securiti.ai Open in urlscan Pro
2606:4700:20::ac43:44b9  Public Scan

Submitted URL: https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https://email.securiti.ai/dc/7Txv__zX8M_d3m017WU0IbGMBJKJpIf1DSuKjEHo...
Effective URL: https://securiti.ai/solutions/saudi-arabia-pdpl/?utm_source=marketo&utm_medium=email-promotion&utm_campaign=701UR000...
Submission: On November 03 via api from RU — Scanned from US

Form analysis 2 forms found in the DOM

<form class="mktoForm mkto-no-label" data-formid="1098"></form>

<form class="mktoForm mkto-no-label" data-formid="1725" style="min-height: 100px"></form>

Text Content

Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI
with proprietary data - easily

View
 * Events
 * Webinars
 * Spotlight Talks
 * Education


Contact Us Schedule a Demo


 * Products
   Data Command Center
   View
   Data+AI Teams
   Data+AI Security Teams
   Data Governance Teams
   Data Privacy Teams
   Build safe enterprise AI systems
   Safe Enterprise AI Copilots
   Implement rule-aware AI copilots across your organization’s data anywhere
   Data Vectorization and Ingestion
   Extract info from complex Unstructured Files, convert it into AI-ready
   formats, and sync to vector databases
   Data Curation and Sanitization for AI
   Transform raw, unstructured files into data ready for model training and
   tuning
   Context-aware LLM Firewalls
   Protect AI interactions with intelligent retrieval, response, and prompt
   firewalls
   Unstructured Data Governance
   Manage and govern unstructured data to enable its safe use with generative AI
   Secure Data+AI anywhere
   Data Security Posture Management
   Secure sensitive data everywhere from hybrid multicloud to SaaS
   AI Security & Governance
   Establish controls for safe adoption of AI technologies including GenAI
   Data Access Intelligence & Governance
   Monitor user access to data and enforce least privilege controls
   Data Discovery & Classification
   Discover shadow and cloud-native assets and accurately classify data
   Compliance Management
   Assess & improve compliance with security best practices frameworks
   Breach Impact Analysis
   Analyze breach impact & automate notifications to affected individuals
   Data Flow Governance
   Understand data lineage and secure real-time streaming data
   Govern data for safe innovation
   Data Discovery & Classification
   Discover shadow and cloud-native assets and accurately classify data
   Unstructured Data Governance
   Manage unstructured data to enable safe use with generative AI
   Data Access Governance
   Monitor sensitive data access and prevent unauthorized use
   AI Governance
   Establish controls for safe adoption of AI technologies including GenAI
   Data Catalog
   Enable users to easily find, understand, trust and access the data they need
   Data Lineage
   Automatically track changes and transformations of data throughout its
   lifecycle
   Data Quality
   Conduct data quality checks and validation across various data types
   Automate data privacy operations
   Data Mapping Automation
   Manage your entire data mapping lifecycle and automate RoPA reports
   AI Governance
   Comply with emerging AI regulations and ensure safe use of AI
   Data Subject Request Automation
   Automate entire DSR lifecycle from consumer request intake to secure report
   delivery
   Assessment Automation
   Automate your entire assessment lifecycle and demonstrate compliance
   Consent Management
   Manage your first-party and third-party consent lifecycle from scanning to
   reporting
   Breach Management
   Automate your incident management and optimize notifications to users &
   regulatory bodies
   Privacy Center
   Elegant Consumer Frontend, Fully Automated Backend, Privacy Regulation
   Intelligent Everywhere
   Compliance Management
   Use automation to audit and improve compliance with global regulations and
   industry standards
 * Solutions
   Technologies
   
   Covering you everywhere with 1000+ integrations across data systems.
   
    * GCP
      View
    * AWS
      View
    * Databricks
      View
    * Snowflake
      View
    * Azure
      View
    * + More
      View
   
   Learn more
   Regulations & Frameworks
   
   Automate compliance with global privacy regulations.
   
