Control #
F
1
.
2
Log deceptive-use prompts and outputs and review quarterly
Log prompts and completions that involve impersonation, misleading content, or influence operations. Review logs quarterly to detect emerging misuse and update red-team scenarios and safeguards.
Evidence
We'll list specific evidence that demonstrates compliance with this control. Typically, this is screenshots, proof of a legal or operational policy, or product demonstrations.
Recommended actions
We'll recommend specific practices and actions for complying with this control.