Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » GDPR » Subject Access Request

Subject Access Request

Under the Right of Access, a data subject (individual) can raise a written or verbal Subject Access Request (SAR) that grants them access to their information and allows them to understand if their information is being processed or not. Data processors will be required to fulfill SARs within a month of them being raised and in a format that is secure and easily understandable, accessible, and concise. Data processors can deny such requests if exceptions or restrictions are in effect. A third party may, with the right form of consent and permission, raise an SAR on behalf of a data subject.

Additional reading

Don’t Be the Next Headline: How Network Security Audits Can Save Your Business

Cybersecurity is a constant race between attackers and defenders, where countermeasures must be implemented before hackers exploit vulnerabilities—otherwise, your organization risks becoming just another statistic. In such a scenario, ‘deeper insights and fast response’ are the only key strategies to maintain visibility and stay ahead. Enter network security audits. A network security audit provides a…
Getting FedRAMP Compliance

FedRAMP Compliance: Importance and Steps

Before the establishment of FedRAMP, the U.S. government’s approach to cloud security was inconsistent and inefficient, leading to increased risks to national information. The introduction of the FedRAMP framework in 2011 aimed to provide a standardized approach to cloud security practices and ensure secure cloud deployment by agencies, emphasizing FedRAMP compliance. Ever since, the FedRAMP…
access review

How Access Reviews Improve Your Organization’s Data Security?

November 12, 2021. A former South Georgia Medical Center employee made an unauthorized copy of a patient’s private data before leaving the company. The center had to provide patients with free credit monitoring and identity restoration to compensate for the disgruntled ex-employee’s actions. While this is the case of a malicious insider, there are other…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.