    * CDMC
      View
    * EU AI Act
      View
    * NIST AI RMF
      View
    * European Union GDPR
      View
    * California's CPRA
      View
    * Brazil's LGPD
      View
    * Canada's PIPEDA
      View
    * China's PIPL
      View
    * + More
      View
   
   Learn more
   Roles
   
   Identify data risk and enable protection & control.
   
    * Data+AI Builders
      View
    * Data Security
      View
    * Data Privacy
      View
    * Data Governance
      View
    * Marketing
      View

 * Resources
   Blog
   Read through our articles written by industry experts
   Collateral
   Product brochures, white papers, infographics, analyst reports and more.
   Knowledge Center
   Learn about the data privacy, security and governance landscape.
   Securiti Education
   Courses and Certifications for data privacy, security and governance
   professionals.
   Webinars
   Learn from industry thought leaders why you need a Data Command Center to
   enable safe use of data.
 * Company
   About Us
   Learn all about Securiti, our mission and history
   Partner Program
   Join our Partner Program
   Contact Us
   Contact us to learn more or schedule a demo
   News Coverage
   Read about Securiti in the news
   Press Releases
   Find our latest press releases
   Careers
   Join the talented Securiti team


Solutions


SAUDI ARABIA’S PERSONAL DATA PROTECTION LAW (PDPL)

Last Updated on September 12, 2024


RAPID PATH TO
SAUDI PDPL

Start your journey to PDPL compliance within 24 hours.

Get Started



REQUEST A DEMO



In September 2021, the Council of Ministers in Saudi Arabia approved the
Personal Data Protection Law (PDPL).

To complement the PDPL, the Saudi Authority for Data and Artificial Intelligence
("SDAIA") has also issued the Implementing Regulations of the Personal Data
Protection Law (Implementing Regulations) and the Regulation on Personal Data
Transfer outside the Kingdom of Saudi Arabia (Personal Data Transfer
Regulations). The PDPL and its implementing regulations entered into full force
and effect on 14 September 2023. However, organizations that process personal
data have been provided with a one-year grace period to modify their practices
and comply with the new legislative requirements. The grace period will
effectively end on 14 September 2024.

The PDPL and the accompanying regulations aim to protect the privacy of
individuals’ personal data and regulate the collection, holding, processing,
disclosure, or use of personal data by organizations. The PDPL provides the
general obligations and principles related to lawful processing, data subjects’
rights, and organizations’ obligations while processing the personal data of
individuals and lays out penalties for organizations in case of non-compliance
with the PDPL. These provisions have been expanded upon by the Implementing
Regulations and the Personal Data Transfer Regulations.

The PDPL applies to any processing of personal data related to individuals that
takes place in Saudi Arabia by any means. If a foreign entity is processing
personal data related to individuals residing in Saudi Arabia, then the PDPL
will also apply.


THE SOLUTION

Securiti enables organizations to comply with the Saudi PDPL through AI-driven
PI data discovery, DSR automation, documented accountability, enhanced
visibility into data processing activities, and AI-driven process automation.



SECURITI SUPPORTS ENTERPRISES IN THEIR JOURNEY TOWARD COMPLIANCE WITH THE SAUDI
PDPL THROUGH AUTOMATION, ENHANCED DATA VISIBILITY, AND IDENTITY LINKING.

Request a demo today to see how Securiti’s products and offerings can help your
organization in PDPL compliance efforts.

--------------------------------------------------------------------------------

 


CUSTOMIZE A DATA SUBJECT RIGHTS REQUEST PORTAL FOR SEAMLESS CUSTOMER CARE

Create customized web forms according to your brand image with the DSR request
format and accept verified data subject rights requests. Automate the initiation
of fulfilment workflows when verified requests are received.



Learn More



AUTOMATE DATA SUBJECT REQUEST HANDLING


Articles: PDPL 4; Implementing Regulation 3, 4, 5, 6, 7, 8


Data subjects need to be notified about their data privacy rights, and
organizations are required to simplify the initiation of verified DSR requests.
Automating the delivery and generation of secure data access reports will
greatly reduce the risk of compliance violations and reduce the workforce
required to comply with all requests.


