Posts

Understanding the UAE Personal Data Protection Act (PDPA)

  Understanding the UAE Personal Data Protection Act (PDPA) [ Author : Rinu Jacob (CIST, CIGE)] Executive Summary The United Arab Emirates Personal Data Protection Act (PDPA) , introduced in 2021 and enforced from January 2022, marks a significant step in the region's commitment to data privacy and security. This federal law governs the processing of personal data within the UAE, aiming to protect individuals’ rights while providing clear compliance obligations for organizations. This article outlines the key elements of the PDPA, explains the rights of data subjects, details organizational responsibilities and highlights penalties for non-compliance. It also presents practical scenarios and a compliance checklist to help businesses align their data practices with the law. With the rapid digitization of services and increased data flows, protecting personal information has become paramount. The UAE’s PDPA establishes a legal framework to regulate how personal data is collecte...

ZERO TRUST SECURITY

  Zero Trust Security [ Author : Rinu Jacob (CIST, CIGE)] The Zero Trust Security (ZTS) model has emerged as a response to the inadequacies of perimeter-based security frameworks in today’s complex digital environments. Unlike conventional architectures that assume implicit trust within the internal network, Zero Trust operates under the principle of "never trust, always verify." All entities— users, devices, applications and data sources —are treated as potential threats, regardless of their location or network status. Principles of Zero Trust Continuous Verification Every access request undergoes real-time evaluation using identity verification, device health status, geolocation and behavioral analytics. Least Privilege Access Access is strictly granted based on the minimum rights required to complete a task. Presumption of Breach The architecture is designed assuming that a security breach may have already occ...