A medium-sized enterprise is expanding and planning to implement a policy to prevent data leaks and unauthorized data transfers. Which policy should the IT department implement to address this specific concern?
Data Loss Prevention policy
Bring your own device (BYOD) policy
Password policy
Remote access policy
Security policy
Onboarding policy