SlideShare a Scribd company logo
Schuman & Co. Law Offices ‫ושות‬ ‫שומן‬'‫ונוטריון‬ ‫דין‬ ‫עורכי‬ ‫משרד‬
http://www.schumanlaw.co.il/ 1
Israel Privacy Protection Regulations - Duty To Report A "Severe
Security Event" To The Privacy Protection Authority
One of the most significant recent developments in data protection in Israel has been the publication of the
Privacy Protection Regulations (Data Security) in May 2017. These significant regulations came into effect in
May 2018.
The regulations were enacted after extensive consultation with the Israeli public, and in particular the stake
holders that would be effected by the regulations. The regulations apply to both private and public sectors and
establish organizational mechanisms aimed at making data security part of the management practices of all
organizations processing personal data.
It is anticipated that the regulations will considerably advance the level of data security in Israel. They are both
flexible, tangible and precise to a degree that offers organizations regulatory certainty and practical tools that
are unpretentious to implement.
The regulations classify databases to four groups according to the level of risk created by the processing activity
in those databases: high, medium, basic and databases controlled by individuals that grant access to no more
than three authorized individuals. The duties of the controllers are determined in accordance with the level of
risk. The level of risk is defined by the data sensitivity, the number of data subjects and number of authorized
access holders.
In certain circumstances, the Privacy Protection Authority may instruct a database to implement supplementary
obligations in order to strengthen the security level of its activities. On the other hand, the Privacy Protection
Authority may use its discretion to exempt a database from applying specific details of the obligations in the
regulations.
Until May 2018, Israeli law did not include a general duty to notify a party whose personal information was
exposed during a cyber breach. Nonetheless, a limited duty to notify a cyber event was set out in the directives
which apply to banks and financial institutions and require them to notify the regulator in case of a cyber
breach.
The new regulations include a duty to report a "Severe Security Event" to the Privacy Protection Authority. The
Privacy Protection Authority has been given the authority to instruct database owners that have been attacked to
notify the parties whose information was exposed.
Schuman & Co. Law Offices ‫ושות‬ ‫שומן‬'‫ונוטריון‬ ‫דין‬ ‫עורכי‬ ‫משרד‬
http://www.schumanlaw.co.il/ 2
The term 'Severe Security Event' is defined in the Privacy Protection Regulations as follows:
"In a database which is subject to a high level of security – a cyber event in which information included in the
database was used or damaged; In a database which is subject to a medium level of security – a cyber event in
which a significant part of the database was used or damaged."
The level of security required from a database is determined in the Privacy Protection Regulations according to:
• the number of people whose information is included therein (generally, a database with information
regarding more than 100,000 people requires a high level of security);
• the number of people who have authorized access to a database (generally, a database with more than
100 authorized parties requires a high level of security); and
• the nature of the information held in the database.
On October 21, 2018 the Israeli Securities Authority (ISA) published a written position, according to which, in
cases of a significant cyberattack, public companies must examine the need to issue an immediate report to the
investors notifying them of the attack. According to the position statement, an immediate report is required in
the event:
• a company could not operate for some time as a result of a cyberattack;
• a cyberattack influences a company's activity (where a hacked database is protected under the privacy
laws this must be referenced);
• a company's computer system is damaged in such a way that it has a material effect on its activities;
• a company must pay a significant amount as ransom due to a cyberattack;
• a company discovers that its computer systems have been exposed to hostile parties; and
• a vulnerability was discovered in products supplied/manufactured by the company.
The Privacy Protection Regulations will likely lead to application of the regulations to any organization
established in Israel that is controller or processor of a database, regardless of where the data subjects may be
and whether they are Israelis. However, the regulations will likely also extend to foreign-based entities
purposefully processing data about Israeli citizens, consumers or employees. To be sure, a hotel in Los Angeles,
USA will not have to comply with Israeli law based on an indiscriminate Israeli customer taking a room with
his family at the hotel. However, But a U.S.-based parent company of an Israeli subsidiary, which manages a
global HR database including rich data about Israeli employees, or a Silicon Valley-based app developer
collecting social networking information about thousands of Israeli users, will have to comply with the new
regulations despite a lack of physical presence in Israel.
This document provides a general summary and is for information purposes only. It is not intended to be
comprehensive nor does it constitute legal advice. If you are interested in obtaining further information
please contact our office at:
Schuman & Co. Law Offices
Beit Bynet, 8 Hamarpe Street, P.O.Box 45392
Har Hotzvim, Jerusalem 97774 Israel
Tel: +972-2-581-3760, Fax: +972-2-581-5432
Shalev@schumanlaw.co.il
http://www.schumanlaw.co.il/

