{"id":3117,"date":"2025-07-17T06:01:06","date_gmt":"2025-07-17T06:01:06","guid":{"rendered":"https:\/\/proget.pl\/en\/?p=3117"},"modified":"2025-11-19T12:52:35","modified_gmt":"2025-11-19T12:52:35","slug":"can-mdm-eavesdrop","status":"publish","type":"post","link":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/","title":{"rendered":"Can an MDM system eavesdrop on you through company phone?"},"content":{"rendered":"<div class=\"!my-16 md:!my-24\">\n  <div \n    class=\"is-layout-constrained\" style=\"--wp--style--global--content-size: 70.75rem;\"\n>\n    <main class=\"xl:grid xl:gap-10 xl:grid-cols-[741px_1fr]\">\n      <article>\n                  <div class=\"inline-grid grid-cols-2 gap-5 sm:flex sm:flex-wrap mb-3\">\n                          <a class=\"uppercase text-[10px] leading-3 text-text-tertiary font-medium w-fit hover:no-underline\"\n                 href=\"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/\"\n              >\n                Cyber smart\n              <\/a>\n                      <\/div>\n                          <h1 class=\"font-[600] text-3xl text-text-primary mb-7 md:mb-12\">Can an MDM system eavesdrop on you through company phone?<\/h1>\n                <div class=\"flex items-center gap-x-8\">\n                      <div class=\"flex items-center gap-x-1.5\">\n                              <div class=\"shrink-0\">\n                  <img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Agnieszka-P-100.webp\" class=\"w-8 h-8 object-cover rounded-full\" alt=\"\" \/>                <\/div>\n                                            <p class=\"text-xs\">Agnieszka Pierlak<\/p>\n                          <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M19.5 3.75h-15a.75.75 0 0 0-.75.75v15c0 .414.336.75.75.75h15a.75.75 0 0 0 .75-.75v-15a.75.75 0 0 0-.75-.75Zm-3-1.5v3m-9-3v3m-3.75 3h16.5\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">17.07.2025<\/p>\n            <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-miterlimit=\"10\" d=\"M12 21a9 9 0 1 0 0-18 9 9 0 0 0 0 18Z\"\/><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M12 6.75V12h5.25\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">\n                5 min\n              <\/p>\n            <\/div>\n                  <\/div>\n        <div class=\"mt-7 md:mt-12 single-post-content\">\n          \n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/proget.pl\/en\/\">Proget<\/a><\/span> &gt; <span><a href=\"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/\">Cyber smart<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\"><strong>Can an MDM system eavesdrop on you through company phone?<\/strong><\/span><\/span><\/div>\n\n\n<div class=\"wp-block-group has-primary-50-background-color has-background has-xs-font-size is-layout-constrained wp-container-core-group-is-layout-6bf6b0c8 wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm);padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">\n<p class=\"has-base-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--2-xs)\"><strong>Jump to:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><ul><li><a href=\"#h-what-is-mdm-and-what-is-it-used-for\" data-level=\"2\">What is MDM and what is it used for?<\/a><\/li><li><a href=\"#h-does-mdm-eavesdrop\" data-level=\"2\">Does MDM eavesdrop?<\/a><\/li><li><a href=\"#h-can-mdm-grant-apps-access-to-the-microphone\" data-level=\"2\">Can MDM grant apps access to the microphone?<\/a><\/li><li><a href=\"#h-how-can-you-tell-if-your-phone-is-currently-eavesdropping-on-you\" data-level=\"2\">How can you tell if your phone is currently eavesdropping on you?<\/a><\/li><li><a href=\"#h-summary\" data-level=\"2\">Summary<\/a><\/li><\/ul><\/div>\n<\/div>\n\n\n\n<p class=\"has-2-xl-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Does MDM eavesdrop or record conversations you have from your work phone? It&#8217;s understandable to have such concerns. When you know that the company manages your phone or tablet, it&#8217;s easy to think that it also controls its microphone.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">In this article, we look at the facts. We will clarify what MDM is and whether it has the ability to record or eavesdrop on conversations. We will also guide you on how to check if and when a company-managed smartphone&#8217;s microphone is recording audio.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-what-is-mdm-and-what-is-it-used-for\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">What is MDM and what is it used for?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\"><strong><span style=\"text-decoration: underline\"><a href=\"https:\/\/proget.pl\/en\/blog\/what-is-an-mdm-system\/\">MDM (Mobile Device Management)<\/a><\/span> is a system that enables companies to remotely and securely manage mobile devices provided for work.<\/strong> While it may sound technical, MDM actually simplifies daily tasks for both the IT department and employees. Here\u2019s an example:<\/p>\n\n\n\n<p class=\"has-neutral-100-background-color has-background has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\"><strong>Imagine<\/strong> starting a new job and getting a company phone &#8211; straight out of the box. Nevertheless, you don&#8217;t have to configure anything. Work apps, mail, contacts and the files you need appear on the device automatically: all you have to do is log into your company account. This is the convenience MDM provides.