Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HIPAA » De-Identified Information

De-Identified Information

De-Identified Information is health information that does not identify an individual if covered entities hold that there is no reasonable cause to believe that it can be used to identify an individual. 

The HIPAA privacy rule specifies two methods to de-identify PHI. 

– Expert determination method which applies statistical or scientific principles to conclude that there is very small risk that the recipient can identify the individual. 

– In the Safe harbor method, 18 identifiers are removed.

Additional reading

ERM software

10 Best ERM Software Review

Back in August 2021, fast food giant KFC failed to meet their meat demands and had to take down menu items due to supply chain disruptions. In 2018, they shut down 900 UK outlets after delivery issues – all due to poor risk visibility. While such incidents cannot be fully avoided, it can be minimized…
The Ultimate PCI DSS Compliance Checklist

The Ultimate PCI DSS Compliance Checklist

As an organization processing card data via online portals, you should be PCI DSS compliant to avoid penalties and reputational damage. But the process is exhaustive, time-consuming, and expensive. This article aims to simplify and demystify the PCI compliance framework, help you identify the PCI levels, learn about the 12 PCI DSS requirements checklist, and…
Cybersecurity Vulnerabilities

Understanding Cybersecurity Vulnerabilities And How They Put You At Risk 

From managing finances to connecting with our loved ones, your digital footprints continue to expand. Yet, with every click, scroll, and connection, you leave yourselves vulnerable to unpredictable security risks. Cyber security and Infrastructure Security Agency recently raised an alarm in Palo Alto Networks’ Expedition tool, highlighting the risks that lie within seemingly innocuous software. …

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.