An icon of an eye to tell to indicate you can view the content by clicking
Signal
Original article date: Apr 08, 2026

77% of Employees Are Sharing Sensitive Data With AI Tools — Here's How Enterprises Are Fighting Back

April 10, 2026
5 min read

Employees aren't waiting for AI governance policies to catch up. They're already using generative AI tools — and they're doing it with company data. New research highlighted in a report from employee monitoring software company CurrentWare reveals the scale of the "shadow AI" problem now confronting enterprise IT and security teams.

According to the findings, up to 77% of employees have entered sensitive company data into AI tools such as ChatGPT, Microsoft Copilot, and Google Gemini — often without IT approval or any visibility into what data left the organization.

The Four Risk Vectors Enterprises Can't Ignore

  • Data leakage through prompts — Employees paste customer records, financials, and source code into AI tools without realizing the data may be processed externally.
  • Unapproved tool adoption — AI tools are browser-accessible, letting employees bypass corporate IT controls entirely.
  • Intellectual property exposure — Proprietary data shared with external AI systems may be stored or reused outside organizational control.
  • Compliance violations — Unmonitored AI usage can trigger violations of GDPR, HIPAA, and CCPA.

A new category is emerging in response: AI usage monitoring and governance — distinct from traditional employee monitoring in that it focuses specifically on which AI tools are accessed, how frequently, what data is shared, and whether policies are being violated.

The business case is straightforward. Global data breach costs average between $4.4M and $4.88M. Organizations that combine AI adoption with AI accountability — enabling productivity while monitoring for misuse — are better positioned to scale safely.

For leaders building AI strategies, the key insight is this: the question is no longer whether employees are using AI. It's how, and what oversight structure exists to govern that use.

🔗 Read the full article on The Desert Sun