Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » SOC 2 » Confidentiality


In the context of SOC 2 (Service and Organization Controls), confidentiality refers to the principle that requires organizations to protect the confidentiality of their customer’s data and information. The confidentiality principle is one of five Trust Services Criteria covered in a SOC 2 attestation engagement.

To meet the confidentiality principle, organizations must have controls to ensure that their customers’ data and information are kept confidential and only accessed by authorized individuals. This may include access controls, data encryption, and secure data transmission.

Additional reading

Data Privacy

Why is Data Privacy Important in 2024?

Did you know that humans collectively produce about 2.5 quintillion bytes of data every day? Now that’s ASTØNISHING! But is this data safe? Not really; if you don’t keep your data safe, it could lead to countless data breaches and harm the responsible individuals who never signed up for this to happen. That’s why it’s…
internal audits process

Ultimate Guide to Internal Audit Process

Investing time and resources to get an external audit without undergoing an internal audit hint that the organization is operating with a false sense of security. There are chances of oversights, blind spots, and increased exposure to risks. These could be data breaches, misrepresentation of financial reports, compliance penalties, tarnished public perception, etc. Internal audit…
HIPAA Compliant Data Storage

HIPAA-Compliant Data Storage Requirements

Healthcare data storage requires stringent rules and protocols given the sensitivity of the patient health information they deal with. The United States Health Insurance Portability and Accountability Act (HIPAA), therefore, defines the general guidelines on best practices for storing and protecting protected health information. HIPAA’s Privacy, Security, and Breach Notification rules give a fluid overview…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.