{"id":11019,"date":"2021-09-01T15:16:14","date_gmt":"2021-09-01T13:16:14","guid":{"rendered":"https:\/\/cosh.de\/beitraege\/mobile-device-management-how-far-are-companies-allowed-to-manage-and-monitor-mobile-devices\/"},"modified":"2022-04-27T16:56:10","modified_gmt":"2022-04-27T14:56:10","slug":"mobile-device-management-how-far-are-companies-allowed-to-manage-and-monitor-mobile-devices","status":"publish","type":"post","link":"https:\/\/cosh.de\/en\/mobile-device-management-how-far-are-companies-allowed-to-manage-and-monitor-mobile-devices\/","title":{"rendered":"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices?"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"720\" height=\"552\" title=\"mobile1\" src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile1.jpg\" data-orig-src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile1.jpg\" alt class=\"lazyload img-responsive wp-image-9109\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27720%27%20height%3D%27552%27%20viewBox%3D%270%200%20720%20552%27%3E%3Crect%20width%3D%27720%27%20height%3D%27552%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile1-200x153.jpg 200w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile1-400x307.jpg 400w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile1-600x460.jpg 600w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile1.jpg 720w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><b style=\"color: #1271b7;\">Control or indulgence?<\/b><\/p>\n<p>More and more, a trend is taking hold: Bring-Your-Own-Device (BYOD) can be found in more and more employment contracts. Employees are thus permitted, even encouraged, to use their own smartphone, private laptop or tablet for work. Many companies already rely on so-called MDM solutions. One important aspect here is mobile device management. As soon as employees&#8217; mobile devices have access to company networks, certain rules and security policies prevail.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-transform:none;\"><p>As a rule, such use requires installation of a software agent on employees&#8217; devices. Organizations use MDM software to detect and, at best, prevent information theft and data leaks &#8211; whether those mobile devices belong to the company or the employee. The installed MDM software application then monitors the device with regard to approved applications and, in the event of theft or loss, resets the device to factory settings without data.<\/p>\n<p>A major problem with mobile device management software is the false sense of security. Especially during the Corona crisis, many employees had to switch to private devices. IT departments were faced with the challenge of securing access to these devices in the best possible way. With MDM profile installations, IT thus has sovereignty over the device &#8211; up to and including remote deletion of all data. This method often resulted in the rejection of BYOD or long discussions with personnel or works councils. This raises the question: How far can companies invade the privacy of their employees and what is legally permissible?<\/p>\n<\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-text-transform:none;\"><div>\n<p><b style=\"color: #1271b7;\">Create secure areas &#8211; separation of personal and company data<\/b><\/p>\n<p>IT departments are only allowed to create certain protected areas on the devices for important company data. If such a device is lost or the user leaves the company, this data can be deleted in the protected area &#8211; without touching the private data. For the control to be permissible, employees must first know and also agree that the mobile device is being controlled. It must be transparently regulated what is controlled and when which data is deleted.<\/p>\n<\/div>\n<\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-text-transform:none;\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-first\" style=\"--awb-bg-size:cover;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-5\"><p><b style=\"color: #1271b7;\">Consent by the employee<\/b><\/p>\n<p>If a company plans to use employees&#8217; private devices with MDM software in connection with BYOD, the employee must expressly agree. However, this only applies if private use of the business devices is permitted and access with mobile device management software is not limited to business data. As an example, many workers use their Outlook app with personal and business accounts mixed.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"2208\" height=\"1242\" title=\"mobile2\" src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile2.jpg\" data-orig-src=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile2.jpg\" alt class=\"lazyload img-responsive wp-image-9110\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%272208%27%20height%3D%271242%27%20viewBox%3D%270%200%202208%201242%27%3E%3Crect%20width%3D%272208%27%20height%3D%271242%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile2-200x113.jpg 200w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile2-400x225.jpg 400w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile2-600x338.jpg 600w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile2-800x450.jpg 800w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile2-1200x675.jpg 1200w, https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile2.jpg 2208w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 800px) 100vw, 400px\" \/><\/span><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><p><b style=\"color: #1271b7;\">Monitoring and control systems<\/b><\/p>\n<p><b>Important<\/b>: Monitoring and control systems intended to monitor the behavior of employees are prohibited u<b>nder Art. 26 of Ordinance 3 to the Labor Code<\/b>! Permanent monitoring for performance control is also inadmissible in any case.<\/p>\n<p>However, if such systems are required for other reasons, they shall be designed in such a way that the health and freedom of movement of workers are not impaired thereby The principle of proportionality counts here. Such systems are permitted for safety reasons and to record work performance.<\/p>\n<p><b>Example<\/b>: telephone switchboards (monitoring incoming and outgoing calls, etc.). For example, if employees are allowed to send private e-mails via the company account, monitoring is usually not permitted.<\/p>\n<p><b style=\"color: #1271b7;\">Working hours<\/b><\/p>\n<p>The employer may, however, request to inspect official correspondence. Supervisors have an interest in monitoring the duration of employees&#8217; working hours in the home office &#8211; just as they do in the office. Important to know here: Employers are also legally obligated to do so by the Working Hours Act (ArbZG). The recording of log-ins on the work computer, smartphone, etc. is a permissible means for this purpose.<\/p>\n<p><b style=\"color: #1271b7;\">Browsing history (on corporate devices)<\/b><\/p>\n<p>Is an employer allowed to monitor an employee&#8217;s Internet behavior? Here it depends on whether the private use of the Internet is prohibited in the employment contract. If this is the case and there is a concrete suspicion, the supervisor may even check without the knowledge and consent of the employee. If personal data obtained is found, it may also be considered evidence and used, for example, in a dismissal case to the detriment of the employee. Even if private use of the Internet is permitted, the boss may still carry out checks in the event of concrete suspicion (e.g. predominant private surfing during working hours).<\/p>\n<p><b style=\"color: #1271b7;\">Our conclusion:<\/b><\/p>\n<p>In the case of BYOD regulations, clear rules must be established in advance. The most common technical measure is the division between private and business data by creating an extra designated data area. Good mobile device management has the ability to remotely wipe business data in an emergency while not compromising private data.