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\">If you lose your phone, MDM tool can help locate it. If recovery isn&#8217;t possible, the system can remotely lock the device and erase its data to protect against unauthorized access. Additionally, MDM can prevent the installation of applications that may contain viruses or other threats. <strong>All these measures aim to secure the company&#8217;s resources, not to invade users&#8217; privacy.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-full\" style=\"padding-top:var(--wp--preset--spacing--md);padding-bottom:var(--wp--preset--spacing--md)\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"373\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/mdm-podsluch-do-artykulu-druga-grafika-v1.webp\" alt=\"cartoon spy coming out of a smartphone screen\" class=\"wp-image-3136\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/mdm-podsluch-do-artykulu-druga-grafika-v1.webp 673w, https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/mdm-podsluch-do-artykulu-druga-grafika-v1-300x166.webp 300w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/figure>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-does-mdm-eavesdrop\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Does MDM eavesdrop?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\"><strong>No,<\/strong> because MDM operates through <span style=\"text-decoration: underline\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/API\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">application programming interfaces (APIs)<\/a><\/span> provided by mobile operating system manufacturers. These APIs dictate <strong>what an app can and cannot do on a device.<\/strong><\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">Apple and Google, creators of iOS and Android, have implemented mechanisms in their systems <strong>that prevent apps, including MDM, from using the microphone without user knowledge.<\/strong> These restrictions are enforced even when a device is fully managed by IT. No reputable MDM vendor can bypass these protections, as such an app would not be permitted on legitimate platforms (app stores), which enforce compliance with these rules.<\/p>\n\n\n\n<p class=\"has-neutral-100-background-color has-background has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\"><strong>Good to know<\/strong><br><br><strong>If an MDM vendor does not offer its mobile applications (MDM agent and additional applications) in an official store,<\/strong> it raises questions about whether choosing that specific system is wise. <strong>Credible vendors<\/strong> operate transparently, making their solutions available for verification to ensure security and compliance. To better protect corporate data, it&#8217;s advisable to rely on verified software and certified vendors.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\"><strong>Conversely, an MDM system can restrict microphone usage<\/strong> \u2013 completely, in specific apps, or in selected locations. Such <span style=\"text-decoration: underline\"><a href=\"https:\/\/proget.pl\/en\/policies\/\">security policies<\/a><\/span> are commonly employed by law firms, banks, or public institutions that need to minimize the risk of inadvertently recording confidential conversations.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\"><strong>What if a company <em>wants <\/em>to record audio on a device?<\/strong> <\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">In that case, it must install a dedicated app \u2013 not an MDM solution \u2013 and obtain the employee&#8217;s <strong>explicit, informed consent.<\/strong> Additionally, most countries require a legitimate purpose for recording and compliance with local regulations, such as GDPR and the Labor Code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-can-mdm-grant-apps-access-to-the-microphone\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Can MDM grant apps access to the microphone?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">Some applications, like instant messaging or voice recorders, <strong>need access to the microphone.<\/strong> However, both Android and iOS systems <strong>do not allow apps to use the microphone without your knowledge.<\/strong> By default, when you launch an app for the first time, you will see a message asking for permission to access the microphone. You can choose to accept or reject this request.<\/p>\n\n\n\n<p class=\"has-neutral-100-background-color has-background has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">If an app, such as a workout app, asks for <strong>microphone access,<\/strong> consider whether it genuinely needs it. When in doubt, you can refuse access. If an important function stops working, the app will prompt you again for permissions, allowing you to make a more <strong>informed decision.<\/strong><\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">For <strong>MDM-managed devices,<\/strong> the situation is more complex:<\/p>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm)\" class=\"wp-block-list\">\n<li class=\"has-lg-font-size\"><strong>Android:<\/strong> the administrator can grant apps access to the microphone on your behalf, but only within the areas of the device managed by MDM. This does not mean that the microphone will operate covertly, <strong>as the device will display an appropriate activity indicator <\/strong>(see the graphic below).<\/li>\n\n\n\n<li class=\"has-lg-font-size\"><strong>iOS:<\/strong> on Apple devices, privacy protection is more stringent. Even in full control mode, the administrator <strong>cannot grant microphone access to any application; this must always be done by the user.