The GRC industry has a language problem. Terms like “compliant,” “secure,” “policy,” and “risk” are used so loosely — and so incorrectly — that they create genuine legal exposure, failed audits, and programs built on a foundation of misunderstanding. These are the worst offenders.
When an executive tells a board “we are compliant,” that statement has different legal weight depending on whether it means “we have checked every mandatory requirement and can evidence it” or “we did our best.” Courts and regulators do not grade on effort.
When a vendor contract says “reasonable security,” what that phrase means in litigation is determined by what controls the industry considers standard — not what the vendor thought was good enough. When a policy document is labeled “policy” but written as a procedure, auditors flag it. When “risk” and “vulnerability” are used interchangeably, the risk register becomes meaningless.
These are not theoretical concerns. Enforcement actions, class action lawsuits, and failed third-party audits regularly cite imprecise or misleading language in compliance documentation as a contributing factor in findings.
Every term used in the SCF CCF™ — from “policy” to “risk” to “compliant” — is used with its precise regulatory and legal meaning. The SCF documentation, assessment methodology (CDPAS), and control catalog use consistent terminology that aligns with how courts, regulators, and auditors actually interpret these words.
Each entry shows the wrong usage, the correct usage, and the real-world consequence of getting it wrong.
"We have a program in place and we think we generally meet the requirements."
Used as a permanent state — "we are compliant" — as if compliance is achieved once and maintained passively. Often stated without evidence, without a completed assessment, and without specific reference to which obligations are being met.
"We have assessed all applicable requirements, we have evidence of implementation for each, and we have no open material gaps — as of the date of our last assessment."
Compliance is point-in-time, evidence-based, and obligation-specific. You are not "compliant with HIPAA" — you are compliant with the HIPAA Security Rule’s 45 CFR Part 164 requirements as of your last documented risk assessment. Compliance decays as systems change and is re-established through assessment.
"We have security controls in place and haven’t been breached."
"Not yet breached" is routinely conflated with "secure." Organizations point to their firewall, their endpoint agent, their SOC 2 report, or their penetration test from 18 months ago as proof of security. None of these are proof of security — they are evidence of specific controls at a point in time.
"We maintain a risk-based cybersecurity program targeting SCR-CMM Level 3 maturity across our prioritized control domains. Our current assessed risk posture shows X open findings rated critical or high."
Security is a continuous, risk-managed state — not a binary. The honest representation is the current state of the risk register, the maturity level of the control program, and the open remediation items. The SCR-CMM provides a defensible, quantified way to describe security posture without making absolute claims.
"Here is our Password Policy" [document contains step-by-step instructions for setting a password and minimum length requirements — which are a procedure and a standard, not a policy].
Organizations mislabel standards as policies, procedures as guidelines, and guidelines as standards. When an auditor asks for your "information security policy," they expect a management-approved statement of intent and direction — not a 47-page technical how-to document.
Policy: Management-approved statement of intent, direction, and principle. "The organization shall protect information assets commensurate with their classification." Mandatory. Brief. Board-accessible.
Standard: Specific, measurable requirement. "Passwords must be minimum 12 characters with complexity." Mandatory. Quantitative. Technology-specific.
Procedure: Step-by-step instructions for performing a task. "To reset a password: 1. Navigate to... 2. Click..." Operational. Role-specific.
Guideline: Recommended but non-mandatory advice. "Users should consider using a password manager." Advisory. Discretionary.
"We identified a risk in the vulnerability scan." / "The threat is that we don’t have MFA." / "Our biggest risk is ransomware."
All three terms are used interchangeably in most organizations. A vulnerability scan identifies vulnerabilities — not risks. MFA absence is a control gap or vulnerability — not a threat. Ransomware is a threat actor category — risk is the product of that threat exploiting a vulnerability to cause impact.
Threat: A potential event or actor that could cause harm. "Ransomware-as-a-service operators targeting healthcare organizations."
Vulnerability: A weakness that a threat could exploit. "Unpatched Exchange server reachable from the internet."
Risk: Potential for loss resulting from a threat exploiting a vulnerability. Risk = Likelihood × Impact. "Risk that ransomware actors exploit the unpatched Exchange server, encrypting 30TB of patient data, estimated impact of $4.2M."
Control: A measure that reduces the likelihood or impact of a risk materializing.
"We had an audit done" [conducted by an internal team member] / "Our annual security review satisfies our audit requirement" / "The vendor provided an audit report" [it was a self-assessment questionnaire].
Organizations routinely represent internal assessments as audits to regulators, boards, and customers. Some regulations explicitly require independent audits — presenting a self-assessment as an audit to a regulator is a compliance failure and potentially a misrepresentation.
