

CHILD SAFETY POLICY
Protejo is dedicated to protecting children from online threats and digital harm
PROTEJO CHILD SAFETY POLICY
Effective Date: January 25, 2026
Last Updated: January 25, 2026
COMMITMENT TO CHILD SAFETY: Protejo is dedicated to protecting children from online threats and digital harm. This Child Safety Policy outlines our comprehensive approach to child protection, mandatory reporting obligations, emergency response procedures, and compliance with global child protection laws.
This policy applies to all users of Protejo services and establishes our legal obligations and operational procedures for handling child safety concerns. All personnel, partners, and users must comply with these requirements.
IMMEDIATE DANGER — CALL EMERGENCY SERVICES
If you believe a child is in immediate physical danger:
United States: Call 911
European Union: Call 112
United Kingdom: Call 999
Canada: Call 911
Australia: Call 000
Hong Kong: Call 999
Israel: Call 100
Other Countries: Contact local emergency services immediately
DO NOT wait for Protejo alerts or contact us first in emergency situations.
TABLE OF CONTENTS
Our Commitment to Child Safety
Legal Framework and Compliance
Definitions and Classifications
Threat Detection and Classification
Emergency Response Procedures
Mandatory Reporting Obligations
Parental Rights and Responsibilities
Professional Users and Ethical Standards
Child Data Protection and Privacy
International Law Compliance
Training and Procedures
Incident Management and Documentation
Technology Safeguards and Limitations
Cooperation with Authorities
Policy Updates and Review
Contact and Reporting Information
OUR COMMITMENT TO CHILD SAFETY
===================================
Core Principles
Protejo is founded on the principle that every child deserves protection from digital harm. Our commitment encompasses:
• Proactive Protection: Advanced AI technology to identify threats before harm occurs
• Immediate Response: Rapid alert systems for time-sensitive safety concerns
• Professional Standards: Adherence to the highest ethical and legal standards
• Global Compliance: Comprehensive compliance with international child protection laws
• Continuous Improvement: Ongoing enhancement of safety protocols and technology
Zero Tolerance Policy
Protejo maintains zero tolerance for:
• Child abuse, exploitation, or endangerment in any form
• Online predatory behavior targeting minors
• Distribution or possession of child sexual abuse material
• Grooming, solicitation, or inappropriate contact with children
• Cyberbullying that threatens child safety or wellbeing
• Self-harm or suicide ideation among monitored children
• Any conduct that places children at risk of physical or psychological harm
Organizational Commitment
• All employees receive mandatory child protection training
• Background checks required for personnel with access to child data
• Regular audit and review of safety protocols and procedures
• Investment in advanced AI and safety detection technologies
• Collaboration with law enforcement and child protection agencies
• Participation in industry safety initiatives and best practice sharing
LEGAL FRAMEWORK AND COMPLIANCE
===================================
International Legal Standards
Protejo complies with comprehensive international, national, and local laws protecting children:
United Nations
• UN Convention on the Rights of the Child
• Optional Protocol on Child Trafficking
• Optional Protocol on Child Sexual Exploitation
United States
• Children's Online Privacy Protection Act (COPPA)
• Child Abuse Prevention and Treatment Act
• Protecting Children from Internet Predators Act
• State mandatory reporting laws (all 50 states)
European Union
• GDPR Article 8 (Child Protection)
• EU Digital Services Act
• Child Sexual Abuse Regulation
• Member State child protection laws
United Kingdom
• Children Act 1989 & 2004
• UK GDPR Child Protection
• Online Safety Act 2023
• Age Appropriate Design Code
Canada
• Child and Family Services Acts
• Personal Information Protection Acts
• Criminal Code (Child Protection)
• Provincial reporting requirements
Australia
• Child Protection Acts (State/Territory)
• Privacy Act 1988 (Child Provisions)
• Online Safety Act 2021
• Mandatory reporting obligations
Hong Kong
• Protection of Children and Juveniles Ordinance (Cap. 213)
• Juvenile Offenders Ordinance (Cap. 226)
• Personal Data (Privacy) Ordinance (Cap. 486) — Child Provisions
• Crimes Ordinance (Cap. 200) — Child Protection Provisions
• Domestic and Cohabitation Relationships Violence Ordinance (Cap. 189)
Israel
• Youth (Care and Supervision) Law
• Privacy Protection Law (Child Provisions)
• Penal Law (Child Protection)
• Mandatory reporting requirements
Other Jurisdictions
• National child protection legislation
• Local privacy and data protection laws
• Regional mandatory reporting requirements
• Cultural and religious protection standards
Regulatory Compliance Framework
Our compliance framework ensures adherence to all applicable laws through:
• Legal Monitoring: Continuous monitoring of legal developments globally