Learn More


SECURE FULFILLMENT OF DATA ACCESS REQUESTS


Articles: PDPL 4(2), 9; Implementing Regulation  3, 4 (3), 6 

Disclosure of information to the data subjects within a limited time frame of
receiving a verifiable data request is a must for any organization looking to
comply. This will be free of charge and delivered through a secure, centralized
portal.





AUTOMATE PROCESSING OF RECTIFICATION/COMPLETION & UPDATION REQUESTS


Articles: PDPL 4(4), 17; Implementing Regulation 7


With the help of automated data subject verification workflows across all
appearances of a subject’s personal data, you can seamlessly fulfil all personal
data rectification, completion, and updation requests.

Learn More


AUTOMATE ERASURE REQUESTS

Articles: PDPL 4(5), 18(1) Implementing Regulation 8


Fulfil data subjects’ erasure requests swiftly through automated and flexible
workflows.





AUTOMATE OBJECTION AND RESTRICTION OF PROCESSING REQUESTS


Article: Implementing Regulation 7 (1), 16 (4)


Build a framework for objection and restriction of processing handling based on
business requirements with the help of collaborative workflows.



AUTOMATE PEOPLE DATA GRAPH


Articles: PDPL 31; Implementing Regulation 33

Discover personal information stored across all your internal and external
systems within the organization and link them back to a unique data subject.
Also, visualize personal data sprawl and identify compliance risks.

Learn More



MEET COOKIE COMPLIANCE


Articles: PDPL 5, 6, 7; Implementing Regulation 11, 12


Automatically scan the web properties within your organization, categorizing
tags and cookies. Also, build customizable cookie banners, collect consent, and
provide a preference center.


Learn More


MONITOR AND TRACK CONSENT

Articles: PDPL 5, 6, 7, 10(1), 15(1), 24(1), 25(1), 26, Implementing Regulation
11, 12, 13 Personal Data Transfer Regulation Outside the Kingdom 2.


Track consent revocation of data subjects to prevent the transfer or processing
of data without their consent. Seamlessly demonstrate consent compliance to
regulators and data subjects and fulfill any consent revocation requests

Learn More



ASSESS SAUDI PDPL READINESS


Articles: PDPL 10, 11, 14, 19, 30, 31; Implementing Regulation 36; Regulation on
Personal Data Transfer Outside the Kingdom 7.


With the help of Securiti’s multi-regulation, collaborative, readiness, and
personal information impact assessment system, you can gauge your organization's
posture against Saudi PDPL requirements, identify the gaps, and address the
risks. Seamlessly expand assessment capabilities across your vendor ecosystem to
maintain compliance against Saudi PDPL.


MAP DATA FLOWS

Articles: PDPL 19, 28, 30, Implementing Regulations 28, 29, 30, 31, Personal
Data Transfer Regulations Outside the Kingdom 2, 4, 5

Track data flows in your organizations, trace this data, catalogue, transfer,
and document business process flows internally and to service providers or third
parties in and outside the Kingdom. Additionally, the controller must take
appropriate measures to ensure that its employees are all adequately trained and
informed of the PDPL’s provisions related to the rights of individuals and
breach notification/security threat procedures.

Learn More



ASSESS THIRD PARTIES

Article: PDPL 8; Implementing Regulation 17 (3), 15

Keep track of privacy and security readiness for all your service providers and
processors from a single interface. Collaborate instantly with vendors, automate
data requests and deletions, and manage all vendor contracts and compliance
documents.


BREACH RESPONSE NOTIFICATION


Articles: PDPL 20; Implementing Regulations 23, 24


Automates compliance actions and breach notifications to concerned stakeholders
in relation to security incidents by leveraging a knowledge database on security
incident diagnosis and response.


Learn More



PRIVACY POLICY AND NOTICE MANAGEMENT


Articles: PDPL 4(1), 12, 13 Implementing Regulation 4(3)


Automate how you publish your privacy notices with the help of pre-built
templates to make the process faster. Enable centralized management by tracking
and monitoring privacy notices to maintain compliance.



