SESP Data Storage, Backup, and Security Policy
SESP is committed to maintaining the highest standards of data security, confidentiality,
integrity, and availability across all institutional IT systems. This policy governs the management,
storage, protection, backup, and recovery of all electronic and physical institutional data.
All measures are aligned with national regulations including the
- Saudi Personal Data Protection Law (PDPL)
- National cybersecurity and cloud- computing regulations
- SESP QMS, ISO 9001:2015 –aligned
- Internal policies and procedures governing IS and access control
This policy aims to ensure that institutional information is protected from unauthorized access, loss,
misuse, or breach, and that business continuity is maintained across all SESP operations.
Scope of IT Systems Covered
This policy applies to all SESP-managed IT systems, including but not limited to:
- Student Information System (SIS)
- Learning Management System (LMS)
- HR & Payroll systems
- Financial and procurement systems
- Email and communication platforms
- Local servers and on-site IT equipment
- Cloud services and SaaS applications
- Network infrastructure, including firewalls, routers, and switches
- End-user devices (desktops, laptops, mobile devices)
- Any third-party systems used to process, store, or transmit institutional data
Centralized Electronic Records & Data Management
SESP maintains a hybrid digital infrastructure built on cloud and on-premises systems to
ensure secure, resilient, and efficient data management.
Electronic Records Management Systems (ERMS)
- All core academic, administrative, financial, HR, and operational records are stored within secure, centralized systems.
- All systems utilize industry-standard encryption and secure hosting (cloud or on-premises).
- System access is governed by role-based access control (RBAC) with granular permissions aligned to job responsibilities.
- User authentication is secured through strong password policies and, where supported, multi-factor authentication (MFA).
Related SESP Process:
SIS User Access and Permissions Procedure
Third-Party Platforms
- Any third-party IT system must comply with PDPL and SESP’s data protection requirements.
- Data-sharing agreements must include confidentiality, security, and breach-notification clauses.
Data Storage and Encryption
SESP uses a combination of cloud-based and on-premises solutions, all built to protect data confidentiality and integrity.
Data Encryption Standards 6
- Data in transit: Encrypted using TLS 1.3 or higher.
- Data at rest: Encrypted using AES-256 or equivalent.
- Encryption is applied across all systems handling personal, academic, financial, HR, or operational data.
Data Classification
All institutional data is assigned a classification level:
- Level 4 Confidential (e.g., personal data, student records, HR files)
- Level 3 Restricted (e.g., internal reports, operational documents)
- Level 2 Internal Use
- Level 1 Public Information
Handling of each category follows PDPL and internal SESP security requirements.
Backup, Redundancy, and Disaster Recovery
SESP maintains a robust, multi-layered backup and redundancy strategy to ensure continuity of operations.
Backup Procedures
- Automated backups of all critical systems occur daily (or more frequently for high-priority systems).
- Backups are stored in secure, geographically separate locations, including cloud-based redundancy.
- Backup files are encrypted at rest.
Backup Types
- Full backups (scheduled weekly)
- Incremental/differential backups (scheduled daily)
- Real-time replication for mission-critical systems (where applicable)
Disaster Recovery
- DRP is tested annually to verify system readiness and response procedures.
- In case of data loss, systems can be restored from the latest verified backup.
Physical Records and On-Site Data Storage
While digital-first systems are the operational norm at SESP, some records require physical storage.
Physical Storage Controls
- Physical documents are stored in locked, access-controlled locations .
- Only authorized staff may access records based on their job function.
- Sensitive records are logged to track access and movement.
On-Site Hardware Security
- Server rooms are secured using access control, temperature regulation, and 24/7 monitoring.
- Network equipment is protected against tampering, theft, and environmental hazards.
Access Controls and User Security
SESP enforces strict measures to ensure that only authorized individuals access sensitive information.
Permissions and Authentication
- Role-based access control (RBAC) is applied across all systems.
- Periodic access reviews ensure alignment with current job functions.
- Accounts of departing employees are deactivated immediately.
Staff Security Training
- All IT system users must participate in data privacy, cybersecurity, and PDPL awareness training.
- All Employees are required to sign confidentiality agreements.
- Regular reminders and workshops reinforce security best practices.
Data Privacy, Confidentiality, and Compliance
SESP adheres strictly to PDPL and all relevant regulations governing personal data and institutional records.
Student and Employee Data Confidentiality
- Access to personal data is strictly limited to authorized personnel.
- Students may request access to their own records through a formal process.
- Data may only be shared externally with explicit written consent, unless otherwise required by law.
PDPL Compliance
SESP ensures compliance by:
- Implementing secure data processing practices
- Ensuring purpose-specific data collection
- Minimizing retained personal data
- Enforcing breach-notification procedures
- Maintaining data subject rights
Monitoring, Auditing, and Incident Response
SESP continuously monitors and evaluates its IT systems to identify security risks and respond proactively.
Monitoring and Logging
- System logs are generated for user activity, system changes, and access events.
- Logs are securely stored and monitored for irregularities.
Security Audits
- Annual internal audits assess compliance with PDPL, cybersecurity policies, and best practices.
- External audits may be conducted when required by contracts or regulatory bodies.
Incident Response
- Incidents are logged, investigated, and addressed according to severity.
- PDPL breach reporting requirements are followed.