What Happens When Nonprofit Staff “Make Tech Work”

When devices, software, and services are outside your organization’s control, it doesn’t start because of bad decisions. The reality, in nonprofits and associations, is that your staff are constantly solving problems in real time. But when work needs to get done, people improvise. This leads to one of the biggest risks for nonprofits – shadow IT. In this article, we explore the risks this behavior introduces and what you can do to avoid it.

Key Takeaways

  • Shadow IT in nonprofits is not malicious, but it is a leadership risk.
  • Nonprofits don’t need to slow their productivity to control shadow IT; they need standards.
  • It isn’t enough to just have visibility into devices, services, and software used; ownership of standards is what reduces risk.

Table of Contents

When Helpful Actions Become Risky

For many nonprofits and associations, technology decisions are made by staff in the moment instead of by leaders in the boardroom. And we’ve seen many of them over the years.

For example, we heard about how a program coordinator needed quick image edits. So, they uploaded client photos into an unsecured AI tool.

In another situation, a contractor needed access to a system “just for the week.” So, a staff member shared a login with them instead of requesting a proper account.

Individually, these choices feel small. Helpful, even.

However, across a distributed workforce, this desired behavior quietly creates opportunities for shadow IT.

You might not know it right now, but the symptoms created by moments of helpfulness may already be showing up in your ecosystem.

What Happens When Nonprofit Staff Just Make Tech Work Mockup

This guide helps nonprofit and association leaders understand the unseen risks created by unapproved technology. Plus, what they can do to protect their data, donors, and mission. 

How Do Helpful Workarounds Turn into Shadow IT?

Across nonprofits and associations, we see the same pattern emerge when organizations run into shadow IT. This is how it typically starts.

1. A staff member identifies an issue and sees technology as the solution. They employ a quick fix to solve the immediate problem.

2. Because the solution works, no one questions it. The workaround isn’t documented, reviewed, or approved. It just becomes “how things are done.”

3. Over time, more people follow the same approach. Colleagues assume the shortcut is acceptable because leaders haven’t said otherwise.

4. This leads to leaders losing visibility into where data lives, who has access, and whether that access is appropriate.

Why is Shadow IT so Common in Nonprofits and Associations?

Nonprofits and associations face unique realities that make them especially prone to shadow IT, including:

Having staff who are prepared to do whatever is needed for the mission.

Nonprofit workers are wired for choosing helpful tasks and are reinforced by the act of helping others – which creates opportunities for tools to be implemented without oversight.

Not having a standardized process.

Without documented policies, everyone creates their own workarounds simply to get work done.

Not following a formal AI strategy.

AI can be an exceptionally helpful tool. However, in nonprofits without a defined AI strategy, usage often spreads informally, driven by individual comfort rather than shared standards. The result is fragmented adoption that’s hard for leaders to oversee or manage responsibly.

Not possessing a centralized IT system, so they rely on BYOD.

Many organizations operate without a formal IT infrastructure – so users to rely on personal laptops, phones, or ad‑hoc apps.

Having widely distributed staff, volunteers, and contractors.

When people work across locations, states, or countries, IT support often becomes fragmented. This leaves users to improvise in ways that can introduce increased risk.

Having inconsistent oversight with volunteers and contractors.

Many volunteers aren’t given proper security guidance, and contractors often retain access to accounts long after a project ends. This creates the perfect environment for unnecessary risk.

These are signals that well-intended workarounds can introduce significant risk into your organization.

When these decisions happen without shared standards, leaders carry the risk (not staff) even if they never approved the tools.

Shadow IT Blog Graphic 2

Quick Self-assessment: How Exposed to Shadow IT Are You?

If your organization is relying on users to “just make tech work,” these questions can help establish a baseline of risk:

  • Do we have centralized identity, MFA, and access control, or is everyone improvising?
  • Do volunteers understand any security expectations?
  • How many tools hold our data outside our approved ecosystem?
  • How many ex-staff or contractors still have access to our systems?
  • Do we have an IT handbook, even a simple one?
  • Are we tracking how AI tools are used today?
  • Would we pass a cyber insurance audit if asked to show evidence of controls today?

If several of these questions are hard to answer, risk is likely accumulating in the background.