<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-how-can-you-tell-if-your-phone-is-currently-eavesdropping-on-you\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">How can you tell if your phone is currently eavesdropping on you?<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">Simply granting an app access to the microphone <strong>does not allow it to use it secretly.<\/strong> Both iOS and Android clearly indicate when the microphone is active.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">On iOS (from version 14), an orange dot appears at the top of the screen. On Android (from version 12 onward), a green indicator is displayed, and users can also completely disable the microphone with a single click.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"568\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/mdm-podsluch-do-artykulu-EN.webp\" alt=\"microphone activity indicators on Android and Apple devices\" class=\"wp-image-3134\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/mdm-podsluch-do-artykulu-EN.webp 673w, https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/mdm-podsluch-do-artykulu-EN-300x253.webp 300w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/figure>\n<\/div>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-top:var(--wp--preset--spacing--lg);margin-bottom:var(--wp--preset--spacing--sm)\">If you notice that your microphone is activated but you&#8217;re not making a call or video call, you can easily check which app is using this feature. <strong>Simply go to your device&#8217;s privacy settings and review the list of apps that have permission to access the microphone.<\/strong> It&#8217;s likely that the app utilizing the microphone has already been granted access \u2013 either by you or the company.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-summary\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Summary<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">MDM is a tool designed to <strong>securely manage your company&#8217;s devices.<\/strong> It allows for remote configuration, application installation, data security, and response measures if devices are lost. <strong>It is not intended for eavesdropping or recording calls \u2013 seriously! \ud83d\ude0a<\/strong><\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">Both Android and iOS have <strong>built-in mechanisms to protect users&#8217; privacy,<\/strong> even on devices controlled by a company. Granting apps permission to use the microphone requires your explicit consent, and any microphone activity is indicated by <strong>indicators visible on the screen.<\/strong><\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">If you&#8217;re worried that MDM is eavesdropping on you through a company smartphone, you can relax. Not even a particularly zealous employer can alter this setup. The system is not designed to record sound; rather, <strong>it is intended to streamline processes and safeguard company data, not to track employees.<\/strong><\/p>\n\n\n<div class=\"alignfull !px-0 bg-background-black text-text-inverted\">\n  <div \n    class=\"is-layout-constrained is-layout-constrained-root px-6 md:px-16\"\n>\n    \n\n<div class=\"wp-block-group has-lg-font-size is-layout-constrained wp-block-group-is-layout-constrained\"><div\n  id=\"block_8bbdf5b01f91fe33d8f42703fa72e916\"\n  class=\"grid grid-cols-1 lg:grid-cols-12 gap-y-16 gap-x-10 py-[--wp--preset--spacing--2-xl] items-center\"\n  style=\"padding-top:var(--wp--preset--spacing--lg);padding-bottom:var(--wp--preset--spacing--lg)\"\n>\n  <div \n    class=\"is-layout-constrained lg:col-span-6 lg:order-1 order-3\"\n>\n    \n<h2\n  class=\"text-3xl !leading-[1.2] font-bold wp-block-heading align-text-left\" style=\";\" id=\"block_e5ed25aa31b65fc0059fb310ac4c9817\"\n>\n  Our MDM agent is&nbsp;on&nbsp;Google Play&#8230;\n<\/h2>\n\n<div \n  id=\"block_07b2c0dd143be4df72615eb79ff2cb33\"\n  class=\"flex flex-wrap gap-4 wp-block-buttons justify-start\"\n  style=\"padding-top:var(--wp--preset--spacing--sm)\"\n>\n  \n<a\n    href=\"https:\/\/proget.pl\/en\/trial\/\" target=\"\" rel=\"noopener\" style=\"min-width: 200px\" class=\"!inline-flex items-center justify-center outline outline-1 -outline-offset-1 rounded-full font-prebold no-underline hover:no-underline focus:no-underline transition-colors duration-300 linear whitespace-nowrap font-sans-alt !leading-[1.362] [&amp;_svg]:flex-none bg-button-primary-main-fill !text-button-primary-main-text outline-button-primary-main-outline hover:bg-button-primary-hover-fill hover:!text-button-primary-hover-text hover:outline-button-primary-hover-outline disabled:bg-button-primary-disabled-fill disabled:!text-button-primary-disabled-text disabled:outline-button-primary-disabled-outline focus:bg-button-primary-selected-fill focus:!text-button-primary-selected-text focus:outline-button-primary-selected-outline button-small text-[0.8125rem] px-4 py-2 gap-2 [&amp;_svg]:w-4 [&amp;_svg]:h-4 wp-block-button !inline-flex\"\n>\n    \n    <span\n        class=\"\"\n    >\n        Costs nothing to test the best\n    <\/span>\n\n            <svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M2.5 8H13.5\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n<path d=\"M9 3.5L13.5 8L9 12.5\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n<\/svg>\n    <\/a>\n\n<\/div>\n\n<\/div>\n  <div class=\"hidden lg:block order-2\"><\/div>\n\n  <div class=\"text-center lg:col-span-5 hidden md:block lg:order-3 order-1\">\n          <img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"350\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/05\/510x350_reklama-grafika-1-en.webp\" class=\"inline-block w-full h-auto rounded-lg\" alt=\"laptop screen with view of Proget console and phone with Proget agent\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/05\/510x350_reklama-grafika-1-en.webp 510w, https:\/\/proget.pl\/app\/uploads\/2\/2025\/05\/510x350_reklama-grafika-1-en-300x206.webp 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/>      <\/div>\n\n      <div class=\"text-center lg:col-span-5 block md:hidden lg:order-3 order-1\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"350\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/05\/510x350_reklama-grafika-1-en.webp\" class=\"inline-block w-full h-auto rounded-lg\" alt=\"laptop screen with view of Proget console and phone with Proget agent\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/05\/510x350_reklama-grafika-1-en.webp 510w, https:\/\/proget.pl\/app\/uploads\/2\/2025\/05\/510x350_reklama-grafika-1-en-300x206.webp 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/>    <\/div>\n  <\/div><\/div>\n\n\n<\/div><\/div>\n\n\n<hr class=\"wp-block-separator has-text-color has-brand-fog-color has-alpha-channel-opacity has-brand-fog-background-color has-background is-style-default\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:0\" \/>\n\n\n\n<div class=\"wp-block-group has-base-white-background-color has-background is-nowrap is-layout-flex wp-container-core-group-is-layout-837611ba wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:0;padding-top:0;padding-right:var(--wp--preset--spacing--sm);padding-bottom:0;padding-left:var(--wp--preset--spacing--sm)\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-700cb50f wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-f078265f wp-block-column-is-layout-constrained\" style=\"padding-right:0;flex-basis:48px\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Agnieszka-P-100.webp\" alt=\"\" class=\"wp-image-2976\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-e1564d08 wp-block-column-is-layout-constrained\" style=\"padding-left:0\">\n<p>Author: Agnieszka Pierlak<\/p>\n\n\n\n<p style=\"margin-top:0;margin-bottom:0.7em;font-size:0.7em\">Marketing specialist with experience in the IT industry. Interested in issues related to cybersecurity and internal security. Privately, a lover of good literature, Asian cuisine and mountain hiking.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n        <\/div>\n      <\/article>\n      <aside class=\"mt-10 xl:mt-0\">\n        <div class=\"hidden xl:block xl:mb-10\">\n          <form role=\"search\" action=\"https:\/\/proget.pl\/en\/blog\/\" autocomplete=\"off\">\n  <div class=\"w-full inline-block relative \">\n    <input\n      class=\"peer w-full bg-transparent text-text-primary font-medium text-sm shadow-01 pr-3 pl-10 pt-xs border border-border-secondary rounded-lg transition-all hover:border-border-active hover:bg-surface-hover-01 focus:border-border-active focus:outline-0 focus:ring-0 disabled:bg-border-disabled disabled:text-text-disabled disabled:cursor-not-allowed disabled:border-border-disabled h-[50px]\"\n      placeholder=\" \"\n      type=\"text\"\n      name=\"s\"\n      value=\"\"\n      id=\"search\"\n    \/>\n    <label\n      class=\"flex w-full h-full select-none pointer-events-none absolute left-0 pr-3 pl-10 transition-all !overflow-visible truncate leading-tigh text-text-tertiary peer-placeholder-shown:text-text-tertiary peer-disabled:text-text-disabled peer-disabled:peer-placeholder-shown:text-text-disabled peer-placeholder-shown:text-sm text-xs peer-focus:text-xs top-[7px] peer-placeholder-shown:top-[15px] peer-focus:top-[7px]\"\n      for=\"search\"\n    >\n      Search\n    <\/label>\n    <button type=\"submit\" class=\"absolute left-0 top-[calc(50%-20px)] w-10 h-[40px] pl-1 flex items-center justify-center\">\n      <svg class=\"w-5 h-5 shrink-0 stroke-primary-500 pointer-events-none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 20 20\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M9.063 15.625a6.562 6.562 0 1 0 0-13.125 6.562 6.562 0 0 0 0 13.125Zm4.64-1.922L17.5 17.5\"\/><\/svg>    <\/button>\n  <\/div>\n<\/form>\n        <\/div>\n                  <h2 class=\"text-text-secondary text-lg font-semibold mb-6\">More articles:<\/h2>\n          <div class=\"grid gap-6\">\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/what-is-an-mdm-system\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/co-to-MDM-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with a laptop, shield with MDM inscription surrounded by question marks\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    What is an MDM (Mobile Device Management) system \u2013 everything you should know\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/how-to-remove-mdm-from-a-company-phone\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/mdm-pracownicy-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop, shield with MDM text and locked phone\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    How to remove MDM from a company phone \u2013 is it worth it? Does the system affect employees?