A processor may receive user command generated by a user. A processor may analyze user information for one or more official activities. The one or more official activities are based, at least in part, on a security policy. A processor may identify the user information is associated with the one or more official activities. A processor may prevent, responsive to determining the user command is associated with the one or more official activities, the one or more personal devices from collecting the user command.