Your Data, Secured by Design.
We treat network telemetry and customer interactions with the same precision we apply to radio frequencies. This policy outlines the specific protocols, retention limits, and safeguards protecting your information across the Qatar 5G ecosystem.
The Compliance Framework
How we interpret Qatar’s data protection landscape.
Our privacy architecture is built on the principle of minimal viable data. We do not collect data for hypothetical future use. Every byte ingested—whether it’s a signal strength log or a billing inquiry—serves an immediate, defined operational purpose. We operate under strict adherence to the Qatar Personal Data Privacy Law (Law No. 13 of 2016), ensuring that every transmission across our network is accounted for, encrypted, and, where necessary, anonymized at the source.
Scope of Collection
We capture essential technical telemetry (device ID, handover events, latency metrics) to maintain network stability. We do not inspect payload content of encrypted user traffic.
Retention Logic
Network logs are retained for 30 days for troubleshooting. Billing records are kept for the statutory 5 years for audit compliance.
What We See (And What We Don’t)
Understanding the difference between network metadata and user content is critical. Our systems are designed to monitor the path of your data, not the data itself.
Collected Data
Authorized- • IMEI / Device ID: To authenticate hardware on the 5G network.
- • Location Triangulation: Approximate cell tower handover points for coverage mapping.
- • Bandwidth Usage: Total GB consumed for billing and capacity planning.
- • Connection Timestamps: Duration of sessions for QoS analysis.
Protected Content
Encrypted- • Message Content: SMS, WhatsApp, and app messages are not decoded.
- • Browsing History: URLs and search queries remain on your device.
- • Call Audio: Voice packets are encrypted end-to-end.
- • Payment Details: Processed via PCI-DSS compliant tokenization gateways.
Security & Breach Notification
In the event of a confirmed data breach affecting personal information, Qatar 5G activates a 48-hour response protocol. This is not a hypothetical exercise. We maintain active threat monitoring 24/7/365 from our Network Operations Center (NOC) in Doha.
Notification to affected users and the Qatar Data Protection Authority is prioritized above public relations. We value transparency over optics. You will be informed of the nature of the breach, the data involved, and the steps you should take immediately.
Contact for Security Concerns
If you suspect unauthorized activity on your account, contact our security team immediately.
FIG 1. NOC VISUALIZATION
Real-time traffic anomaly detection systems.
FIG 2. PHYSICAL LAYER
Physical access restricted to Tier 3 clearance.
Your Rights, Exercised Simply
You own your data. We are merely the custodians of its transmission.
Data Protection Officer
For privacy inquiries, requests, or concerns, reach our governance team directly.
Quick Actions
Initiate a specific request or review the full legal framework.
Last Updated: . Subject to change without notice.