Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » NIST » NIST Privacy Framework

NIST Privacy Framework

The NIST Privacy Framework is a set of guidelines and recommendations that are useful for the organization in minimizing privacy risks while collecting or storing personal information. It integrates privacy into product or service design while assuring compliance with a relevant law and building customer trust. The framework was created due to the growing number of cybercrime incidents, as well as the increased complexity of privacy legislations around the globe.

NIST Privacy framework applies in tandem with NIST Cybersecurity Framework (CSF) to new privacy challenges. Both the frameworks come essentially with three major components: Core, Profiles, and Implementation Tiers.

  • The five functions under the core of three categories and subcategories are: Identify-P, Govern-P, Control-P, Communicate-P, and Protect-P. It provides organizations with an initial structure about what they should know about the privacy risks and the necessary measures to be placed in such activities.
  • Profiles help organizations develop a plan in line with their intended state, specified objectives, and willingness to accept the associated risk. Profiles make it easier for the framework to satisfy the privacy management needs of an organization, as it remains in line with the desired requirements.

The implementation tiers range from Tier 1: Partial to Tier 4: Adaptive. That is to say, organizations can measure and understand maturity relating to their privacy practices and hence determine the level of thoroughness needed for particular privacy risk management activities.

Additional reading

security audit checklist

Security Audit Checklist – 2025 Guide

IT is now fully integrated into business functions, and while this integration is a boon, it can quickly become the first piece of the domino effect that could cause a significant crash when left unchecked. Security audits are designed to monitor and repair the IT infrastructure to achieve optimum efficiency.  An information security audit checklist…
Vendor Risk Management

What Is Vendor Risk Management (VRM)?

When a company works with a third party, vendors often gain access to sensitive data that is processed on behalf of the company. This compounds the risk of exposure and therefore becomes an extension of their compliance needs. Because of this, businesses consider vendor risk management as a crucial point of contention when developing a…
security compliance management

Security Compliance Management: How to Automate

Imagine this. You’re a top executive in the finance department of the company. One day, you receive an email from your CEO’s email address explaining in great detail a scenario that resulted in him not being able to login to one of your databases. Nothing really seems to raise an alarm. The domain name looks…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.