Control #

F

1

.

2

Log deceptive-use prompts and outputs and review quarterly

Log prompts and completions that involve impersonation, misleading content, or influence operations. Review logs quarterly to detect emerging misuse and update red-team scenarios and safeguards.

Evidence

We'll list specific evidence that demonstrates compliance with this control. Typically, this is screenshots, proof of a legal or operational policy, or product demonstrations.

Recommended actions

We'll recommend specific practices and actions for complying with this control.

Provide feedback on this control