• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    cyber-enabled cargo theft

    FBI Warns of Surge in Cyber-Enabled Cargo Theft Targeting Logistics Firms

    RightsCon 2026

    Global Rights Event Scrapped in Zambia Amid Sudden Government Decision

    vulnerability patch wave

    NCSC Warns Organisations to Act Fast as Hidden Software Flaws Surface

    ChipSoft cyberattack

    Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    CVE-2026-41940

    CVE-2026-41940: Critical cPanel Authentication Bypass Exposes Hosting Systems

    Operation Tri-Force Sentinel

    Dubai Police Smash International Scam Empire in Massive FBI and China-Led Operation

    IOCTA 2026 report

    IOCTA 2026 Report Warns of Rising AI-Driven Cybercrime and Dark Web Threats

    Hutt City Council phishing attack

    Hutt City Council Confirms Phishing Attack, Data of Hundreds Potentially Exposed

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    vulnerability patch wave

    NCSC Warns Organisations to Act Fast as Hidden Software Flaws Surface

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    UAC-0247, CERT-UA, Ukrainian IP Addresses, IP Addresses, Digital Assets, Russia, Ukraine

    Ukraine Warns of Surge in Cyberattacks on Hospitals, Local Governments by UAC-0247 Hackers

    Goldman Sachs, AI Risks, AI-driven Risks, Mythos, Anthropic, David Solomon

    Goldman Sachs ‘Hyperaware’ of AI Risks; Working with Anthropic on Mythos

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    cyber-enabled cargo theft

    FBI Warns of Surge in Cyber-Enabled Cargo Theft Targeting Logistics Firms

    RightsCon 2026

    Global Rights Event Scrapped in Zambia Amid Sudden Government Decision

    vulnerability patch wave

    NCSC Warns Organisations to Act Fast as Hidden Software Flaws Surface

    ChipSoft cyberattack

    Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    CVE-2026-41940

    CVE-2026-41940: Critical cPanel Authentication Bypass Exposes Hosting Systems

    Operation Tri-Force Sentinel

    Dubai Police Smash International Scam Empire in Massive FBI and China-Led Operation

    IOCTA 2026 report

    IOCTA 2026 Report Warns of Rising AI-Driven Cybercrime and Dark Web Threats

    Hutt City Council phishing attack

    Hutt City Council Confirms Phishing Attack, Data of Hundreds Potentially Exposed

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    vulnerability patch wave

    NCSC Warns Organisations to Act Fast as Hidden Software Flaws Surface

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    UAC-0247, CERT-UA, Ukrainian IP Addresses, IP Addresses, Digital Assets, Russia, Ukraine

    Ukraine Warns of Surge in Cyberattacks on Hospitals, Local Governments by UAC-0247 Hackers

    Goldman Sachs, AI Risks, AI-driven Risks, Mythos, Anthropic, David Solomon

    Goldman Sachs ‘Hyperaware’ of AI Risks; Working with Anthropic on Mythos

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cyber Essentials Policy Updates

Instagram Introduces ‘Teen Accounts’ with Enhanced Protections for Young Users

Mihir Bagwe by Mihir Bagwe
September 17, 2024
in Policy Updates, Compliance, Cyber Essentials, Cyber News, Firewall Daily, Governance
0
Teen Accounts, Instagram, Meta, Instagram Teen Accounts, Data Privacy
713
SHARES
4k
VIEWS
Share on LinkedInShare on Twitter

Instagram’s latest move to protect its younger audience takes shape with the introduction of “Teen Accounts.”

Starting today, teens under 16 will be placed into these accounts, which come with built-in protections. These safeguards limit who can contact them and control the content they see. Parents will need to grant permission for teens to adjust these settings, ensuring a safer digital experience for the next generation.

Instagram aims to reassure parents that their teens can explore the app without fear of inappropriate content or unsafe interactions.

Built-In Protections in ‘Teen Accounts’

The default settings in Instagram Teen Accounts address key concerns about online safety. With a private account setting, only approved followers can see a teen’s content, keeping unwanted contacts at bay. Teens can only receive direct messages from people they already follow. This ensures that they are not exposed to unsolicited messages, reducing the risk of harmful or predatory interactions, said Meta, which owns the popular image and short video sharing platform.

Sensitive content filters will also limit exposure to inappropriate material, such as violent or suggestive content. Instagram promises that the most restrictive content settings will be automatically applied, particularly in areas like Explore and Reels, which tend to surface trending posts.

Instagram is also turning on its “Hidden Words” feature by default for teens, filtering out offensive comments and direct messages. This anti-bullying measure helps protect teens from harmful language, allowing for a healthier interaction space.

report-ad-banner

Time Management and Parental Control

One of the central features of Instagram Teen Accounts is the focus on time management. Teens will get reminders to log off after 60 minutes of usage per day, and the app will enter “Sleep Mode” from 10 PM to 7 AM, muting notifications and sending auto-replies to any direct messages received during this period.

Stephen Almond, Executive Director Regulatory Risk said: “We welcome Instagram’s new protections for its younger users following our engagement with them. Our Children's code is clear that kids' accounts must be set as 'high privacy' by default, unless there is a compelling reason not to do so. We'll keep pushing where we think industry can go further, and take action where companies are not doing the right thing."
Parental Controls like time management are set as built-in features in Teen Accounts. (Source: Meta)

Parents will also have control over how much time their teens can spend on Instagram. Through the supervision feature, they can block access to the app during specific times, such as overnight or during school hours. These tools aim to help families set boundaries, ensuring teens’ online time remains balanced with their offline responsibilities.

