A medium-sized enterprise is expanding and planning to implement a policy to prevent data leaks and unauthorized data transfers. Which policy should the IT department implement to address this specific concern?
Password policy
Security policy
Bring your own device (BYOD) policy
Data Loss Prevention policy
Onboarding policy
Remote access policy