Glossary of Compliance
Compliance Glossary
Our list of curated compliance glossary offers everything you to know about compliance in one place.
De-Identified Information
De-Identified Information is health information that does not identify an individual if covered entities hold that there is no reasonable cause to believe that it can be used to identify an individual.
The HIPAA privacy rule specifies two methods to de-identify PHI.
– Expert determination method which applies statistical or scientific principles to conclude that there is very small risk that the recipient can identify the individual.
– In the Safe harbor method, 18 identifiers are removed.
Additional reading
Everything You Need to Know About GRC Audit
Do you know that 44% of organizations plan to implement GRC or upgrade their existing implementation? Why so? Because GRC audits are proving to be an eye-opener for organizations so that they can optimize their GRC processes and controls. This helps businesses stay on top of their security and compliance game. Regular GRC audits are…
SOC 2 Report: Building Trust Through Compliance
In today’s day and age, data security is a pivotal selling point. Customers and prospects want to know that their data is secure and that the companies they sign on with have sufficient measures to ensure it stays that way. And so, companies are often tasked with proving the effectiveness of their security controls. A…
Get CCPA Certified: Essential Steps for Compliance
Previously, organizations were required to make efforts to protect client data, but they were not held accountable for what they did with it or with whom they shared it. The California Consumer Privacy Act (CCPA), one of the country’s first digital consumer rights and data privacy legislations, offers robust individual privacy rights and safeguards around…
Sprinto: Your growth superpower
Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.