Learn More


KEY RIGHTS UNDER SAUDI PDPL


RIGHT TO KNOW

Data subjects have the right to information that includes informing data
subjects of the legal or practical justification for collecting their personal
data, the purpose of that collection, and that their data should not be
processed in a manner inconsistent with the purpose of its collection.

--------------------------------------------------------------------------------


RIGHT TO ACCESS

Data subjects have the right to access their personal data from the entity and
obtain a copy of it in a clear and readable format, in conformity with the
content of the records, at no cost. There are a few exceptions to this right.

--------------------------------------------------------------------------------


RIGHT TO CORRECTION

Where data subjects discover their personal information is incorrect or
incomplete, they have the right to request an entity to correct or complete
their personal information.

--------------------------------------------------------------------------------


RIGHT TO DESTRUCTION

Data subjects have the right to request the destruction of data that is no
longer needed or collected in an illegal manner.

--------------------------------------------------------------------------------


RIGHT TO DATA PORTABILITY

Data subjects have a right to obtain their personal data in a legible and clear
format and request their personal data to be transferred to another controller.


KEY FACTS ABOUT SAUDI PDPL

1

Saudi Data & Artificial Intelligence Authority (SDAIA) will be the main
regulatory authority under the PDPL, ensuring its enforcement for the first two
years. A transfer of supervision to the National Data Management Office (NDMO)
will be considered in 2024.

2

Organizations must appoint a Data Protection Officer (DPO), if their core
activities involve processing personal data on a large scale, regular and
systematic monitoring of data subjects, or processing of sensitive personal data
as per the SDAIA Rules for Appointing Personal Data Protection Officers. 

3

Sensitive data is defined as data that shows an individual's ethnic or tribal
origin, or religious, intellectual, or political belief, or indicates his
membership in civil associations or institutions.

4

The collection of personal data should be limited to the minimum amount of data
that enables the achievement of the specified purposes.

5

Individuals who unlawfully disclose sensitive data with the intent to harm the
data subject or gain personal benefit can face imprisonment for up to two years
or fines up to three million Riyals, or both. Repeat offenders may face doubled
fines. 

6

For other violations of the PDPL, fines can be as high as five million Riyals,
with the possibility of doubled penalties for repeated infractions. 

7

The PDPL requires data to be retained as long as it is necessary to achieve the
specific purposes for which it was collected or only as required by the PDPL.
The Implementing Regulations also state the kind of information that should be
included in a ROPA.

8

The Implementing Regulations introduce a National Register of Controllers for
registering controllers with SDAIA. The SDAIA has issued The Rules Governing the
National Register of Controllers Within the Kingdom, to facilitate registration.

9

The Personal Data Transfer Regulations provide an evaluation criterion that will
be applied to countries, specific sectors, and organizations to assess the level
of protection of personal data outside the KSA.


SECURITI NAMED A LEADER IN THE IDC MARKETSCAPE FOR DATA PRIVACY COMPLIANCE
SOFTWARE

Read the Report

At Securiti, our mission is to enable organizations to safely harness the
incredible power of Data & AI.

Copyright © 2024 Securiti · Sitemap · XML Sitemap

NEWSLETTER



--------------------------------------------------------------------------------

COMPANY

 * About Us
 * Careers
 * Contact Us
 * Partner Program
 * News Coverage
 * Press Releases

RESOURCES

 * Blog
 * Collateral
 * Knowledge Center
 * Securiti Education
 * Privacy Center
 * Free Do Not Sell Tool
 * What is DSPM

TERMS

 * Terms & Policies
 * Security & Compliance
 * Manage cookie preferences
 * My Privacy Center

GET IN TOUCH

info@securiti.ai
Securiti, Inc.
300 Santana Row
Suite 450
San Jose, CA 95128

 * 
 * 
 * 

--------------------------------------------------------------------------------


Contact Us Schedule a Demo
 * Products
   * Data Command Center
   * Data+AI Teams
   * Data+AI Security Teams
   * Data Governance Teams
   * Data Privacy Teams
   Back
   
