A Step-by-Step Migration Checklist for Switching Approval Platforms
A practical migration checklist for moving approval platforms with less downtime, safer data transfer, and cleaner user adoption.
Switching a document approval platform is not just a software swap. It is an operational change that touches templates, permissions, integrations, records retention, and the day-to-day habits of the people who approve work. If the move is handled well, you can reduce cycle time, improve auditability, and standardize the way approvals happen across departments. If it is handled poorly, you can create duplicate processes, missed signatures, and avoidable downtime that frustrates users and slows business.
This guide gives you a pragmatic migration checklist for moving from one approval workflow software stack to another without breaking continuity. It covers the full transition path: inventorying your current workflows, exporting data, recreating your approval process templates, validating your approval API integrations, training users, and verifying that your new environment is ready before you cut over. Along the way, we’ll lean on operational lessons from adjacent domains like pipeline security, clear security documentation, and vendor strategy signals so you can evaluate risk like a buyer, not just like a user.
Pro Tip: The best migration plan is not “move everything at once.” It is “preserve the critical workflows first, then phase in improvements.” That reduces downtime and gives you a safe rollback path if something goes wrong.
1) Define the Scope Before You Touch Anything
1.1 Build a workflow inventory
Before exporting a single record, create a full inventory of every approval flow currently in use. Include procurement approvals, HR forms, finance sign-offs, legal reviews, customer-facing document approvals, and any ad hoc exceptions that only exist because a manager requested them once and they never got removed. This inventory should capture the document type, owner, approver chain, SLA, integration points, retention rules, and current pain points. The goal is to understand not just what you have, but what needs to be preserved versus redesigned.
This is also the best moment to benchmark the business value of each workflow. Some routes may be high volume but low risk, while others may be low volume and highly regulated. If you need a framework for evaluating which workflows deserve redesign, the same discipline used in cost-justification playbooks and vendor evaluation signals applies here: focus on the workflows that drive the most operational friction and compliance exposure first.
1.2 Separate must-have continuity from nice-to-have optimization
Not every feature from the old platform needs to be recreated on day one. Identify your non-negotiables: approval history, signer identity controls, legal timestamps, template fields, attachments, and integration triggers. Then mark improvements that can wait until after go-live, such as custom dashboards, refined routing rules, or advanced conditional logic. This makes the migration realistic and reduces the odds that your team tries to re-engineer the entire process while also changing vendors.
Think in terms of minimum viable continuity. A practical migration keeps the old business rules intact, even if the new interface looks different. If your users can continue sending approvals, tracking status, and proving who approved what, the platform change is already delivering value. For organizational alignment, it helps to frame this like a controlled operational transition, similar to how resilient operating models reduce overload during periods of change.
1.3 Assign ownership and timeline
Every migration needs a decision owner, a technical owner, and a business owner. The decision owner resolves tradeoffs, the technical owner handles data and integrations, and the business owner ensures the workflows remain usable for actual approvers. Without this structure, migration tasks drift, and teams stall because everyone assumes someone else is validating the process. Put dates on each phase: discovery, export, recreation, testing, training, cutover, and post-launch monitoring.
A useful rule is to create a calendar similar to a product launch. You are not simply switching tools; you are replacing an operational dependency. Treating the work like a launch also helps with communications, much like the discipline used in major campaign planning or B2B rebrand transitions, where timing and adoption matter as much as technical readiness.
2) Audit the Current Platform and Export What You Actually Need
2.1 Identify exportable objects
Most approval platforms contain several different kinds of data, and not all of it is equally important. At minimum, you should be able to export workflow definitions, template versions, approval logs, user roles, attachments, completed documents, and compliance metadata. If the current platform supports API export, use that first. If not, request structured data extracts from the vendor and verify whether they include timestamps, approval comments, status changes, and final signed artifacts.
Be careful not to assume the export is complete just because it exists. Many teams discover too late that the export omits historical comments, custom fields, or nested approvals. That is why you should create a field-by-field mapping sheet before export. A good migration is a data exercise, not just an IT task. You are preserving the evidence chain behind every approval, which is especially important if your operations depend on auditability or regulated records, much like the record-keeping standards discussed in video integrity and traceability.
