Back to Blog
Compliance Guide

PDPL Compliance Checklist for GCC Organizations

Saudi Arabia's Personal Data Protection Law is now enforced. Use this practical checklist to assess your organization's compliance posture across data inventory, consent, rights management, breach response, and third-party obligations.

Sentinel Unity GRC Team20 February 20257 min read
PDPLData PrivacySDAIAGCCCompliance Checklist

Why PDPL Compliance Matters Now

Saudi Arabia's Personal Data Protection Law (PDPL), enforced by the Saudi Data and Artificial Intelligence Authority (SDAIA), is now actively enforced. Organizations that process personal data of Saudi residents — whether based inside the Kingdom or internationally — must demonstrate compliance or face regulatory penalties.

For many organizations, PDPL compliance is not yet systematic. Policies exist on paper, but the operational controls — data inventories, consent mechanisms, breach notification workflows — are immature or missing.

This checklist is designed to help compliance and privacy teams rapidly assess their current PDPL posture and identify priority gaps.


Who PDPL Applies To

Before working through the checklist, confirm that PDPL applies to your organization:

  • Does your organization process personal data of Saudi residents? (If yes, PDPL applies)
  • Is your organization based outside Saudi Arabia but serving Saudi customers or employees? (Extraterritorial scope applies)
  • Is your organization public sector or private sector? (Both are covered)

If your organization processes any personal data relating to individuals in Saudi Arabia, PDPL obligations apply.


Part 1: Data Inventory and Mapping

A complete understanding of what personal data you hold, where it is, and how it flows is the foundation of PDPL compliance.

Checklist:

  • [ ] We maintain a comprehensive personal data inventory covering all systems, databases, and processes
  • [ ] Each data category is documented with: data type, collection purpose, legal basis, retention period, and storage location
  • [ ] Cross-border data flows are identified and documented (data sent to international vendors, cloud providers, or group entities)
  • [ ] Data owners are assigned for each processing activity
  • [ ] The data inventory is reviewed and updated at least annually

Common gap: Most organizations that have not formally implemented PDPL compliance lack a complete data inventory. Without it, assessing compliance across other areas is impossible.


Part 2: Lawful Basis for Processing

Every personal data processing activity must have a valid lawful basis under PDPL.

Checklist:

  • [ ] All data processing activities have a documented lawful basis (consent, contractual necessity, legal obligation, vital interests, or public interest)
  • [ ] Where consent is the basis: consent mechanisms are explicit, specific, and freely given — not pre-ticked or bundled with terms of service
  • [ ] Consent records are maintained, including when and how consent was obtained
  • [ ] Processing activities relying on legitimate interests have been assessed for proportionality
  • [ ] Processing purposes are clearly communicated to data subjects at the point of collection

Common gap: Organizations relying on consent often find that their consent mechanisms do not meet PDPL standards — particularly pre-ticked boxes, bundled consent, or vague purpose descriptions.


Part 3: Data Subject Rights

Saudi residents have explicit rights under PDPL that organizations must be operationally equipped to fulfill.

Rights covered by PDPL:

  • Right to access personal data held
  • Right to correction of inaccurate data
  • Right to erasure (with exceptions)
  • Right to object to certain processing
  • Right to data portability

Checklist:

  • [ ] A documented process exists for receiving and responding to data subject requests
  • [ ] Response timelines are defined and tracked (PDPL sets maximum response periods)
  • [ ] Staff who may receive data subject requests are trained on the process
  • [ ] We can technically fulfill erasure requests (including across backup systems where required)
  • [ ] A log of data subject requests received and their outcomes is maintained
  • [ ] Grounds for refusing requests (where applicable) are documented and defensible

Common gap: Most organizations lack a formal data subject rights workflow. Requests are handled ad-hoc, timelines are not tracked, and there is no audit trail.


Part 4: Cross-Border Data Transfers

Transferring personal data outside Saudi Arabia requires specific safeguards under PDPL.

Checklist:

  • [ ] All cross-border data transfers are identified (cloud services, international vendors, intra-group transfers)
  • [ ] Each transfer has an assessed lawful transfer mechanism: adequate jurisdiction, SDAIA approval, contractual safeguards, or explicit consent
  • [ ] Data transfer agreements (standard contractual clauses or equivalent) are in place with international processors
  • [ ] Cloud services used to process Saudi personal data are assessed for their data residency and transfer practices
  • [ ] SDAIA transfer approval has been sought where required

Common gap: Organizations using global cloud platforms (Microsoft 365, Google Workspace, Salesforce, AWS) often have not assessed whether their configuration and data residency settings meet PDPL transfer requirements.


