Glossary of Compliance
Compliance Glossary
Our list of curated compliance glossary offers everything you to know about compliance in one place.
PII
PII refers to Personally Identifiable Information or any information used to identify a person. SOC 2 requires businesses that handle sensitive data to implement appropriate controls to ensure PII’s confidentiality, integrity, and availability.
Examples of PII in a SOC 2 report include names, addresses, telephone numbers, email addresses, social security numbers, and financial information such as credit card numbers and bank account numbers.
Additional reading
How to Build an Effective SOC 2 Disaster Recovery Plan
Did you know that infrastructure failures can cost a staggering $100,000 per hour? And that’s not even the worst part—critical application failures can rack up costs between $500,000 and $1 million per hour! Most SMBs can’t bounce back from such massive losses. This is one of the reasons why organizations take their disaster recovery plans…
How to get SOC 2 Type 2 Certification
Getting a SOC 2 type 2 certification is critical to building trust and demonstrating to your customers that you take data security and protection seriously. While there isn’t any legal obligation to comply with SOC 2, getting your organization SOC 2 attested has many advantages. For one, it helps you stand out and removes friction…
Cybersecurity for Small Businesses
There are several myths and misconceptions surrounding cybersecurity for small businesses. Why would the attackers target small businesses? They aren’t large enough. Small businesses often do not have big budgets for cybersecurity. But they do have valuable data. So, cybersecurity isn’t just an IT issue. In reality, 48% of small businesses faced an attack by…

Sprinto: Your growth superpower
Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.
