• Broken@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    12 hours ago

    Absolutely. Companies have every right to control what tools are authorized to use on their hardware, and what touches their data or users data. It could be as complex as security or as simple as don’t use a competing service, but it all makes sense. Don’t tell me how use my stuff and I won’t tell you how to use yours.

    If it’s BYOD then that’s another multiple layers of cans of worms not worth getting into.