Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » GDPR » Breach Notification

Breach Notification

Breach Notification under the GDPR is the obligation of a controller to report any security incident in which individuals’ personal data have been subject to unauthorized access or disclosure, destruction, or other forms of misuse. 

It helps alert data subjects and regulators of a potential breach and provides them with information about the incident. This can include what occurred, what was impacted, and what is being done to mitigate the effects. 

For example, suppose a 3rd party misuses an organization’s system to access a database containing sensitive financial information on its customers. In that case, that organization must notify authorities within 72 hours of discovering the breach. Failing to do so could result in significant fines and penalties for noncompliance.

Additional reading

PCI DSS Self Assessment Questionnaire

PCI DSS Self Assessment Questionnaire [Downloadable]

With trillions of dollars in purchases expected to be made using credit cards alone by 2024, the need for PCI compliance is more pressing than ever. Unfortunately, fraud remains a persistent threat, causing billions of dollars to be lost on a yearly basis.  One of the key ways to safeguard your customer’s data is by…
Components of HIPAA

Top 5 Components of HIPAA

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) ensures that health service providers i.e Business Associates (BA) and Covered Entities protect PHI (Protected Health Information) while offering healthcare services. In this article, we discuss the main components of HIPAA and how each serves the purpose stated above.  What are the Components of HIPAA?…
nist compliance

NIST Compliance: A Beginners Guide

NIST asserts significant influence on a number of standards. It provides a framework for security teams to identify, detect, and respond to threats. As a widely recognized security standard, it specifies guidelines for federal security systems. One of its most widely used publications is the 800 series, concerned with computer security.  In this article, we…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.