Beginner
CCPA/CPRA consumer request workflow (DSAR) with SLAs
Designs a DSAR workflow including intake, verification, fulfillment, and logging, with SLA tracking. Useful for operationalizing privacy compliance.
Design a consumer privacy request (DSAR) workflow for {organization_name}.
Inputs:
- Request types supported: {request_types}
- Systems holding personal data: {systems_list}
- Verification requirements: {verification_requirements}
- SLA targets and legal deadlines: {sla_deadlines}
- Exceptions and exemptions (if known): {exceptions}
Output:
1) End-to-end workflow steps and roles (customer support, privacy, IT).
2) Request log schema (fields to track, timestamps, outcomes).
3) Template responses (acknowledgment, fulfillment, denial with reasons placeholders).
4) Controls and QA (identity verification, data completeness, audit trail).
Not legal advice; align with counsel and local requirements.Related Prompts
Compliance & Regulatory
Advanced10-Q MD&A draft from variance drivers (management-ready)
Drafts an MD&A section based on provided financial changes and drivers, with structured language and risk-aware tone. Useful for SEC reporting teams accelerating first drafts.
GPT-5.2 Thinking; GPT-4.1; o3-mini
0
0
2
Compliance & Regulatory
Intermediate10-K footnote checklist mapped to owners and source systems
Creates a 10-K footnote checklist with owners, data sources, and validation checks. Useful for planning the annual reporting process and avoiding last-minute gaps.
GPT-5.2 Thinking; GPT-4.1; o3-mini
0
0
2
Compliance & Regulatory
IntermediateSOX risk-control matrix (RCM) generator for a process
Creates a SOX RCM with risks, controls, evidence, and testing attributes. Useful for building or refreshing SOX documentation efficiently.
GPT-5.2 Thinking; GPT-4.1; o3-mini
0
0
2