The marketing team has been using a third-party application named “ChartWizard” for several months to enhance their presentations. The IT department discovers that “ChartWizard” has broad permissions, including access to all Google Drive files. Before deciding on the best course of action, how should you handle this scenario?