SlideShare a Scribd company logo
1 of 3

The latest internet service launched was fiber optic
connections, with speeds of up to 100 Mbps.

The average broadband speed of the country is 3.8
Mbps.

Most standards and technology solutions are
adopted from the U.S and Europe.

MCIT- Ministry of Communications and Info Tech

KACST – King Abdulaziz City for Science and Tech

CITC - Communications and Info Tech Commission

CERT - Computer Emergency Response Team

Anti-Spam Program
 The E-Crime Act
 Web sites hacking or PC spying can result in penalties
of up to one year in jail and fines up to $133,000.
 Hacking financial or banking databases, or performing
false monetary transactions can result in penalties of up
to four years in jail and fines up to $800,000.
 The E-Transaction Act
 Setting uniform legal standards for using electronic
transactions and signatures.
 Ensuring the credibility and integrity of electronic
transactions, signatures and records.
 Preventing misuse and fraud in electronic
transactions and signatures.
 Largest and most stable economy in the Gulf.
 No personal income taxes and only a 20%
corporate tax.
 100% foreign ownership of companies and
property.
 Should have a visa to enter the country.
 Copyrights law is not strictly applied.
 Risk of terrorist attacks on oil companies and
facilities.
 Threats form other countries to attack oil
facilities or block production lines.

More Related Content

What's hot

Internet
InternetInternet
InternetJodip
 
Internet Filtering In South Korea
Internet Filtering In South KoreaInternet Filtering In South Korea
Internet Filtering In South Koreamichroeder
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Laws and policies that Help fight Cybercrime - PAD 747
Laws and policies that Help fight Cybercrime - PAD 747Laws and policies that Help fight Cybercrime - PAD 747
Laws and policies that Help fight Cybercrime - PAD 747jmanishor
 
Analysis of wiretap stats
Analysis of wiretap stats Analysis of wiretap stats
Analysis of wiretap stats csoghoian
 
Key features for whistleblowing systems
Key features for whistleblowing systemsKey features for whistleblowing systems
Key features for whistleblowing systemsIESE Business School
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentationbsookman
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshMd. Mehedi Al Hasan Rakib
 
Anti-Corruption Enforcement and Compliance in the US, UK, and China
Anti-Corruption Enforcement and Compliance in the US, UK, and ChinaAnti-Corruption Enforcement and Compliance in the US, UK, and China
Anti-Corruption Enforcement and Compliance in the US, UK, and ChinaEthisphere
 

What's hot (17)

Internet
InternetInternet
Internet
 
Internet Filtering In South Korea
Internet Filtering In South KoreaInternet Filtering In South Korea
Internet Filtering In South Korea
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Laws and policies that Help fight Cybercrime - PAD 747
Laws and policies that Help fight Cybercrime - PAD 747Laws and policies that Help fight Cybercrime - PAD 747
Laws and policies that Help fight Cybercrime - PAD 747
 
7.9 Presentation
7.9 Presentation7.9 Presentation
7.9 Presentation
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Analysis of wiretap stats
Analysis of wiretap stats Analysis of wiretap stats
Analysis of wiretap stats
 
Key features for whistleblowing systems
Key features for whistleblowing systemsKey features for whistleblowing systems
Key features for whistleblowing systems
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
A Public Safety Organisation
A Public Safety OrganisationA Public Safety Organisation
A Public Safety Organisation
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Anti-Corruption Enforcement and Compliance in the US, UK, and China
Anti-Corruption Enforcement and Compliance in the US, UK, and ChinaAnti-Corruption Enforcement and Compliance in the US, UK, and China
Anti-Corruption Enforcement and Compliance in the US, UK, and China
 

Viewers also liked

La chirurgie esthétique en Tunisie
La chirurgie esthétique en TunisieLa chirurgie esthétique en Tunisie
La chirurgie esthétique en TunisieHannibal Clinique
 
단기금융상품『BU797』.『COM』호스텔팩 부산롯데호텔
단기금융상품『BU797』.『COM』호스텔팩 부산롯데호텔단기금융상품『BU797』.『COM』호스텔팩 부산롯데호텔
단기금융상품『BU797』.『COM』호스텔팩 부산롯데호텔hdflkgjdo
 
Happy new year
Happy new yearHappy new year
Happy new yearNur Faez
 
Page 2 winter issue of empowerment magazine
Page 2   winter issue of empowerment magazinePage 2   winter issue of empowerment magazine
Page 2 winter issue of empowerment magazinesacpros
 
What Your Marketing Automation Vendor Won't Ever Tell You
What Your Marketing Automation Vendor Won't Ever Tell YouWhat Your Marketing Automation Vendor Won't Ever Tell You
What Your Marketing Automation Vendor Won't Ever Tell YouEsanosys
 
E twinning legionnaires
E twinning legionnairesE twinning legionnaires
E twinning legionnaireszloubet
 