\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/situational-awareness\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/swiadomosc-sytuacyjna_03-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and icons, situational awareness, receiving signals\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Situational awareness: a skill that you can use in your daily and professional life\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/does-your-company-need-mdm\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/06\/7-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with a laptop and a shield icon with MDM written on it\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Check if your company also needs a professional MDM solution\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/03\/24-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and padlocked shield icon, cogs, tile with password stars\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Cyber hygiene in business \u2013 learn the simple rules and how you can support it\n                  <\/h3>\n                <\/div>\n              <\/a>\n                      <\/div>\n              <\/aside>\n    <\/main>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Does MDM eavesdrop or record conversations you have from your work phone? It&#8217;s understandable to have such concerns. When you know that the company manages your phone or tablet, it&#8217;s easy to think that it also controls its microphone. In this article, we look at the facts. We will clarify what MDM is and whether it has the ability to record or eavesdrop on conversations. We will also guide you on how to check if and when a company-managed smartphone&#8217;s microphone is recording audio. What is MDM and what is it used for? MDM (Mobile Device Management) is a system that enables companies to remotely and securely manage mobile devices provided for work. While it may sound technical, MDM actually simplifies daily tasks for both the IT department and employees.<\/p>\n","protected":false},"author":3,"featured_media":3120,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-3117","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersmart"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Can an MDM system eavesdrop on you through company phone? | Proget<\/title>\n<meta name=\"description\" content=\"We look at the facts. We also show you how to check if and when your company smartphone&#039;s microphone is recording sound.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can an MDM system eavesdrop on you through company phone?\" \/>\n<meta property=\"og:description\" content=\"We look at the facts. We also show you how to check if and when your company smartphone&#039;s microphone is recording sound.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/\" \/>\n<meta property=\"og:site_name\" content=\"Proget\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-17T06:01:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-19T12:52:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/MDM-podsluch_02.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1351\" \/>\n\t<meta property=\"og:image:height\" content=\"296\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Agnieszka Pierlak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Agnieszka Pierlak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/\"},\"author\":{\"name\":\"Agnieszka Pierlak\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/person\\\/2511d4c9e540e5daf31b4f90bc874539\"},\"headline\":\"Can an MDM system eavesdrop on you through company phone?\",\"datePublished\":\"2025-07-17T06:01:06+00:00\",\"dateModified\":\"2025-11-19T12:52:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/\"},\"wordCount\":1030,\"publisher\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2025\\\/07\\\/MDM-podsluch_02.webp\",\"articleSection\":[\"Cyber smart\"],\"inLanguage\":\"en-GB\",\"accessibilityFeature\":[\"tableOfContents\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/\",\"name\":\"Can an MDM system eavesdrop on you through company phone? | Proget\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2025\\\/07\\\/MDM-podsluch_02.webp\",\"datePublished\":\"2025-07-17T06:01:06+00:00\",\"dateModified\":\"2025-11-19T12:52:35+00:00\",\"description\":\"We look at the facts. We also show you how to check if and when your company smartphone's microphone is recording sound.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/#primaryimage\",\"url\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2025\\\/07\\\/MDM-podsluch_02.webp\",\"contentUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2025\\\/07\\\/MDM-podsluch_02.webp\",\"width\":1351,\"height\":296,\"caption\":\"banner with a laptop and a phone, graphics with microphone, earpiece, magnifying glass, and eye icons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/can-mdm-eavesdrop\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Proget\",\"item\":\"https:\\\/\\\/proget.pl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber smart\",\"item\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/category\\\/cybersmart\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Can an MDM system eavesdrop on you through company phone?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/\",\"name\":\"Proget\",\"description\":\"Enterprise Mobility Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/proget.pl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\",\"name\":\"Proget Sp. z o.o.\",\"alternateName\":\"Proget\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/04\\\/logo-space-white-1.svg\",\"contentUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/04\\\/logo-space-white-1.svg\",\"width\":1,\"height\":1,\"caption\":\"Proget Sp. z o.o.