All links to official websites of government agencies in the Kingdom of Saudi Arabia end with .gov.sa
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
A physical system used to provide services related to the telecommunications and information technology sector, including facilities, networks and devices.
Information that the government agency publishes through its digital channels to give an overview of the agency and what it does, such as: Its latest news, its initiatives and its mechanism of action.
Visual representation used to represent content and data elements in different levels of details and its interrelationship.
Provides examples showing the implementation mechanism of the of policies and standards in place.
Every source code is written for the benefit of a state entity and owned by the government.
Ministries, authorities, public institutions, councils, national centers including any additional form of a public agency.
This is a Cloud typically fully owned by a Government and provisioned for the exclusive use of Governmental authorities. Operations for this Cloud could be done by a Governmental authority, a third party (e.g. a Cloud Service Provider) or a combination of these. It is typically located inside the country, mainly to protect data sovereignty.
An agreement between one or more government agencies with one or more vendors, contractors and procurers including the terms and conditions of the contracts that will be awarded within a certain period.
Modern technologies that support the implementation of digital government activities, which its applications still under development, such as: AI, IoT, Blockchain, etc.
Any exchange, communication, contracting or other procedure performed or executed, wholly or partially, by electronic means
An electronic data system specially designed to work independently or with another electronic data system, to generate electronic signatures.
Electronic data included in, attached to, or logically associated with an electronic transaction and used to verify the identity and approval of the person signing it and to detect any change to said transaction after signature.
Total 9 Pages
4 Visitors Said Yes from 5
Suggestions and comments
For any inquiries or comments about the services or the current page, please fill in the required information.
Add Comment