More Related Content

What's hot

State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
TRPC Pte Ltd
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
Jan Carroza
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Accellis Technology Group
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
DoubleHorn
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
Cyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency servicesCyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency services
VFIS
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
EMC
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
MassTLC
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
Raffa Learning Community
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Brian Dickerson
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
Raffa Learning Community
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
PECB
 
Hacker Hunters Case Study
Hacker Hunters Case StudyHacker Hunters Case Study
Hacker Hunters Case Study
Fableeha Choudhury
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)wright1908
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
Joe Orlando
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
Keelan Stewart
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updates
Ines Mergel
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
CBIZ, Inc.
 

What's hot (20)

State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
State of Cybersecurity, Data Protection Policy, and Cloud Adoption in Asia Pa...
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
Cyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency servicesCyber liability and the growing threat to emergency services
Cyber liability and the growing threat to emergency services
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Hacker Hunters Case Study
Hacker Hunters Case StudyHacker Hunters Case Study
Hacker Hunters Case Study
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)1.03 ethics and_security_review_ppt (1)
1.03 ethics and_security_review_ppt (1)
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updates
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
 

Similar to Israel Privacy Protection Regulations - Duty To Report A Severe Security Event

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Raleigh ISSA
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
Lifeline Data Centers
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryptionNeoCertified
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
David Sweigert
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Terrance Tong
 
Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing?
N-iX
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
Singhania2015
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
Ulf Mattsson
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
Robert Craig
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.ppt
Samir Jha
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
Matt Siltala
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
American Chamber of Commerce in Bahrain
 

Similar to Israel Privacy Protection Regulations - Duty To Report A Severe Security Event (20)

Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryption
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
 
Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing?
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.ppt
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 

More from Barry Schuman

What Are Phantom Shares?
What Are Phantom Shares?What Are Phantom Shares?
What Are Phantom Shares?
Barry Schuman
 
Facebook's Business Model Challenged Following EU Regulator Ruling
Facebook's Business Model Challenged Following EU Regulator RulingFacebook's Business Model Challenged Following EU Regulator Ruling
Facebook's Business Model Challenged Following EU Regulator Ruling
Barry Schuman
 
Choice of Entity: Matters Startups Should Cogitate When Selecting An Entity S...
Choice of Entity: Matters Startups Should Cogitate When Selecting An Entity S...Choice of Entity: Matters Startups Should Cogitate When Selecting An Entity S...
Choice of Entity: Matters Startups Should Cogitate When Selecting An Entity S...
Barry Schuman
 
Israel Tax Authority Ruling Number 2018-18
Israel Tax Authority Ruling Number 2018-18Israel Tax Authority Ruling Number 2018-18
Israel Tax Authority Ruling Number 2018-18
Barry Schuman
 
Use of Service Provider Instead of Employee
Use of Service Provider Instead of EmployeeUse of Service Provider Instead of Employee
Use of Service Provider Instead of Employee
Barry Schuman
 
United Kingdom GDPR Action Taken Against Canadian Company
United Kingdom GDPR Action Taken Against Canadian CompanyUnited Kingdom GDPR Action Taken Against Canadian Company
United Kingdom GDPR Action Taken Against Canadian Company
Barry Schuman
 
Simple Agreement For Future Equity (SAFE)
Simple Agreement For Future Equity (SAFE)Simple Agreement For Future Equity (SAFE)
Simple Agreement For Future Equity (SAFE)
Barry Schuman
 
Update The Law for the Encouragement of Capital Investments
Update   The Law for the Encouragement of Capital InvestmentsUpdate   The Law for the Encouragement of Capital Investments
Update The Law for the Encouragement of Capital Investments
Barry Schuman
 