<\/p>\n<p>It is important here that in the case of mixed use, employees take care not to allow third parties to access company data. This also applies even if you &#8220;only lend&#8221; your partner the device for a short time for surfing. The question posed at the beginning as to how far employers may control equipment must always be decided on a case-by-case basis. In general, it can be said that monitoring must always be considered in accordance with the principle of proportionality. The purpose of the surveillance measure must correspond to a concrete reason (e.g. security against theft, security against industrial espionage, etc.).<\/p>\n<p>All measures that are necessary must be designed in such a way that the intrusion into the personal rights of employees is kept as low as possible. Personal evaluations are only permitted in the event of concrete suspicion of misuse. If your company needs support with the introduction or configuration of mobile device management, we are of course there as a contact partner for you.<\/p>\n<p style=\"color: #1271b7;\"><b>Simply book your free consultation appointment on the topic of mobile device management.<\/b><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/outlook.office365.com\/owa\/calendar\/CosHConsultingGmbH@cosh.de\/bookings\/s\/KgxSacWrSUytl7Q6r8jFNQ2\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange consultation appointment<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":11020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[398,399],"tags":[403,477,474,475,476],"class_list":["post-11019","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-news","tag-it-en","tag-law","tag-mobile-device-management-en","tag-mobile-devices","tag-working-time"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Device Management: How far are companies allowed to manage and monitor mobile devices? - CosH Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices? - CosH Information Technology\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/\" \/>\n<meta property=\"og:site_name\" content=\"CosH Information Technology\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-01T13:16:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-27T14:56:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile-device.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/\"},\"author\":{\"name\":\"Erik\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\"},\"headline\":\"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices?\",\"datePublished\":\"2021-09-01T13:16:14+00:00\",\"dateModified\":\"2022-04-27T14:56:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/\"},\"wordCount\":3017,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/mobile-device.jpg\",\"keywords\":[\"IT\",\"Law\",\"Mobile Device Management\",\"Mobile devices\",\"Working time\"],\"articleSection\":[\"Blog posts\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/\",\"url\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/\",\"name\":\"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices? - CosH Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/mobile-device.jpg\",\"datePublished\":\"2021-09-01T13:16:14+00:00\",\"dateModified\":\"2022-04-27T14:56:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/mobile-device.jpg\",\"contentUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/mobile-device.jpg\",\"width\":2000,\"height\":1300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cosh.de\\\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cosh.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\",\"url\":\"https:\\\/\\\/cosh.de\\\/\",\"name\":\"CosH Information Technology\",\"description\":\"IT-Dienstleister &amp; Service Provider N\u00fcrnberg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cosh.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\",\"name\":\"Erik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"caption\":\"Erik\"},\"sameAs\":[\"https:\\\/\\\/cosh.de\"],\"url\":\"https:\\\/\\\/cosh.de\\\/en\\\/author\\\/e-kapfensteincosh-de\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices? - CosH Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices? - CosH Information Technology","og_url":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/","og_site_name":"CosH Information Technology","article_published_time":"2021-09-01T13:16:14+00:00","article_modified_time":"2022-04-27T14:56:10+00:00","og_image":[{"width":2000,"height":1300,"url":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile-device.jpg","type":"image\/jpeg"}],"author":"Erik","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Erik","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/#article","isPartOf":{"@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/"},"author":{"name":"Erik","@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d"},"headline":"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices?","datePublished":"2021-09-01T13:16:14+00:00","dateModified":"2022-04-27T14:56:10+00:00","mainEntityOfPage":{"@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/"},"wordCount":3017,"commentCount":0,"image":{"@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile-device.jpg","keywords":["IT","Law","Mobile Device Management","Mobile devices","Working time"],"articleSection":["Blog posts","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/","url":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/","name":"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices? - CosH Information Technology","isPartOf":{"@id":"https:\/\/cosh.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/#primaryimage"},"image":{"@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile-device.jpg","datePublished":"2021-09-01T13:16:14+00:00","dateModified":"2022-04-27T14:56:10+00:00","author":{"@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d"},"breadcrumb":{"@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/#primaryimage","url":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile-device.jpg","contentUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2022\/03\/mobile-device.jpg","width":2000,"height":1300},{"@type":"BreadcrumbList","@id":"https:\/\/cosh.de\/mobile-device-management-wie-weit-duerfen-unternehmen-mobilgeraete-verwalten-und-ueberwachen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cosh.de\/en\/"},{"@type":"ListItem","position":2,"name":"Mobile Device Management: How far are companies allowed to manage and monitor mobile devices?"}]},{"@type":"WebSite","@id":"https:\/\/cosh.de\/#website","url":"https:\/\/cosh.de\/","name":"CosH Information Technology","description":"IT-Dienstleister &amp; Service Provider N\u00fcrnberg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cosh.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d","name":"Erik","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","caption":"Erik"},"sameAs":["https:\/\/cosh.de"],"url":"https:\/\/cosh.de\/en\/author\/e-kapfensteincosh-de\/"}]}},"_links":{"self":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/11019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/comments?post=11019"}],"version-history":[{"count":2,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/11019\/revisions"}],"predecessor-version":[{"id":11022,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/11019\/revisions\/11022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media\/11020"}],"wp:attachment":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media?parent=11019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/categories?post=11019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/tags?post=11019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}