Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » PCI DSS » Cardholder Data

Cardholder Data

Cardholder data (CD) consists of all personally identifiable information (PII), such as the cardholder’s name, card number, expiration date, and CVV security code of the individual with a credit or debit card. This is sensitive card information subject to security regulations like PCI DSS. Banks, payment merchants, and other entities that store and process this data must have adequate security measures to protect the cardholder’s data from security threats. Failure to protect cardholder data can land you in legal problems, and there are financial penalties as well.

Additional reading

NIST Password Guidlines

NIST Password Guidelines: 11 Rules to Follow (Latest Version Updated)

Passwords have always been a contentious topic within the cybersecurity world and among everyday users. No one enjoys understanding the complex rules or changing passwords regularly just because the calendar says so.  Over the years, these frustrating requirements have led to poor password practices like sticky notes, password123, or reusing the same login across platforms….
PCI Compliance for Small Businesses

8 Steps to Get PCI Compliance for Small Business

The Payment Card Industry Data Security Standards (PCI DSS) is a compliance framework that sets guidelines for any organization processing card transactions to ensure the protection of sensitive cardholder information.  However, with four distinct levels of PCI DSS and the need to interpret and map requirements to specific controls, achieving compliance can be an intensive…
Top 8 Cloud Security Challenges: Addressing Modern Threats

80+ Cloud Security Statistics

The adoption of cloud infrastructure for businesses was rather quick. Cloud offers more flexibility to businesses at lower costs and higher efficiency. But could it also lead to increased security issues for your business?  82% of breaches involved cloud-stored data. Cloud security breaches have been on the rise for quite a while now. Plus, with…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.