The document discusses the problem of "shadow systems" in organizations, which are small databases or spreadsheets developed by employees outside of IT control to manage business-critical information. This creates issues around data security, productivity, and compliance. The document evaluates options for resolving these issues, including adopting strict data access protocols, using file security software, or procuring specialist software designed to provide a secure alternative to shadow systems that meets knowledge workers' needs.