The University is committed to protecting the privacy and the confidentiality of the personal information of its employees in accordance with the University’s Policy 90 – Access to Information and Protection of Privacy. All device information that is accessed for business purposes follows the proper security protocols for accessing information. Consult Microsoft’s website for detailed information.
What is seen by MAM
MAM is not used for monitoring or controlling specific activities on mobile devices.
What can be seen | What can never be seen |
---|---|
|
|
Your organization can put a missing, corporate-owned iPhone or iPad into managed lost mode, which lets them request the device's location. When someone requests access to the device location, the device locks and a message appears on the lock screen to explain what's happening.
What is user selectable |
---|
|
For people using their personal devices, MAM does not see any information.