securiti.ai
Open in
urlscan Pro
2606:4700:20::ac43:44b9
Public Scan
Submitted URL: https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https://email.securiti.ai/dc/7Txv__zX8M_d3m017WU0IbGMBJKJpIf1DSuKjEHo...
Effective URL: https://securiti.ai/solutions/saudi-arabia-pdpl/?utm_source=marketo&utm_medium=email-promotion&utm_campaign=701UR000...
Submission: On November 03 via api from RU — Scanned from US
Effective URL: https://securiti.ai/solutions/saudi-arabia-pdpl/?utm_source=marketo&utm_medium=email-promotion&utm_campaign=701UR000...
Submission: On November 03 via api from RU — Scanned from US
Form analysis
2 forms found in the DOM<form class="mktoForm mkto-no-label" data-formid="1098"></form>
<form class="mktoForm mkto-no-label" data-formid="1725" style="min-height: 100px"></form>
Text Content
Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily View * Events * Webinars * Spotlight Talks * Education Contact Us Schedule a Demo * Products Data Command Center View Data+AI Teams Data+AI Security Teams Data Governance Teams Data Privacy Teams Build safe enterprise AI systems Safe Enterprise AI Copilots Implement rule-aware AI copilots across your organization’s data anywhere Data Vectorization and Ingestion Extract info from complex Unstructured Files, convert it into AI-ready formats, and sync to vector databases Data Curation and Sanitization for AI Transform raw, unstructured files into data ready for model training and tuning Context-aware LLM Firewalls Protect AI interactions with intelligent retrieval, response, and prompt firewalls Unstructured Data Governance Manage and govern unstructured data to enable its safe use with generative AI Secure Data+AI anywhere Data Security Posture Management Secure sensitive data everywhere from hybrid multicloud to SaaS AI Security & Governance Establish controls for safe adoption of AI technologies including GenAI Data Access Intelligence & Governance Monitor user access to data and enforce least privilege controls Data Discovery & Classification Discover shadow and cloud-native assets and accurately classify data Compliance Management Assess & improve compliance with security best practices frameworks Breach Impact Analysis Analyze breach impact & automate notifications to affected individuals Data Flow Governance Understand data lineage and secure real-time streaming data Govern data for safe innovation Data Discovery & Classification Discover shadow and cloud-native assets and accurately classify data Unstructured Data Governance Manage unstructured data to enable safe use with generative AI Data Access Governance Monitor sensitive data access and prevent unauthorized use AI Governance Establish controls for safe adoption of AI technologies including GenAI Data Catalog Enable users to easily find, understand, trust and access the data they need Data Lineage Automatically track changes and transformations of data throughout its lifecycle Data Quality Conduct data quality checks and validation across various data types Automate data privacy operations Data Mapping Automation Manage your entire data mapping lifecycle and automate RoPA reports AI Governance Comply with emerging AI regulations and ensure safe use of AI Data Subject Request Automation Automate entire DSR lifecycle from consumer request intake to secure report delivery Assessment Automation Automate your entire assessment lifecycle and demonstrate compliance Consent Management Manage your first-party and third-party consent lifecycle from scanning to reporting Breach Management Automate your incident management and optimize notifications to users & regulatory bodies Privacy Center Elegant Consumer Frontend, Fully Automated Backend, Privacy Regulation Intelligent Everywhere Compliance Management Use automation to audit and improve compliance with global regulations and industry standards * Solutions Technologies Covering you everywhere with 1000+ integrations across data systems. * GCP View * AWS View * Databricks View * Snowflake View * Azure View * + More View Learn more Regulations & Frameworks Automate compliance with global privacy regulations. * CDMC View * EU AI Act View * NIST AI RMF View * European Union GDPR View * California's CPRA View * Brazil's LGPD View * Canada's PIPEDA View * China's PIPL View * + More View Learn more Roles Identify data risk and enable protection & control. * Data+AI Builders View * Data Security View * Data Privacy View * Data Governance View * Marketing View * Resources Blog Read through our articles written by industry experts Collateral Product brochures, white papers, infographics, analyst reports and more. Knowledge Center Learn about the data privacy, security and governance landscape. Securiti Education Courses and Certifications for data privacy, security and governance professionals. Webinars Learn from industry thought leaders why you need a Data Command Center to enable safe use of data. * Company About Us Learn all about Securiti, our mission and history Partner Program Join our Partner Program Contact Us Contact us to learn more or schedule a demo News Coverage Read about Securiti in the news Press Releases Find