{"id":307691,"date":"2025-02-19T02:13:37","date_gmt":"2025-02-19T01:13:37","guid":{"rendered":"https:\/\/glosarix.com\/glossary\/unapproved-software-en\/"},"modified":"2025-02-19T02:13:37","modified_gmt":"2025-02-19T01:13:37","slug":"unapproved-software-en","status":"publish","type":"glossary","link":"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/","title":{"rendered":"Unapproved Software"},"content":{"rendered":"<p>Description: Unapproved software refers to applications or programs that have not received formal authorization from an organization for use within its technological infrastructure. This type of software can include applications downloaded by employees without the knowledge or consent of the IT department, as well as tools that have not undergone the security and regulatory compliance evaluation process. The use of unapproved software poses serious security risks, as it can introduce vulnerabilities, facilitate unauthorized access to sensitive data, and compromise system integrity. Additionally, this software may not comply with the security policies established by the organization, which can result in legal penalties or damage to reputation. Managing the security posture in this context becomes crucial, as organizations must implement effective controls and policies to identify and mitigate the risks associated with the use of unapproved software. This includes monitoring applications in use, educating employees about the risks of using unauthorized software, and creating a governance framework that ensures that only approved and secure tools are used in the workplace.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: Unapproved software refers to applications or programs that have not received formal authorization from an organization for use within its technological infrastructure. This type of software can include applications downloaded by employees without the knowledge or consent of the IT department, as well as tools that have not undergone the security and regulatory compliance [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"glossary-categories":[],"glossary-tags":[],"glossary-languages":[],"class_list":["post-307691","glossary","type-glossary","status-publish","hentry"],"post_title":"Unapproved Software ","post_content":"Description: Unapproved software refers to applications or programs that have not received formal authorization from an organization for use within its technological infrastructure. This type of software can include applications downloaded by employees without the knowledge or consent of the IT department, as well as tools that have not undergone the security and regulatory compliance evaluation process. The use of unapproved software poses serious security risks, as it can introduce vulnerabilities, facilitate unauthorized access to sensitive data, and compromise system integrity. Additionally, this software may not comply with the security policies established by the organization, which can result in legal penalties or damage to reputation. Managing the security posture in this context becomes crucial, as organizations must implement effective controls and policies to identify and mitigate the risks associated with the use of unapproved software. This includes monitoring applications in use, educating employees about the risks of using unauthorized software, and creating a governance framework that ensures that only approved and secure tools are used in the workplace.","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Unapproved Software - Glosarix<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unapproved Software - Glosarix\" \/>\n<meta property=\"og:description\" content=\"Description: Unapproved software refers to applications or programs that have not received formal authorization from an organization for use within its technological infrastructure. This type of software can include applications downloaded by employees without the knowledge or consent of the IT department, as well as tools that have not undergone the security and regulatory compliance [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/\" \/>\n<meta property=\"og:site_name\" content=\"Glosarix\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GlosarixOficial\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/\",\"url\":\"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/\",\"name\":\"Unapproved Software - Glosarix\",\"isPartOf\":{\"@id\":\"https:\/\/glosarix.com\/en\/#website\"},\"datePublished\":\"2025-02-19T01:13:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/glosarix.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unapproved Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/glosarix.com\/en\/#website\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"name\":\"Glosarix\",\"description\":\"T\u00e9rminos tecnol\u00f3gicos - Glosarix\",\"publisher\":{\"@id\":\"https:\/\/glosarix.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/glosarix.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/glosarix.com\/en\/#organization\",\"name\":\"Glosarix\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"contentUrl\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"width\":192,\"height\":192,\"caption\":\"Glosarix\"},\"image\":{\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/GlosarixOficial\",\"https:\/\/www.instagram.com\/glosarixoficial\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unapproved Software - Glosarix","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/","og_locale":"en_US","og_type":"article","og_title":"Unapproved Software - Glosarix","og_description":"Description: Unapproved software refers to applications or programs that have not received formal authorization from an organization for use within its technological infrastructure. This type of software can include applications downloaded by employees without the knowledge or consent of the IT department, as well as tools that have not undergone the security and regulatory compliance [&hellip;]","og_url":"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/","og_site_name":"Glosarix","twitter_card":"summary_large_image","twitter_site":"@GlosarixOficial","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/","url":"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/","name":"Unapproved Software - Glosarix","isPartOf":{"@id":"https:\/\/glosarix.com\/en\/#website"},"datePublished":"2025-02-19T01:13:37+00:00","breadcrumb":{"@id":"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/glosarix.com\/en\/glossary\/unapproved-software-en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/glosarix.com\/en\/"},{"@type":"ListItem","position":2,"name":"Unapproved Software"}]},{"@type":"WebSite","@id":"https:\/\/glosarix.com\/en\/#website","url":"https:\/\/glosarix.com\/en\/","name":"Glosarix","description":"T\u00e9rminos tecnol\u00f3gicos - Glosarix","publisher":{"@id":"https:\/\/glosarix.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/glosarix.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/glosarix.com\/en\/#organization","name":"Glosarix","url":"https:\/\/glosarix.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","contentUrl":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","width":192,"height":192,"caption":"Glosarix"},"image":{"@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/GlosarixOficial","https:\/\/www.instagram.com\/glosarixoficial\/"]}]}},"_links":{"self":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/307691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/comments?post=307691"}],"version-history":[{"count":0,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/307691\/revisions"}],"wp:attachment":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/media?parent=307691"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-categories?post=307691"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-tags?post=307691"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-languages?post=307691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}