   Build safe enterprise AI systems
    * Safe Enterprise AI Copilots
      Implement rule-aware AI copilots across your organization’s data anywhere
      View
    * Data Vectorization and Ingestion
      Extract info from complex Unstructured Files, convert it into AI-ready
      formats, and sync to vector databases
      View
    * Data Curation and Sanitization for AI
      Transform raw, unstructured files into data ready for model training and
      tuning
      View
    * Context-aware LLM Firewalls
      Protect AI interactions with intelligent retrieval, response, and prompt
      firewalls
      View
    * Unstructured Data Governance
      Manage and govern unstructured data to enable its safe use with generative
      AI
      View
   
   Secure Data+AI anywhere
    * Data Security Posture Management
      Secure sensitive data everywhere from hybrid multicloud to SaaS
      View
    * AI Security & Governance
      Establish controls for safe adoption of AI technologies including GenAI
      View
    * Data Access Intelligence & Governance
      Monitor user access to data and enforce least privilege controls
      View
    * Data Discovery & Classification
      Discover shadow and cloud-native assets and accurately classify data
      View
    * Compliance Management
      Assess & improve compliance with security best practices frameworks
      View
    * Breach Impact Analysis
      Analyze breach impact & automate notifications to affected individuals
      View
    * Data Flow Governance
      Understand data lineage and secure real-time streaming data
      View
   
   Govern data for safe innovation
    * Data Discovery & Classification
      Discover shadow and cloud-native assets and accurately classify data
      View
    * Unstructured Data Governance
      Manage unstructured data to enable safe use with generative AI
      View
    * Data Access Governance
      Monitor sensitive data access and prevent unauthorized use
      View
    * AI Governance
      Establish controls for safe adoption of AI technologies including GenAI
      View
    * Data Catalog
      Enable users to easily find, understand, trust and access the data they
      need
      View
    * Data Lineage
      Automatically track changes and transformations of data throughout its
      lifecycle
      View
    * Data Quality
      Conduct data quality checks and validation across various data types
      View
   
   Automate data privacy operations
    * Data Mapping Automation
      Manage your entire data mapping lifecycle and automate RoPA reports
      View
    * AI Governance
      Comply with emerging AI regulations and ensure safe use of AI
      View
    * Data Subject Request Automation
      Automate entire DSR lifecycle from consumer request intake to secure
      report delivery
      View
    * Assessment Automation
      Automate your entire assessment lifecycle and demonstrate compliance
      View
    * Consent Management
      Manage your first-party and third-party consent lifecycle from scanning to
      reporting
      View
    * Breach Management
      Automate your incident management and optimize notifications to users &
      regulatory bodies
      View
    * Privacy Center
      Elegant Consumer Frontend, Fully Automated Backend, Privacy Regulation
      Intelligent Everywhere
      View
    * Compliance Management
      Use automation to audit and improve compliance with global regulations and
      industry standards
      View

 * Solutions
   * Technologies
   * Regulations
   * Roles
   Back
    * GCP
      View
    * AWS
      View
    * Databricks
      View
    * Snowflake
      View
    * Azure
      View
    * + More
      View
   
    * CDMC
      View
    * EU AI Act
      View
    * NIST AI RMF
      View
    * European Union GDPR
      View
    * California's CPRA
      View
    * Brazil's LGPD
      View
    * Canada's PIPEDA
      View
    * China's PIPL
      View
    * + More
      View
   
    * Data+AI Builders
      View
    * Data Security
      View
    * Data Privacy
      View
    * Data Governance
      View
    * Marketing
      View

 * Resources
   * Blog
     
     View
   * Collateral
     
     View
   * Knowledge Center
     
     View
   * Securiti Education
     
     View
   * Webinars
     
     View
 * Company
   * About Us
     
     View
   * Partner Program
     
     View
   * Contact Us
     
     View
   * News Coverage
     
     View
   * Press Releases
     
     View
   * Careers
     
     View

 * Events
 * Spotlight Talks


WHAT'S
NEW

 * 
 * 
 * 
 *