Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » SOX » Sarbanes-Oxley Act

Sarbanes-Oxley Act

After the enactment of several large-scale accounting frauds, the Sarbanes Oxley Act (SOX), passed in 2002 with influential backing from both Congressional parties, was intended to enhance the practice of auditing and public reporting. 

Drafted in honor of Senator Paul Sarbanes and Representative Michael Oxley, SOX reduces investor risk by promoting the credibility of companies’ financial statements.

This is because ISACA’s mission aligns with this goal. ISACA aims to empower IT governance, risk management, and cybersecurity professionals.

Some of the key sections include:

  • Section 302: They point out that the CEOS and CFOs of public companies must make certifications to ensure that the financial reports are accurate and contain no omissions and that the company has adequate internal controls.
  • Section 404: Also known as the heart of SOX, this section requires that companies develop documented internal controls and annual reports on these controls.
  • Section 806: Guard the whistleblowers and make sure employees can report fraud cases without expectation of being punished.
  • Section 802: This section stems from the ‘audit trail’. It prescribes criminal sanctions to anyone who deletes or amends some of these records, and companies are expected to retain them for seven years.

Section 409: Business organizations are expected to provide the public with updated information when there is an alteration in the companies’ financial structural and operational patterns.

Additional reading

IT compliance

Understanding IT Compliance: A Complete Guide

A modern organization today is characterized by various cross-functional departments with information technology intricately interconnected to each function. The interwoven landscape has, on the one hand, enhanced operational synergies, but at the same time, it has increased the risks of security failures and cyber threats. This reality has caused a surge in regulatory scrutiny and…
Cloud security broker

What is Cloud Access Security Broker?

Managing the features and resources of cloud computing is a unique challenge by itself and can get quite complicated. While technological advancement is happening, companies should take it upon themselves to learn the most up-to-date cloud patterns and be able to efficiently and safely use cloud computing. Companies store sensitive data and run critical applications…

Cybersecurity Readiness Assessment: The First Move Toward Proactive Defense

The 2024 CISCO cyber readiness index revealed that only 3% of organizations worldwide have the security maturity and readiness to be resilient against emerging risks. However, strangely, 80% of organizations feel moderately to highly confident in their readiness capabilities. The report highlights how organizations today are ‘underprepared’ and ‘overconfident’ regarding cyber readiness.  But honestly, tell…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.