2.2 Validate retention and compliance requirements
Before moving records, confirm how long you need to keep them, where they must be stored, and who is allowed to access them. If your old platform holds legally sensitive approvals, you may need to keep it in read-only mode for a retention period even after the cutover. In some cases, the old platform remains a compliance archive while the new platform becomes the live system of record. That decision should be documented early, because it affects licensing, access controls, and export strategy.
If your workflows contain customer data, financial approvals, or identity-sensitive artifacts, make sure your export plan supports encryption and access restrictions. This is similar to the discipline in security documentation for non-technical users: clarity prevents misuse. It also mirrors the trust requirements seen in compliance-heavy digital systems, where preserving evidence matters as much as speed.
2.3 Create a rollback-safe archive
Do not rely on the source platform as your only backup. Store export files in a controlled archive with version labels, owner names, and export timestamps. If possible, test a restoration of sample records in a sandbox before the production cutover. The archive should include a snapshot of templates, routing rules, permissions, and any integration configs that might be difficult to reconstruct later.
This archive is your insurance policy. If the migration reveals an unexpected field mismatch or an integration issue, you can compare live behavior against the archived configuration instead of guessing. This approach resembles a supply-chain contingency plan: keep the original path intact until the new one has proven itself, which is exactly the kind of risk discipline seen in secure deployment pipelines.
3) Recreate Templates, Routing Logic, and Approval Rules
3.1 Rebuild your approval process template library
Your new platform is only as good as the templates you recreate in it. Start by rebuilding the most-used forms first: purchase requests, contract sign-offs, expense approvals, and recurring operational forms. Preserve all required fields, default values, conditional logic, attachments, and approval routing. Where possible, standardize naming conventions so users can find templates quickly and admins can manage them consistently. A strong approval process template library reduces training time and support tickets.
When recreating templates, do not copy the old design blindly. A migration is a chance to remove dead fields, simplify branching logic, and improve the user experience. Many teams find that half the complexity in their old approval flow came from old exceptions nobody wanted to remove. If your platform allows templating best practices, think of it the same way creative teams use reusable assets in template-making leadership models: standardization can coexist with flexibility when designed well.
3.2 Map routing rules carefully
Routing rules are where migrations usually break. If your current platform uses department, spend threshold, geography, document type, or manager hierarchy, map every condition into the new environment. Create a side-by-side table showing the old rule and the new rule, then validate each branch with sample cases. This helps you catch hidden dependencies such as escalation timers, backup approvers, or conditional skip steps. The objective is to preserve business logic exactly where it matters and improve it only when the team can safely absorb the change.
For complex routing, create test scenarios for edge cases. For example, what happens if the primary approver is on leave? What happens if a document contains both legal and finance clauses? What happens when a purchase crosses a threshold after tax? These examples sound small until they delay purchase orders or contracts. A structured mapping discipline similar to ROI forecasting for paper workflows helps you quantify the value of getting routing right on the first try.
3.3 Preserve version history and naming conventions
If the legacy system has many template versions, decide which versions need to be recreated and which can be retired. In most businesses, only the latest active templates need full rebuilding, while older versions can be archived. However, if historical approvals must remain accessible for audits or disputes, ensure the new system provides searchable links back to the exported records. Use naming conventions that make version lineage obvious, such as “PO_Approval_v3_2026” rather than generic labels that future admins will misread.
Version control also helps support teams answer user questions faster. When someone says, “I used the old expense form,” they should be able to tell exactly which template family that refers to. The same clarity principle appears in hosting selection guides, where versioning, compatibility, and uptime all matter to operational stability.
4) Plan Integration Cutover With Realistic Risk Controls
4.1 Inventory every integration before switch day
Approval systems rarely live alone. They connect to ERP platforms, CRM tools, HR systems, cloud storage, email, identity providers, and internal APIs. Build a full integration map showing what sends data into the platform, what receives status updates, and which systems trigger approvals automatically. Include the owner, authentication method, data fields, and expected timing for each connection. If an integration breaks, the approval flow may still run manually, but the business cost will usually increase immediately.
This is where your approval API review becomes essential. Confirm whether the new vendor supports webhooks, REST endpoints, bulk imports, event logs, and authentication methods that match your security standards. If you are replacing an older platform with a modern one, the API layer may be the biggest long-term improvement. For teams that care about resilience and interoperability, the integration logic should be assessed as carefully as the app itself, much like data architecture in operational systems.
