Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST Privacy Framework

NIST Privacy Framework

The NIST Privacy Framework is a set of guidelines and recommendations that are useful for the organization in minimizing privacy risks while collecting or storing personal information. It integrates privacy into product or service design while assuring compliance with a relevant law and building customer trust. The framework was created due to the growing number of cybercrime incidents, as well as the increased complexity of privacy legislations around the globe.

NIST Privacy framework applies in tandem with NIST Cybersecurity Framework (CSF) to new privacy challenges. Both the frameworks come essentially with three major components: Core, Profiles, and Implementation Tiers.

  • The five functions under the core of three categories and subcategories are: Identify-P, Govern-P, Control-P, Communicate-P, and Protect-P. It provides organizations with an initial structure about what they should know about the privacy risks and the necessary measures to be placed in such activities.
  • Profiles help organizations develop a plan in line with their intended state, specified objectives, and willingness to accept the associated risk. Profiles make it easier for the framework to satisfy the privacy management needs of an organization, as it remains in line with the desired requirements.

The implementation tiers range from Tier 1: Partial to Tier 4: Adaptive. That is to say, organizations can measure and understand maturity relating to their privacy practices and hence determine the level of thoroughness needed for particular privacy risk management activities.

Additional reading

The-Ultimate-SOC-2-Compliance-Questionnaire

The Ultimate SOC 2 Compliance Questions

The hardest thing about SOC 2 is knowing where to start. What makes it even tougher is the fact there’s no easy template to follow – every SOC 2 audit is unique to the organization carrying it out. However, there’s no need to despair! “While there’s no one size fits all answer, there are several…
HITRUST Audit

HITRUST Audit [Easy Step by Step Guide]

A research by Ponemon Institute reveals that the healthcare industry has faced the most expensive breaches for 12 years in a row. This highlights the need to address the security gaps in an effective way. The HITRUST framework aims to address the challenges of managing healthcare services in a secure way. But how can you…
GRC in cyber security

GRC in Cyber security (Complete Guide)

The debate about digitization being a boon or a bane can be polarizing. Still, we can all agree that it has brought a wave of cyber threats, scams, breaches, and other sophisticated cyber attacks.  The digital landscape shifts like quicksand, which explains why 68% of business owners feel that cybersecurity risks are increasing. Enter Governance,…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.