There is a growing gap between company-sanctioned apps, services and programs and what employees are actually using. This gap is called “Shadow IT” and it is emerging as a major challenge for both in-house and outside counsel as well as CIOs, chief privacy officers and chief information security officers.
Managing Risk in Light of 'Shadow IT'
Information Governance in the Age of Cloud Application Proliferation

This premium content is locked for Cybersecurity Law & Strategy subscribers only
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN Cybersecurity Law & Strategy
- Stay current on the latest information, rulings, regulations, and trends
- Includes practical, must-have information on copyrights, royalties, AI, and more
- Tap into expert guidance from top entertainment lawyers and experts
Already have an account? Sign In Now
For enterprise-wide or corporate access, please contact Customer Service at [email protected] or call 1-877-256-2473.






