POSH
Device Safety
Start with the device in your child’s hand.
Lock the device first, then the apps, games, and platforms on it.
DEVICE SAFETY HUB
App Installs
Permissions
Downtime
First Safety Layer
Device first. Everything else second.
OPEN DEVICE = OPEN ACCESS
Most parents start with the app or game because that is what the child talks about most.
The stronger move is usually to secure the device first.
If the device is open, installs are easier, privacy settings are easier to change, and risky apps are easier to hide.
The device is the first safety layer.
The safer the phone, tablet, or computer is, the stronger every other safety setting becomes.
How to use this page:
Pick your child’s main device first, lock installs and permissions, then move into apps, games, and platforms.
The stronger the device setup, the easier everything else becomes.
Why devices come first
If the device is open, everything on it is easier to access.
Parental controls, install restrictions, content filters, permissions, and passcodes should be the first safety layer.
Once the device is properly locked down, apps, games, messaging, and social platforms become easier to manage safely.
Device first = stronger protection everywhere else
Child safety first:
A safer phone, tablet, or computer reduces risk across games, social apps, browsers, livestreams, private chats, downloads, and hidden accounts.
Which situation fits best right now?
You do not need to fix everything today. Lock the biggest access points first.
Choose your child’s device
Different devices have different settings, risks, and control systems.
Start with the device your child uses most, not the one you think matters most.
What to lock on every device
- App installs and purchases — stop children adding risky apps or spending without approval
- Screen time and downtime — create structure around when the device can be used
- Web filters and content limits — reduce easy access to mature or harmful material
- Camera, microphone, and location permissions — limit hidden exposure points
- Parent-controlled passcode — stop safety settings being changed back
- Account switching and new accounts — reduce hidden profiles and workarounds
If a child can install apps freely, change privacy settings, hide accounts, or disable protections, the rest of your safety setup becomes much weaker.
Best setup order
Lock the device
↓
Restrict installs and permissions
↓
Lock the platform
↓
Lock the app or game
↓
Review regularly as your child grows
Device controls are strongest when paired with platform settings, house rules, and regular calm check-ins.
What parents often miss
- A child can have a “safe” app on an unsafe device
- Browsers can bypass app restrictions
- Permissions like camera, mic, and location create hidden exposure
- New apps often get installed after the main setup is finished
- Late-night use and secondary accounts usually start on the device
- One unlocked device can reopen risks across multiple apps at once
The device is where access begins — and where it should be controlled first.
What safer device structure looks like
Parents control settings
Safety settings, passcodes, purchase approvals, and permissions are controlled by the parent, not the child.
App installs are restricted
New apps, games, and browser-based workarounds are harder to add without approval.
Use happens in structure
Downtime, shared charging rules, and calmer device routines reduce secrecy and late-night risk.
Reviews happen regularly
Settings, permissions, accounts, and recent app changes are checked before problems deepen quietly.
Warning signs to watch for
- Frequent app switching when you walk in
- Hidden apps, folders, or accounts
- Late-night or private device use
- Defensiveness about screen time or activity
- More secrecy or behaviour changes around the device
- Deleted messages, disabled notifications, or second accounts
- Strong emotional reactions when asked simple device questions
Behaviour changes often show the problem before the settings do.
Best next safety pathways
Device safety works best when it leads into platform safety, app safety, and clearer house rules.
Important reminder
Most online risk starts with access.
Devices control access.
The device is not the whole safety system, but it is the layer that supports everything else.
Locking the device first makes every other safety step stronger