4.2 Decide between parallel run and hard cutover
Most organizations should use a parallel run for critical workflows. In a parallel run, the old and new systems operate side by side for a defined period, but only one is the source of truth. This lets you verify routing, integrations, and user behavior without risking business continuity. A hard cutover can be faster, but it should be reserved for simpler use cases with low volume and low compliance risk. Choose based on the business impact of failure, not on convenience.
During the parallel period, define which system receives official approvals, which one is for validation only, and how discrepancies will be resolved. Document the rollback criteria in advance. If the new system fails acceptance testing or an integration misses data, you should know exactly when to revert. This kind of staged risk control is similar to the discipline behind simulation-led deployment, where testing in advance reduces the chance of a costly live failure.
4.3 Reconcile data flows after go-live
Once you cut over, monitor integration logs for at least several business cycles. Verify that documents are being created, routed, signed, stored, and indexed correctly. Pay special attention to timestamps, user IDs, document IDs, and status changes, since those are the fields most likely to be mismatched during a platform migration. If downstream systems depend on notifications or webhooks, confirm that they are receiving events in the same order and format as before.
Be ready to tune sync intervals or field mappings after launch. Many integrations succeed technically but still create operational friction because a status change lands too late for the finance team or a signed file lands in the wrong folder. That is why post-cutover reconciliation matters as much as the initial connection. Think of it as the operational equivalent of resilient update pipelines: the job is not complete when the update ships, but when it proves stable under real conditions.
5) Migrate Users, Roles, and Permissions Without Confusion
5.1 Rebuild your permission model
Access control is a frequent source of migration errors because old platforms often accumulate role exceptions over time. Recreate the permission model from first principles: who can create templates, who can submit documents, who can approve, who can administer, and who can audit. Then compare that model to the current platform’s actual user list and permissions report. In many cases, you will find inactive users, duplicate roles, and overly broad admin rights that should be cleaned up during the transition.
When permissions are simplified, approval systems become easier to trust and easier to support. That is especially important for businesses trying to reduce risk while also speeding up approvals. The same principle appears in customer-centric support: the user experience improves when the service model is designed around real workflows instead of internal convenience.
5.2 Segment training by user type
Not every user needs the same training. Approvers need to know how to review, comment, reject, or delegate. Submitters need to know how to start the right template and attach the correct supporting documents. Administrators need deep instruction on routing logic, data fields, troubleshooting, and template maintenance. Create distinct onboarding paths so each group learns only what they need to work confidently on day one.
Training should be practical, not theoretical. Use live examples from your own business rather than generic screenshots. For instance, show a real expense approval, a real contract workflow, and a real purchase request. This mirrors the best practices in user onboarding for operational tools, where relevance drives adoption more than feature lists do. Provide cheat sheets and one-page guides that users can reference during the first week.
5.3 Prepare champions and super users
Every migration benefits from a small group of champions who can answer questions quickly. Select people from finance, operations, HR, legal, and IT, depending on where approvals are most frequent. Give them early access to the new platform, ask them to complete real tasks, and use their feedback to refine the launch plan. These champions reduce the load on admins and create a more credible peer-to-peer support model.
Champions are especially important when old habits are deeply ingrained. A user who has approved documents a certain way for five years may not trust a new workflow immediately. Peer influence can make the difference between passive compliance and active adoption. This is a classic organizational rollout pattern, similar to what you see in brand humanization strategies where trust is earned through familiarity and responsiveness.
6) Verify Security, Audit Trails, and Compliance Before Launch
6.1 Confirm audit log integrity
One of the biggest reasons businesses buy a new approval platform is to improve traceability. That means the new system must preserve who approved what, when they approved it, and what changed between versions. Test whether the audit trail captures submission, review, approval, rejection, delegation, reassignment, and final signature events. Make sure logs are immutable or tamper-evident, and confirm that exported records are machine-readable for compliance teams.
If your organization answers to internal auditors, external auditors, or customers with strict controls, document the evidence model before launch. A platform is only as trustworthy as the records it can produce under pressure. For a practical lens on evidence and authenticity, the logic in integrity-protected media workflows is surprisingly relevant: the system must prove the chain of custody, not just store the file.
