Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » SOC 2 » Quality Report

Quality Report

A SOC 2 quality report is a document that service organizations use to demonstrate that they have adequate controls, policies, and processes in place to secure customer data. These controls are related to the five trust principles: security, availability, processing integrity, confidentiality, and privacy. Security is the most important and compulsory criterion, while others can be audited for compliance based on business needs. 

The report is provided by a CPA (Certified Public Accountant) firm. There are two types of report – Type 1 and Type 2. A Type 1 report provides a snapshot of the service organization’s controls at a specific point in time. A Type 2 report provides a snapshot of the service organization’s controls over a longer period of time, generally six months or longer.

Additional reading

What is Cybersecurity

What is Cybersecurity? A Simple Guide to Online Protection

As digital landscapes continue to evolve at an accelerated pace, new tools, technologies, and systems are added to them daily. These are necessary tools for businesses to grow, but they also open up doors to new vulnerabilities and threats. This is why cybersecurity has become ubiquitous in our digital world.  Cybersecurity is the process of…
ISO 31000

An Overview of ISO 31000: The Risk Management Standard

Managing cybersecurity risk is not as simple as it sounds. You’ll often hear terms like “avoid,” “mitigate,” or “transfer,” but when you dig deeper, you realize these are broad strategies. The real challenge is translating them into actionable steps that measurably reduce risk. What does it mean to “avoid” risk? Is it simply removing a…
article 15 gdpr

Article 15 GDPR Right of access by the data subject

Article 15 of the General Data Protection Regulation (GDPR) empowers the data subject to exercise their right to know the information their employers hold about them. Are your employees (current/former) asking you to produce the information you have about them? Should you consider oral requests, What’s the TAT for response time and what are the…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.