What is the SOC 2 Common Criteria List?

Protecting privacy and security is foundational for all organizations that process, store, or transmit customer data and personal information. The System and Organization Controls for Ser ...
January 5, 2023

What Is the Threshold Application of the CCPA?

When the California Consumer Privacy Act went into effect at the start of 2020, many businesses scrambled to determine whether the law applied to them. The CCPA is the most stringent privacy ...
December 29, 2022

What’s the Definition of Sale Under the CCPA?

The California Consumer Privacy Act (CCPA) is a privacy law that applies to businesses working in California; it requires them to provide certain basic protections for any personal data the ...
December 20, 2022

What is Compliance Risk Management?

Compliance risk management is the process of identifying, assessing, and monitoring the risks to your enterprise's compliance with regulations and industry standards. This includes all the i ...
December 20, 2022

SOC 1 vs SOC 2: What’s the Difference?

SOC audits — the acronym stands for "Systems and Organization Controls" — provide assurance on the effectiveness of internal controls at service organizations such as advisory fi ...
December 19, 2022

What’s the System Description of a SOC 2 Report?

A SOC 2 system description is an important part of a SOC report. It outlines the boundaries of that report, and contains important details regarding the people, processes, and technology tha ...
December 15, 2022

Compliance Does Not Equal Security: How to Take a Proactive Approach to See, Understand and Act on Risk

Compliance is the typical starting point in protecting your organization. After all, it's a "must-do," and failure to comply can result in fines and other regulatory action. But focusing exc ...
November 9, 2022

What Are the Three Types of ISO Audits?

October 25, 2022
1 2 3 21