our latest press releases Careers Join the talented Securiti team Solutions SAUDI ARABIA’S PERSONAL DATA PROTECTION LAW (PDPL) Last Updated on September 12, 2024 RAPID PATH TO SAUDI PDPL Start your journey to PDPL compliance within 24 hours. Get Started REQUEST A DEMO In September 2021, the Council of Ministers in Saudi Arabia approved the Personal Data Protection Law (PDPL). To complement the PDPL, the Saudi Authority for Data and Artificial Intelligence ("SDAIA") has also issued the Implementing Regulations of the Personal Data Protection Law (Implementing Regulations) and the Regulation on Personal Data Transfer outside the Kingdom of Saudi Arabia (Personal Data Transfer Regulations). The PDPL and its implementing regulations entered into full force and effect on 14 September 2023. However, organizations that process personal data have been provided with a one-year grace period to modify their practices and comply with the new legislative requirements. The grace period will effectively end on 14 September 2024. The PDPL and the accompanying regulations aim to protect the privacy of individuals’ personal data and regulate the collection, holding, processing, disclosure, or use of personal data by organizations. The PDPL provides the general obligations and principles related to lawful processing, data subjects’ rights, and organizations’ obligations while processing the personal data of individuals and lays out penalties for organizations in case of non-compliance with the PDPL. These provisions have been expanded upon by the Implementing Regulations and the Personal Data Transfer Regulations. The PDPL applies to any processing of personal data related to individuals that takes place in Saudi Arabia by any means. If a foreign entity is processing personal data related to individuals residing in Saudi Arabia, then the PDPL will also apply. THE SOLUTION Securiti enables organizations to comply with the Saudi PDPL through AI-driven PI data discovery, DSR automation, documented accountability, enhanced visibility into data processing activities, and AI-driven process automation. SECURITI SUPPORTS ENTERPRISES IN THEIR JOURNEY TOWARD COMPLIANCE WITH THE SAUDI PDPL THROUGH AUTOMATION, ENHANCED DATA VISIBILITY, AND IDENTITY LINKING. Request a demo today to see how Securiti’s products and offerings can help your organization in PDPL compliance efforts. -------------------------------------------------------------------------------- CUSTOMIZE A DATA SUBJECT RIGHTS REQUEST PORTAL FOR SEAMLESS CUSTOMER CARE Create customized web forms according to your brand image with the DSR request format and accept verified data subject rights requests. Automate the initiation of fulfilment workflows when verified requests are received. Learn More AUTOMATE DATA SUBJECT REQUEST HANDLING Articles: PDPL 4; Implementing Regulation 3, 4, 5, 6, 7, 8 Data subjects need to be notified about their data privacy rights, and organizations are required to simplify the initiation of verified DSR requests. Automating the delivery and generation of secure data access reports will greatly reduce the risk of compliance violations and reduce the workforce required to comply with all requests. Learn More SECURE FULFILLMENT OF DATA ACCESS REQUESTS Articles: PDPL 4(2), 9; Implementing Regulation 3, 4 (3), 6 Disclosure of information to the data subjects within a limited time frame of receiving a verifiable data request is a must for any organization looking to comply. This will be free of charge and delivered through a secure, centralized portal. AUTOMATE PROCESSING OF RECTIFICATION/COMPLETION & UPDATION REQUESTS Articles: PDPL 4(4), 17; Implementing Regulation 7 With the help of automated data subject verification workflows across all appearances of a subject’s personal data, you can seamlessly fulfil all personal data rectification, completion, and updation requests. Learn More AUTOMATE ERASURE REQUESTS Articles: PDPL 4(5), 18(1) Implementing Regulation 8 Fulfil data subjects’ erasure requests swiftly through automated and flexible workflows. AUTOMATE OBJECTION AND RESTRICTION OF PROCESSING REQUESTS Article: Implementing Regulation 7 (1), 16 (4) Build a framework for objection and restriction of processing handling based on business requirements with the help of collaborative workflows. AUTOMATE PEOPLE DATA GRAPH Articles: PDPL 31; Implementing Regulation 33 Discover personal information stored across all your internal and external systems within the organization and link them back to a unique data subject. Also, visualize personal data sprawl and identify compliance risks. Learn More MEET COOKIE COMPLIANCE Articles: PDPL 5, 6, 7; Implementing Regulation 11, 12 Automatically scan the web properties within your organization, categorizing tags and cookies. Also, build customizable cookie banners, collect consent, and provide a preference center. Learn More MONITOR AND TRACK CONSENT Articles: PDPL 5, 6, 7, 10(1), 15(1), 24(1), 25(1), 26, Implementing Regulation 11, 12, 13 Personal Data Transfer Regulation Outside the Kingdom 2. Track consent revocation of data subjects to prevent the transfer or processing of data