this post was submitted on 30 Jun 2024
2232 points (99.4% liked)

Malicious Compliance

19527 readers
4 users here now

People conforming to the letter, but not the spirit, of a request. For now, this includes text posts, images, videos and links. Please ensure that the “malicious compliance” aspect is apparent - if you’re making a text post, be sure to explain this part; if it’s an image/video/link, use the “Body” field to elaborate.

======

======

Also check out the following communities:

!fakehistoryporn@lemmy.world !unethicallifeprotips@lemmy.world

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] Kit@lemmy.blahaj.zone 2 points 4 months ago* (last edited 4 months ago) (1 children)

You're talking about MDM in Intune which is only used on corporate owned devices. MAM is used for personal devices and does not have device administration access. It's in the name - Mobile Application Management.

https://learn.microsoft.com/en-us/mem/intune/fundamentals/intune-planning-guide#personal-devices-vs-organization-owned-devices

[–] brax@sh.itjust.works 2 points 4 months ago

This implies that the company has a competent IT team that rolls it out correctly, and that there won't be some way to exploit it and dig in further than expected.

Also:

On personal devices, it's normal and expected for users to check email, join meetings, update files, and more. Many organizations allow personal devices to access organization resources.

(From the site)

Lmao WHAT? It's normal for users to do company shit on their personal phone? What kind of delusional Spongebob bullshit is that? Is the company gonna pay for data or subsidize the cost of my phone? Are they going to pay me to be on call if they expect me to of this shit outside of my working hours?