Best app to monitor teenager's iPhone activity?

Posted on 2014-07-15
Medium Priority
Last Modified: 2014-11-04
I have a parent who is dealing with a bullying problem. Their kid is being bullied by another via text / Snapchat, etc...

They have asked me if I know of any monitoring software (app) for the iPhone that will grab all the texts, emails, and other communication from their kid's phone and send it to them.

They essentially want this:

But for the iPhone so they can deal with the bully and the bully's parents.

Does such an app exist?

Regarding privacy concerns: The phone in question is owned by the parent who asked. The child is still a minor.
Question by:DrDamnit

Assisted Solution

by:Tyler Verkade
Tyler Verkade earned 100 total points
ID: 40197270
I know that Teensafe is one that I've heard quite a bit about, you can find that here: http://www.teensafe.com/
LVL 12

Accepted Solution

KRUNAL TAILOR earned 1800 total points
ID: 40198369
LVL 17

Assisted Solution

by:Sikhumbuzo Ntsada
Sikhumbuzo Ntsada earned 100 total points
ID: 40198599
Have a look at covenant eyes as well.
LVL 32

Author Comment

ID: 40199029
Had anyone had experience with any of these..  Looking for recommendations based on experience....

Expert Comment

by:Ariel Pena
ID: 40421944
I have used phone sheriff both on a personal and a professional corporate environment.  look at "http://www.phonesheriff.com/parental.html

It allows you to block numbers from texting your kids device and much more features. You also will get a log of all incoming and outgoing text, in case that you decide to escalate it to the authorities.

Featured Post

Become a Leader in Data Analytics

Gain the power to turn raw data into better business decisions and outcomes in your industry. Transform your career future by earning your MS in Data Analytics. WGU’s MSDA program curriculum features IT certifications from Oracle and SAS.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question