without their consent. Seamlessly demonstrate consent compliance to regulators and data subjects and fulfill any consent revocation requests Learn More ASSESS SAUDI PDPL READINESS Articles: PDPL 10, 11, 14, 19, 30, 31; Implementing Regulation 36; Regulation on Personal Data Transfer Outside the Kingdom 7. With the help of Securiti’s multi-regulation, collaborative, readiness, and personal information impact assessment system, you can gauge your organization's posture against Saudi PDPL requirements, identify the gaps, and address the risks. Seamlessly expand assessment capabilities across your vendor ecosystem to maintain compliance against Saudi PDPL. MAP DATA FLOWS Articles: PDPL 19, 28, 30, Implementing Regulations 28, 29, 30, 31, Personal Data Transfer Regulations Outside the Kingdom 2, 4, 5 Track data flows in your organizations, trace this data, catalogue, transfer, and document business process flows internally and to service providers or third parties in and outside the Kingdom. Additionally, the controller must take appropriate measures to ensure that its employees are all adequately trained and informed of the PDPL’s provisions related to the rights of individuals and breach notification/security threat procedures. Learn More ASSESS THIRD PARTIES Article: PDPL 8; Implementing Regulation 17 (3), 15 Keep track of privacy and security readiness for all your service providers and processors from a single interface. Collaborate instantly with vendors, automate data requests and deletions, and manage all vendor contracts and compliance documents. BREACH RESPONSE NOTIFICATION Articles: PDPL 20; Implementing Regulations 23, 24 Automates compliance actions and breach notifications to concerned stakeholders in relation to security incidents by leveraging a knowledge database on security incident diagnosis and response. Learn More PRIVACY POLICY AND NOTICE MANAGEMENT Articles: PDPL 4(1), 12, 13 Implementing Regulation 4(3) Automate how you publish your privacy notices with the help of pre-built templates to make the process faster. Enable centralized management by tracking and monitoring privacy notices to maintain compliance. Learn More KEY RIGHTS UNDER SAUDI PDPL RIGHT TO KNOW Data subjects have the right to information that includes informing data subjects of the legal or practical justification for collecting their personal data, the purpose of that collection, and that their data should not be processed in a manner inconsistent with the purpose of its collection. -------------------------------------------------------------------------------- RIGHT TO ACCESS Data subjects have the right to access their personal data from the entity and obtain a copy of it in a clear and readable format, in conformity with the content of the records, at no cost. There are a few exceptions to this right. -------------------------------------------------------------------------------- RIGHT TO CORRECTION Where data subjects discover their personal information is incorrect or incomplete, they have the right to request an entity to correct or complete their personal information. -------------------------------------------------------------------------------- RIGHT TO DESTRUCTION Data subjects have the right to request the destruction of data that is no longer needed or collected in an illegal manner. -------------------------------------------------------------------------------- RIGHT TO DATA PORTABILITY Data subjects have a right to obtain their personal data in a legible and clear format and request their personal data to be transferred to another controller. KEY FACTS ABOUT SAUDI PDPL 1 Saudi Data & Artificial Intelligence Authority (SDAIA) will be the main regulatory authority under the PDPL, ensuring its enforcement for the first two years. A transfer of supervision to the National Data Management Office (NDMO) will be considered in 2024. 2 Organizations must appoint a Data Protection Officer (DPO), if their core activities involve processing personal data on a large scale, regular and systematic monitoring of data subjects, or processing of sensitive personal data as per the SDAIA Rules for Appointing Personal Data Protection Officers. 3 Sensitive data is defined as data that shows an individual's ethnic or tribal origin, or religious, intellectual, or political belief, or indicates his membership in civil associations or institutions. 4 The collection of personal data should be limited to the minimum amount of data that enables the achievement of the specified purposes. 5 Individuals who unlawfully disclose sensitive data with the intent to harm the data subject or gain personal benefit can face imprisonment for up to two years or fines up to three million Riyals, or both. Repeat offenders may face doubled fines. 6 For other violations of the PDPL, fines can be as high as five million Riyals, with the possibility of doubled penalties for repeated infractions. 