\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/proget-software\\\/\"],\"description\":\"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\\\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.\",\"legalName\":\"Proget Sp. z o.o.\",\"foundingDate\":\"2012-03-27\",\"taxID\":\"5472142508\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/person\\\/2511d4c9e540e5daf31b4f90bc874539\",\"name\":\"Agnieszka Pierlak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"caption\":\"Agnieszka Pierlak\"},\"description\":\"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/author\\\/apierlak\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Can an MDM system eavesdrop on you through company phone? | Proget","description":"We look at the facts. We also show you how to check if and when your company smartphone's microphone is recording sound.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/","og_locale":"en_GB","og_type":"article","og_title":"Can an MDM system eavesdrop on you through company phone?","og_description":"We look at the facts. We also show you how to check if and when your company smartphone's microphone is recording sound.","og_url":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/","og_site_name":"Proget","article_published_time":"2025-07-17T06:01:06+00:00","article_modified_time":"2025-11-19T12:52:35+00:00","og_image":[{"width":1351,"height":296,"url":"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/MDM-podsluch_02.webp","type":"image\/webp"}],"author":"Agnieszka Pierlak","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Agnieszka Pierlak","Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/#article","isPartOf":{"@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/"},"author":{"name":"Agnieszka Pierlak","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539"},"headline":"Can an MDM system eavesdrop on you through company phone?","datePublished":"2025-07-17T06:01:06+00:00","dateModified":"2025-11-19T12:52:35+00:00","mainEntityOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/"},"wordCount":1030,"publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/MDM-podsluch_02.webp","articleSection":["Cyber smart"],"inLanguage":"en-GB","accessibilityFeature":["tableOfContents"]},{"@type":"WebPage","@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/","url":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/","name":"Can an MDM system eavesdrop on you through company phone? | Proget","isPartOf":{"@id":"https:\/\/proget.pl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/#primaryimage"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/MDM-podsluch_02.webp","datePublished":"2025-07-17T06:01:06+00:00","dateModified":"2025-11-19T12:52:35+00:00","description":"We look at the facts. We also show you how to check if and when your company smartphone's microphone is recording sound.","breadcrumb":{"@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/#primaryimage","url":"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/MDM-podsluch_02.webp","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2025\/07\/MDM-podsluch_02.webp","width":1351,"height":296,"caption":"banner with a laptop and a phone, graphics with microphone, earpiece, magnifying glass, and eye icons"},{"@type":"BreadcrumbList","@id":"https:\/\/proget.pl\/en\/blog\/can-mdm-eavesdrop\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Proget","item":"https:\/\/proget.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber smart","item":"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/"},{"@type":"ListItem","position":3,"name":"Can an MDM system eavesdrop on you through company phone?"}]},{"@type":"WebSite","@id":"https:\/\/proget.pl\/en\/#website","url":"https:\/\/proget.pl\/en\/","name":"Proget","description":"Enterprise Mobility Management","publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proget.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/proget.pl\/en\/#organization","name":"Proget Sp. z o.o.","alternateName":"Proget","url":"https:\/\/proget.pl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","width":1,"height":1,"caption":"Proget Sp. z o.o."},"image":{"@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/proget-software\/"],"description":"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.","legalName":"Proget Sp. z o.o.","foundingDate":"2012-03-27","taxID":"5472142508"},{"@type":"Person","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539","name":"Agnieszka Pierlak","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","caption":"Agnieszka Pierlak"},"description":"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.","url":"https:\/\/proget.pl\/en\/blog\/author\/apierlak\/"}]}},"_links":{"self":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/3117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/comments?post=3117"}],"version-history":[{"count":4,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/3117\/revisions"}],"predecessor-version":[{"id":3137,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/3117\/revisions\/3137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media\/3120"}],"wp:attachment":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media?parent=3117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/categories?post=3117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/tags?post=3117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}