6.2 Test identity and signature controls
Verify how the new system handles authentication, identity verification, delegated approvals, and digital signatures. If you use SSO, MFA, or identity provider rules, test them in a sandbox before cutover. If the platform supports legally binding e-signatures, confirm the signature method meets your company’s policy and any applicable jurisdictional requirements. You should also test access from mobile devices, because approvers often act from email or phone notifications rather than desktop workflows.
This matters because identity failure can stop a workflow even when the rest of the migration is successful. The user may receive the request, but cannot sign, delegate, or view the record. That is why security and usability must be validated together, as emphasized in clear security docs that translate technical controls into practical behavior.
6.3 Review data residency and legal hold behavior
For companies in regulated sectors, check where the vendor stores data, how backups are handled, and what happens during legal hold. If your old platform supported a specific retention or archiving model, the new one must be capable of meeting it or you need an alternate archive strategy. You should also confirm deletion procedures, because compliance often depends on proving that data is removed in a controlled and documented way.
Do not wait until after launch to ask these questions. They affect contracting, implementation, and user policy. If you need a buyer-oriented lens on vendor selection, the logic in enterprise vendor strategy helps frame whether the provider is stable enough to support your compliance obligations long term.
7) Train Users and Communicate the Change Like an Operational Launch
7.1 Create a communication plan with milestones
Users need more than a launch email. They need a staged communication plan that tells them what is changing, when it changes, what they need to do differently, and where to get help. Send messages before training, before cutover, on launch day, and after the first week of live usage. Include screenshots, quick-start guidance, and examples tailored to each department so the change feels concrete rather than abstract.
Communications should be concise but complete. Too little information creates anxiety, while too much information gets ignored. Good change communication is similar to successful product education in B2B messaging redesign: the message works when it connects with real buyer behavior. Even a strong tool can fail if users do not understand the new process.
7.2 Use role-based job aids
Job aids are the fastest way to reduce downtime after a platform switch. Build one-page guides for submitters, approvers, and admins, and include the exact steps for their most common tasks. Add annotated screenshots, required fields, escalation options, and troubleshooting tips. These materials should be searchable and easy to print for teams that still prefer paper backup during the transition.
If you have distributed teams, record short walkthrough videos that show the new flow from start to finish. Make the videos task-based rather than feature-based. Users do not care about every menu item; they care about getting the approval done without help. A concise, task-first format is the same reason people prefer shorter, sharper content in other domains: it respects attention and speeds adoption.
7.3 Offer office hours during the first two weeks
Even excellent training cannot anticipate every issue. Offer live office hours, a dedicated support channel, or a temporary migration help desk for the first two weeks after go-live. Capture questions and convert the recurring ones into updated help content. This reduces support load and signals that the organization is serious about successful adoption, not just software installation.
You can also collect quick feedback on confusion points, such as template selection or approval delegation. In practice, this feedback is often more valuable than generic satisfaction surveys. It tells you where the workflow design still needs simplification, much like iterative product feedback in content refinement loops.
8) Run a Verification Checklist Before Full Go-Live
8.1 Validate end-to-end test cases
Create a set of test cases that represent your most important approval paths. Include a simple workflow, a multi-step workflow, an exception workflow, and a high-risk workflow that requires audit precision. For each case, test submission, routing, notification, approval, rejection, delegation, export, and archive. Record the expected result and the actual result, then resolve mismatches before the system becomes the source of truth.
Do not trust a test that only proves the form loads. A platform migration succeeds when the whole chain works, from creation to retention. Teams that test like this are effectively applying the same rigor as error-correction thinking: small failures need to be detected before they cascade into larger operational problems.
8.2 Compare old and new outputs side by side
For a subset of documents, compare the output of the old platform and the new one. Check routing choices, timestamps, approval comments, signatures, document rendering, and archive behavior. If your new platform intentionally improves the user experience or changes the layout, that is fine, but the underlying business outcome should remain correct. This side-by-side comparison is one of the most reliable ways to catch hidden mismatches.
It also helps stakeholders feel confident in the switch. Many migration objections are emotional as well as technical; people worry the new system will change outcomes even if the process says it won’t. Showing comparable outputs lowers that anxiety and reinforces that the approval automation logic remains intact.
8.3 Complete a sign-off gate
Before final go-live, require sign-off from business owners, IT, compliance, and at least one representative end user group. The sign-off gate should confirm that the checklist is complete, rollback steps are documented, the archive is accessible, and support channels are ready. This prevents the common mistake of launching because a date arrived rather than because readiness was proven.
