The Transport General Authority is committed to providing a secure and reliable environment for its information systems by adopting the best security practices and ensuring compliance with all laws and regulations related to cybersecurity. The authority also continues to develop its systems and apply preventive measures to protect sensitive information and ensure business continuity in a secure environment, which includes the following:
- The Transport General Authority supports the national cybersecurity strategy, which aims to create a safe and trusted Saudi cyberspace that enables growth and prosperity.
- The Transport General Authority is committed to maintaining the confidentiality and integrity of all information created, shared, or used within its systems.
- The Transport General Authority conducts regular security audits, updates, necessary tests, and continuous monitoring to ensure the protection of critical information from potential risks that could negatively impact its operations or reputation.
- The Transport General Authority adopts strategies to ensure business continuity and minimize the impact of any system disruptions by following and applying the highest cybersecurity standards to maintain the confidentiality, integrity, and availability of information.
- The Transport General Authority complies with the regulatory, legal, and legislative requirements issued by the National Cybersecurity Authority.
- The Transport General Authority applies internationally best practices in information security by designing and implementing an Information Security and Confidentiality Management System in accordance with the ISO/IEC 27001 standard and adhering to its controls.
- The Transport General Authority raises user awareness about the importance of cybersecurity and ways to protect their personal information.
- The Transport General Authority maintains its level of commitment to cybersecurity requirements by implementing continuous corrective and preventive measures.
- The Transport General Authority is committed to continuous development in the field of cybersecurity to ensure adaptation to technological changes and cybersecurity risks.