האינטרנט של הדברים - האתגר החדש של עולם המשפט
האינטרנט של הדברים - האתגר החדש של עולם המשפטהאינטרנט של הדברים - האתגר החדש של עולם המשפט
האינטרנט של הדברים - האתגר החדש של עולם המשפט
Barry Schuman
 
Elon Musk Settles SEC Fraud Charges
Elon Musk Settles SEC Fraud ChargesElon Musk Settles SEC Fraud Charges
Elon Musk Settles SEC Fraud Charges
Barry Schuman
 
The Convertible Loan
The Convertible LoanThe Convertible Loan
The Convertible Loan
Barry Schuman
 
Israel Supreme Court Allows Legal Actions Against Facebook In Israel
Israel Supreme Court Allows Legal Actions Against Facebook In IsraelIsrael Supreme Court Allows Legal Actions Against Facebook In Israel
Israel Supreme Court Allows Legal Actions Against Facebook In Israel
Barry Schuman
 

More from Barry Schuman (12)

What Are Phantom Shares?
What Are Phantom Shares?What Are Phantom Shares?
What Are Phantom Shares?
 
Facebook's Business Model Challenged Following EU Regulator Ruling
Facebook's Business Model Challenged Following EU Regulator RulingFacebook's Business Model Challenged Following EU Regulator Ruling
Facebook's Business Model Challenged Following EU Regulator Ruling
 
Choice of Entity: Matters Startups Should Cogitate When Selecting An Entity S...
Choice of Entity: Matters Startups Should Cogitate When Selecting An Entity S...Choice of Entity: Matters Startups Should Cogitate When Selecting An Entity S...
Choice of Entity: Matters Startups Should Cogitate When Selecting An Entity S...
 
Israel Tax Authority Ruling Number 2018-18
Israel Tax Authority Ruling Number 2018-18Israel Tax Authority Ruling Number 2018-18
Israel Tax Authority Ruling Number 2018-18
 
Use of Service Provider Instead of Employee
Use of Service Provider Instead of EmployeeUse of Service Provider Instead of Employee
Use of Service Provider Instead of Employee
 
United Kingdom GDPR Action Taken Against Canadian Company
United Kingdom GDPR Action Taken Against Canadian CompanyUnited Kingdom GDPR Action Taken Against Canadian Company
United Kingdom GDPR Action Taken Against Canadian Company
 
Simple Agreement For Future Equity (SAFE)
Simple Agreement For Future Equity (SAFE)Simple Agreement For Future Equity (SAFE)
Simple Agreement For Future Equity (SAFE)
 
Update The Law for the Encouragement of Capital Investments
Update   The Law for the Encouragement of Capital InvestmentsUpdate   The Law for the Encouragement of Capital Investments
Update The Law for the Encouragement of Capital Investments
 
האינטרנט של הדברים - האתגר החדש של עולם המשפט
האינטרנט של הדברים - האתגר החדש של עולם המשפטהאינטרנט של הדברים - האתגר החדש של עולם המשפט
האינטרנט של הדברים - האתגר החדש של עולם המשפט
 
Elon Musk Settles SEC Fraud Charges
Elon Musk Settles SEC Fraud ChargesElon Musk Settles SEC Fraud Charges
Elon Musk Settles SEC Fraud Charges
 
The Convertible Loan
The Convertible LoanThe Convertible Loan
The Convertible Loan
 
Israel Supreme Court Allows Legal Actions Against Facebook In Israel
Israel Supreme Court Allows Legal Actions Against Facebook In IsraelIsrael Supreme Court Allows Legal Actions Against Facebook In Israel
Israel Supreme Court Allows Legal Actions Against Facebook In Israel
 

Recently uploaded

NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 

Recently uploaded (20)

NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 

Israel Privacy Protection Regulations - Duty To Report A Severe Security Event

  • 1. Schuman & Co. Law Offices ‫ושות‬ ‫שומן‬'‫ונוטריון‬ ‫דין‬ ‫עורכי‬ ‫משרד‬ http://www.schumanlaw.co.il/ 1 Israel Privacy Protection Regulations - Duty To Report A "Severe Security Event" To The Privacy Protection Authority One of the most significant recent developments in data protection in Israel has been the publication of the Privacy Protection Regulations (Data Security) in May 2017. These significant regulations came into effect in May 2018. The regulations were enacted after extensive consultation with the Israeli public, and in particular the stake holders that would be effected by the regulations. The regulations apply to both private and public sectors and establish organizational mechanisms aimed at making data security part of the management practices of all organizations processing personal data. It is anticipated that the regulations will considerably advance the level of data security in Israel. They are both flexible, tangible and precise to a degree that offers organizations regulatory certainty and practical tools that are unpretentious to implement. The regulations classify databases to four groups according to the level of risk created by the processing activity in those databases: high, medium, basic and databases controlled by individuals that grant access to no more than three authorized individuals. The duties of the controllers are determined in accordance with the level of risk. The level of risk is defined by the data sensitivity, the number of data subjects and number of authorized access holders. In certain circumstances, the Privacy Protection Authority may instruct a database to implement supplementary obligations in order to strengthen the security level of its activities. On the other hand, the Privacy Protection Authority may use its discretion to exempt a database from applying specific details of the obligations in the regulations. Until May 2018, Israeli law did not include a general duty to notify a party whose personal information was exposed during a cyber breach. Nonetheless, a limited duty to notify a cyber event was set out in the directives which apply to banks and financial institutions and require them to notify the regulator in case of a cyber breach. The new regulations include a duty to report a "Severe Security Event" to the Privacy Protection Authority. The Privacy Protection Authority has been given the authority to instruct database owners that have been attacked to notify the parties whose information was exposed.
  • 2. Schuman & Co. Law Offices ‫ושות‬ ‫שומן‬'‫ונוטריון‬ ‫דין‬ ‫עורכי‬ ‫משרד‬ http://www.schumanlaw.co.il/ 2 The term 'Severe Security Event' is defined in the Privacy Protection Regulations as follows: "In a database which is subject to a high level of security – a cyber event in which information included in the database was used or damaged; In a database which is subject to a medium level of security – a cyber event in which a significant part of the database was used or damaged." The level of security required from a database is determined in the Privacy Protection Regulations according to: • the number of people whose information is included therein (generally, a database with information regarding more than 100,000 people requires a high level of security); • the number of people who have authorized access to a database (generally, a database with more than 100 authorized parties requires a high level of security); and • the nature of the information held in the database. On October 21, 2018 the Israeli Securities Authority (ISA) published a written position, according to which, in cases of a significant cyberattack, public companies must examine the need to issue an immediate report to the investors notifying them of the attack. According to the position statement, an immediate report is required in the event: • a company could not operate for some time as a result of a cyberattack; • a cyberattack influences a company's activity (where a hacked database is protected under the privacy laws this must be referenced); • a company's computer system is damaged in such a way that it has a material effect on its activities; • a company must pay a significant amount as ransom due to a cyberattack; • a company discovers that its computer systems have been exposed to hostile parties; and • a vulnerability was discovered in products supplied/manufactured by the company. The Privacy Protection Regulations will likely lead to application of the regulations to any organization established in Israel that is controller or processor of a database, regardless of where the data subjects may be and whether they are Israelis. However, the regulations will likely also extend to foreign-based entities purposefully processing data about Israeli citizens, consumers or employees. To be sure, a hotel in Los Angeles, USA will not have to comply with Israeli law based on an indiscriminate Israeli customer taking a room with his family at the hotel. However, But a U.S.-based parent company of an Israeli subsidiary, which manages a global HR database including rich data about Israeli employees, or a Silicon Valley-based app developer collecting social networking information about thousands of Israeli users, will have to comply with the new regulations despite a lack of physical presence in Israel. This document provides a general summary and is for information purposes only. It is not intended to be comprehensive nor does it constitute legal advice. If you are interested in obtaining further information please contact our office at: Schuman & Co. Law Offices Beit Bynet, 8 Hamarpe Street, P.O.Box 45392 Har Hotzvim, Jerusalem 97774 Israel Tel: +972-2-581-3760, Fax: +972-2-581-5432 Shalev@schumanlaw.co.il http://www.schumanlaw.co.il/