Hacker News new | past | comments | ask | show | jobs | submit login

Most management software on a company laptop (or endpoint in jargon-speak) will be set up to allow this and your company's policy will allow them to activate monitoring software if an investigation is required. It probably won't be used unless you're already in deep shit, which the person in TFA pretty much was.

It's not that unusual.




And, it explicitly mentions concerns about getting the equipment back. So it's a company owned computer.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: