web Site Use Information

Similar to other commercial Web sites, our Web sites utilize a standard technology called “cookies” (see explanation below, “What Are Cookies?”) and web server log files to collect information about how our Web site is used.

Information gathered through cookies and Web server logs may include the date and time of visits, the pages viewed, time spent at our Web site, and the Web sites visited just before and just after our Web site.

Storage of Collected Information

The security of your personal information is important to us. When you enter sensitive information (such as credit card numbers) on our website, we encrypt that information using secure socket layer technology (SSL).

When Credit Card details are collected, we simply pass them on in order to be processed as required. We never permanently store complete Credit Card details.

We follow generally accepted industry standards to protect the personal information submitted to us, both during transmission and once we receive it.

If you have any questions about security on our Website, you can email us at <ContactEmail>.

Access to Collected Information

If your personally identifiable information changes, or if you no longer desire our service, you may correct, update, delete or deactivate it by emailing us at <ContactEmail>.

Orders

If you purchase a product or service from us, we may request certain personally identifiable information from you.

You may be required to provide contact information such as:

Name

Email

Postal address

Your school or organisation

Financial information (such as credit card number, expiration date, name on card, card billing address).

We use this information for billing purposes and to fill your orders. If we have trouble processing an order, we will use this information to contact you.

Communications

Using Technology Better uses personally identifiable information for essential communications, such as

Emails

Accounts information

Critical service details.

We may also use this information for other purposes, including some promotional Emails.

If at any time a customer wishes not to receive such correspondence, they can request to be removed from any mailing lists by contacting support.

You will be notified when your personal information is collected by any third party that is not our agent/service provider, so you can make an informed choice as to whether or not to share your information with that party.

Third Parties

Using Technology Better may at its discretion use other third parties to provide essential services on our site or for our business processes.

We may share your details as necessary for the third party to provide that service.

These third parties are prohibited from using your personally identifiable information for any other purpose.

Using Technology Better does not share any information with third parties for any unknown or unrelated uses.

What Are Cookies?

A cookie is a very small text document, which often includes an anonymous unique identifier. When you visit a Web site, that site’s computer asks your computer for permission to store this file in a part of your hard drive specifically designated for cookies.

Each Web site can send its own cookie to your browser if your browser’s preferences allow it, but (to protect your privacy) your browser only permits a Web site to access the cookies it has already sent to you, not the cookies sent to you by other sites.

Browsers are usually set to accept cookies. However, if you would prefer not to receive cookies, you may alter the configuration of your browser to refuse cookies.

If you choose to have your browser refuse cookies, it is possible that some areas of our site will not function as effectively when viewed by the users.

A cookie cannot retrieve any other data from your hard drive or pass on computer viruses.

How Do We Use Information We Collect from Cookies?

As you visit and browse our Web site, the site uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security.

Cookies, in conjunction with our Web server’s log files, allow us to calculate the aggregate number of people visiting our Web site and which parts of the site are most popular. This helps us gather feedback to constantly improve our Web site and better serve our clients.

Cookies do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.

Legal

We reserve the right to disclose your personally identifiable information as required by law and when we believe that disclosure is necessary to protect our rights and/or comply with a judicial proceeding, court order, or legal process served on our Website.

Links

Links on the Using Technology Better site to external entities are not covered within this policy. The terms and conditions set out in this privacy statement only cover the domain name of usingtechnologybetter.com

Changes to Privacy Policy

If we decide to change our privacy policy, we will post those changes to this privacy statement, and other places we deem appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.

We reserve the right to modify this privacy statement at any time, so please review it periodically. If we make material changes to this policy, we will not use the personal information you have submitted to us under this Privacy Policy in a manner that is materially inconsistent with this Privacy Policy, without your prior consent

Delivery Policy

Most goods are digitally delivered instantly via email.  Our services may be delivered either via an online medium or live in person.

For our online delivery see below.  For services delivered live onsite, please refer to our speaker agreement form which is emailed to you on confirmation of booking.

Refund Policy

We do not offer refunds or returns unless we cannot supply goods or services or the goods or services are not delivered as promised.

Australian law is the governing body for all work, goods and services supplied by Using Technology Better.

Marketing Release

Using Technology Better (UTB) may film, record, and photograph me (the results of which are the “Recordings”). UTB may also incorporate into any production(s) any separate content (e.g., quotes, testimonials, biographical information, profiles, photos, videos, sound recordings, artwork, etc.) I provide to UTB or approve in writing (“Materials”).

1.License

I grant to UTB an irrevocable, perpetual, worldwide, royalty-free license to, in its sole discretion, (i) edit, translate, and modify the Recordings and the Materials, (ii) attribute the Recordings and Materials to me by my name, age, and city and state of residence, (iii) incorporate the Recordings and the Materials into content to promote UTB, its programs, or products (“Content”), and (iv) publicly use, distribute, reproduce, create derivative works from, and perform/display the Content, and any excerpts thereof, in any language.

2. No Compensation.

I grant this permission without any financial or other obligation of any nature.

 

For any issues or concerns please contact us