Glossary

C

Compliance Program

A compliance program is a company's set of internal artifacts (controls, policies, systems, etc.) put into place in order to comply with laws, rules, and regulations or to uphold the business's reputation.

E

Evidence

Each piece of evidence provides proof that a company is adhering to its controls. Auditors (and sometimes customers) require a company to provide evidence, so that they can validate that the company is actually meeting the compliance obligations it claims.

P

Program

A compliance program is a company's set of internal artifacts (controls, policies, systems, etc.) put into place in order to comply with laws, rules, and regulations or to uphold the business's reputation.

S

Security Posture

An organization's security posture (or cybersecurity posture) is the collective security status of all software, hardware, services, networks, information, vendors and service providers. 

Subservice Organization

If a vendor’s controls, in combination with your organization’s controls, are necessary to achieve your service commitments and system requirements, to meet your SOC 1 objectives, or to fulfill applicable SOC 2 trust services criteria, then the vendor is classified

T

Test

A test checks for a single requirement in a control. All controls contain one or more tests, each of which checks for a specific requirement of the control.

Third-Party Vendor

A third party vendor is a person or company that provides services for another company (or that company's customers).

Trust Assurance

Trust Assurance is a brand new approach. Trust Assurance is a crafted, consumer-grade user experience that demystifies compliance. It pairs machine learning with intuitive design to do most of the work for you; embedding accurate testability into every workflow to

TrustHQ

TrustHQ enables companies to engage their employees in meeting their trust obligations to the company. Employees can understand, and periodically attest to their obligations to the company - such as reading and acknowledging company policies, declaring their use of third-party

TrustOps

Application that enables continuous compliance automation. TrustOps empowers teams to manage their internal trust operations and achieve one or more security and privacy compliance standards such as SOC 2, HIPAA, ISO 27001, etc.

TrustShare

An automatically generated, interactive website that TrustCloud customers use as a single place for all trust communication with their prospects and customers. TrustShare confidently showcases your company’s security and compliance hygiene to help you bi-pass completing security questionnaires!

U

User

An individual who uses TrustCloud, identified with their email ID. A user may be part of a single team, or multiple teams. Most users belong to a single team.

V

Vendor

A company that builds and ships a system. For example, Microsoft is the vendor for systems like Azure AD, Confluence, Office 365 etc.

OR