Skip to main content
  • Application of Information Security Policies

    • Article (24)

      The remote communication technology provided for in this Regulation shall be subject to the legislations, regulations and information security policies approved in the UAE.