Text Size

  • Increase
  • Decrease
  • Normal

Current Size: 100%

Library

  • National Laws
    Here you can find a collection of legislations and related by laws enacted by the State of Qatar in the domain of Information & Communication Technology. We have endeavored to provide you with a copy of both the English and Arabic texts. However please note that the English versions are translated copies and in case of a dispute the text in the Arabic shall have precedence.
  • National Policies and Standards
    Here you can find a collection of Standards and Policies endorsed and published by Supreme Council of Information and Communication Technology (ictQATAR) in the information security domain.
  • National Guideline And Tools
    Here you can find a collection of Guidelines and Tools that you may find useful in your compliance initiatives. Some of the tools have been developed in-house by the Cyber Security Division of ictQATAR to help you adopt the policies and standards issued by ictQATAR / State of Qatar. Some of the tools are publicly available resources (available under various licenses like GPU etc..) that we thought you may find useful.
  • International Policies & Strategies
    Here you can find a collection of documents related to the policies and strategies of various countries on topics related to Information Security and protection of Critical Information Infrastructure.
     
  • International Legislations
    Here you can find a collection of Legislations from different countries in relation to Critical Information Infrastructure Protection, Cyber Laws, Data Privacy Laws, E-Commerce Laws and Telecom Laws.
  • International Standards
    ** Coming Soon ** Here you can find a collection of Insternational Standards published by different counties and bodies likes (NIST and ENISA) on various aspects of Information Security.
  • International Best Practices
    ** Coming Soon ** Here you can find the best practices and guides published by different counties and bodies on various aspects of Information Security like protection of critical infrastructure, spam protection, considerations for cloud computing, wireless security, social networking, etc.