Part 5: Data Breach Notification

PDPL requires timely notification to SDAIA and, where appropriate, to affected data subjects following a personal data breach.

Checklist:

  • [ ] A documented personal data breach response procedure exists and is tested
  • [ ] The breach notification timeline to SDAIA (72 hours from discovery) is understood by the incident response team
  • [ ] Criteria for determining when a breach must also be notified to affected data subjects are documented
  • [ ] A breach register is maintained (including breaches below the notification threshold)
  • [ ] The security and IT teams know what constitutes a "personal data breach" under PDPL (not just a security incident)
  • [ ] Post-incident reviews include a PDPL notification assessment step

Common gap: Many organizations have a cybersecurity incident response plan that does not include a PDPL breach assessment step or the 72-hour SDAIA notification requirement.


Part 6: Privacy by Design and Data Minimization

PDPL requires data protection to be built into processes and systems from the outset.

Checklist:

  • [ ] Privacy requirements are assessed for new systems, products, or services before they are deployed
  • [ ] Data minimization is practiced — only data necessary for the specified purpose is collected
  • [ ] Data retention periods are defined and technical controls enforce deletion after the retention period expires
  • [ ] Privacy impact assessments (PIAs) are conducted for high-risk processing activities
  • [ ] Default settings in products and services minimize data collection (privacy by default)

Common gap: Legacy systems often have no defined retention periods, and organizations continue to hold personal data indefinitely without legal justification.


Part 7: Third-Party and Processor Management

Organizations that engage third parties to process personal data on their behalf must ensure those processors comply with PDPL requirements.

Checklist:

  • [ ] An inventory of all third-party data processors is maintained
  • [ ] Data processing agreements (DPAs) are in place with all processors handling Saudi personal data
  • [ ] DPAs specify: processing purpose, data categories, security requirements, data subject rights support, breach notification obligations, and return/deletion of data at contract end
  • [ ] Security assessments are conducted on processors handling sensitive personal data
  • [ ] Sub-processor arrangements are identified and contractually controlled

Common gap: Data processing agreements are missing for many vendor relationships, particularly those established before PDPL was enacted.


Part 8: Governance and Documentation

PDPL compliance requires documented accountability — policies, records, and governance structures that demonstrate an organization takes data protection seriously.

Checklist:

  • [ ] A privacy policy exists, is accurate, and is accessible to data subjects
  • [ ] An internal personal data protection policy covers organizational obligations under PDPL
  • [ ] A Data Protection Officer (DPO) or equivalent privacy lead is designated
  • [ ] Staff who handle personal data receive regular PDPL training
  • [ ] Records of processing activities (RoPA) are maintained
  • [ ] PDPL compliance is reviewed at least annually

Prioritizing Your PDPL Remediation

Once you have completed this checklist, prioritize remediation based on:

Highest priority (fix immediately):

  • Data breach notification process — the 72-hour SDAIA timeline has no grace period
  • Consent mechanism issues — invalid consent is a direct regulatory risk
  • Cross-border transfers without safeguards — particularly for cloud services

High priority (address within 3 months):

  • Personal data inventory completion
  • Data subject rights workflow
  • Data processing agreements with third-party processors

Medium priority (address within 6 months):

  • Privacy by design processes for new projects
  • Data retention policy and technical enforcement
  • Staff training programs

PDPL and Your Broader GRC Program

PDPL compliance does not exist in isolation. For organizations also managing NCA ECC or SAMA CSF, many controls overlap — particularly in data protection, third-party risk, and incident response. A unified GRC platform allows organizations to:

  • Map PDPL obligations alongside NCA ECC and SAMA CSF requirements
  • Avoid duplicate evidence collection for overlapping controls
  • Manage third-party risk programs across all three frameworks from a single vendor registry
  • Track incident response obligations across cybersecurity and privacy frameworks together

Conclusion

PDPL compliance requires systematic, ongoing effort — not a one-time audit exercise. Organizations that establish robust data inventories, valid consent mechanisms, operational data subject rights workflows, and tested breach notification processes will be well-positioned to demonstrate compliance to SDAIA.

For organizations starting their PDPL journey, using this checklist as a gap assessment is the fastest way to understand current posture and prioritize remediation.

Request a demo to see how Sentinel Unity supports PDPL compliance management alongside NCA ECC and SAMA CSF in a single unified platform.

Ready to see Sentinel Unity in action?

Book a personalized demo with our GRC specialists.

Request a Demo