META QUEST
Meta Quest: *Parents:* Important guidance & safety warnings for children’s use here. Using Meta Quest requires an account and is subject to requirements that include a minimum age of 10 (requirements may vary by country). See meta.com/quest/terms and the parent’s info page at meta.com/quest/parent-info. Certain apps, games and experiences may be suitable for a more mature audience. META QUEST FEATURES, FUNCTIONALITY, AND CONTENT NOTICE: Features, functionality and content are subject to change or withdrawal at any time, may not be available in all areas or languages or may be restricted; may require enabled software or service activation, and additional terms, conditions and/or charges may apply.
META QUEST IMPORTANT SAFETY NOTICE https://www.meta.com/quest/quest-2-facial-interface-recall/.
Financing Options. You may be offered financing options for your Meta purchases. Learn more here.
***Based on the graphic performance of the Qualcomm Snapdragon XR2 Gen 2 vs XR2 Gen 1 on Meta Quest 2
RAY-BAN META
Meta AI and voice commands only in select countries and languages. Please check local availability. Meta account and Meta View App required. For ages 13+ only. Requires compatible phone with Android or iOS operating system plus wireless internet access. Features, functionality and content are subject to change or withdrawal at any time. Additional account registration, terms and fees may apply. Software updates may be required. Performance may vary based on user location, device battery, temperature, internet connectivity and interference from other devices, plus other factors. User must comply with all applicable local laws and regulations, especially relating to privacy. May interfere with personal medical devices. Check manufacturer Safety & Warranty Guide and FAQs for more product information, including battery life.
©2025 Meta.
We do not allow content that sexually exploits or endangers children. To keep our messaging services safe we use technology to detect such content. This includes photo-matching technology which uses ‘hashes’ (unique codes or digital fingerprints) to detect child exploitation imagery. We also use technology that relies on messaging metadata to identify potentially harmful threads. These technologies store files as short digital hashes that can determine whether two files are the same or similar, even without the original image or video, and compare them with our databases to detect potential child sexual abuse material. If the uploaded media is identical or very similar to known hashes in our databases, it is considered likely to be such material. We have different review processes in place to ensure accuracy which include human review before adding hashes to our databases.
We use these technologies on the basis of EU Regulation 2021/1232, which provides for an exemption from the confidentiality obligations regarding messages (Articles 5(1) and 6(1) of the EU ePrivacy Directive (EU Directive 2002/58/EC)). These child safety technologies are limited to the purpose of detecting, removing or reporting content that sexually exploits or endangers children. If we detect such content we will remove it and depending on the severity of the case may block the relevant accounts, terminate or suspend relevant services. In these cases, we provide information in our products on available appeal if the user disagrees with our decision. Users will also be informed that they may complain to the Irish Data Protection Commission (more information is available at here) or to any other supervisory authority and that they also have the right to seek a judicial remedy through a competent court. You can get more information on the processing of your data by visiting our Privacy Policy and more specifically the legal basis in section “Protection of your vital interests or that of another person”.
Relevant information is reported to the National Center for Missing & Exploited Children (NCMEC), who in turn forwards reports to law enforcement authorities around the world, as appropriate. More information on this can be found by visiting our Privacy Policy “How we promote safety, security and integrity”. You can also get more information on how we respond to legal requests by visiting our Privacy Policy “How do we respond to legal requests, comply with applicable law and prevent harm”.