this post was submitted on 12 Sep 2023
305 points (96.9% liked)
Privacy
31876 readers
682 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You should demand a work phone but work apps are usually insolated from the rest of the system for both yours and your employers benefit.
It enables your job to track you off hours. Did you go to a protest on the weekend your company doesn't approve of? If you aren't careful, you might give it permissions to your photos. If it's some form of 2FA, it might desire access to your SMS. In earlier days, the Outlook app use to be able to wipe the phone, it is more sandboxed now. But can you see how allowing access to your private information is a bad idea? Just say no. If it's for work related apps, they owe you a device to run it on.
The amount of tracking the intrusiveness of it highly depends on the type of management they used.
MAM or work profiles are most often used for personal devices and it grants the employer the ability to only manage specific apps and or profile.
MDM enrollment is used for corporate owned devices and is more capable.
Here is some documentation for MS Intune, it will be slightly different for other providers but it will be roughly the same: https://learn.microsoft.com/en-us/mem/intune/apps/android-deployment-scenarios-app-protection-work-profiles
Absolutely.