What about running Prey on a device someone else uses? Is that a violation of privacy?
Good question. First of all, if the device doesn’t belong to you, you should immediately remove Prey as that is not only a violation of privacy but also a violation of our Terms of Service. Now, if the device is indeed yours (i.e. company, school, university, etc) then the answer really depends on the privacy laws in your country.
So yes, if Prey is installed, it is possible for whoever owns the account it is associated to, to use whatever features it has while the end user is using the machine.
As an IT security advocate, I'd be nervous about a company installing tracking software on a machine and then encouraging me to use it for personal tasks. The benign implication is that they really are using Prey just as an anti-theft tool, and you aren't being monitored at all; the more onerous possibility is that Prey is being used to monitor those "personal" activities.
So basically, it's possible. Are they actually doing it? You probably won't know. So, it's up to you to decide where on that spectrum you're going to stand.