'Most Innovative Startup 2020' by RSA - Watch the video

Learn More

Abu Dhabi's ADHICS & ADGM DPR

Get compliant with the most comprehensive PrivacyOps platform.

Download the book today!

PrivacyOps - Automation & Orchestration for Privacy Compliance
Download Book
Available in PDF

Privacy Law Type

On 2nd March, 2019, the Department of Health—Abu Dhabi (DoH), launched the Abu Dhabi Healthcare Information and Cyber Security (ADHICS) Standard. This is the first standard that aims to provide healthcare professionals and entities a comprehensive guide to the regulation of healthcare data in Abu Dhabi. This law ensures the highest levels of privacy and security of patients’ data, in line with international standards, is maintained.

The solution

SECURITI.ai enables organizations to comply with the ADHICS regulations through AI-driven PI data discovery, DSR automation, documented accountability, enhanced visibility into data processing activities and AI-driven process automation.

securiti dashboard

SECURITI.ai supports enterprises in their journey toward compliance with the ADHICS through automation, enhanced data visibility and identity linking.

See how our comprehensive PrivacyOps platform helps you comply with various sections of ADHICS


 

Automate health professionals’ data access request handling

HI 2.1

The automation of the delivery and generation of secure data access reports will greatly reduce the risk of compliance violations and reduce the workforce required to comply with all the requests.

dsr portal
dsr handling

Automated discovery, mapping, cataloging and labeling of data assets

AM 1.1, AM 2.1, AM 3.1, AM 3.6, HI 1.1, CM 3.2, CM 4.3

Scan data stores and intelligently identify different data assets and automate their labelling and cataloging for better, efficient and ADHICS compliant management of your organization’s data assets.

Secure fulfillment of data access requests

HI 2.1

Organizations are required to disclose patients’ medical information to health professionals who have a valid license to practice their profession in the UAE.

data access request
personal data monitoring tracking

Continuous monitoring and tracking

AC 7.3, AM 4.10

Keep track of risks involved by continuously monitoring and scanning data against non-compliance to security controls or data residency. Surface new Personal Data categories, types and data flow risks on a continuous basis.

Automate People Data Graph

AC 7.3

Discover personal information stored across all your systems within the organization and link them back to a unique patient identity. Visualize personal data sprawl and identify compliance risks.

personal information data linking
Assess GDPR readiness

Assess ADHICS readiness

OM 2.2, OM 2.3, OM 3.1

With the help of our multi-regulation, collaborative, readiness and privacy impact assessment system you can measure your organization's posture against ADHICS requirements, identify the gaps and address the risks. Seamlessly being able to expand assessment capabilities across your vendor ecosystem to maintain compliance against ADHICS requirements.

Map data flows

AM 4.10

Keep track of data flows in your organizations, trace this data , catalog the collection of data and transfer data and document business process flows internally and to service providers or 3rd parties.

map data flows
manage vendor risk

Manage vendor risk

CM 2.5, TP 2.1, TP 2.2, SA 7.2, SA 7.5

Track, manage and monitor privacy and security readiness for all your service providers from a single interface. Collaborate instantly, automate data requests and manage all vendor contracts and compliance documents.

manage vendor risk

Manage vendor risk

CM 2.5, TP 2.1, TP 2.2, SA 7.2, SA 7.5

Track, manage and monitor privacy and security readiness for all your service providers from a single interface. Collaborate instantly, automate data requests and manage all vendor contracts and compliance documents.

manage vendor risk

Manage vendor risk

CM 2.5, TP 2.1, TP 2.2, SA 7.2, SA 7.5

Track, manage and monitor privacy and security readiness for all your service providers from a single interface. Collaborate instantly, automate data requests and manage all vendor contracts and compliance documents.

manage vendor risk

Manage vendor risk

CM 2.5, TP 2.1, TP 2.2, SA 7.2, SA 7.5

Track, manage and monitor privacy and security readiness for all your service providers from a single interface. Collaborate instantly, automate data requests and manage all vendor contracts and compliance documents.

manage vendor risk

Manage vendor risk

CM 2.5, TP 2.1, TP 2.2, SA 7.2, SA 7.5

Track, manage and monitor privacy and security readiness for all your service providers from a single interface. Collaborate instantly, automate data requests and manage all vendor contracts and compliance documents.

manage vendor risk

Manage vendor risk

CM 2.5, TP 2.1, TP 2.2, SA 7.2, SA 7.5

Track, manage and monitor privacy and security readiness for all your service providers from a single interface. Collaborate instantly, automate data requests and manage all vendor contracts and compliance documents.

Breach Response Notification

HI 2.1, IM 2.1, IM 2.5, IM 2.6

Automates compliance actions and breach notifications to concerned stakeholders in relation to security incidents by leveraging a knowledge database on security incident diagnosis and response.

breach response notification

Quick facts about ADHICS

1

ADHICS stands for “Abu Dhabi Health Information and Cyber Security”

2

Healthcare facilities are required to meet the standard requirements in order to integrate within the new ‘Malaffi’ system

3

The standard will be mandatory for licensing healthcare practitioners and facilities

4

ADHICS aims to ensure the privacy and security of patients healthcare information in Abu Dhabi

5

ADHICS went into effect on March 2nd, 2019

The Abu Dhabi Global Market (ADGM) is a Financial Free Zone within the UAE with its own civil and commercial laws. Under Article 6(1) of Law No.4 of 2013 concerning ADGM, Data Protection Regulations 2021 (the “ADGM DPR”) were enacted to protect the data of individuals. The ADGM DPR covers the processing of personal data wholly or partly by automated means and to the processing other than by automated means of personal data which forms part of a Filing System or is intended to form part of a Filing System.