• Jurisdictional Analysis: Country-specific compliance assessments
• Regulatory Consultation: Regular consultation with legal experts
• Authority Cooperation: Active cooperation with regulatory bodies
• Policy Updates: Regular updates reflecting legal changes
DEFINITIONS AND CLASSIFICATIONS
====================================
Child Safety Threat Categories
Critical Threats (Immediate Response Required)
• Imminent Physical Danger: Threats of violence, abuse, or harm
• Self-Harm Ideation: Suicide threats or self-injury planning
• Sexual Exploitation: Predatory contact, grooming, or abuse
• Child Abuse Material: Creation, distribution, or possession
• Kidnapping Threats: Abduction plans or attempts
• Severe Cyberbullying: Persistent harassment threatening safety
High-Priority Concerns (Urgent Response Required)
• Online Predatory Behavior: Inappropriate adult-child communication
• Emotional Abuse: Psychological manipulation or trauma
• Substance Abuse: Drug or alcohol abuse by minors
• Eating Disorders: Dangerous eating patterns or behaviors
• Risky Behaviors: Dangerous challenges or illegal activities
• Mental Health Crisis: Severe depression or psychological distress
Moderate Concerns (Standard Response Required)
• Cyberbullying: Persistent harassment or intimidation
• Inappropriate Content: Exposure to harmful material
• Privacy Violations: Sharing of personal information
• Academic Issues: Cheating or academic dishonesty
• Social Conflicts: Peer relationship problems
• Minor Behavioral Issues: Age-inappropriate conduct
Age-Based Classifications
• Young Children (Under 13): Enhanced protections, parental consent required
• Adolescents (13-17): Age-appropriate privacy balanced with safety
• Transitional Adults (18+): Adult privacy rights with safety considerations
THREAT DETECTION AND CLASSIFICATION
========================================
AI-Powered Detection System
Our advanced artificial intelligence system analyzes digital communications using:
• Natural Language Processing: Context-aware text analysis in 8+ languages
• Sentiment Analysis: Emotional state and distress detection
• Behavioral Pattern Recognition: Unusual activity identification
• Image and Video Analysis: Visual content assessment for safety concerns
• Temporal Analysis: Time-based pattern recognition and escalation detection
Multi-Layer Detection Approach
• Keyword Detection: Comprehensive databases of concerning terms
• Context Analysis: Situational understanding beyond keyword matching
• Risk Scoring: Weighted assessment of multiple threat indicators
• Human Review: Expert validation for complex or ambiguous cases
• Continuous Learning: AI model improvement based on new threat patterns
Alert Generation and Prioritization
Critical Alerts (Immediate)
• Delivered within seconds of detection
• Multiple notification channels (SMS, email, push, Telegram)
• Automatic escalation to emergency contacts
• Direct integration with emergency services where legally permitted
High-Priority Alerts (Within 5 minutes)
• Immediate notification to primary contacts
• Detailed context and evidence provided
• Recommended actions and resources
• Follow-up monitoring and escalation
Standard Alerts (Within 15 minutes)
• Comprehensive threat assessment
• Educational resources and guidance
• Trend analysis and pattern recognition
• Preventive measures and recommendations
EMERGENCY RESPONSE PROCEDURES
==================================
CRITICAL THREAT RESPONSE PROTOCOL
Upon detection of critical threats to child safety:
Immediate Actions (0-5 minutes):
• Alert Generation: Automatic high-priority alert sent to all registered contacts
• Evidence Preservation: Secure capture and storage of all relevant communications
• Authority Notification: Immediate notification to appropriate authorities as required by law
• Emergency Contacts: Direct notification to emergency contacts and support services
Follow-up Actions (5-30 minutes):
• Situation Assessment: Human expert review of AI detection and context
• Resource Deployment: Provision of emergency resources and support information
• Continuous Monitoring: Enhanced monitoring of all communications for escalation
• Professional Support: Connection with appropriate professional services
Escalation Matrix
• Level 1 — User Notification: Alert to account holder and authorized users
• Level 2 — Professional Referral: Connection with mental health or support services
• Level 3 — Authority Notification: Report to child protective services or law enforcement
• Level 4 — Emergency Services: Direct contact with emergency responders
Documentation and Follow-up
• Complete incident documentation with timestamps and evidence
• Follow-up monitoring to ensure child safety
• Coordination with ongoing investigations or interventions
• Post-incident review and protocol improvement
MANDATORY REPORTING OBLIGATIONS
====================================
Legal Reporting Requirements
Protejo is legally obligated to report suspected child abuse, neglect, or endangerment to appropriate authorities in many jurisdictions. These obligations take precedence over privacy considerations and user preferences.