3 Shadow IT Risks Nonprofit Leaders Often Overlook

1. Data Security

When staff and volunteers rely on personal tools, your ability to control who has access to data starts to fray. What begins as convenience – using a familiar app or personal account – quickly turns into an oversight challenge.

Without clear ownership or visibility, accounts often stay active long after someone leaves the organization. And when security standards like MFA, device protection, and monitoring aren’t applied consistently, gaps compound in the background.

A single compromised login can expose information your organization is trusted to protect, including:

  • Donor data
  • Member records
  • Internal communications

2. Compliance & Privacy

Shadow IT makes it harder to answer basic questions that leaders are often asked.

For example:

  • Who accessed sensitive data?
  • Where is it stored?
  • And how long has it been kept?

When information lives in devices and software outside of your control, your visibility drops fast.

Privacy, retention, and reporting controls weaken. And not because anyone is being careless, but because there’s no consistent oversight.

Over time, this makes it difficult to demonstrate due diligence to boards, funders, auditors, or regulators confidently.

3. Operational & Continuity Risk

Over time, institutional knowledge often ends up scattered across personal apps, shared logins, or informal tools. While this may help the work move faster in the moment, it also blurs accountability and makes access harder to track.

When a well-meaning staff member, volunteer, or contractor moves on, that access can disappear overnight. Suddenly, you find yourself in a situation where files are locked, systems are inaccessible, and no one is quite sure who owns what.

You could be left with stalled programs, delayed services, and avoidable disruption for the people and communities you serve.

5 Warning Signs of Shadow IT Nonprofits Should Watch For

Signs of shadow IT What it signals
What you’ll hear: “We don’t really know what tools everyone uses to get their work done.”
Limited visibility into where organizational data lives.
What you’ll see: Passwords are shared and described as “temporary.”
Weak access control and unclear ownership.
What happens during onboarding: Volunteers or contractors are given access without a formal checklist.
Inconsistent oversight and lingering access risk.
What exists on paper: IT or security policies exist but aren’t regularly read, enforced, or updated.
Governance without accountability.
How decisions are made: Technology choices prioritize speed over best practices and standards.
Workarounds are quietly becoming the norm.

Changes Nonprofits Can Make without Killing Productivity

Addressing shadow IT doesn’t mean slowing people down or saying “no” to useful tools. It’s really all about setting clear expectations so everyone’s work can move forward safely – protecting your mission, donors, and data.

You can drastically reduce your risk by:

Establishing plain‑language acceptable use guidelines that your staff will understand.

Standardizing a small set of core systems (email, file storage, identity) and requiring approval for new apps.

Setting standards for AI tools use (e.g., Copilot, ChatGPT, Grammarly, Claude).

Providing basic security training to everyone, including volunteers.

Giving staff and volunteers devices managed by the organization (or secure virtual environments).

Creating a lightweight, shareable IT handbook for staff, volunteers and contractors.

Implementing a consistent onboarding and offboarding workflow.

Centralizing identity and requiring multi-factor authentication.

Reviewing account access regularly and removing any that are no longer needed.

Leadership

Shadow IT is a Leadership Responsibility

Shadow IT in nonprofits and associations rarely starts with bad intentions. It starts with people trying to help (and they’re often really good at it).

That’s why leadership teams need to set clear expectations and put standards in place to protect the data their stakeholders trust them to steward.

If you’re unsure where shadow IT exists in your organization, decide what “approved,” “secure,” and “supported” actually mean. Then, make those expectations visible across the organization – before an incident forces the conversation.

Lasting risk reduction comes when leaders clearly own the technology standards and data access decisions.

Latest Teal News

The Insider's Edge

The right IT strategies can transform your business. Subscribe now to access curated strategies, trends, and solutions for forward-thinking executives like you.

Recent Articles
Categories
Don’t Stop Here

More To Explore

Compliance

9 Vital Steps to Foster a Strong Compliance Culture

A compliance culture means adopting the right mindset. It goes beyond ticking boxes or following rules. At its heart, it’s about protecting your organization from the serious risks of non-compliance,

Proactive vs Reactive

5 Signs Your Washington DC MSP is Reactive

Use this article to pressure-test whether your MSP can support your small- or midsized business’s next stage of growth, or if it might be time to find a better fit.