IDC Names Securiti a Worldwide Leader in Data Privacy

View

Saudi Arabia’s Personal Data Protection Law

Operationalize PDPL compliance with the most comprehensive PrivacyOps platform

Last Updated on April 28, 2023

Privacy Center
Fully Functional In Minutes

Elegant Consumer Frontend, Fully Automated Backend, Privacy Regulation Intelligent Everywhere.

 

Saudi Arabia has drafted a data privacy regulation to protect the personal data of individuals in Saudi Arabia. This law was approved by the Council of Ministers in Saudi Arabia and is named the Personal Data Protection Law (PDPL). To complement the PDPL, Saudi Authority for Data and Artificial Intelligence ("SDAIA") has also issued the Draft Executive Regulations ("Draft Regulations") in March 2022.

The PDPL aims to protect the privacy of individuals’ personal data and regulate the collection, holding, processing, disclosure, or use of personal data by organizations. The PDPL provides comprehensive details related to lawful processing, data subjects’ rights, and organizations’ obligations while processing the personal data of individuals and lays out penalties for organizations in case of non-compliance with the PDPL.

The PDPL applies to any processing of personal data related to individuals that take place in Saudi Arabia by any means. If a foreign entity is processing personal data related to individuals residing in Saudi Arabia, then the PDPL will also apply.

On March 21st, 2023, the Saudi Council of Ministers passed amendments to the PDPL, and accordingly, PDPL will officially come into force on 14 September 2023.

The solution

Securiti enables organizations to comply with the Saudi PDPL through AI-driven PI data discovery, DSR automation, documented accountability, enhanced visibility into data processing activities, and AI-driven process automation.

saudi arabia pdpl

Securiti supports enterprises in their journey toward compliance with the Saudi PDPL through automation, enhanced data visibility, and identity linking.

Request a demo today to see how Securiti’s products and offerings can help your organization in PDPL compliance efforts.


 

Customize a Data Subject Rights Request Portal for Seamless Customer Care

Create customized web forms according to your brand image with the DSR request format and accept verified data subject rights requests. Automate the initiation of fulfillment workflows when verified requests are received.

data subject rights request
Automate data subject request

Automate Data Subject Request Handling

Articles: PDPL 4, Draft Regulation Chapter II

Data subjects need to be notified about their data privacy rights and organizations are required to simplify the initiation of verified DSR requests. Automating the delivery and generation of secure data access reports will greatly reduce the risk of compliance violations and reduce the workforce required to comply with all requests.

Secure Fulfillment of Data Access Requests

Articles: PDPL 4(2), 9, Draft Regulations 6

Disclosure of information to the data subjects within a limited time frame of receiving a verifiable data request is a must for any organization looking to comply. This will be free of charge and delivered through a secure, centralized portal.

data access requests
dsr rectify request

Automate Processing of Rectification/Completion & Updation Requests

Articles: PDPL 4(3), 17 , Draft Regulations 7

With the help of automated data subject verification workflows across all appearances of a subject’s personal data, you can seamlessly fulfill all personal data rectification, completion and updation requests.

Automate erasure requests

Articles: PDPL 4(4) , 18(1) , Draft Regulations 8

Fulfill data subjects’ erasure requests swiftly through automated and flexible workflows.

erasure requests
restriction of processing requests

Automate Objection and Restriction of Processing Requests

Article: Draft Regulations 15

Build a framework for objection and restriction of processing handling based on business requirements, with the help of collaborative workflows.

Monitor and Track Consent

Articles: 5, 6, 7, 10(1), 15(1), 24(1), 25(1), 26(2)

Track consent revocation of data subjects to prevent the transfer or processing of data without their consent. Seamlessly demonstrate consent compliance to regulators and data subjects and fulfill any consent revocation requests

monitoring and tracking
People Data Graph

Automate People Data Graph

Articles: PDPL 30 , Draft Regulations 35

Discover personal information stored across all your internal and external systems within the organization and link them back to a unique data subject. Also, visualize personal data sprawl and identify compliance risks.

