A government website registered with the Digital Government Authority

Suggesions

Information security strategy

Information security strategy

The Bank follows and applies the highest standards of information security to maintain confidentiality, validity and availability of information, which are available in several formats, including print, paper-written, electronically preserved or mail-transfered or using electronic means, offers or verbal exchanges in talks, and the Bank often relies on computer systems for the preservation, processing and management of customer data and information. Therefore, the Bank ensures that it is adequately protected in accordance with security controls and optimum applications for information security, regardless of the form it takes, or the means used to exchange or preserve them because they are a valuable asset that must be treated in any way.


The Bank also considers that information and data are very valuable assets that must be protected to ensure the provision of reliable services to customers, and therefore the Bank ' s management aims to protect this information and data by applying appropriate controls to the Bank ' s regulations and testing and continuously monitoring to ensure that important information is protected against potential risks that may adversely affect the Bank ' s working mechanisms or reputation.


The Bank has also set targets to enhance information security to ensure that all services to beneficiaries continue to be provided in a safe manner, in line with Basic controls on cybersecurity (ECC-1: 2018)

Continuing improvement:

The Bank Administration is continuously improving the information security management system, through which the effectiveness of security controls is maintained and improved. Key performance indicators have also been developed and used to measure the effectiveness of its information security management system and controls, and the Bank is conducting at least an annual review of information security management policies or major changes to ensure the relevance, efficiency, effectiveness and development of frameworks in line with regulations and legislation such as those issued. Basic controls on cybersecurity (ECC-1: 2018) I'm sorry.

In case there's any enquiries about the information security strategy, you can contact the gate management via page. Communication channels I'm sorry.

Relevant legislation:

NElectronic transaction system Communications and Information Technology Authority

Informatics Crime Control System Communications and Information Technology Authority

Basic cybersecurity controls National cybersecurity authority

Do you have any questions

If you have any questions, please contact us

Last Modified Date 26/04/2026 - 11:53 AM Saudi Time

Was this page helpful?