KSAPDPL.COM

Table of Contents

Personal Data Destruction, Anonymization, and Pseudonymisation Guideline – Introduction
Personal Data Destruction, Anonymization, and Pseudonymisation Guideline – Objectives
Personal Data Destruction, Anonymization, and Pseudonymisation Guideline – First: Personal Data Destruction
Personal Data Destruction, Anonymization, and Pseudonymisation Guideline – Second: Anonymization
Personal Data Destruction, Anonymization, and Pseudonymisation Guideline – Third: Pseudonymisation
Personal Data Destruction, Anonymization, and Pseudonymisation Guideline – Fourth: General Guidelines

Personal Data Destruction, Anonymization, and Pseudonymisation Guideline – First: Personal Data Destruction

Overview

Personal Data Destruction, Anonymization, and Pseudonymisation GuidelineFirst: Personal Data Destruction explains when and how Controllers must permanently destroy personal data under the Saudi Personal Data Protection Law (PDPL).

It clarifies destruction triggers, mandatory conditions that must be met when destruction occurs, and acceptable technical destruction techniques, ensuring that personal data becomes permanently inaccessible, irrecoverable, and unidentifiable in compliance with Article 18 of the Law and related regulatory requirements.

SDAIA's Official Text

The text below reproduces official PDPL law, regulation, or guideline issued by the Saudi Data & AI Authority, verified against the original SDAIA source. No changes or reinterpretation applied.

First: Personal Data Destruction

In cases where the Controller is required to destroy personal data, it shall ensure that the data is permanently and irrevocably deleted, rendering it inaccessible, unrecoverable, and unidentifiable. Data archiving or backup processes shall not be considered data destruction techniques. Such processes shall be treated as personal data in accordance with the Law and its Implementing Regulations. Additionally, the Controller shall comply with the requirements of Article 18 of the Law and other applicable data destruction regulations. This Guideline does not relieve entities of their obligation to adhere to relevant controls, standards, and rules issued by the National Cybersecurity Authority or other competent authorities.


  1. Destruction Circumstances: The Controller shall destroy personal data in any of the following cases:

    1. Upon the request of the data subject.

    2. If the personal data is no longer necessary to fulfill the purposes of its collection.

    3. If the data subject withdraws their consent to the collection of their personal data, where consent was the sole legal basis for data processing.

    4. If the Controller becomes aware that the personal data is being processed in a manner that violates the Law.

  2. Destruction Conditions: The Controller, upon the destruction of personal data, shall:

    1. Take appropriate measures to notify other entities to whom the Controller has disclosed the relevant personal data and request that they destroy it.

    2. Take appropriate measures to notify individuals to whom personal data has been disclosed by any means and request that they destroy it.

    3. Destroy all copies of the personal data stored in the Controller's systems, including backups, taking into account any relevant regulatory requirements.

  3. Examples of Destruction Techniques:

    1. Data Overwriting and Secure Erasure (SE): Data overwriting involves replacing original data with random, meaningless data, rendering the original data irretrievable. Secure erasure is a more advanced data deletion technique than overwriting. It involves issuing a command to the device's software to delete all data, including data residing in sectors not typically accessible through standard deletion processes.

    2. Data Erasure (without Physical Media Destruction): This technique involves utilizing a degaussing device to neutralize the magnetic field that stores data, thereby rendering the data effectively unreadable. Degaussing is a secure and efficient technique that preserves the physical integrity of the storage device for reuse, making it the preferred technique for bulk data erasure operations. However, degaussing is limited to magnetic media and is not applicable to solid-state drives (SSDs) or flash-based storage.

    3. Shredding and Distortion: Shredding assets into tiny shreds and physically distorting them to render the assets effectively unreadable.

Plain-Language Explanation

The explanation below is provided to help you understand the SDAIA’s legal text and does not replace or override the official PDPL law, regulation, or guideline.

Permanent and Irreversible Destruction

This section establishes that personal data destruction must result in permanent and irreversible deletion. Once destroyed, the data must be inaccessible, unrecoverable, and unidentifiable. Archiving or backing up personal data does not qualify as destruction, and archived or backed-up data continues to be treated as personal data subject to the Law and Implementing Regulations.

Legal and Regulatory Alignment

Controllers are required to comply with Article 18 of the Law and any other applicable data destruction regulations when destroying personal data. The guideline also confirms that compliance with this guidance does not replace obligations under cybersecurity controls, standards, or rules issued by the National Cybersecurity Authority (NCA) or other competent authorities.

1. Destruction Circumstances

The guideline specifies the situations in which Controllers must destroy personal data. These include responding to a valid request from the data subject, cases where personal data is no longer necessary to achieve the purpose of collection, withdrawal of consent where consent is the sole legal basis, and situations where the Controller becomes aware that personal data is being processed in violation of the Law.

2. Destruction Conditions

When destroying personal data, Controllers must take additional steps to ensure full effectiveness of the destruction. This includes notifying entities to whom the personal data was disclosed and requesting that they destroy it, notifying individuals who received the data by any means, and ensuring that all copies of the personal data, including backups, are destroyed in accordance with regulatory requirements.

3. Examples of Destruction Techniques

The guideline provides examples of acceptable destruction techniques. These include data overwriting and secure erasure, which render data irretrievable through logical deletion methods, data erasure using techniques such as degaussing where applicable to magnetic media, and physical destruction methods such as shredding or distortion to render storage media unreadable. The suitability of each technique depends on the type of storage medium and the technical context.

Saudi Personal Data Protection Law Compliance Services (KSA PDPL)

KSA PDPL Compliance Implementation

Achieve PDPL Compliance in 4 weeks or less.

Data Protection Officer As A Service (DPOaaS)

Let us handle your daily PDPL Compliance Operations.

KSA PDPL Compliance Audit (External)

Audit your PDPL compliance obligations.

Scroll to Top