Reporting Triggers
We are required to report when we have reasonable suspicion of:
• Physical Abuse: Evidence of physical harm or violence against a child
• Sexual Abuse: Sexual exploitation, molestation, or inappropriate contact
• Emotional Abuse: Psychological harm, threats, or severe emotional maltreatment
• Neglect: Failure to provide necessary care, supervision, or protection
• Endangerment: Conditions or behaviors that place a child at risk of harm
Jurisdiction-Specific Reporting
United States
• National Child Abuse Hotline: 1-800-4-A-CHILD (1-800-422-4453)
• State CPS Agencies: Reports made to relevant state authorities
• Law Enforcement: Immediate crimes reported to local police
• Timeline: Within 24-48 hours as required by state law
European Union
• National Hotlines: Reports to country-specific child protection services
• EU Child Protection: Coordination with EU-wide initiatives
• Local Authorities: Municipal and regional child welfare services
• Timeline: Immediate for urgent cases, within legal timeframes
United Kingdom
• NSPCC Helpline: 0808 800 5000
• Local Safeguarding: Local Authority Designated Officer (LADO)
• Police: 999 for emergencies, 101 for non-emergencies
• Timeline: Immediate reporting as required
Canada
• Provincial CAS: Children's Aid Society in relevant province
• RCMP: Royal Canadian Mounted Police for federal crimes
• Local Police: Municipal police for immediate threats
• Timeline: As required by provincial legislation
Australia
• State Departments: Child protection services in each state/territory
• Australian Federal Police: For federal crimes and online exploitation
• eSafety Commissioner: Online safety and cyberbullying reports
• Timeline: As required by state/territory law
Hong Kong
• Social Welfare Department: Child Protective Services Unit
• Hong Kong Police Force: Child Abuse Investigation Unit (CAIU)
• Family Crisis Support Centre: 24-hour hotline +852 2512 2121
• Against Child Abuse Hotline: +852 2755 1122
• Timeline: Immediate for urgent cases
Israel
• Child Protection Officers: Municipal welfare services
• Israel Police: Youth Investigation Unit
• Ministry of Social Affairs: Emergency hotline *118
• Timeline: Immediate as required by mandatory reporting law
Other Countries
• Local Authorities: National child protection agencies
• International Organizations: UNICEF, Save the Children partnerships
• Embassy Support: Consular assistance where appropriate
• Timeline: According to local legal requirements
Reporting Process
• Initial Assessment: Trained personnel review detected threats
• Legal Consultation: Confirmation of reporting obligations
• Report Preparation: Comprehensive documentation of evidence
• Authority Contact: Direct communication with appropriate agencies
• Follow-up: Ongoing cooperation with investigations
• Documentation: Complete records of all reporting activities
PARENTAL RIGHTS AND RESPONSIBILITIES
=========================================
Parental Authority and Control
Parents and legal guardians retain primary authority and responsibility for their children's safety and wellbeing. Protejo serves as a tool to assist, not replace, parental supervision.
