← Back to VoxSign
Compliance · UAE PDPL · Saudi PDPL

Voice AI Under GCC PDPL

Last updated: 2026-04-18

Audience: CTOs, CISOs, and data-protection officers at GCC enterprises evaluating voice-AI platforms.

This page summarises how VoxSign's architecture aligns with UAE PDPL (Federal Decree-Law No. 45 of 2021) and Saudi Arabia PDPL. It is an engineering-led reading of the regulations, not legal advice. Procurement teams should cross-check against their in-house counsel or the official authorities (UAE Data Office, Saudi SDAIA).

1. Two-sentence TL;DR

VoxSign's heavy compute (ASR, LLM, embeddings) runs on a GPU you control — your workstation, an in-country data centre, or a customer VPC. The Center coordination service can be deployed inside UAE or Saudi borders; outbound egress is optional, off by default, and configurable per tenant.

2. What PDPL actually requires

Both regimes converge on six obligations relevant to voice AI:

  1. Lawful basis for processing (consent or documented legitimate interest).
  2. Purpose limitation — data collected for X is not silently repurposed for Y.
  3. Data minimisation — do not collect more than needed.
  4. Cross-border transfer controls — audio and transcripts may not leave the jurisdiction without safeguards.
  5. Data-subject rights — access, correction, deletion, portability.
  6. Breach notification — 72 hours to the regulator.

3. PDPL clauses ↔ VoxSign controls

ObligationHow VoxSign supports it
Lawful basis (UAE Art. 4, KSA Art. 5) Per-user consent captured at onboarding, stored with timestamp + consent version.
Purpose limitation (UAE Art. 5, KSA Art. 6) Voice data scoped to enabled features only. No silent analytics.
Data minimisation Only transcripts (not audio) reach the Center. Hard-example archive stores audio hashes.
Cross-border transfer (UAE Art. 22, KSA Art. 29) Enterprise deployments run fully on customer infrastructure. Hosted tenants can pin all data to a region.
Data-subject rights Export + delete endpoints exposed in the API.
Breach notification Documented 72-hour incident-response SOP (available under NDA).

4. Deployment modes and PDPL posture

ModeData lives atTypical customer
Self-hosted Edge, no CenterCustomer hardware onlyBanks, government, healthcare, defence
Self-hosted Edge + Self-hosted CenterCustomer DC, both tiersLarge GCC enterprises
Self-hosted Edge + VoxSign-hosted Center (in-region)Customer edge + regional CenterMid-market GCC SaaS
VoxSign-hosted everythingVoxSign infrastructureNon-regulated workloads

5. Default sub-processor list

The default Enterprise deployment uses no third-party AI processors. Cloud providers are opt-in per tenant:

6. What we do not claim

7. Next steps for a regulated evaluation

  1. Email security@voxsign.ai with your jurisdiction, workload, and deployment preference.
  2. We send the DPA template and a pre-filled security questionnaire.
  3. 30-day POC on your hardware at no cost — scoped to 10 users and 10 k utterances with up-front success metrics.
  4. Go / no-go decision. If no-go, full data deletion certificate.
Full 10-section compliance guide (with DPA template and data-flow diagrams) is available under NDA. Request a copy at security@voxsign.ai.