Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » GDPR » Subject Access Request

Subject Access Request

Under the Right of Access, a data subject (individual) can raise a written or verbal Subject Access Request (SAR) that grants them access to their information and allows them to understand if their information is being processed or not. Data processors will be required to fulfill SARs within a month of them being raised and in a format that is secure and easily understandable, accessible, and concise. Data processors can deny such requests if exceptions or restrictions are in effect. A third party may, with the right form of consent and permission, raise an SAR on behalf of a data subject.

Additional reading

GRC Certification – How to choose from top 10 GRC Certifications ?

A career in Governance, Risk, and Compliance (GRC) can be highly rewarding. This is a dynamic field which is financially lucrative with diverse opportunities for growth and an ability to impact and safeguard an organization’s assets and business reputation. If you are intrigued by a career in GRC, graduate degrees in IT, computer science, and…

How much does Cyber Essentials Plus Certification cost?

Considering the seriousness of cyber-attacks faced by UK companies, the Cyber Essentials and Cyber Essentials Plus certifications were launched in June 2014. By October 2014, it became an essential requirement for government suppliers to ensure data protection.  According to the National Cyber Security Centre (NCSC), the previous year, 9037 Cyber Essential Plus certificates were issued,…

ISO 27001 vs PCI DSS: Similarities & Differences

Companies handling sensitive customer data and payment information are under pressure to comply with not just one, but multiple security frameworks. It’s no longer a question of if you’ll need to prove compliance, but how many certifications you’ll be asked to show. One framework wants proof that your entire business manages information risk; the other…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.