Parental Rights
• Access Rights: Full access to all monitoring data and reports concerning their children
• Configuration Control: Complete control over monitoring settings and alert thresholds
• Data Management: Right to review, correct, or delete child information
• Service Control: Right to modify, suspend, or terminate monitoring at any time
• Professional Consultation: Access to professional resources and support services
• Privacy Protection: Control over data sharing and third-party access
Parental Responsibilities
• Legal Authority: Ensure legal right to monitor the child
• Age-Appropriate Communication: Discuss monitoring with children in suitable ways
• Prompt Response: Take appropriate action when safety alerts are received
• Professional Help: Seek professional assistance when warranted
• Ongoing Supervision: Maintain active parental involvement beyond digital monitoring
• Privacy Respect: Balance safety monitoring with age-appropriate privacy expectations
Special Circumstances
Divorced or Separated Parents
• Both parents with legal custody receive alerts unless court orders specify otherwise
• Primary account holder controls monitoring settings
• Court orders take precedence over default notification settings
• Professional mediation services available for disputes
Foster Care and Guardianship
• Legal guardians have same rights and responsibilities as biological parents
• Social services may be included in alert notifications as appropriate
• Enhanced documentation requirements for child welfare cases
• Coordination with case workers and support services
PROFESSIONAL USERS AND ETHICAL STANDARDS
=============================================
Professional Service Categories
Protejo Pro — Mental Health Professionals
• Licensed Professionals: Psychologists, psychiatrists, therapists, counselors
• Clinical Use: Integration with therapeutic treatment and assessment
• HIPAA Compliance: Full compliance with healthcare privacy requirements
• Professional Ethics: Adherence to licensing board ethical standards
• Supervision Requirements: Appropriate clinical supervision and oversight
Protejo Business — Institutional Users
• Educational Institutions: Schools, colleges, and educational programs
• Child Care Organizations: Daycares, after-school programs, camps
• Healthcare Facilities: Hospitals, clinics, and treatment centers
• Social Services: Child protective services and welfare agencies
Professional Ethical Standards
Core Ethical Requirements
• Best Interest Standard: All actions must be in the child's best interest
• Informed Consent: Appropriate consent from children and parents/guardians
• Confidentiality: Protection of sensitive information within professional bounds
• Competence: Use only within areas of professional competence
• Non-maleficence: Do no harm through monitoring or intervention
• Cultural Sensitivity: Respect for cultural, religious, and family values
Professional Training Requirements
• Completion of Protejo professional training program
• Understanding of child development and digital safety
• Knowledge of relevant legal and ethical obligations
• Competency in crisis intervention and emergency response
• Ongoing continuing education in digital safety and technology
Professional Oversight and Accountability
• License Verification: Regular verification of professional credentials
• Audit Procedures: Random audits of professional account usage
• Reporting Mechanisms: Systems for reporting ethical concerns
• Professional Standards Board: Advisory board of professional experts
• Disciplinary Procedures: Clear processes for addressing violations
CHILD DATA PROTECTION AND PRIVACY
======================================
Enhanced Privacy Protections for Children
Children's personal information receives enhanced protection beyond standard privacy requirements. We implement specific safeguards, access controls, and handling procedures for all child-related data.
COPPA Compliance (Children Under 13)
• Verifiable Parental Consent: Required before any data collection
• Limited Data Collection: Only information necessary for safety monitoring
• No Behavioral Advertising: Prohibition on advertising profiling
• Parental Access Rights: Full access to review and manage child data
• Deletion Rights: Right to delete child information at any time
• Safe Harbor Procedures: Compliance with COPPA safe harbor provisions
GDPR Article 8 Compliance (EU Children)
• Age Verification: Robust systems to verify child age
• Parental Consent: Clear, informed consent from parents/guardians
• Data Minimization: Processing limited to necessary safety purposes
• Retention Limits: Strict limits on data retention periods
• Access Rights: Enhanced rights for children and parents
• Privacy by Design: Child privacy built into all systems
Hong Kong PDPO Compliance (Child Data)
• Collection limited to lawful safety purposes directly related to Protejo's function
• Data not excessive for child safety monitoring purposes
• Enhanced security measures for all child-related personal data
• Parental access and correction rights fully supported
• Data retention limited to the minimum period necessary
