this post was submitted on 08 Jan 2026
106 points (91.4% liked)
Actually Infuriating
841 readers
1 users here now
Community Rules:
Be Civil
Please treat others with decency. No bigotry (disparaging comments about any race, ethnicity, religion, gender, sexuality, nationality, ability, age, etc). Personal attacks and bad-faith argumentation are not allowed.
Content should be actually infuriating
Politics and news are allowed, as well as everyday life. However, please consider posting in partner communities below if it is a better fit.
Mark NSFW/NSFL posts
Please mark anything distressing (death, gore, etc.) as NSFW and clearly label it in the title.
Keep it Legal and Moral
No promoting violence, DOXXing, brigading, harassment, misinformation, spam, etc.
Partner Communities
- Mildly Infuriating
- Furiously Infuriating
- Memes
- Political Memes
- Lemmy Shitpost
- Not The Onion
- You Should Know
- Lemmy Be Wholesome
founded 11 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It depends on the registration profile they require. If they have you register it as a company owned phone vs a BYOD device.
BYOD registration creates a separate partition on your phones hard drive for the apps installed via the company portal. They cannot see all apps on the device, or any web traffic, sms, phone calls etc. they cannot lock the device or wipe the device in its entirety, only the apps on the company partition.
So in short, it depends on how the IT / Security department setup the device registration, and the registration process will notify you of the access level and allow you to accept / deny.
The issue is they just triggered it without communication. That's a breach of respect.
Depending on the industry / region in which you work, they will have regulatory obligations to protect sensitive data such as PII and PHI. From a business perspective they are trying to remove liability and decrease of obvious attack vectors they have limited control over. From an individual perspective, they are implementing controls that protect the privacy rights of their customers. As a security professional, it's good to see. Personally I would always prefer to keep work and personal items separate to reduce the chance that I'm the cause of a breach.
They can send emails to their coworkers to communicate. They don't. I understand there might be reasons they rolled it out.
happy cake day!