Introduction .gov

/passwords that were used during the session are emptied and all the files are deleted. This ensures good data protection when using these devices. If any documents/files need to be saved they will either saved in the young person’s personal cloud storage and/or emailed as … ................
................