Angry University of Alaska workers

“There are no supreme saviors / Neither God, nor Caesar, nor tribune / Producers, let us save ourselves!”
The Internationale

Don't do University work with personal devices! )

If you dare to fight the University of Alaska bosses, they will spy on you. If you’re using their resources, they can read your email, your chats. They can go through what you store in Google Drive or OneDrive. They can watch you on their innumerable cameras. They can track what you print. They can see what you asked CoPilot or Gemini. They can log the sites you browse. So on and so on.

But don’t think you’re any safer at home. If you do University work on a personal device, the bosses have carte blanche to examine that device. Per the Board of Regents’ Policies and Regulations “R02.07.066 Mobile Device Security”:

Faculty, staff, students, affiliates, and others with access to university information resources acknowledge that utilization of any personally owned computer equipment, including laptop computers and mobile devices, to access, store manipulate, or transmit non-public university data or resources leads to a reduced expectation of privacy with respect to that equipment, and that the equipment is subject to inspection by the university in the event that equipment has been compromised or otherwise may have exposed non-public university data, or has been utilized in furtherance of a violation of regents’ policy or university regulation, or may contain evidence relevant to a determination of whether or not such compromise, exposure, or violation may have occurred. Such inspection or examination will be limited to that degree necessary to determine whether and to what extent such compromise, exposure or violation has occurred; what safeguards were not in place or otherwise failed to prevent the occurrence; what remediation steps are appropriate; and what preventive steps will be necessary to avoid recurrence. A request for the employee to consent to the inspection of a personal device can be made by any information resources personnel. A user unwilling to cooperate in the inspection may request an immediate review by the chief information security officer or designee, who will make the final determination whether an inspection under this section is to be conducted. Should the chief information security officer determine that an inspection is necessary, any subsequent inspection and investigation will comply with all applicable regents’ policies, university regulations, state, and federal laws.

All you can do to avoid this is to never do University work on your personal devices. This is good operational security for those who are fighting the bosses. But it’s also a good idea in general. Claw back your time from these vampires! Don’t work when you’re not at work!