Meet Cookie Compliance

Articles: 5,6,7

Automatically scan the web properties within your organization, categorizing tags, and cookies. Also, build customizable cookie banners, collect consent, and provide a preference center.

cookie compliance
track consent

Monitor and Track Consent

Articles: 5, 6, 7, 10(1), 15(1), 24(1), 25(1), 26(2)

Track consent revocation of data subjects to prevent the transfer or processing of data without their consent. Seamlessly demonstrate consent compliance to regulators and data subjects and fulfill any consent revocation requests

Assess Saudi PDPL Readiness

Articles: 10, 11, 14, 19, 30, 31

With the help of Securiti’s multi-regulation, collaborative, readiness, and personal information impact assessment system, you can gauge your organization's posture against Saudi PDPL requirements, identify the gaps, and address the risks. Seamlessly expand assessment capabilities across your vendor ecosystem to maintain compliance against Saudi PDPL.

Saudi PDPL readiness
data flows

Map Data Flows

Articles: 19, 28,, 30(1)(e), Draft Regulations 28, 29, 30, 31

Track data flows in your organizations, trace this data, catalog, transfer, and document business process flows internally and to service providers or third parties in and outside the Kingdom. Additionally, the controller must take appropriate measures to ensure that its employees are all adequately trained and informed of the PDPL’s provisions related to the rights of individuals and breach notification/security threat procedures.

Assess Third Parties

Article: Draft Regulation Article 18

Keep track of privacy and security readiness for all your service providers and processors from a single interface. Collaborate instantly with vendors, automate data requests and deletions, and manage all vendor contracts and compliance documents.

Assess Third Parties
Breach Response Notification

Breach Response Notification

Articles: PDPL 16 , Draft Regulations 18, 19, 23, 24

Automates compliance actions and breach notifications to concerned stakeholders in relation to security incidents by leveraging a knowledge database on security incident diagnosis and response.

​​Privacy Policy and Notice Management

Articles: PDPL 12 Draft Regulations 4(3)

Automate how you publish your privacy notices with the help of pre-built templates to make the process faster. Also, enable centralized management by tracking and monitoring privacy notices to maintain compliance.

Privacy Policy and Notice Management

Key Rights Under Saudi PDPL

Right to Know

Under the PDPL, data subjects have the right to information that includes informing data subjects of the legal or practical justification for collecting their personal data, the purpose of that collection, and that their data should not be processed in a manner inconsistent with the purpose of its collection.


Right to Access

Data subjects have the right to access their personal data from the entity and obtain a copy of it in a clear and readable format, in conformity with the content of the records, at no cost. There are a few exceptions to this right.


Right to Correction

Where data subjects discover their personal information is incorrect or incomplete, they have the right to request an entity to correct or complete their personal information.


Right to Destruction

Data subjects have the right to request the destruction of data no longer needed or collected in an illegal manner.


Right to Data Portability

Data subjects have a right to obtain their personal data in a legible and clear format and request their personal data to be transferred to another controller.

Key Facts about Saudi PDPL

1

Saudi Data & Artificial Intelligence Authority (SDAIA) will be the main regulatory authority under the PDPL, ensuring its enforcement for the first two years. A transfer of supervision to the National Data Management Office (NDMO) will be considered in 2024.

2

Personal data can only be collected with the express or implied consent of its owner unless its collection or processing is required to fulfill a regulatory requirement, to fulfill a statutory requirement to protect personal data or to fulfill a legal requirement or protect the vital interests of individuals or pursue legitimate interests of the controller, provided that it does not harm rights of individuals and does not involve sensitive personal data.

3

Organizations must appoint one or more employees as DPOs to oversee data protection obligations. The SDAIA will determine the need for a DPO based on specific criteria outlined in the Draft Regulations.

4

Sensitive data is defined as data that shows an individual's ethnic or tribal origin, or their religious, intellectual, or political belief, or indicates his membership in civil associations or institutions.

5

The collection of personal data should be limited to the minimum amount of data that enables the achievement of the specified purposes.

6

Non-compliance can lead to up to 2 years of imprisonment or a fine of up to SAR 3 million ($800,000).

7

The PDPL requires data to be retained as long as it is necessary to achieve the specific purposes for which it was collected or only as required by the PDPL.

At Securiti, our mission is to enable enterprises to safely harness the incredible power of data and the cloud by controlling the complex security, privacy and compliance risks.

Newsletter



Gartner Cool Vendor Award Forrester Badge IAPP Innovation award 2020 IDC Worldwide Leader RSAC Leader CBInsights Forbes Security Forbes Machine Learning G2 Users Most Likely To Recommend