A sign-off gate also creates accountability. If the migration later needs adjustments, the team has a clear record of what was approved and what assumptions were accepted. In operational terms, this is the same logic as a controlled release process in secure deployment management: move only when the evidence supports it.
9) Measure Post-Migration Performance and Stabilize the System
9.1 Track the right KPIs
After go-live, measure whether the migration delivered its intended outcomes. Useful KPIs include average approval cycle time, first-pass completion rate, number of support tickets, workflow exception rate, integration error count, and percentage of users completing tasks without help. These metrics tell you whether the move truly improved the business or merely relocated complexity into a new interface.
For operational teams, this is where the new platform proves its value. You want to see fewer manual follow-ups, fewer lost approvals, and better visibility into bottlenecks. If you need a model for tying usage to business outcomes, the principles in automation ROI forecasting can help turn anecdotal success into measurable results.
9.2 Stabilize based on user feedback
The first few weeks after migration will surface issues that no test plan predicted. Gather feedback from submitters, approvers, and admins, then prioritize fixes based on business impact and frequency. Some issues will be training problems, while others will be true configuration gaps. Handle both, but distinguish them clearly so the team doesn’t keep patching the product when the issue is really a process misunderstanding.
Use a weekly stabilization review to decide what gets fixed immediately, what gets queued, and what needs redesign. This approach gives the migration momentum without letting small issues linger. The mindset is similar to what resilient operators do in process-heavy businesses: keep the system running, then improve it deliberately.
9.3 Retire the old platform safely
Once the new platform has been validated, plan the decommissioning of the old system carefully. Set a date for read-only access if required, then remove active permissions, close obsolete integrations, and document where legacy exports are stored. Keep enough access for audits and historical reference, but not so much that users continue to rely on the old process out of habit. A clean retirement prevents shadow workflows from reappearing.
The retirement phase is often overlooked, but it is essential for real transformation. If both systems remain active indefinitely, support costs rise and users stay confused. Think of this as operational closure, not just technical shutdown. Well-managed retirement is the final sign that the migration succeeded.
10) Detailed Migration Checklist You Can Use Immediately
10.1 Pre-migration checklist
Use the following checklist before any production change. Confirm that the workflow inventory is complete, all data exports have been tested, templates have been mapped, integrations have been documented, and role ownership is assigned. Make sure compliance requirements are reviewed and a rollback plan exists. Finally, confirm that stakeholder sign-off has been collected and that the support model is ready.
This is the stage where teams either create control or create chaos. A disciplined pre-migration checklist lowers the probability of surprises and gives every department confidence that the switch is deliberate. The structure is similar to the buyer diligence process in technical due diligence: ask hard questions before the change, not after.
10.2 Go-live checklist
On launch day, verify that user access is active, templates are published, notifications are working, API and webhook connections are live, and logs are recording correctly. Run a small batch of live but low-risk documents through the new system first. Monitor the results in real time so any issue can be caught before it spreads across the organization. Maintain a direct escalation path for business-critical problems during the first 24 to 48 hours.
Do not overload launch day with every possible workflow. Start with the core approval paths and then expand. This keeps the operation stable and prevents support from being swamped with edge cases. A phased approach is the same reason organizations benefit from simulation before deployment: controlled conditions reveal problems early.
10.3 Post-migration checklist
After the switch, verify that all key records are searchable, archives are accessible, and reports are accurate. Confirm that users understand where to submit documents, how to track status, and how to escalate if a workflow stalls. Review the first week of logs for missing fields, failed webhooks, or misrouted approvals. Then hold a post-mortem to capture lessons learned and update the standard migration playbook.
That final step turns a one-time project into an institutional capability. The next time you replace or consolidate software, your team will have a documented path instead of starting from scratch. That is how operational maturity compounds over time.
