UAE Government Attempts to Formulate and Pass Additional Security Legislation in the IT Sector

Paper Type:  Essay
Pages:  5
Wordcount:  1200 Words
Date:  2022-11-20


In the contemporary age of vast and complex advancements made in the Information Technology sector, the issue of security has become an even more pressing matter. The advancements made in the sector are advantageous for a variety of reasons, but they also create loopholes which people with bad intentions can utilize with the intent to harm other users in the various sites that require internet connectivity. A recent study by the National Initiative for Cybersecurity Education (NICE), a reputable organization, discovered that the United Arab Emirates is one of the countries in the world that is more prone to cyber-attacks than any other (Alsmadi, 2019). The results of the study and the recent trend are worrying, hence, the UAE's government's focus on the formulation and implementation of additional security to ensure the safety of users of various internet applications; these legislations will be discussed in the succeeding paragraphs which will involve the analysis of these laws and the effect they have on security.

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Laws and Policies to Enhance Security in the UAE

One of the sectors that are lagging behind the rest of the world in the UAE is the lack of a law that prohibits the collection of personal data of the citizens of the country. However, there is a provision in the constitution that stipulates that individuals are entitled to the protection of their right to privacy across the various online media (UAE Government, 2018). To this end, prohibition is exercised on media platforms to prevent them from publishing personal data without prior permission from the subject. Owing to the laxity in the formulation and implementation of the legislation concerning security in Information Technology media, some advocates in the UAE have proposed and are still pushing for the implementation of laws as described in the following paragraphs.

A law that passed in 2012 is one on Combating Cybercrimes often referred to as the Cybercrime Law. It deals with the activities conducted online that would be termed as either identity theft, hacking or acts of fraud. According to the legislation, one who accesses unauthorized electronic information systems, networks or websites is liable to prosecution. Although the law has been in enforcement since 2012, the implementation is wanting, and this phenomenon has led some legislators and advocacy groups to enact stricter policies to make it more useful (STA Law Firm, 2018).

Another law that deals with personal security with regards to computer networks or electronic information systems is in Article 21 of the Cybercrime Law. The law prohibits the unauthorized access of personal information that can be used to harm a person's reputation, morale or security. The law encompasses all forms of unauthorized access which even includes photographing, eavesdropping and access to personal information through computer networks or other modes of information technology (A guide to Abu Dhabi's Legal Framework, 2017). The two laws mentioned above are doing their level best in combating cybercrime, but the process is ineffective due to the lack of an enforcement body. Therefore, advocacy groups are pushing for the creation of more robust enforcement agencies that will ensure that the enforcement of the legislation on protection of personal data is successful.

Telecommunications is the other significant industry in the UAE for a variety of reasons. For one, the industry has personal information of more than 97% of the residents, two, these subscribers are susceptible to attacks meted out by criminals who may have access to information systems of the various telecommunication providers and also, the various telecommunication providers have become lax in the protection of personal data of their clients. A law on the protection of personal information (TRA Consumer Protection Regulations) stipulates that telecommunication service providers should ensure that their systems are robust to protect against infiltration attacks aimed at stealing data of clients (Efthymiopoulous, 2018).

Another law that is security conscious is the Dubai Law No. 28, formulated in 2015, restricts the disclosure of personal data obtained in the course of collection of statistical information. Legislators have been pushing for stricter enforcement principles of the law as statistical data on the citizens is private information and thus a significant component of their security (Fox, 2019).

Just as Information Technology is pertinent to the advancement of a nation, so is healthcare. It is one of the most critical sectors in ensuring the maintenance of a nation's security. The UAE does not, however, have a law or legislation regarding the various healthcare policies and regulations that should be enforced to protect individuals from malicious individuals. The Dubai Healthcare City is a free zone that operates under the UAE government's mandate which allows it to maintain its data protection systems. The reason for this phenomenon is that healthcare is significant to the success of the country's economy, it is no wonder then that the free zone is the healthcare hub of Dubai. Since it is a free zone, it is full of practitioners from various countries who provide healthcare services to locals and foreigners in the region. The healthcare hub is however under Dubai Law No. 26 which was enacted in 2016 and asserts that data sharing aimed at enhancing innovation and economic prosperity is secure (Herbert Smith Freehills, 2018). Although the law is in place, advocacy groups and some legislators are of the opinion that implementation of more stringent legislation is necessary to provide more security.


The laws and regulations mentioned above are just a few of the governing policies that are either under-enforcement or advocacy to ensure stricter and more robust delivery of security measures to protect all the nationals against malicious activity. They, however, show the extent to which the government of UAE is committed to ensure that all the individuals residing and working within the region are safe from all aspects that pose a threat to their security. It is no wonder then that numerous agencies, government groups, and other advocates are always pushing for stricter legislation to ensure that security in the UAE is as strict as it can get. The move to make stricter regulations regarding security will always be present, and this is a comforting thought to all the residents in the UAE as they can be sure that whatever information they store, pass or retrieve is safe from people with malicious intentions.


A guide to Abu Dhabi's legal framework and most relevant laws. (2017, July 20). Retrieved February 05, 2019 from

Alsmadi, I. (2019). Cyber Policy and Strategy Management. The NICE Cyber Security Framework, 181-203. doi:10.1007/978-3-030-02360-7_8

Efthymiopoulos, M. P. (2018). Cyber-Security and Sustainable Development: The Case of Dubai. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense, 1-13. doi:10.1007/978-3-319-06091-0_19-1

Fox, E. (2019). Retrieved February 05, 2019 from

Herbert Smith Freehills. (2018). United Arab Emirates Cybersecurity - Getting The Deal Through - GTDT. Retrieved from

STA Law Firm. (2018, November 6). Cyber Crime Law In United Arab Emirates - Security - United Arab Emirates. Retrieved February 05, 2019 from

UAE Government. (2018). Maintaining safety and security - The Official Portal of the UAE Government. Retrieved February 05, 2019 from

Cite this page

UAE Government Attempts to Formulate and Pass Additional Security Legislation in the IT Sector. (2022, Nov 20). Retrieved from

Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism