Watch this video on YouTube
Your organization has implemented Copilot for Enterprise. You want to ensure that Copilot usage complies with internal security policies. Which of the following practices should be followed?