The key points in this article reflect findings we made in our research – that certain groups within organisations are circumventing IT policy by exploiting smart-phones and various devices to provide innovative services to the enterprise – but against the IT policy of the enterprise. Responding to this challenge is a key concern.