Need to Limit How Much Your Kids Use Their Devices Use Screen Time in iOS 12

It’s a constant refrain in many homes—a kid clamoring to use an iPad or iPhone to play games, watch videos, or chat with friends. As a parent, you know too much screen time is bad, especially when it affects homework or family dinners. At the same time, an iOS device may be essential for communication and schoolwork.

In iOS 12, Apple introduced Screen Time, which shows how much time you spend on your own device, and helps you control your usage—see our recent article for details. But Screen Time also has parental controls. They’re best managed with Family Sharing from your own iOS device, so if you haven’t already done so, tap Settings > YourName > Set Up Family Sharing and follow the instructions. (You can also set up Screen Time directly on the child’s device—tap Use Screen Time Passcode to set a passcode that prevents the child from overriding limits.)

With Family Sharing set up, go to Settings > Screen Time and notice your children’s names in the new Family section. Tap a child’s name to set Screen Time limitations and restrictions on their iOS devices. Initially, Screen Time walks you through an assistant that explains the main features and helps you set some basic limitations. It also prompts you to create a four-digit parent passcode, which you’ll need to adjust settings in the future or override time limits.

Subsequently, when you tap your child’s name, you’ll see Screen Time’s standard sections for Downtime, App Limits, Always Allowed, and Content & Privacy Restrictions. For a full explanation of the first three, see our previous article; we’ll focus on what’s different for children and on Content & Privacy Restrictions here.

Downtime


Downtime is useful for blocking all device usage during a time when your child should be sleeping, doing homework, or just not using the screen. You can set only one time period, so if you want to control usage on a more complex schedule, you’ll need to do that in another way.

For a child, the Downtime screen has a Block at Downtime option that you must enable to actually block access to the device during the scheduled time. If it’s off, and the child tries to use the device during that time, they’ll be able to tap Ignore Limit just like an adult can. That might be appropriate for a teenager who may need to check email late at night to find details for tomorrow’s sports practice. With Block at Downtime on, however, the only override is with the parent passcode.

App Limits


As our previous article noted, App Limits specify how long a category of apps—or a specific app—may be used each day, with the time resetting at midnight. For children, you might want to try restricting nothing for a week, and see what apps they’re using and for how long. Then have “the talk” about appropriate use of digital devices and agree on limits.

You can tap Customize Days to allow more time on weekends, for instance, and you can exempt an app from all limitations in the Always Allowed screen.

Once your child hits an app limit, Screen Time will block them from using the app, with the only override being your parent passcode.

Content & Privacy Restrictions


Here’s where you’ll find all the previous parental controls, which let you turn on a wide variety of restrictions. To get started, enable the Content & Privacy Restrictions switch. There are three basic sections here:

  • Store and Content Restrictions: Use these to control app downloading and deletion, what sort of content can be downloaded from Apple’s online stores, whether or not Web content should be filtered, and more.

  • Privacy Restrictions: The entries here depend on what apps are installed, but the main question is if you want to allow location sharing.

  • Allow Changes: These items relate to settings on the iOS device itself. You might want to disallow passcode and account changes, and volume limit changes, if you’ve set a maximum volume in Settings > Music > Volume Limit.

Reports


At the top of its main screen for the child, Screen Time reports on usage for both the current day and the last 7 days, showing a graph of screen time by hour or day, with color coding to indicate which app categories were in use. Review this report regularly to see if you need to adjust the Downtime or App Limit settings. Your child can also check the same report directly on their device in Settings > Screen Time.

Screen Time’s controls are good but not perfect. Enterprising kids have discovered workarounds such as changing the device’s time setting and deleting and redownloading apps. So don’t see Screen Time as a guaranteed technological solution—it’s just another tool in your parenting toolkit.

AI Usage Transparency Report

Pre-AI Era · Written before widespread use of generative AI tools

AI Signal Composition

Rep Tone Struct List Instr
Repetition: 33%
Tone: 52%
Structure: 45%
List: 8%
Instructional: 12%
Emoji: 0%

Score: 0.04 · Low AI Influence

Summary

Screen Time parental controls in iOS 12 provide a useful tool for managing children's device usage, but may not be foolproof.

Related Posts

Leaving Flickr: Migrating 20,000+ Photos to Synology and Taking Back Control

There’s a certain kind of friction you start to notice when you’ve been using a service for a long time. Not enough to make you leave immediately, but enough to make you pause. Flickr had been that kind of service for me. It quietly held years of photos, uploads from old phones, albums I hadn’t looked at in ages, and a massive "Auto Upload" collection that had grown into something I didn’t fully understand anymore.

Read more

How I Finally Passed the PMP Exam (After 12 Years of Waiting)

Back in 2013, I registered for a PMI membership with every intention of pursuing my PMP certification. I downloaded the handbook, bookmarked the eligibility requirements, and even told a few friends that I was going to do it "soon." At the time, I thought getting certified would be a straightforward process, but little did I know what lay ahead in terms of studying and preparation.

Read more

The Evolution of Apple Certification: A Journey Through Versions, Challenges & Growth

When I recently passed the Apple Certified Support Professional (ACSP) exam again, I paused to reflect — not just on this milestone, but on the long path I’ve walked through Apple’s certification landscape. My first certification dates back to macOS 10.5, and over the years, I’ve earned credentials across nearly every version since. In that time, the exams — and Apple itself — have transformed significantly.

Read more

Secure Software, Secure Career: How I Passed the CSSLP

After passing the CISSP earlier this year, I decided to follow it up with the **Certified Secure Software Lifecycle Professional (CSSLP)** certification. For those unfamiliar, CSSLP is an ISC2 certification that focuses specifically on secure software development practices across the full SDLC—from requirements and design to coding, testing, deployment, and maintenance. My goal in pursuing this certification was to further develop my skills in ensuring the security of software throughout its entire lifecycle.

Read more

Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune

Alright, so today we're going to be talking about the management of bring your own device BYOD for Android devices. There's a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM on the market. We just happen to use Jamf where I work, but you could use anything from Braavos to SimpleMDM to Kanji or JumpCloud. Mosyle is also a great option.

Read more

BYO with me in 2025: iOS with User Enrollment in JAMF Pro

It really depends on your company's needs. For example, many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be securing the company's sensitive data in all forms. This may involve implementing policies for contractor-owned devices, ensuring that all devices accessing company data meet minimum security standards, and regularly reviewing and updating these standards to stay ahead of emerging threats.

Read more

Securing BYOD Email Access: Exploring Strategies in Microsoft 365

In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block email access on non-company devices by default and ensure only sanctioned apps can access organizational email accounts. This approach will help prevent unauthorized access and data breaches, aligning with our commitment to maintaining the security and integrity of company communications.

Read more

How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies

Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here's a detailed account of my experience, including the resources I used, some tips that helped me along the way, and what I learned from the process itself.

Read more

Get more out of scripting than you may expect

Expect is an extension to the Tcl scripting language written by Don Libes. The program automates interactions with programs that expose a text terminal interface. Expect, originally written in 1990 for the Unix platform, has since become available for Microsoft Windows and other systems. Its functionality allows users to interact with these programs through scripted commands, eliminating the need for manual input.

Read more