The following description comes from the Google Play Store description of the app:Setup: http://support.divide.com/categories/20091027-Setup
Divide creates a separate and secure workspace on your phone or tablet, so you can access work data, while keeping your personal life private from your employer. Divide offers employees and companies a secure tool for Bring-your-own-device (BYOD) programs. Syncs with Exchange ActiveSync, Google Apps, and Lotus Notes.
WORK & PERSONAL LIFE ON A SINGLE DEVICE
With Divide, you don’t have to compromise your freedom and privacy to do work on your personal device because Divide keeps both of your environments separate. All of your work data is accessed and stored in the Divide workspace so you can enjoy all the benefits of using your favorite device, with full confidence that corporate data stays secure. When you’re done working, Divide technology lets you simply switch to the personal environment for things like personal texts messages and pictures.
Divide comes supercharged with a suite of enhanced business apps that are fully-encrypted and compliant with your company's security policies.
• Secure Email
• Work Calendar
• Work Contacts
• Private Browser
• Encrypted Files
DEVICE MANAGEMENT IN THE CLOUD
All Divide users get free access to MyDivide (my.divide.com), putting you in control of your device like never before. Remotely locate a lost device, wipe sensitive data, view usage statistics, and more... all from your web browser!
ENTERPRISE GRADE SECURITY
All applications running in the Divide workspace take advantage of Divide’s enhanced security. Divide’s full on-flash encryption ensures that none of your personal apps can ever read business data inside the secure Divide workspace.
For IT Admins:
Divide is a turnkey remote management solution, augmented by the most advanced and secure cloud-based console — Divide Manager. Administrators can also seamlessly extend existing business services and deploy 3rd party apps. Learn more by visiting www.divide.com.
With powerful productivity apps out-of-the-box, support for various enterprise mail systems and complete personal and IT cloud management, Divide is the next generation of enterprise mobility and the perfect solution to BYOD (“Bring Your Own Device”).
We dedicate time each day to listen to your feedback and work on feature requests that come from you. Contact us at email@example.com to provide your thoughts on how we can build a better product. For additional support, please also visit http://support.divide.com to search our help forums.
|Full network access||Can access the internet||It appears this app uses this data for internal use within the app's functionality|
|Can access the internet||It appears this app uses this data for utility purposes|
|Read phone status and identity||Can read phone's current state information like in-phone call, phone signal, carrier, device ID, and phone number||Utility|
|Find accounts on the device||Can use user's account information stored on the phone||Utility|
|Modify your contacts||Can edit contacts on device||Not analyzed yet|
|Add or modify calendar events and send email to guests without owners\' knowledge||Allows an application to write the user's calendar data.||Not analyzed yet|
|Use accounts on the device||Allows the app to request authentication tokens.||Not analyzed yet|
|Draw over other apps||Can create alerts on other apps or parts of the user interface||Not analyzed yet|
|Write subscribed feeds||Allows the app to modify your currently synced feeds. Malicious apps may change your synced feeds.||Not analyzed yet|
|Send sms messages||Can send SMS messages||Not analyzed yet|
|Receive text messages (sms)||Can receive SMS messages||Not analyzed yet|
|Receive text messages (mms)||Allows an application to monitor incoming MMS messages.||Not analyzed yet|
|Read your text messages (sms or mms)||Can read SMS messages||Not analyzed yet|
|Read your contacts||Can read user's contact list (phone book) and phone call history||Not analyzed yet|
|Read calendar events plus confidential information||Allows an application to read the user's calendar data.||Not analyzed yet|
|Reroute outgoing calls||Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether.||Not analyzed yet|
|Add or remove accounts||Can manage user's accounts on the phone||Not analyzed yet|
|Close other apps||Allows an application to call killBackgroundProcesses(String).||Not analyzed yet|
|Retrieve running apps||Can retrieve information on currently and recently running apps on the device||Not analyzed yet|
|Disable your screen lock||Allows applications to disable the keyguard if it is not secure.||Not analyzed yet|
|Connect and disconnect from wi-fi||Can connect to and disconnect from Wi-Fi access points||Not analyzed yet|
|Change network connectivity||Allows applications to change network connectivity state.||Not analyzed yet|
|Directly call phone numbers||Can call phone numbers||Not analyzed yet|
|Access bluetooth settings||Allows applications to discover and pair bluetooth devices.||Not analyzed yet|
|Pair with bluetooth devices||Can connect to user's Bluetooth devices||Not analyzed yet|
|Create accounts and set passwords||Can use user's account authentication information (like password) or create new accounts||Not analyzed yet|
|Precise location (gps and network-based)||Can use user's precise location||Not analyzed yet|
|Write call log||Can change your device’s call log including incoming and outgoing calls data||Not analyzed yet|
|Approximate location (network-based)||Can use user's approximate location||Not analyzed yet|
|Read call log||Can read your device’s call log, including incoming and outgoing calls||Not analyzed yet|
|Edit your text messages (sms or mms)||Allows the app to write to SMS messages stored on your tablet or SIM card. Malicious apps may delete your messages.||Not analyzed yet|
|Modify or delete the contents of your usb storage||Can write to your phone's USB storage||Not analyzed yet|
Version of the app analyzed:
App was last analyzed by Privacy Grade on:
Why does this app have this grade?
Our method for grading apps uses a privacy model that we built. This model is based on crowdsourced surveys that we conducted to capture people’s expectations and comfort levels with various app behaviors.
See the sensitive permissions table below the app description to see the permissions that made users of the app uncomfortable.
If you have issues about the information on this page, click the button below to send us feedback.Send Us Feedback