Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » ISO 27001 » Advanced Digital Signature

Advanced Digital Signature

The advanced electronic signature is a digital signature to uniquely identify the signer based on an advanced certificate. The signature keys are utilized with a high degree of confidence by the signatory (who has sole possession of the signing key).

An electronic signature is observed to be advanced, under eIDAS,  if it has met several requirements, including:

– Identifies and links its signatory uniquely

– The private key used to make the electronic signature is under the sole proprietorship of the signatory

– If the data is tampered with after the signature, the signature must detect that this has happened

-The signature should be invalidated in the event its accompanying data has changed

Additional reading

HIPAA Documentation: Importance & Requirements

If you own a healthcare facility or provide a service to one, you know how important it is to be HIPAA compliant. HIPAA has a long list of requirements, and documentation is an important one. The struggle with HIPAA documentation is often confusing. The legal speak often leads non-compliance folks down the rabbit hole. But…

How to Create an ISO 27001 Remote Working Policy That Passes Audit

Securing endpoints and enforcing consistent policies across a hybrid or remote workforce remains one of the toughest challenges for security and compliance teams. With employees working across varied locations, devices, and networks, the risk surface expands fast, and without clear guardrails, compliance falls apart. Annex A.6.7 of ISO 27001:2022 directly addresses this complexity by requiring…

NIST Risk Management Framework: The 7 Steps Explained 

The NIST Risk Management Framework provides a comprehensive approach for managing network infrastructure and operations risks. Published by the United States government, it provides a structured methodology for identifying, assessing, prioritizing, and mitigating risks related to networking technologies and activities within an organization.    In this article, we understand what comprises the NIST risk management framework…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.