Quote:
Originally Posted by JSanders
well at least you know now...
|
I still don't know with certainty.
I know the company's IT department has a wide range of latitude in setting permissions on their handsets. But do PIN messages actually flow through the BES so, as with transitional email, they can be recorded, monitored, and read by IT?
My thinking has always been anything on a company's handset is fair game for them to see and I act accordingly. But from a technical standpoint, I'm still curious how PIN messages are routed. I've seen authoritative explanations that contradict themselves.