Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Understanding Saudi Arabia’s Global AI Hub Law

Published May 8, 2025
Author

Syeda Eimaan Gardezi

Associate Data Privacy Analyst at Securiti

Listen to the content

Introduction

In a major move to position the country as a global leader in digital technology and artificial intelligence, Saudi Arabia’s  Communications, Space and Technology Commission (CST)  has introduced a draft for the Global AI Hub Law, a legal framework for operating various types of data centers, called “Hubs”. Open for public consultation till May 14, 2025, the Global AI Hub Law allows foreign governments and companies to store and process data within Saudi Arabia under their own legal regimes, while maintaining local oversight. Taking  effect 60 days after publication in the official gazette, it aims to:

  • position Saudi Arabia as a global leader in digital technologies, attracting foreign governments and businesses for peaceful technological development;
  • utilize Saudi Arabia’s strategic location to offer tech solutions that bridge the global digital divide;
  • create sovereign data centers to strengthen international partnerships with secure, cross-border data sovereignty; and
  • foster innovation, research, and development by expanding opportunities in Saudi Arabia’s digital economy.

This not only positions Saudi Arabia as a neutral, secure hub for cross-border data hosting and a key player in global AI and digital infrastructure but is expected to boost foreign investment and enhance Saudi Arabia’s digital economy.

This blog breaks down the law’s main features in an easy-to-read format.

Key Definitions to Understand the Global AI Hub Law

Before diving into the law itself, it is essential to understand the following key terms:

Key Term  Description
Competent Authority The official body (or bodies) chosen by Saudi Arabia’s Council of Ministers (CoM) to oversee the AI Hub Law.
Guest Country A foreign country that signs an agreement with Saudi Arabia to set up a private hub or an extended hub.
Private Hub A data center inside Saudi Arabia used only by a guest country to host its own data, apps, and services under its own country’s rules.
Extended Hub A data center inside Saudi Arabia used by an operator to host its own or its subscribers’ data, apps, and services under the rules of a guest country.
Virtual Hub A data center inside Saudi Arabia where a service provider hosts its customers’ data, apps, and services under the rules of a specific foreign country.
Operator A company that makes an agreement with the competent authority to run an extended hub under a deal with a guest country.
Service Provider A company based in Saudi Arabia that is officially approved to offer virtual hub services under this law.
Customer A party that has contracted with a service provider to use a virtual hub.
Customer Content Any software, data, text, audio, video, or images stored, transmitted, or processed by a customer or its end users via a virtual hub.
Bilateral Agreement An international agreement between Saudi Arabia and a foreign state for the purpose of the Global AI Hub Law and subject to international law.

Understanding AI Hubs

In the context of the Global AI Hub Law, a “hub” refers to a data center located in Saudi Arabia that not only hosts data, applications, and services but also operates under the legal framework of a foreign government or entity. It therefore serves as a centralized platform for storing and processing data, while being governed by a bilateral agreement between Saudi Arabia and the relevant country.  Consequently, foreign countries can have their data hosted in Saudi Arabia but governed by their own laws (with Saudi oversight).

The law introduces three types of data hubs, each with unique roles and governance structures:

Private Hub Extended Hub Virtual Hub
Who operates it? Guest Country Operator Service Provider
What is the purpose of hubs? Host the guest country’s own data, applications, and services under its own laws. Host data, applications, and services of the operator or its subscribers under the guest country’s laws. Host customer content under the foreign state’s laws.
Who has the legal jurisdiction? Guest country’s laws apply inside the hub as per the bilateral agreement. Guest country’s laws apply inside the hub as per the bilateral agreement. Laws of the foreign state apply to customer content as per the bilateral agreement.
What is the role of Saudi Arabia?  They must provide protection, connectivity, resources; grants immunities/privileges (as per bilateral agreement).

Entry by authorities allowed in emergencies

They must provide protection, connectivity, resources; grants immunities/privileges (as per bilateral agreement).

Entry by authorities allowed in emergencies

They must support the enforcement of valid orders from the foreign state.

Authorities can act if hosting/processing harms Saudi Arabia or interferes with another state’s internal affairs

What are compliance obligations? Ensure compliance and cooperation with:

  • international law,
  • Global AI Hub Law,
  • international restrictions on data and technology, and
  • local authorities to support digital infrastructure (as per bilateral agreement).
Ensure compliance and cooperation with:

  • international law,
  • Global AI Hub Law,
  • international restrictions on data and technology, and
  • local authorities to support digital infrastructure (as per bilateral agreement).

Operators must also comply with international best practices.

Ensure compliance and cooperation with:

  • Global AI Hub Law,
  • Saudi Arabia’s laws, unless exempted; and
  • competent authority.