Comparison Table: Old Platform vs. New Platform Migration Readiness
| Area | Old Platform Check | New Platform Readiness Check | Risk if Missed | Owner |
|---|---|---|---|---|
| Data export | Can export workflows, logs, attachments | Imported records verified in sandbox | Lost history or incomplete audit trail | IT / Admin |
| Templates | Current templates cataloged | All active templates recreated and tested | Users cannot submit critical requests | Business Owner |
| Routing rules | Rules documented with exceptions | Branch logic validated with test cases | Wrong approver or stalled workflow | Ops / Admin |
| Integrations | ERP/CRM/API connections mapped | Webhooks, auth, and sync schedules confirmed | Missing downstream updates or duplicate records | IT / Integration Owner |
| Security | Access model and retention defined | SSO/MFA, audit logs, legal hold tested | Compliance exposure or blocked access | Compliance / IT |
| Training | User segments identified | Role-based job aids delivered | Low adoption and support overload | Change Lead |
| Cutover | Rollback plan documented | Parallel run or hard switch approved | Downtime and business interruption | Project Owner |
Frequently Asked Questions
How long does a typical approval platform migration take?
For a small business or mid-market team, a straightforward migration can take a few weeks if the workflows are simple and the templates are standardized. More complex environments with multiple integrations, compliance requirements, or custom approval rules may take several months. The real driver is not only the software, but the number of approval types you need to preserve. The more custom logic you have, the more time you should allocate for testing and user onboarding.
Should we migrate everything at once or in phases?
Phased migration is usually safer, especially if your approval workflows are business-critical. Move the highest-value, most stable workflows first, then migrate lower-priority or more complex paths once the platform is proven. A phased approach reduces downtime and creates a chance to improve the process based on early feedback. It also gives teams a more manageable learning curve.
What is the most common mistake during data migration?
The most common mistake is assuming the exported data is complete without validating it field by field. Teams often forget comments, attachments, custom fields, or approval timestamps, which are essential for audits and continuity. The fix is to build a mapping sheet, test a sample import, and compare the original and imported records before launch. Never treat export success as migration success.
How do we handle approvals already in flight during cutover?
The safest approach is to freeze changes at a defined cutoff time and finish in-flight approvals in the source system, while only new approvals start in the new platform. If business volume is high, you may need a parallel run and a clear rule for which system owns which records. The key is to avoid splitting a single approval chain across two systems unless you have carefully documented handoff logic. Without that, you risk missing signatures or confusing users.
Do we need to retrain every user?
Yes, but not with the same depth. Every user should receive basic onboarding that explains where to go, how to submit, and how to approve. Power users, admins, and compliance stakeholders need deeper training because they manage the configuration and troubleshooting. Role-based user onboarding is more efficient and usually results in higher adoption than a one-size-fits-all session.
What should we do with the old platform after cutover?
Usually the old platform should be kept in read-only mode for a retention period if it contains important historical approvals or audit records. After that, it can be decommissioned once the archive is secure and the business has confirmed it no longer needs active access. Be sure to revoke permissions, stop old integrations, and document the archive location. This keeps shadow workflows from returning.
Final Takeaway: Migrate for Continuity First, Optimization Second
A successful switch to new workflow automation tools is not about flashy features. It is about preserving business continuity while improving the structure, visibility, and control of approvals. The best migration checklist is one that protects data, reconstructs templates carefully, validates integrations, trains users by role, and proves readiness before cutover. If you do those things in order, you reduce downtime, maintain compliance, and give the new platform a fair chance to deliver value.
For deeper planning support, compare your readiness against the broader operational guidance in automation ROI forecasting, vendor risk strategy, and secure rollout discipline. If you treat migration as an operational change rather than a software purchase, you will choose better, launch cleaner, and recover faster if something needs adjustment.
Related Reading
- Forecasting Adoption: How to Size ROI from Automating Paper Workflows - Learn how to connect workflow automation to measurable business returns.
- Writing Clear Security Docs for Non-Technical Advertisers: Passkeys & Account Recovery - A practical model for explaining security controls to everyday users.
- Securing the Pipeline: How to Stop Supply-Chain and CI/CD Risk Before Deployment - Useful for planning safe cutovers and rollback paths.
- VC Signals for Enterprise Buyers: What Crunchbase Funding Trends Mean for Your Vendor Strategy - A vendor evaluation lens for long-term platform confidence.
- Integrating AI and Industry 4.0: Data Architectures That Actually Improve Supply Chain Resilience - Helpful for thinking about integrations as part of a larger data system.
Related Topics
Michael Reynolds
Senior SEO Content Strategist
Senior editor and content strategist. Writing about technology, design, and the future of digital media. Follow along for deep dives into the industry's moving parts.
From Our Network
Trending stories across our publication group