Addressing Parents’ Concerns

Incorporating parental supervision is at the heart of this update. Parents of teens under 16 will need to approve any changes that make the protections less strict. For older teens, parents can choose whether or not to turn on the supervision feature. This allows parents to decide how involved they want to be in managing their teen’s Instagram experience.

“These updates to Instagram’s Teen Accounts offer a balanced approach, empowering parents with essential oversight,” said Lucy Thomas OAM, CEO & Co-Founder of Project Rockit. “In an ever-evolving online world, this update ensures that young people can engage meaningfully and safely, fostering positive connections while still providing the protection they need.”

Stephen Almond, Executive Director Regulatory Risk said: “We welcome Instagram’s new protections for its younger users following our engagement with them. Our Children's code is clear that kids' accounts must be set as 'high privacy' by default, unless there is a compelling reason not to do so. We'll keep pushing where we think industry can go further, and take action where companies are not doing the right thing."
Another example of Parental Controls in Teen Accounts. (Source: Meta)

Instagram’s changes come at a time when parents are increasingly concerned about how their children engage with social media. According to Dr. Megan Moreno, Co-Medical Director of the SAMHSA-Funded AAP Center of Excellence on Social Media and Youth Mental Health, the default safety and privacy settings are a step in the right direction. “We look forward to hearing from teens about their experience of these new Teen Accounts and associated features and settings,” she added.

Age Verification and Compliance

Teens lying about their age have been a persistent challenge for social media platforms. Instagram aims to tackle this issue by requiring age verification in more areas of the app. If a teen tries to sign up with an adult birthday, they will be required to verify their age. Instagram is also developing technology to identify accounts likely belonging to teens, even if their profile lists an adult age.

This proactive step aims to catch underage users and automatically place them into Teen Accounts, applying the same protections as those for younger teens. The company plans to start testing this new age-verification technology in the U.S. early next year.

Safe Content for Teens

The introduction of Teen Accounts also places a spotlight on the content teens can access. Instagram will apply its strictest content restrictions, limiting exposure to mature or inappropriate material. This includes content that promotes dangerous behaviors, like self-harm or cosmetic procedures.

By curating a safer feed, Instagram hopes to create a more positive and constructive environment for teens. The platform will continue to remove any content that violates its guidelines, and it aims to reduce the number of sensitive posts that teens may encounter, even from people they follow.

Instagram plans to automatically place teens into Teen Accounts over the next 60 days across key markets, including the U.S., UK, Canada, and Australia. European Union countries will see the rollout later this year, with a global rollout expected by January.

This update marks a significant shift in how the platform caters to its younger users. It also paves the way for similar protections across other Meta platforms in the future.

Industry Reactions

Meta’s new approach to teen safety has drawn praise from various sectors. The National PTA President, Yvonne Johnson, commended the move, saying it reflects Meta’s commitment to providing safer, age-appropriate experiences.

“With teens automatically placed in Teen Accounts and certain privacy settings turned on by default, this update demonstrates that Meta is taking steps to empower parents and deliver safer, more age-appropriate experiences on the platform,” Johnson said.

The UK data privacy watchdog shared a similar sentiment. Stephen Almond, Executive Director of Regulatory Risk, stated:

“We welcome Instagram’s new protections for its younger users following our engagement with them. Our Children’s code is clear that kids’ accounts must be set as ‘high privacy’ by default, unless there is a compelling reason not to do so. We’ll keep pushing where we think industry can go further, and take action where companies are not doing the right thing.”

Academic experts also weighed in, highlighting the importance of tailoring online experiences to teens’ developmental stages. Rachel Rodgers, Associate Professor of Applied Psychology at Northeastern University, praised Instagram’s age-specific protections. “Younger adolescents require additional safeguards, and Instagram is taking that into account with these updates,” Rodgers noted.

What’s Next for Teen Accounts?

As Instagram continues to develop and refine its Teen Accounts, the platform will gather feedback from both parents and teens to assess the effectiveness of these protections. The company is also set to roll out new features that offer even more oversight and customization for parents, including the ability to adjust settings directly to be more protective.

By combining built-in safeguards with options for parental control, Instagram aims to strike a balance between safety and exploration, fostering an environment where teens can engage meaningfully while staying protected.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: data privacyInstagramInstagram Teen AccountsMetaSocial MediaTeen AccountsThe Cyber ExpressThe Cyber Express News
Previous Post

UK Data Regulator Cracks Down on Sky Betting and Gaming’s Unlawful Cookie Practices

Next Post

Hezbollah’s Pager Explosions Trigger Questions of Similar Threat to Smartphones

Next Post
Hezbollah's Pager Explosions

Hezbollah's Pager Explosions Trigger Questions of Similar Threat to Smartphones

Sectoral Threat Reports

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

cyber-enabled cargo theft
Cyber News

FBI Warns of Surge in Cyber-Enabled Cargo Theft Targeting Logistics Firms

May 4, 2026
RightsCon 2026
Cyber News

Global Rights Event Scrapped in Zambia Amid Sudden Government Decision

May 4, 2026
vulnerability patch wave
Cyber Essentials

NCSC Warns Organisations to Act Fast as Hidden Software Flaws Surface

May 4, 2026
TCE weekly roundup cybersecurity news
Cyber News

The Cyber Express Weekly Roundup: Data Breaches, AI Risks, and Phishing Campaigns Dominate Cybersecurity Landscape

May 1, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information