A generation of technology-minded users are finding a way around internal IT policies, not for intentional misuse or non-productive entertainment, but in order to work in ways they find most effective. However, in the process they are often breaching data guidelines, undermining security, compromising desktop and data integrity or in some cases, even breaking the law.