Safety note

Use a personal phone and personal email when you can. Stay off company devices, company chat, and company accounts for organizing conversations.

Checklist
Checklists & Tools
Checklists
Device and account safety
Safety basics

Company Device and Account Safety Checklist

Assume company devices, company accounts, and company networks are not private. You do not need paranoia theatre. You do need cleaner habits. If you can, do this instead use a pers

General digital-safety guidance for workersLast reviewed April 22, 2026reviewed for source accuracyhigh risk

Educational, not legal advice

Before you use this page

Treat this as orientation, not as a legal decision.

These pages are meant to help workers slow down, sort the facts, and choose a safer next page. They do not replace advice from a labor lawyer, organizer, or local labor institution.

Use when

Use when workers need a calmer digital-safety checklist before they start comparing notes, sharing documents, or moving a conversation off employer systems.

Not for

Not for promising anonymity, defeating employer monitoring, or replacing a real security plan in a high-risk case.

Authority footing

Mixed sourcing. Last reviewed April 22, 2026. Risk level: high.

Legal scope

Educational, not legal advice

Checklist

Checklists & Tools

Read the page, then use the rail.

Assume company devices, company accounts, and company networks are not private. You do not need paranoia theatre. You do need cleaner habits.

If you can, do this instead

  • use a personal phone and personal email
  • use a personal messaging app with end-to-end encryption
  • meet in person for the most sensitive early conversations when that is practical
  • use personal notes, not company docs, for your timeline and issue comparisons

Lock down the basics on personal accounts

  • use strong unique passwords
  • turn on multifactor authentication
  • update your phone, laptop, browser, and messaging apps
  • slow down before clicking links or attachments that look urgent or strange

Those are plain habits, but they matter. CISA's baseline guidance still starts there for a reason.

Do not do this on employer systems if you can avoid it

  • do not organize in company chat
  • do not use company email for planning
  • do not store worker notes in company docs, tickets, or project boards
  • do not assume deleting a message means it stopped existing
  • do not mix your personal life into a company-managed phone or laptop just because it is convenient

Why this matters

The NLRB General Counsel's monitoring memo describes employer tools that can include keyloggers, screenshots, webcam photos, audio recording, GPS tracking, and other monitoring practices. The point here is not to promise invisibility. It is to stop workers from casually feeding sensitive organizing activity into systems the employer already controls.

Safer communication defaults

  • in person is often the cleanest choice for early sensitive conversation
  • if you need a digital channel, prefer end-to-end encrypted messaging
  • keep group spaces smaller and later than your instincts may want
  • keep the first notes and conversations one-to-one where possible

The EFF's communication guidance makes the same basic point: in-person is often most privacy-protective, and otherwise end-to-end encryption is the next best move. CISA's mobile communications guidance also points targeted users toward end-to-end encrypted communications.

What this checklist is not

This is not a promise that personal tools make workers anonymous. It is not a guide to defeating monitoring software. It is a discipline checklist for reducing needless exposure before trust and structure are real.

Page facts

Use this page as reference, not as a script.

Page type

Checklist

Category

Checklists & Tools

Risk level

high

Jurisdiction

General digital-safety guidance for workers

When to use

Use when workers need a calmer digital-safety checklist before they start comparing notes, sharing documents, or moving a conversation off employer systems.

Not for

Not for promising anonymity, defeating employer monitoring, or replacing a real security plan in a high-risk case.

Last reviewed

April 22, 2026

Review status

reviewed-for-source-accuracy

Source footing

Mixed sourcing

Source list

5 structured sources

Legal scope

Educational, not legal advice