7 The PDPL requires data to be retained as long as it is necessary to achieve the specific purposes for which it was collected or only as required by the PDPL. The Implementing Regulations also state the kind of information that should be included in a ROPA. 8 The Implementing Regulations introduce a National Register of Controllers for registering controllers with SDAIA. The SDAIA has issued The Rules Governing the National Register of Controllers Within the Kingdom, to facilitate registration. 9 The Personal Data Transfer Regulations provide an evaluation criterion that will be applied to countries, specific sectors, and organizations to assess the level of protection of personal data outside the KSA. SECURITI NAMED A LEADER IN THE IDC MARKETSCAPE FOR DATA PRIVACY COMPLIANCE SOFTWARE Read the Report At Securiti, our mission is to enable organizations to safely harness the incredible power of Data & AI. Copyright © 2024 Securiti · Sitemap · XML Sitemap NEWSLETTER -------------------------------------------------------------------------------- COMPANY * About Us * Careers * Contact Us * Partner Program * News Coverage * Press Releases RESOURCES * Blog * Collateral * Knowledge Center * Securiti Education * Privacy Center * Free Do Not Sell Tool * What is DSPM TERMS * Terms & Policies * Security & Compliance * Manage cookie preferences * My Privacy Center GET IN TOUCH info@securiti.ai Securiti, Inc. 300 Santana Row Suite 450 San Jose, CA 95128 * * * -------------------------------------------------------------------------------- Contact Us Schedule a Demo * Products * Data Command Center * Data+AI Teams * Data+AI Security Teams * Data Governance Teams * Data Privacy Teams Back Build safe enterprise AI systems * Safe Enterprise AI Copilots Implement rule-aware AI copilots across your organization’s data anywhere View * Data Vectorization and Ingestion Extract info from complex Unstructured Files, convert it into AI-ready formats, and sync to vector databases View * Data Curation and Sanitization for AI Transform raw, unstructured files into data ready for model training and tuning View * Context-aware LLM Firewalls Protect AI interactions with intelligent retrieval, response, and prompt firewalls View * Unstructured Data Governance Manage and govern unstructured data to enable its safe use with generative AI View Secure Data+AI anywhere * Data Security Posture Management Secure sensitive data everywhere from hybrid multicloud to SaaS View * AI Security & Governance Establish controls for safe adoption of AI technologies including GenAI View * Data Access Intelligence & Governance Monitor user access to data and enforce least privilege controls View * Data Discovery & Classification Discover shadow and cloud-native assets and accurately classify data View * Compliance Management Assess & improve compliance with security best practices frameworks View * Breach Impact Analysis Analyze breach impact & automate notifications to affected individuals View * Data Flow Governance Understand data lineage and secure real-time streaming data View Govern data for safe innovation * Data Discovery & Classification Discover shadow and cloud-native assets and accurately classify data View * Unstructured Data Governance Manage unstructured data to enable safe use with generative AI View * Data Access Governance Monitor sensitive data access and prevent unauthorized use View * AI Governance Establish controls for safe adoption of AI technologies including GenAI View * Data Catalog Enable users to easily find, understand, trust and access the data they need View * Data Lineage Automatically track changes and transformations of data throughout its lifecycle View * Data Quality Conduct data quality checks and validation across various data types View Automate data privacy operations * Data Mapping Automation Manage your entire data mapping lifecycle and automate RoPA reports View * AI Governance Comply with emerging AI regulations and ensure safe use of AI View * Data Subject Request Automation Automate entire DSR lifecycle from consumer request intake to secure report delivery View * Assessment Automation Automate your entire assessment lifecycle and demonstrate compliance View * Consent Management Manage your first-party and third-party consent lifecycle from scanning to reporting View * Breach Management Automate your incident management and optimize notifications to users & regulatory bodies View * Privacy Center Elegant Consumer Frontend, Fully Automated Backend, Privacy Regulation Intelligent Everywhere View * Compliance Management Use automation to audit and improve compliance with global regulations and industry standards View * Solutions * Technologies * Regulations * Roles Back * GCP View * AWS View * Databricks View * Snowflake View * Azure View * + More View * CDMC View * EU AI Act View * NIST AI RMF View * European Union GDPR View * California's CPRA View * Brazil's LGPD View * Canada's PIPEDA View * China's PIPL View * + More View * Data+AI Builders View * Data Security View * Data Privacy View * Data Governance View * Marketing View * Resources * Blog View * Collateral View * Knowledge Center View * Securiti Education View * Webinars View * Company * About Us View * Partner Program View * Contact Us View * News Coverage View * Press Releases View * Careers View * Events * Spotlight Talks WHAT'S NEW * * * *