Audit: An independent, formal examination by a qualified third party producing an opinion or attestation. Has defined independence requirements. Legally significant. Examples: SOC 2 Type II, HIPAA independent audit, CMMC C3PAO assessment.
Assessment: A structured evaluation that may be conducted internally or by a qualified third party. Produces findings and recommendations. Not an opinion or attestation. Examples: CDPAS self-assessment (Type 1), CDPAS third-party assessment (Type 2).
Review: An informal evaluation — typically internal, less structured, advisory in nature. Does not satisfy audit or assessment requirements under most regulatory frameworks.
"We follow industry best practices." / "This configuration aligns with best practices." / "Best practices require you to implement X."
"Best practices" is invoked constantly to lend authority to recommendations that may be highly subjective, vendor-specific, outdated, or inapplicable to the organization’s context. It is also used defensively — "we followed best practices" — as if that phrase constitutes a legal defense. It does not.
"NIST SP 800-63B Section 5.1.1 recommends a minimum password length of 8 characters for memorized secrets. The SCF control IAC-XX requires [specific requirement]. Our implementation aligns with NIST SP 800-63B and satisfies SCF IAC-XX."
Cite the specific authoritative source. "Best practices" means nothing in litigation or a regulatory exam. "NIST SP 800-63B, Section 5.1.1" means something. The SCF STRM methodology exists precisely to provide this specificity — every SCF control traces to the authoritative source that requires or recommends it.
"We protect privacy by encrypting personal data." / "Our security program covers our privacy obligations." / "We keep data confidential, so we’re compliant with GDPR."
Security and privacy are routinely treated as synonymous. Encrypting data protects its confidentiality and integrity — this is a security control. But privacy is about lawful processing, purpose limitation, individual rights, and data subject consent — legal obligations that encryption does not address at all.
Security: The set of technical and organizational controls that protect the confidentiality, integrity, and availability of information systems and data. A security program can be excellent while still violating every privacy law.
Privacy: The right of individuals to control how their personal data is collected, used, shared, and retained. A privacy program addresses legal bases, consent, individual rights, and purpose limitation — none of which are security controls.
Confidentiality: One of the three pillars of security (CIA triad — Confidentiality, Integrity, Availability). Protecting data from unauthorized disclosure. A security property, not a privacy principle.
"We implement reasonable security" [meaning: we do what our budget allows and what we think is sensible].
Many US state laws, the FTC Act, and common law negligence claims use "reasonable security" as the compliance standard. Organizations assume this is a flexible, subjective standard that accommodates their constraints. Regulators and courts do not agree.
"Reasonable security means implementing controls that are appropriate to the nature, size, and complexity of the organization and the sensitivity of the data — measured against recognized industry standards."
The FTC and state AGs have consistently measured "reasonable security" against NIST CSF, NIST SP 800-53, and CIS Controls. The SCF CCF™ — as the most comprehensive metaframework mapping all recognized standards — provides the most defensible foundation for demonstrating "reasonable security" because it documents precisely how controls satisfy each applicable standard.
A practical substitution guide for the most common word crimes in GRC communications, documentation, and executive reporting.
Say: "As of our [date] CDPAS assessment, we have no open critical or high findings against our applicable MCRs. Our next scheduled assessment is [date]."
Compliance is evidence-based, point-in-time, and obligation-specific — not a permanent state.
Say: "Our current SCR-CMM score is Level [X] across our prioritized control domains. Our open risk register shows [N] critical and [N] high risk items currently in remediation."
Security is a quantified, dynamic posture — not a binary state.
Say: "[Specific control], per [specific standard, section, version]." e.g., "MFA for all remote access, per NIST SP 800-63B and SCF IAC-09."
Cite the authoritative source. "Best practices" is not a defense in litigation or a regulatory exam.
Use a tiered documentation structure: Policy (intent) → Standard (requirement) → Procedure (steps) → Guideline (recommendation). Label each correctly.
Auditors expect each document type to match its label and serve its purpose.
Call vulnerabilities vulnerabilities. Reserve "risk" for: Threat + Vulnerability + Likelihood + Impact — a quantified statement of potential loss, not a finding from a scan.
Risk registers must contain risks — not vulnerability inventory.
Say: "Our security program addresses CIA of personal data. Our privacy program addresses lawful basis, individual rights, data minimization, and cross-border transfers." These are separate programs.
Security and privacy are complementary but legally distinct obligations.
The SCF CCF™ uses exact, legally-grounded terminology across all 1,400+ controls — distinguishing policy from procedure, risk from vulnerability, MCR from DSR, and compliance from security. Download free and build on a foundation that will hold up under scrutiny.