I need to sound the alarm on something that security teams are not taking seriously enough: the proliferation of workplace location tracking tools, and what happens when this data inevitably gets breached.
Microsoft’s new Teams Wi-Fi location tracking feature – which auto-detects whether employees are in the office based on their device’s Wi-Fi connection – is the latest in a growing category of “workplace intelligence” tools. But from a privacy and security engineering perspective, this feature class introduces risks that most organizations have not threat-modeled.
The Attack Surface Nobody Is Discussing
When Teams tracks your office presence via Wi-Fi, it generates a longitudinal dataset of your physical patterns:
- When you arrive and leave (Wi-Fi connect/disconnect timestamps)
- Which building you are in (if the org uses per-building SSIDs or AP mapping)
- How often you come in (weekly patterns over months)
- Whether you travel (absence patterns correlate with PTO and travel)
This data lives in Microsoft 365 telemetry, accessible to IT admins, and potentially exposed through Microsoft Graph API. If an attacker compromises an admin account – which happens regularly through phishing – they now have a physical surveillance map of your workforce.
This is not theoretical. In 2025 alone, multiple Fortune 500 companies experienced Microsoft 365 breaches through compromised admin credentials. Adding physical location data to that exposure profile changes the risk calculus dramatically.
GDPR Is Not a Suggestion
For companies operating in the EU, the legal exposure is substantial. The GDPR requires a lawful basis for processing personal data, and “employee location relative to office” is unambiguously personal data. The six lawful bases under GDPR are:
- Consent (but employee consent is considered unreliable due to power imbalance – EDPB guidance)
- Contract necessity (tracking location is not necessary to fulfill an employment contract)
- Legal obligation (no law requires employers to track office presence via Wi-Fi)
- Vital interests (not applicable)
- Public task (not applicable)
- Legitimate interest (requires a balancing test, and employee privacy rights likely outweigh)
Companies that enable Teams location tracking for EU employees without a Data Protection Impact Assessment (DPIA) are walking into regulatory crosshairs. The EU Data Protection Authorities have been increasingly aggressive about workplace surveillance, with multiple six-figure fines in 2025 for less invasive tracking.
Beyond GDPR: US State Privacy Laws Are Catching Up
Even in the US, the landscape is shifting. As of 2026:
- California (CPRA) includes employee data protections
- Illinois (BIPA) could apply if biometric aspects are involved
- New York and Massachusetts are advancing employee monitoring disclosure laws
- Connecticut already requires employers to disclose electronic monitoring
The patchwork of state laws means a company enabling Teams location tracking across US offices may face different compliance requirements in different states. Most HR teams are not prepared for this.
What Security Teams Should Do Right Now
If your organization is considering or has already enabled workplace location tracking through Teams or any similar tool:
- Conduct a DPIA before enabling the feature. Document the purpose, necessity, and proportionality of collecting this data.
- Implement data minimization: If the goal is presence verification, store only “in office / not in office” – not timestamps, building IDs, or historical patterns.
- Set retention limits: Location data should auto-delete after the shortest defensible period. 30 days maximum.
- Restrict access: Only designated HR personnel should see location data. Managers should not have direct access.
- Audit access logs: Every query of location data should be logged and auditable.
- Create a written policy: Employees must know exactly what is tracked, who can see it, and how it will (and will not) be used.
- Separate from performance data: Location data must never feed into performance review systems or influence promotion decisions.
The real question for this community: how many of your organizations have even discussed the privacy implications of these tools with your security or legal teams? My guess is very few.