Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » GDPR » Subject Access Request

Subject Access Request

Under the Right of Access, a data subject (individual) can raise a written or verbal Subject Access Request (SAR) that grants them access to their information and allows them to understand if their information is being processed or not. Data processors will be required to fulfill SARs within a month of them being raised and in a format that is secure and easily understandable, accessible, and concise. Data processors can deny such requests if exceptions or restrictions are in effect. A third party may, with the right form of consent and permission, raise an SAR on behalf of a data subject.

Additional reading

ISO 27001 Checklist: 13 Easy Steps To Get Started

TL;DR An ISO 27001 checklist provides a structured roadmap to implement an Information Security Management System (ISMS) and prepare for certification. Key steps include forming an internal security team, defining ISMS scope, conducting risk assessments, implementing Annex A controls, and maintaining required documentation. The process also involves internal audits, external certification audits (Stage 1 &…

SOC 2 Criteria Mapping to ISO 27001 Controls

SOC 2 and ISO 27001 are both crucial compliance certifications that organizations go for in their compliance journey to enhance security and accelerate growth. Getting compliant with either of these compliances can be time taking and strenuous on your teams. Now imagine getting compliant for both. Are we looking at doubled expenses, resource utilization, opportunity…

Bypassing MFA: Learnings from the biggest MFA breaches of all times

Quick question: If we secure an asset with a password that only the intended user should know, add security questions that only they can answer, confirm their identity through something only they could possess—like their smartphone—and even layer on security tokens or smart cards, we should be airtight, right? Wrong! More than 78% of companies…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.