This is a dedicated watch page for a single video.
The IT department becomes aware of a new third-party application named “SlideEnhancer” that has been connected by several users to enhance their presentation designs. Upon investigation, it’s found that “SlideEnhancer” has not gone through the standard vetting process, and there's no clarity about its data management practices. How should you address the potential risk posed by this application?