Prompts
Prompt
Act as a privacy and cybersecurity expert and conduct a comprehensive review of the organization’s data protection policy.
Guidelines: For each area, assign a compliance score from 1-10 (1 = major violation, 10 = high compliance) and provide a detailed analysis.
- Data Mapping and Classification (specify and explain):
- Documentation of data sources and types
- Data classification levels
- Data cleansing processes
- Access and Authorization Policy (specify and explain):
- Principle of least privilege
- Access controls and logging
- User management mechanisms
- Physical and Technical Security (specify and explain):
- Infrastructure defenses against breaches
- Encryption and network controls
- Data loss prevention systems
- Awareness and Training Processes (specify and explain):
- Mandatory and periodic training sessions
- Simulation tests (phishing, etc.)
- Internal reporting and escalation mechanisms
- Incident Response and Investigation (specify and explain):
- Procedures for responding to security incidents
- Forensic investigation capabilities
- Regulatory breach reporting obligations
For non-compliant areas:
- Provide immediate remedial procedures
- Indicate complementary tools or technologies
- Suggest post-change monitoring metrics
Conclude with a multi-stage improvement plan, including timelines and responsible parties for each area.
Why this converts well
- Ready to copy and use immediately
- Tailored for legal and public-sector work
- Easy to adapt to internal workflows
Tags
privacy-cyber