The competent authority monitors compliance and ensures adherence to treaties and agreements. It is further tasked with collecting summaries of orders issued about service providers from foreign states and maintaining a register of all hubs, countries, operators, and agreements. Furthermore, bilateral agreements are pivotal in enforcement as they set the specific terms, conditions, and privileges for private, extended, or virtual hubs, ensuring mutual obligations are clearly defined while protecting Saudi Arabia’s national interests.

It’s also important to note that the CoM can end agreements or approvals to protect national security, sovereignty, or diplomatic relations. However, even after termination, some privileges may continue for a set time to ensure a smooth transition, for example, if a virtual hub is cancelled, the law remains in effect for 120 days after cancellation, or longer if specified.

Key Considerations & Challenges

The Global AI Hub Law represents an ambitious and forward-looking attempt to redefine data sovereignty and cross-border data governance. As Saudi Arabia moves toward finalizing and implementing the law, key opportunities and challenges will shape its trajectory. Despite these strategic benefits, the Global AI Hub Law raises complex legal and operational questions that will require careful navigation.

One major challenge lies in reconciling conflicting legal regimes: by allowing foreign jurisdictions to apply within Saudi territory, the law introduces an overlap of legal authorities. This hybrid model could create uncertainty around which law prevails in disputes when multiple legal systems assert incompatible rules regarding data privacy, national security, intellectual property, or content moderation. Hence, creating a risk of legal fragmentation or enforcement deadlock within the hubs.

Moreover, the Global AI Hub law’s reliance on bilateral agreements adds complexity and potential asymmetry. Each agreement could vary in terms, scope, and enforcement provisions, making consistency across hubs difficult to achieve. This raises questions about regulatory fairness and transparency, as well as the operational burden on regulators to oversee diverse agreements while safeguarding national interests.

Conclusion

Despite the complexities, the Global AI Hub Law signals Saudi Arabia’s bold commitment to shaping the future of global data governance. It represents a pioneering approach, creating a hybrid legal framework that combines extraterritorial data jurisdiction with national oversight, redefining traditional models of data localization and control.

Thus, whether you’re a policymaker, tech investor, or legal professional, it opens new opportunities for data collaboration, AI innovation, and international partnerships, setting a precedent that may shape global data governance in the years to come.

How Securiti Can Help

Securiti is the pioneer of the Data + AI Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Securiti Gencore AI enables organizations to safely connect to hundreds of data systems while preserving data controls and governance as data flows into modern GenAI systems. It is powered by a unique knowledge graph that maintains granular contextual insights about data and AI systems.

Gencore AI provides robust controls throughout the AI system to align with corporate policies and entitlements, safeguard against malicious attacks and protect sensitive data. This enables organizations to comply with the AI regulations.

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

Securiti Powers Sovereign AI in the EU with NVIDIA View More

Securiti Powers Sovereign AI in the EU with NVIDIA

The EU has taken the lead globally in ensuring that the power of AI systems is harnessed for the overall wellbeing of human citizens...

The Risks of Legacy DLP: Why Cloud Security Needs DSPM View More

The Risks of Legacy DLP: Why Cloud Security Needs DSPM

82% of 2024 data breaches involved cloud data, raising concerns about the effectiveness of legacy data loss prevention (DLP) solutions in today's cloud-centric data...

Data Classification: A Core Component of DSPM View More

Data Classification: A Core Component of DSPM

Data classification is a core component of DSPM, enabling teams to categorize data based on sensitivity and allocate resources accordingly to prioritize security, governance,...

9 Key Components of a Strong Data Security Strategy View More

9 Key Components of a Strong Data Security Strategy

Securiti’s latest blog breaks down the 9 key components of a robust data security strategy and explains how it helps protect your business, ensure...

Beyond DLP: Guide to Modern Data Protection with DSPM View More

Beyond DLP: Guide to Modern Data Protection with DSPM

Learn why traditional data security tools fall short in the cloud and AI era. Learn how DSPM helps secure sensitive data and ensure compliance.

Mastering Cookie Consent: Global Compliance & Customer Trust View More

Mastering Cookie Consent: Global Compliance & Customer Trust

Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now View More

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now

Discover why shifting focus from AI risk to AI readiness is critical for enterprises. Learn how Data Security Posture Management (DSPM) empowers organizations to...

The European Health Data Space Regulation View More

The European Health Data Space Regulation: A Legislative Timeline and Implementation Roadmap

Download the infographic on the European Health Data Space Regulation, which features a clear timeline and roadmap highlighting key legislative milestones, implementation phases, and...

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New