Konsep al-Tasfiyah (Pemurnian) Akidah dalam Sunnah Nabawiyah
Konsep al-Tasfiyah (Pemurnian) Akidah dalam Sunnah NabawiyahKonsep al-Tasfiyah (Pemurnian) Akidah dalam Sunnah Nabawiyah
Konsep al-Tasfiyah (Pemurnian) Akidah dalam Sunnah NabawiyahSakinah Saptu
 
Soal al qur'an hadits kelas ix smt 1 2013
Soal al qur'an hadits kelas ix smt 1 2013Soal al qur'an hadits kelas ix smt 1 2013
Soal al qur'an hadits kelas ix smt 1 2013Ibnu Mislan
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource ManagementAriful Saimon
 
Internship Presentation
Internship PresentationInternship Presentation
Internship PresentationAndrew Puetz
 

Viewers also liked (14)

La chirurgie esthétique en Tunisie
La chirurgie esthétique en TunisieLa chirurgie esthétique en Tunisie
La chirurgie esthétique en Tunisie
 
단기금융상품『BU797』.『COM』호스텔팩 부산롯데호텔
단기금융상품『BU797』.『COM』호스텔팩 부산롯데호텔단기금융상품『BU797』.『COM』호스텔팩 부산롯데호텔
단기금융상품『BU797』.『COM』호스텔팩 부산롯데호텔
 
Happy new year
Happy new yearHappy new year
Happy new year
 
13 a final portfolio
13 a final portfolio 13 a final portfolio
13 a final portfolio
 
Page 2 winter issue of empowerment magazine
Page 2   winter issue of empowerment magazinePage 2   winter issue of empowerment magazine
Page 2 winter issue of empowerment magazine
 
adcb
adcbadcb
adcb
 
What Your Marketing Automation Vendor Won't Ever Tell You
What Your Marketing Automation Vendor Won't Ever Tell YouWhat Your Marketing Automation Vendor Won't Ever Tell You
What Your Marketing Automation Vendor Won't Ever Tell You
 
E twinning legionnaires
E twinning legionnairesE twinning legionnaires
E twinning legionnaires
 
16 accounting abbreviation
16 accounting abbreviation16 accounting abbreviation
16 accounting abbreviation
 
Ali Abdullah-Ezzani
Ali Abdullah-Ezzani                   Ali Abdullah-Ezzani
Ali Abdullah-Ezzani
 
Konsep al-Tasfiyah (Pemurnian) Akidah dalam Sunnah Nabawiyah
Konsep al-Tasfiyah (Pemurnian) Akidah dalam Sunnah NabawiyahKonsep al-Tasfiyah (Pemurnian) Akidah dalam Sunnah Nabawiyah
Konsep al-Tasfiyah (Pemurnian) Akidah dalam Sunnah Nabawiyah
 
Soal al qur'an hadits kelas ix smt 1 2013
Soal al qur'an hadits kelas ix smt 1 2013Soal al qur'an hadits kelas ix smt 1 2013
Soal al qur'an hadits kelas ix smt 1 2013
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
 
Internship Presentation
Internship PresentationInternship Presentation
Internship Presentation
 

Similar to Saudi Arabia Internet and Cybersecurity Laws

Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Frameworkanthonywong
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaakashsaqi444
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control AuthorityDaily 10 Minutes
 

Similar to Saudi Arabia Internet and Cybersecurity Laws (20)

Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
Cyber law
Cyber lawCyber law
Cyber law
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control Authority
 
Brief kif0809
Brief kif0809Brief kif0809
Brief kif0809
 

Saudi Arabia Internet and Cybersecurity Laws

  • 1.  The latest internet service launched was fiber optic connections, with speeds of up to 100 Mbps.  The average broadband speed of the country is 3.8 Mbps.  Most standards and technology solutions are adopted from the U.S and Europe.  MCIT- Ministry of Communications and Info Tech  KACST – King Abdulaziz City for Science and Tech  CITC - Communications and Info Tech Commission  CERT - Computer Emergency Response Team  Anti-Spam Program
  • 2.  The E-Crime Act  Web sites hacking or PC spying can result in penalties of up to one year in jail and fines up to $133,000.  Hacking financial or banking databases, or performing false monetary transactions can result in penalties of up to four years in jail and fines up to $800,000.  The E-Transaction Act  Setting uniform legal standards for using electronic transactions and signatures.  Ensuring the credibility and integrity of electronic transactions, signatures and records.  Preventing misuse and fraud in electronic transactions and signatures.
  • 3.  Largest and most stable economy in the Gulf.  No personal income taxes and only a 20% corporate tax.  100% foreign ownership of companies and property.  Should have a visa to enter the country.  Copyrights law is not strictly applied.  Risk of terrorist attacks on oil companies and facilities.  Threats form other countries to attack oil facilities or block production lines.