Employees Embrace Shadow AI, Bypassing IT Controls
Business Insider reports a rise in "shadow AI," where employees use unapproved AI tools to speed work. The article quotes Gregg Bayes-Brown describing his use of a personal enterprise Google account and NotebookLM to compress what he estimates was 150 hours of work into 30 minutes. Business Insider notes that AI use policies lag IT enforcement, and the piece highlights examples such as Claude in its headline. The report also cites a Google statement that data entered into NotebookLM is not used to train Google models. Business Insider frames these behaviors as employee choices balancing productivity gains against data-control policies, and it presents first-hand accounts of workers skirting formal IT approvals.
What happened
Business Insider published a feature on the growing phenomenon labeled "shadow AI," reporting that employees are increasingly using unapproved AI services to accelerate work. The story quotes Gregg Bayes-Brown saying he used a personal enterprise Google account and NotebookLM to condense work he estimated as 150 hours into 30 minutes. Business Insider also reports a Google statement that data entered into NotebookLM is not used to train Google's models. The article uses Claude in its headline as an illustrative example of off-policy tools employees adopt.
Technical details
Editorial analysis: The Business Insider article focuses on user behavior and policy friction rather than new technical capabilities. For practitioners, the relevant technical point is data handling: even consumer or personal-enterprise AI products differ in retention, telemetry, and training-use policies, and those differences determine enterprise exposure. Vendors frequently publish terms describing training data usage; Business Insider cites Google's public claim on NotebookLM training-use.
Context and significance
The piece places shadow AI in the context of productivity pressure and slow-moving IT governance. Reporting highlights worker anecdotes where perceived efficiency gains drive bypassing of formal procurement or policy processes. For security and compliance teams, this pattern increases blind spots for data leakage, undocumented prompts, and uncontrolled model outputs.
What to watch
Editorial analysis: Observers should track three indicators: vendor data-usage disclosures, enterprise telemetry showing unsanctioned API traffic, and policy adoption that balances usability with controls. Business Insider's reporting centers on firsthand accounts rather than systematic measurement, leaving open how widespread the behavior is beyond the anecdotes presented.
Scoring Rationale
The story highlights a rising operational risk that affects security, compliance, and data governance teams, making it relevant for practitioners, though the article is anecdotal rather than a large-scale empirical study.
Practice with real Ad Tech data
90 SQL & Python problems · 15 industry datasets
250 free problems · No credit card
See all Ad Tech problems


