The "Shadow IT" Audit
Employees often use unauthorized apps or personal cloud drives to bypass clunky internal systems, creating massive, unmanaged record silos.
Identifying these rogue applications allows you to capture missing records and understand where your official systems are failing users.
  1. Have you noticed employees conducting official business on personal messaging apps or unauthorized cloud accounts?
  2. Why do your users feel the need to bypass the approved Electronic Records Management System?
Action Item: Survey three colleagues to find out what unofficial tools they use to share large files.
2
1 comment
Paul Mullon
5
The "Shadow IT" Audit
powered by
Records Information Management
skool.com/records-information-management-7849
This is a Community for records & information professionals to master global standards, modern practices, and lead digital recordkeeping.
Build your own community
Bring people together around your passion and get paid.
Powered by