Special Data Handling Procedures
Technical Safeguards
• Encryption: End-to-end encryption for all child communications
• Access Controls: Strict role-based access to child data
• Audit Logging: Comprehensive logs of all data access
• Data Segmentation: Separation of child data from adult data
• Backup Security: Enhanced security for backup systems
Data Retention and Deletion
• Monitoring Data: Deleted within 30 days of service termination
• Media Files: Automatically and permanently deleted after 48 hours
• Safety Reports: Retained for legal compliance periods only
• Emergency Records: Retained as required by law enforcement
• Right to Erasure: Expedited deletion upon parent/guardian request
• Age Transition: Updated handling when children reach majority
INTERNATIONAL LAW COMPLIANCE
==================================
Global Compliance Framework
Protejo operates in compliance with child protection laws in all jurisdictions where our services are available:
North America
• United States: COPPA, state child protection laws
• Canada: Provincial Child and Family Services Acts
• Mexico: General Law on Rights of Children and Adolescents
Europe
• EU: GDPR Article 8, Digital Services Act
• UK: Children Act, Online Safety Act
• Individual member state child protection laws
Asia-Pacific
• Hong Kong: Protection of Children and Juveniles Ordinance, PDPO
• Australia: Privacy Act, child protection state laws
• Japan: Personal Information Protection Act (child provisions)
• Singapore: Personal Data Protection Act
Middle East & Africa
• Israel: Youth (Care and Supervision) Law
• South Africa: Children's Act 38 of 2005
• UAE: Child Protection Law
Latin America
• Brazil: Child and Adolescent Statute (ECA)
• Argentina: Comprehensive Protection of Children's Rights
• Colombia: Childhood and Adolescence Code
Cross-Border Coordination
• International Cooperation: Coordination with international child protection agencies
• Data Transfer Safeguards: Appropriate safeguards for international data transfers
• Legal Authority Recognition: Recognition of cross-border legal authorities
• Emergency Coordination: International emergency response protocols
TRAINING AND PROCEDURES
=============================
Personnel Training Requirements
Mandatory Training for All Personnel
• Child Protection Fundamentals: Recognition of abuse, neglect, and endangerment
• Legal Obligations: Understanding of reporting requirements and legal framework
• Cultural Sensitivity: Awareness of cultural, religious, and social factors
• Technology Systems: Proper use of monitoring and alert systems
• Emergency Procedures: Response protocols for various threat types
• Privacy Protection: Handling of sensitive child information
• Professional Ethics: Ethical standards and professional boundaries
Specialized Training Programs
• AI Analysts: Advanced training in threat pattern recognition
• Crisis Responders: Emergency intervention and de-escalation techniques
• Legal Team: Cross-jurisdictional law and reporting requirements
• Customer Support: Child safety sensitive customer service
• Technical Team: Child-safe system design and development
Ongoing Education and Updates
• Quarterly training updates on new threats and legal changes
• Annual comprehensive child protection training renewal
• Professional development opportunities and conferences
• Peer consultation and case study reviews
• External expert consultation and advisory relationships
INCIDENT MANAGEMENT AND DOCUMENTATION
===========================================
Incident Classification System
Level 1 — Critical Incidents
• Imminent threat to child safety or life
• Evidence of serious abuse or exploitation
• Emergency services intervention required
• Response time: Immediate (0-5 minutes)
Level 2 — High-Priority Incidents
• Serious safety concerns requiring professional intervention
• Mental health crisis or self-harm indicators
• Ongoing abuse or exploitation patterns
• Response time: Within 15 minutes
Level 3 — Standard Incidents
• Concerning behavior patterns or communications
• Cyberbullying or peer conflicts
• Inappropriate content exposure
• Response time: Within 1 hour
Documentation Requirements
• Incident Reports: Comprehensive documentation of all safety incidents
• Response Actions: Record of all actions taken and notifications made
• Follow-up Records: Documentation of ongoing monitoring and support
• Evidence Preservation: Secure storage of relevant communications and data
• Legal Compliance: Records required for legal and regulatory compliance
Quality Assurance and Review
• Regular review of incident response effectiveness
• Analysis of threat detection accuracy and false positive rates
• Continuous improvement of response protocols
• External audit and assessment of child protection procedures
• Stakeholder feedback and recommendation integration
TECHNOLOGY SAFEGUARDS AND LIMITATIONS
===========================================
Technology Capabilities and Limitations
While Protejo employs advanced AI technology for child safety monitoring, all technology has inherent limitations. Users must understand these limitations and maintain appropriate supervision beyond automated systems.
