Unknown/uncontrolled data applications Bad/broken end-user applications Inefficient business processes Backlog of IT requests No data access control/backup.
“Add-ins” of functionality for some Office programs Placed within the document or in the task pane Access apps can contain Apps for Office Related.