Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » SOX » Sarbanes-Oxley Act

Sarbanes-Oxley Act

After the enactment of several large-scale accounting frauds, the Sarbanes Oxley Act (SOX), passed in 2002 with influential backing from both Congressional parties, was intended to enhance the practice of auditing and public reporting. 

Drafted in honor of Senator Paul Sarbanes and Representative Michael Oxley, SOX reduces investor risk by promoting the credibility of companies’ financial statements.

This is because ISACA’s mission aligns with this goal. ISACA aims to empower IT governance, risk management, and cybersecurity professionals.

Some of the key sections include:

  • Section 302: They point out that the CEOS and CFOs of public companies must make certifications to ensure that the financial reports are accurate and contain no omissions and that the company has adequate internal controls.
  • Section 404: Also known as the heart of SOX, this section requires that companies develop documented internal controls and annual reports on these controls.
  • Section 806: Guard the whistleblowers and make sure employees can report fraud cases without expectation of being punished.
  • Section 802: This section stems from the ‘audit trail’. It prescribes criminal sanctions to anyone who deletes or amends some of these records, and companies are expected to retain them for seven years.

Section 409: Business organizations are expected to provide the public with updated information when there is an alteration in the companies’ financial structural and operational patterns.

Additional reading

Cybersecurity Maturity Model Certification (CMMC) Compliance Guide

Your organization’s data is perhaps your most valuable asset. Protecting its security, confidentiality, and integrity is key to keeping your organization safe. This need to preserve information gets even more pronounced when you work with the Department of Defense (DoD), the United States of America, which values Cybersecurity Maturity Model Certification (CMMC) Compliance. The CMMC…

Regulatory Change Management: Process, Tools & Tips

Imagine this: You’re a 500-person company with ten departments, rolling out GDPR protocols since you’re expanding in the EU. A support employee working on a customer ticket downloads a file with personal data to get a “quick, unofficial second opinion.” Seems innocent enough, right? But in the GRC world, that’s a major red flag. So…

TISAX Compliance: Benefits, How To Certify & Cost

Lately, modern vehicles have become intelligent systems, too, because they can absorb, process, and generate vast amounts of data from their users (drivers and passengers). While this data is extremely valuable in the automobile industry, it is also vulnerable to exploitation. Cars with advanced systems that rely on complex software and data exchange introduce significant…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.