Main Page Safe Usage Policy

Safe Usage Policy

Introduction

This electronic portal of the Authority has been established to serve you. To ensure the security of your data and the safety of your browsing experience, access to the Authority’s portal, navigation of any related pages, uploading of materials, or copying of any information is subject to the Safe Usage Policy, which includes the usage guidelines outlined below. We kindly ask that you read these rules and policies carefully before using this portal. Please note that by simply accessing the portal, you are considered bound by the terms and conditions detailed below. If you do not agree to these terms, you are requested not to access the portal or view any of its pages.

Safe Usage Guidelines

By using the Authority's portal, the visitor agrees to refrain from the following:

Using the portal as a medium for distributing unauthorized promotional content or publishing material that violates public morals.

Uploading files that contain malware, spyware, or data and information not owned by the user, with prior knowledge of that.

Engaging in unlawful or illegal activities through the portal.

Intentionally disrupting or attempting to disrupt the portal by any means, such as malware, hacking, or promoting services or products that compromise the portal's integrity.

Uploading content that contains viruses, trojans, or any code, files, or programs that may damage, alter, or impair the portal or users' devices and systems.

Placing an excessive or unreasonable load on the portal's infrastructure through repeated or inappropriate actions.

Modifying, destroying, deleting, or tampering with data or information on the portal.

Using the portal in association with suspicious or illegal websites, either within or outside Saudi Arabia.

Falsely claiming affiliation with or representing any organization or entity without proper authorization.

Impersonating others or using the portal for unlawful or suspicious activities that threaten national security.

Engaging in questionable activities through the portal or misusing its data in violation of intellectual property rights or personal and public data ownership rights.

Interfering with the methods used by the Authority to present its data and services.

Committing any action that violates the Anti-Cybercrime Law or any other applicable regulations within the Kingdom of Saudi Arabia.

Privacy Policy

This website does not collect any personal information about you when you visit it, unless you choose to knowingly and explicitly provide such information to us. If you do choose to provide information, it will only be used to fulfill your request for information or services from the Authority.

By using this website, you agree to the terms of this Privacy Policy. Please note that any information you submit may be shared with other national entities if required to complete your request, without the need to refer back to any involved party.

All information provided by website visitors is considered the property of the Authority, which reserves the right to use this information for any purpose. The Authority may also utilize any ideas, concepts, expertise, or techniques contained in any information submitted by a visitor to this website.

Roles and Responsibilities

In addition to what is stated in the Authority's Roles and Responsibilities document regarding cybersecurity, all departments and employees within the Authority shall implement the provisions of this policy and actively contribute to enhancing the level of maturity and compliance in the field of cybersecurity. This aims to reduce cyber risks to the Authority's information technology (IT) and operational technology (OT) assets and protect them from both internal and external threats.

Compliance

Adherence to this document is mandatory. Compliance will be subject to periodic review by the Executive Cybersecurity Management. In the event of any violation of this policy, the necessary corrective actions will be taken, and any disciplinary measures will be applied in accordance with the Work Regulation.

Exception Criteria

It is prohibited to bypass cybersecurity policies, procedures, or requirements without obtaining prior official authorization from the Executive Director of Cybersecurity, unless such action conflicts with relevant legislative or regulatory requirements.

Page Visitors: 0

Last update date: