Draft an information security policy for a [company/sector]. Include: scope, asset protection, access controls, data handling, incident response, and staff training.
Useful prompt but the real issue is bigger? That usually means the workflow or team mechanism needs attention, not just the wording.
Standardizes security best practices for audits and user awareness; makes requirements explicit.
Asset: All laptops encrypted. Access: MFA. Response: Report to CISO w/in 24hrs...
Log in to suggest improvements.