AI System Capabilities
• Multi-Language Processing: Threat detection in 8+ languages including Hebrew, Arabic, English, Russian, Georgian, Spanish, Portuguese, and German
• Context Analysis: Understanding of conversational context and relationships
• Pattern Recognition: Identification of concerning behavioral patterns over time
• Multimedia Analysis: Assessment of images, videos, and audio content
• Real-Time Processing: Immediate analysis and alert generation
Known Limitations
IMPORTANT: System Limitations
• False Positives: System may flag benign content as concerning
• False Negatives: Genuine threats may not be detected
• Context Misinterpretation: Misunderstanding of sarcasm, jokes, or cultural references
• Platform Dependencies: Limited to platforms that allow monitoring access
• Encrypted Communications: Cannot analyze end-to-end encrypted content
• Offline Activity: No monitoring of offline interactions or behaviors
Continuous Improvement
• Regular updates to threat detection algorithms
• Integration of new threat patterns and indicators
• Performance monitoring and accuracy assessment
• User feedback integration for system improvement
• Collaboration with child safety experts and researchers
COOPERATION WITH AUTHORITIES
==================================
Law Enforcement Cooperation
Protejo maintains cooperative relationships with law enforcement agencies globally:
• Immediate Reporting: Direct reporting channels for urgent threats
• Evidence Preservation: Secure preservation of evidence for investigations
• Investigation Support: Technical assistance and expert testimony
• Training Collaboration: Joint training programs on digital safety
• Policy Development: Input on law enforcement policies and procedures
Child Protective Services Partnership
• Established reporting procedures with child welfare agencies
• Collaborative case management and follow-up
• Professional development and training partnerships
• Resource sharing and best practice development
• Multi-disciplinary team participation when appropriate
International Cooperation
• INTERPOL: Cooperation with international law enforcement
• National Child Protection Agencies: Direct relationships with government agencies
• NGO Partnerships: Collaboration with child protection organizations
• Industry Initiatives: Participation in industry safety coalitions
POLICY UPDATES AND REVIEW
===============================
Regular Review Schedule
• Quarterly Reviews: Assessment of policy effectiveness and legal compliance
• Annual Comprehensive Review: Full policy review and update process
• Legal Change Updates: Immediate updates following legal or regulatory changes
• Incident-Driven Reviews: Policy assessment following significant incidents
• Stakeholder Feedback: Integration of feedback from users, professionals, and authorities
Update Notification Process
• 30-day advance notice for material policy changes
• Direct notification to all professional users
• Public posting on protejo.net and in user portals
• Training updates for all personnel
• Documentation of all policy changes and rationale
CONTACT AND REPORTING INFORMATION
=======================================
Emergency Contacts
Immediate Child Safety Emergencies
Email: emergency@protejo.net
Phone: +1 (323) 686-3424 (24/7 Emergency Line)
Response Time: Within 30 minutes
Child Safety Concerns
Email: childsafety@protejo.net
Response Time: Within 2 hours
Professional Support
Email: professional@protejo.net
Response Time: Within 4 hours
Legal and Compliance
Email: legal@protejo.net
Response Time: Within 24 hours
Data Protection Officer
Email: dpo@protejo.net
Response Time: Within 10 business days
Customer Support
Email: support@protejo.net
Response Time: Within 48 hours
Mailing Address
Speshelly Ltd.
Attn: Child Safety Department
1150 S Olive St
Los Angeles, CA 90015
United States
Global Emergency Numbers Reference
• United States: 911
• European Union: 112
• United Kingdom: 999
• Canada: 911
• Australia: 000
• Hong Kong: 999
• Israel: 100
• New Zealand: 111
• South Africa: 10111
• Singapore: 999
Child Protection Hotlines Reference
• USA — Childhelp National Child Abuse Hotline: 1-800-422-4453
• UK — NSPCC Helpline: 0808 800 5000
• Canada — Kids Help Phone: 1-800-668-6868
• Australia — Kids Helpline: 1800 551 800
• Hong Kong — Against Child Abuse: +852 2755 1122
• Hong Kong — SWD Child Protective Services: +852 2343 2255
• Israel — ERAN Emotional First Aid: *1201
• EU — Missing Children Europe: 116 000
EFFECTIVE DATE AND ACKNOWLEDGMENT
This Child Safety Policy is effective as of January 25, 2026. By using our Services after this date, you acknowledge that you have read, understood, and agree to comply with the provisions of this Child Safety Policy.
Document Version: 1.1
Last Review Date: January 25, 2026
Next Scheduled Review: July 25, 2026
© 2026 Protejo (Speshelly Ltd.). All rights reserved.
