Mika, a new marketing intern, has enrolled her personally owned device into her employer’s EMM solution, known as the BYOD (Bring Your Own Device) use case. What can Mika’s IT manager do on her device in this case?
- Fully erase the device at any time completely wiping the device of all data without the ability to only erase company data.
- Read personal text messages, view personal photos and capture all data on the device regardless it being personal or work data.
- Use the device processors to mine crypto currency when their device is charging at night while they sleep to earn bonuses.
- Provide Mika with fully compliant access to company IT resources and apps completely separated by the work profile with no access to her personal profile and data.