As users utilise and interact with these tools, they are often sharing information with systems owned and managed by another organisation.
Because of their “human-like” capabilities, users tend to trust and over rely on such systems.