One of the most important accountabilities of the modern CIO is data integrity. The corporation must be confident that the data it uses to make strategic business decisions is safe, accurate, and private. There is no question that the IT department and its CIO is ultimately responsible for assuring this is true.\n\nBut ensuring data integrity is a daunting task. In the face of hackers, data repositories in the cloud, and ever-changing technology, data integrity is an ongoing battle \u2014 one made much more difficult by the presence of shadow IT. And it will only get worse as AI opportunities make it easier for employees to misuse corporate data.\n\nShadow IT: Unsanctioned and persistent\n\nFirst, let\u2019s define terms. Gartner defines shadow IT as IT devices, software, and services outside the ownership or control of the IT organization. This definition includes IT devices not controlled by the corporation, software that may exist on corporate IT devices, or data interactions provided by third parties on the cloud.\n\nDespite how corporate data is used or manipulated in these scenarios, the CIO is still responsible for the accuracy and integrity of the data. Unfortunately, this is the case even if the system is unknown to IT. This expectation is all the justification IT needs to pursue and stop shadow IT.\n\nIT must work closely with the IT steering committee \u2014 which should be composed of senior management, including the CEO and CIO, and be responsible for prioritizing the IT agenda \u2014 to develop a strong statement of policy that forbids this unilateral activity. At the same time, however, IT in conjunction with the IT steering committee must also establish a methodology that enables user departments to quickly implement computer solutions that require a minimum of IT time.\n\nA good, but imperfect analogy for this could come from the marketing department, which is responsible for assuring the protection of the brand and trademarks both internally and externally. Any violation that is found by the marketing department is usually met with swift and uncompromising cease and desist orders. A similar approach should be taken by IT in dealing with shadow IT.\n\nBringing the shadow to light\n\nTo achieve this balance between eliminating unsanctioned tech and providing a way to cure the drive toward shadow IT, IT leaders should take a three-step approach.\n\nFirst, CIOs should establish a quick-reaction team (QRT) that deals only with these small projects that user departments are looking to achieve \u2014 especially when it comes to leveraging AI. The QRT needs to be an elite group within IT comprising members who understand the risks of data manipulation, are well versed in security pitfalls, and follow developments in AI enough to know its opportunities and pitfalls. It would be the mission of this group to analyze the requirements and assure that data access is secure and that the user understands the nature of the data being accessed.\n\nThe QRT would also need to analyze the parameters of the work to be done to assure that the results are not already available from another existing source. They would also determine whether the software is compatible with the existing corporate network. This becomes even more critical if, at some point, the company wishes to scale the application to serve the entire corporation.\n\nSecond, the shadow IT policy must be understood and enforced by the IT steering committee. This group must understand the existential risks that data breaches could cause for the corporation and it must understand that violations of the policy would have sanctions that must be supported companywide.\n\nThird, IT must continually monitor the contents of all devices connected to its network whether locally or remotely. Corporate computers must be monitored to be sure that all software has the appropriate licenses for all third-party applications to avoid substantial fines from vendors. Any private devices that connect to the corporate network must also be monitored to assure that they are in compliance with corporate standards and are secure. There are many software solutions on the market that can provide this service.\n\nAdditional risks \u2014 and getting it right\n\nEven with these safeguards in place there are still substantial risks associated with shadow IT systems. If the individual who developed the system in the user department suddenly leaves their current job or even the company, there could be a long learning curve to train a replacement. Oftentimes the user department tries to shift this burden to IT since an IT-savvy replacement is sometimes hard to find. Also, we cannot expect the QRT to have the time or the ability to take over the system. This could be doubly dangerous if the departing employee has evil intent to harm the company given that his credentials are probably unknown to the company.\n\nAnother risk exists if the vendor supplying the software suddenly goes out of business, substantially increases the support fees, or otherwise changes system usage parameters. This process could be handled by the QRT but there could be time issues involved if the system has become critical to the department.\n\nThe usual reason given by user departments as to why they want to pursue shadow IT is something like: \u201cThe process to get an IT system approved, developed, and implemented is too arduous, takes too long, and requires an enormous commitment of time and resources. They want us to define exactly what we want. We, on the other hand, just want a flexible approach that gives us everything we need. Business changes fast but IT slows us down.\u201d\n\nCertainly, there is some truth to that. Hopefully, most of these issues can be addressed by an aggressive QRT. But the company must also understand that security and data integrity issues must be carefully considered. It is also incumbent on each member of the IT steering committee to take their job of prioritizing projects seriously so that the IT department is working on the most important projects that are needed by the corporation. If there is a need to expand IT to develop more solutions, the IT steering committee has the power to approve that.\n\nIn my book The 9 1\/2 Secrets of a Great IT Organization the subtitle reads \u201cDon\u2019t Do IT Yourself\u201d. Shadow IT is yet another example that shows that when IT systems are developed in a vacuum, the results can be more costly, redundant, subject to piracy, and, most importantly, lead to a degrading of data integrity. If we address shadow IT in this manner, the company should get the systems it needs in a timely manner and the CIO should not be sleeping with one eye open due to data integrity concerns.