Information Security 8 min read

Analysis of Deepin's "Resignation Tendency Analysis" Service and Its Privacy Implications

The article examines how Deepin's "Resignation Tendency Analysis" service monitors employee online behavior, outlines the features offered, discusses legal and privacy concerns, and presents public reactions and alternative viewpoints on the broader issue of workplace surveillance.

IT Services Circle
IT Services Circle
IT Services Circle
Analysis of Deepin's "Resignation Tendency Analysis" Service and Its Privacy Implications

Recent netizens have shared personal experiences of being monitored by a so‑called "Resignation Tendency Analysis" service allegedly provided by Deepin (深信服), sparking heated debate over privacy violations.

"Don’t think I don’t know what you do at work; I know exactly when you want to leave!"

The service claims to collect data such as software usage, resume submissions, and website visits to generate a list of employees with potential resignation risk and assign risk levels.

According to Deepin, the product is part of its "Behavior Awareness System" (BA) that performs deep modeling of massive web‑traffic logs to provide various behavior‑perception applications, including full‑network traffic analysis, office‑network analysis, event perception, data‑leak tracing, work‑efficiency analysis, and internet‑addiction analysis.

"It’s like selling a knife with a license; we can’t control who buys it or how it’s used."

Deepin’s public page describes the system as a behavior‑awareness platform that continuously extracts value from user‑behavior data, offering features such as potential‑risk lists, risk analysis, and detailed usage statistics (e.g., which department accessed which recruitment sites, duration, frequency, etc.).

Legal experts note that while companies may legally monitor work‑related internet activity, they lack the right to inspect personal data without employee consent, making the line between legitimate monitoring and privacy infringement blurry.

"If it concerns work‑related browsing, the company can view it; if it concerns personal matters, the company has no right without authorization."

Netizens suggest practical ways to evade such monitoring, such as using mobile devices for job searches, submitting resumes with alternate accounts, or routing traffic through a personal VPS.

Other firms, including Qi An Xin (奇安信) and various niche vendors, also offer similar employee‑monitoring solutions, ranging from basic to advanced versions with features like screenshot capture of chat records, mouse‑click counting, and keystroke monitoring.

Overall, the discussion highlights a growing industry of employee‑behavior analytics tools, the tension between organizational risk management and individual privacy rights, and the need for clearer legal frameworks and corporate responsibility.

privacyemployee monitoringinformation securitydata privacyBehavior Analysisnetwork traffic analysis
IT Services Circle
Written by

IT Services Circle

Delivering cutting-edge internet insights and practical learning resources. We're a passionate and principled IT media platform.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.