The ADGM DPR applies to the processing of personal data in the context of the activities of an establishment of a data controller or a data processor in ADGM, regardless of whether the processing takes place in ADGM or not.

The solution

SECURITI enables organizations to comply with the ADGM DPR through AI-driven PI data discovery, DSR automation, documented accountability, enhanced visibility into data processing activities, and AI-driven process automation.

securiti dashboard

SECURITI supports enterprises in their journey toward compliance with the ADGM DPR through automation, enhanced data visibility, and identity linking.

See how our comprehensive PrivacyOps platform helps you comply with various sections of ADGM DPR


 

Customize a data subject rights request portal for seamless customer care

With the DSR request format, create customized web forms according to your brand image and accept verified data subject rights requests. Automate the initiation of fulfillment workflows when verified requests are received.

dsr portal
dsr handling

Automate data subject requests handling

Articles: 10, 13, 21

The automation of the delivery and generation of secure data access reports will greatly reduce the risk of compliance violations and reduce the workforce required to comply with all the data subject requests..

Secure fulfillment of data access and port requests

Article: 13, 18

The information is delivered through a secured centralized point to data subjects within a limited time frame. It allows organizations to timely respond to an access request and provides information in a manner that is readily retrieved.

data access request
data rectify request

Automate the processing of rectification requests

Articles: 14, 17

Fulfill data rectification requests, seamlessly, with the help of automated data subject verification workflows across all appearances of a data subject’s personal data.

Automate erasure requests

Articles: 15, 17

Fulfill data subjects’ erasure requests through automated and flexible workflows.

data erasure request
processing request

Automate objection and restriction of processing requests

Articles: 16, 19, 17, 20

With the help of collaborative workflows, build a framework for objection and restriction of processing handling based on business requirements.

Continuous monitoring and tracking

Articles: 4, 5

Keep track of risks against non-compliance to data subjects’ rights by continuously monitoring and scanning data.

personal data monitoring tracking
consent preference management

Monitor and track consent

Articles: 5(1)(a), 6

Seamlessly demonstrate consent compliance to regulator and data subjects.Track consent revocation of the data subjects to prevent the processing or transfer of data without their consent.

Meet cookie compliance

Articles: 5(1)(a), 6

Automatically scan the organization’s web properties, and categorize tags and cookies. Also, build customizable cookie banners, collect consent and provide a preference center.

cookie consent
Assess GDPR readiness

Assess ADGM DPR readiness

Articles: 2-5, 10, 22, 23, 25, 26, 30, 31, 34, 35

Measure your organization's posture against ADGM DPR requirements with the help of our multi-regulation, collaborative, readiness and privacy impact assessment system. Seamlessly expand assessment capabilities across your vendor ecosystem to maintain compliance against DPR requirements.

Manage vendor risk

Articles: 26, 30

Track, manage and monitor privacy and security readiness for all your service providers from a single interface. Collaborate instantly, automate data requests and manage all vendor contracts and compliance documents.

manage vendor risk
breach response notification

Breach Response Notification

Articles: 32, 33

Automate compliance actions and breach notifications to concerned stakeholders with regards to security incidents by leveraging a knowledge database on security incident diagnosis and response.

Privacy Policy & Notice Management

Articles: 10, 11, 12

Use expert-made jurisdiction specific templates with built-in integration with the rest of your privacy stack to automate updates to the privacy policy & notice by tracking changes in cookie consent, universal consent, data processing, and data subject rights activities.

Key Rights under ADGM DPR

Right to Access:

A data subject has the right to obtain from the data controller confirmation as to whether or not personal data concerning him or her is being processed, and access to the personal data.

Right to Portability:

The data subject has the right to receive the personal data that is held by, or on behalf of, the data controller concerning them, which they have provided to a data controller, in a structured, commonly used and machine-readable format and has the right to transmit that data to another data controller.

Right to Rectification:

A data subject has the right to request and obtain from the data controller without undue delay the rectification of inaccurate personal data concerning him or her.

Right to Restriction of Processing:

The data subject has the right to request the restriction of the processing of his/her personal data in certain circumstances. This means that an individual can limit the way that a data controller uses their data.

Right to be Notified:

Data subjects have the right to be notified of processing of their personal data and the purposes for which such processing is conducted.

Right to Erasure:

The data subject has the right to obtain from the data controller the erasure of personal data concerning him or her without undue delay and the data controller has the obligation to erase personal data without undue delay, provided that there is no exception to erasure request.

Right to Object:

A data subject has the right to object at any time, on grounds relating to their particular situation. Data Subjects also have the right to object at any time to the processing, including profiling of their personal data for direct marketing purposes.

Right to Object to Automated Decision Making

The Data Subject has the right not to be subject to a decision based solely on automated Processing, including Profiling, which produces legal effects concerning him or her , or similarly significantly affects him or her.

Facts related to ADGM DPR

1

Fines of up to $28 million can be imposed on organizations that are non-compliant with the ADGM DPR.

2

The commissioner of the Data Protection Authority will enforce the ADGM DPR.

3

Organizations are required to appoint a data protection officer under the ADGM DPR to ensure that requirements of the ADGM are being met within the organization.

4

An ADGM entity that intends to process personal data must register as a Data Controller with the ADGM Registrar to do so.

5

Personal data shall not be transferred to a country or territory outside of the ADGM unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects, or organizations can rely upon appropriate safeguards or specific derogations listed in the ADGM DPR.