Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » GDPR » Breach Notification

Breach Notification

Breach Notification under the GDPR is the obligation of a controller to report any security incident in which individuals’ personal data have been subject to unauthorized access or disclosure, destruction, or other forms of misuse. 

It helps alert data subjects and regulators of a potential breach and provides them with information about the incident. This can include what occurred, what was impacted, and what is being done to mitigate the effects. 

For example, suppose a 3rd party misuses an organization’s system to access a database containing sensitive financial information on its customers. In that case, that organization must notify authorities within 72 hours of discovering the breach. Failing to do so could result in significant fines and penalties for noncompliance.

Additional reading

SOC 2 Compliance Checklist: A Step-by-Step Guide For 2026

With cloud-hosted applications becoming a mainstay in today’s world of IT, staying compliant with industry standards and benchmarks like SOC 2 is becoming a necessity for SaaS firms. Therefore, getting SOC 2 compliance isn’t a question of ‘why’ as much as it is a ‘when’. With that in mind, here’s a handy SOC 2 compliance…

Risk Management in Healthcare: Strategies for a Safer Future

The healthcare sector has seen immense efficiency gains from technology—improved patient outcomes, centralized services through third-party vendors, better data management, and a constant drive for innovation. However, beneath the benefits lie a complex web of interconnected challenges—regulatory laws, clinical issues, patient data concerns, and an under-preparedness for cyber attacks. It’s no wonder that year after…

Mandatory ISO 27001 Documents You Must Prepare

Identifying documents for ISO 27001 demands meticulous attention to detail. Overlooking critical documents or including unnecessary ones are common scenarios with far-reaching consequences. Adding a layer of complexity to the process are the various formats—digital files, physical records, screenshots, emails, time stamps, evidence catalogue, etc. The stakes are high, as gaps in documentation could lead…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.