Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » PCI DSS » PCI DSS Standards

PCI DSS Standards

The PCI Data Security Standard (PCI DSS) safeguards cardholder data and sensitive authentication information when processed, stored, or transmitted. The PCI DSS universe is built of 3 important components. They are:

PCI Data Security Standard (PCI DSS)

This component applies to any company that deals with cardholder data, whether it’s storing, processing, or transmitting it. It covers the technical and operational aspects of systems connecting to cardholder data. If your business handles payment cards in any way, you must comply with PCI DSS to ensure data security.

Payment Application Data Security Standard (PA-DSS)

PA-DSS is mainly for software developers and integrators who create applications that are about cardholder data. It also covers applications you sell, distribute, or license to third parties.

PIN Entry Device Security Requirements (PCI PED) 

PCI PED is mainly for manufacturers who create and manage personal identification number (PIN) entry terminals used in financial transactions. PCI PED specifies these devices’ security requirements and ensures you securely handle PINs.

Additional reading

PCI DSS Fines

PCI DSS Fines: How Much Will It Cost?

A fine of $145 million and a ban from processing card payments for 14 months. That was the PCI DSS fine Heartland paid for data theft of 100 million debit and credit card data from their site in 2008/2009. Target was another recent recipient of PCI DSS fines—they paid $18.5 million in settlements and $202…
GRC pricing

GRC Pricing: A Complete Breakdown

The Governance, Risk, and Compliance (GRC) market is showing signs of rapid growth and expansion. The growth is estimated to be reaching a figure of $60.5 billion by 2025, up from $38 billion in 2020. This need for integrating GRC into strategic objectives is driven by mounting cybersecurity challenges, complicated regulatory demands, and heightened market…
12-Step GDPR Compliance Checklist

12-Step GDPR Compliance Checklist

Applications used in daily life collect large amounts of data through embedded trackers. This data could potentially be used in a cyber attack, leading to a violation of data privacy. According to Salesforce, 60% of their customers felt they had no control over how their personal data is used.  The European Union established the General…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.