The missing piece
Months after the compliance deadline for the Personal Data Protection Law (PDPL) set by the Saudi Data & AI Authority (SDAIA), its impact is becoming increasingly evident. Organizations based in the Kingdom of Saudi Arabia are striving to meet the law’s requirements and, as a result, are investing in multiple privacy compliance-oriented projects.
Some organizations are placing a strong focus on establishing robust governance frameworks, prioritizing the development and formalization of privacy policies, procedures, and operational guidelines. This includes drafting and publishing privacy notices, deploying consent forms, and setting clear protocols for managing Data Subject Rights (DSR) and personal data breaches.
In fact, some organizations are taking compliance to the next level by automating consent tracking, rights request management, and privacy notices. These efforts help increase maturity levels and offer a growing sense of confidence that compliance is well in hand.
While the measures implemented through various privacy projects are essential and highly visible to both regulators and Data Subjects, a critical blind spot still remains.
The missing piece lies within the name itself: the Personal Data Protection Law—a framework that embodies the true essence of safeguarding and protecting personal data.
Article 19 of the PDPL clearly outlines the obligation to apply the necessary organizational and technical measures to protect personal data from loss, damage, unauthorized access, or disclosure. This aspect of compliance is less flashy, more technical, and often more complex to implement—yet it is fundamental to ensuring effective personal data protection.
Addressing some missing pieces
1- Lack of privacy access rights reviews
Many organizations conduct periodic access rights reviews from a cybersecurity perspective, covering the fundamental principles of confidentiality, integrity, and availability (CIA). However, these reviews often overlook who has access to personal data. Understanding the distinction between a regular access rights review and a privacy-specific access rights review is crucial for effective privacy governance and compliance under regulations such as the PDPL.
The following highlights the key differences:
Regular access rights review
Privacy access rights review
2. Missing personal data classification
Most organizations adopt the data classification standard published by National Data Management Office (NDMO) and implement it across all their data. However, personal data is often treated as regular data, resulting in a failure to correctly classify it within systems and applications. Without a proper classification framework that takes personal data into consideration, it becomes challenging to apply proportional protection measures through Data Leakage Prevention (DLP), Mobile Device Management (MDM), and other technical solutions in a proportionate and effective manner.
DLP systems can identify the types of data being processed—such as names, ID numbers, and email addresses. However, they often lack context regarding how or why the data was collected, especially in cases where it originated from public sources or was collected with user consent.
To overcome this, organizations should enable DLP systems to apply appropriate rules based on contextual factors such as data source and consent. In addition to that, Data Classification tools should be configured to classify data during ingestion or creation, using labels that reflect how the personal data was collected. Examples include:
These tags would be stored with the data and remain consistent across systems (structured or unstructured).
3. Inadequate Generative Artificial Intelligence (GenAI) and robotics controls
Most organizations are rapidly adopting GenAI tools like ChatGPT and Microsoft Copilot to enhance productivity and automate tasks. In doing so, employees often upload sensitive information such as personal data, HR records, or internal documents leading to unauthorized data sharing, data breaches, and regulatory non-compliance. To address this issue, organizations should implement distinct sets of technical requirements, procedures, and processes, such as:
- Inspect outbound traffic (HTTPS/SSL) to identify sensitive data (e.g., personal data, protected health information (PHI), and payment card data (PCI) in real-time).
- Block or alert when specific patterns (e.g., national ID, email addresses, payroll data) are being sent to specific cloud domains or APIs (e.g., chat.openai.com, api.openai.com, or copilot.microsoft.com).
- Enforce policy-based restrictions (e.g., allow only anonymized data or prevent upload of any HR or financial records).
4. Inadequate technical safeguards
Organizations typically implement technical controls based on National Cybersecurity Authority - Data Cybersecurity Controls (NCA-DCC), National Cybersecurity Authority - Essential Cybersecurity Controls (NCA-ECC), and international cybersecurity standards and best practices. However, personal data is frequently treated as regular data, with standard security controls applied uniformly across all data types.
Below are common areas that are often overlooked when implementing appropriate personal data technical safeguards:
Outside the box
Choosing the right privacy and protection practitioner
Selecting the right privacy and protection practitioner is crucial. Many practitioners treat the data privacy function in silo, failing to oversee and incorporate it effectively within the existing functions of an organization. A key principle that privacy practitioners, especially those advising organizations in the Kingdom of Saudi Arabia, should consider is the importance of thinking outside the box.
For example, there is the right to request destruction of personal data. The PDPL gives individuals the right to request destruction, hence the erasure of their personal data. This applies to all copies of their data, including those stored in backups. However, SDAIA recognizes that it is technically impractical to immediately delete specific data from permanent backups (e.g., full-image backups or tapes).Nevertheless, if or when a backup is restored, any previously deleted personal data must also be re-deleted as part of the restoration process.
In addition, organizations should:
What organizations should do
Achieving PDPL compliance requires more than well-written policies and automated consent tools. At the core of data privacy is data protection, which means embedding robust technical and organizational controls into every layer of the data ecosystem. Organizations that focus solely on the visible aspects of compliance risk missing out on the deeper obligations that truly secure personal data, ultimately falling short of the law’s true intent.
By Carlos Obeid, Data Protection Senior Manager and Daniel Brierley, Partner, Cyber – Digital Trust and Privacy, Deloitte Middle East