Glossary of Compliance
Compliance Glossary
Our list of curated compliance glossary offers everything you to know about compliance in one place.
PHI
Protected Health Information (PHI) refers to any data in a medical data record that can be used to identify an individual. This data was created, used, or disclosed during the course of offering health services to a patient.
The Privacy Rule of HIPAA extensively covers the rights an individual has over this information. Covered entities and business associates who use and disclose PHI must do so within the guidelines of HIPAA.
Additional reading
SOC 2 Reports: Types & Steps To Get It
In today’s day and age, data security is a pivotal selling point. Customers and prospects want to know that their data is secure and that the companies they sign on with have sufficient measures to ensure it stays that way. And so, companies are often tasked with proving the effectiveness of their security controls. A…
NIST 800-53 Controls: Strengthening Cybersecurity
If you process highly sensitive data in your systems, a basic security checklist of individual actions or tools – firewall, antivirus, data encryption won’t suffice. You need to safeguard your organization using a broader perspective and comprehensive approach covered in frameworks like NIST. The NIST 800-53 control families outline a set of controls organizations can…
Chaos to Clarity: Demystifying Cloud Security Posture Management
CSPM ensures your cloud business runs smoothly, corrects security misconfigurations, and enables business continuity and growth. The agility, scalability, and accessibility that make cloud technology desirable also breed a complex environment ripe for exploitation. The cloud is just a misconfiguration away from a major disaster. With a big surface area of attack and no clear…

Sprinto: Your growth superpower
Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.



