Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » SOC 2 » Privacy

Privacy

Privacy is one of the five trust service criteria of SOC 2. It is information an entity collects, uses, retains, discloses, and disposes to meet its objectives. 

The privacy principle aims to service organizations who handle sensitive personal information do so in a responsible and trustworthy manner. They should have appropriate controls in place to protect the privacy of individuals. This principle guides organizations to handle privacy based on the following:

– Notice and communication of objectives

– Choice and consent

– Collection

– Use, retention, and disposal

– Access

– Disclosure and notification

– Quality

– Monitoring and enforcement

Additional reading

Risk Management in Enterprise: Frameworks & Compliance

Let’s talk about risk management in enterprise deals, and how it can win you trust (or cost you deals, if overlooked). You know exactly how this deal is going to go. The business case is solid. They love what you’ve built. They need what you’re selling.  Seems like a square deal till security and procurement…

GRC Controls: How to Build a Strong, Risk-Resilient Enterprise

GRC controls help an organization implement their strategic GRC goals. These controls include policies, procedures, practices, and technical safeguards. An organization uses GRC controls to manage its risks, enforce compliance requirements, and uphold good governance. They detect when something’s amiss (like a policy violation or emerging risk) and respond to keep the business stable. Without…

What Is Data Loss Prevention (DLP)?

In 2017, Equifax, one of the largest credit reporting agencies in the US, reported a Data breach. The breach went undetected for months and exposed the personal information of 147 million consumers, nearly half the United States population.  What was the cause? A single unpatched vulnerability in the web application. This oversight allowed hackers to…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.