Imagine your search terms, key-strokes, private chats and photographs are being monitored every time they are sent. Millions of students across the country don’t have to imagine this deep surveillance of their most private communications: it’s a reality that comes with their school districts’...
Stopped reading right there. Whenever you are issued a device, you should immediately assume it’s being monitored by the owner of the device. This goes for school/job/etc. The owner of the device will always be monitoring it for reasons of making sure you are using the device for intended purpose to making sure you aren’t using it for illegal purposes.
The first thing I did when I was issued a laptop for a job was check for monitoring software of any type. The second thing I did was become extremely suspicious when I couldn’t find any. I suppose the rule is “most likely” or “more often than not” while also being “always assume”.
I might have the exception to this. I’m able to dual boot my work laptop, as can the other engineers in my department. So it’s effectively a Linux machine under my exclusive administration. The only request from my IT department was how to format the host name.
I’m still not taking chances with that thing though, even when on my home network. The rules exist even if there’s a 99.99% chance they won’t be enforced. I have nothing to gain from doing nefarious shit on it just to prove a point, lol.
Stopped reading right there. Whenever you are issued a device, you should immediately assume it’s being monitored by the owner of the device. This goes for school/job/etc. The owner of the device will always be monitoring it for reasons of making sure you are using the device for intended purpose to making sure you aren’t using it for illegal purposes.
That’s fine.
But third parties should still be heavily limited on the information they can gather from just class work usage.
deleted by creator
The first thing I did when I was issued a laptop for a job was check for monitoring software of any type. The second thing I did was become extremely suspicious when I couldn’t find any. I suppose the rule is “most likely” or “more often than not” while also being “always assume”.
I might have the exception to this. I’m able to dual boot my work laptop, as can the other engineers in my department. So it’s effectively a Linux machine under my exclusive administration. The only request from my IT department was how to format the host name.
I’m still not taking chances with that thing though, even when on my home network. The rules exist even if there’s a 99.99% chance they won’t be enforced. I have nothing to gain from doing nefarious shit on it just to prove a point, lol.