Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Israel's Protection of Privacy Law

Operationalize PPL compliance with the most comprehensive PrivacyOps platform

Last Updated on September 29, 2023

Schedule Your
Personal Demo

Learn how you can leverage Securiti’s Data Command Center to address data security, privacy, governance, and compliance.

See a demo
Schedule your demo today

Enacted in 1981, Israel's Protection of Privacy Law (PPL) is one of the oldest data privacy regulations in the world. Since then, it has undergone several amendments and additions to ensure it remains applicable to modern data-related activities such as the automated processing of personal data.

The PPL provides comprehensive guidelines on the management and usage of databases to safeguard the privacy of Israelis' personal data. It also aims to ensure threats to Israelis' data privacy are minimal.

Under the PPL, Privacy Protection Authority (PPA) is the main supervisory unit established by the Minister of Justice with the approval of the Knesset's Constitution, Law, and Justice Committee. The individual who leads the PPA (Privacy Protection Authority) also holds the position of the Registrar of Databases.

Each year, no later than the 1st of April, the Registrar prepares a Protection of Privacy Report submitted by the Protection of Privacy Council to the Constitution, Law and Justice Committee of the Knesset, detailing the enforcement and supervisory activities in the preceding year with comments on how it plans to carry out its functions for the upcoming year.


The Solution

Securiti promises thorough compliance with Israel's Protection of Privacy Law and other relevant data privacy regulations thanks to its PI data discovery, DSR automation, documented accountability, and AI-process automation features.

Its data solutions and a plethora of similar modules, backed up by state-of-the-art artificial intelligence and machine-learning-based algorithms, make Securiti an ideal option for organizations that want to achieve effective and efficient compliance with the relevant regulatory requirements.

 

israel ppl compliance solution

Request a demo today to learn how Securiti can aid you and your organization's data compliance efforts in Israel.


Automate Processing of Rectification & Update Requests

PPL Sections: 13, 13A,14

Automate all data rectification and update requests and gain real-time updates on their progress via the central dashboard to ensure data accuracy.

data rectification process
data erasure request

Automate Erasure Requests

PPL Section: 17F(b)

Automate all data erasure requests and monitor real-time updates via the central dashboard.

Automate Erasure Requests

PPL Section: 17F(b)

Automate all data erasure requests and monitor real-time updates via the central dashboard.

Monitor & Track Consent

PPL Section: 1 , 2(6) , DTR Section: 2(1)

Ensure absolute compliance with the appropriate regulatory requirements via deep insights into all users' consent statuses via the central dashboard. This allows for any potential processing or transfer of data to occur only per the relevant consent requirements.

cookie tracking consent
data flow mapping

Map Data Flows

Data Transfers Regulations

Track data flows in and out of your organization's data infrastructure, trace this data, and catalog, transfer, and document business process flows internally and to service providers or third parties, including cross-border data transfers.

Automate DPIAs & Risk Assessments

Security Regulation 5

Automate the execution of a data protection impact assessment (DPIA) to ensure it is conducted at regular intervals, giving you ample time, data, and insights to take appropriate actions if necessary.

dpia risk assessment
data breach notification

Automate Data Breach Response Notifications

Security Regulations 11(a) + 11(c)

Automate data breach response notifications to all concerned stakeholders as soon as legally obliged by leveraging a knowledge database on security incident diagnosis and response.

Manage Vendor Risk

Security Regulation 15

Keep track of privacy and security readiness for all your service providers and processors from a centralized dashboard. Collaborate with vendors, automate data requests, and manage all vendor contracts and compliance documents from a consolidated platform.

israel vendor risk management
israel privacy policy management

Privacy Policy & Notice Management

Section: 11

Automate the generation of a privacy policy that adequately informs the users about your organization's data processing practices while fully complying with all applicable law provisions.

Automate Data Security Controls

Section 17 + Security Regulation 2 + 4 + 6

Automate the deployment of effective data security measures that provide an appropriate degree of protection to all vital data assets by encrypting and masking data and restricting access to such data to a select few personnel.

israel privacy law Data Security Controls
israel privacy law access control management

Ensure Access Controls & Identity Management

Security Regulations: 7, 8, 9, 10

Deploy appropriate mechanisms and controls that ensure access to sensitive and critical data assets is reserved strictly for personnel that need access to such data. Additionally, maintain an extensive record of personnel accessing specific data assets for documentation and accountability purposes.


Key Rights Under Israel's Protection of Privacy Law

Here are key data subject rights that Israelis are entitled to per the PPL:

Right to Access

All Israelis have the right to inspect and access, either themselves or via a representative authorized by them, any information that may have been collected and stored on them in a database. This authorization should be based on a written agreement between the person who has the databases and the actual owner of each database. If the organization has five registered databases, then it must annually give a list to the Registrar. This list confirms who can access each database based on agreements and includes the security supervisor's name.


Right to Inspect

Each individual has the right to review information about themselves stored in a database. The database owner must facilitate this review upon the person's request, allowing them or their authorized representative (in writing) to examine the information in Hebrew, Arabic, or English.


Right to Rectification

All Israelis have the right to request the rectification of their personal data within a database. In case the owner of the database is not based in Israel, then the data processor is supposed to comply with the users’ request if the owner agrees to the request for rectification or a court orders a correction to be made. If such a request cannot be granted, the owner or the processor must inform the user in the form and manner prescribed within the regulations.


Right to Deletion

Every person is entitled to demand, in writing, of the owner of the database used for direct mailing that the information relating to him be deleted from the database.

Facts Related to Israel's Protection of Privacy Law

Here are some important facts to know about Israel's Protection of Privacy Law:

1

As per the Data Transfer Regulations, data from Israeli databases cannot be transferred abroad unless the receiving country's laws offer a protection level similar to Israeli Law;

2

While transferring the data outside of Israel, specific principles apply, such as fair and lawful usage, purpose limitation, accuracy, and data security;

3

According to PPL, a person or entity found guilty of infringing on citizens' privacy may be ordered to pay the injured person statutory damages not exceeding 50,000 shekels per offense;

4

In case a court finds a person or entity deliberately infringed on a citizen's privacy with the intent to cause harm, they may be ordered to the injured person 100,000 shekels;

5

A person found guilty of committing the specified offenses could face up to one year of imprisonment. These offenses include:

  • managing, possessing, or using a database in contravention of regulatory provisions,
  • intentionally providing false information during database registration, failing to provide accurate information upon request, and not complying with information inspection requests;
  • granting illegal database access or failing to provide required documents to the Registrar;
  • neglecting to appoint a mandated security supervisor, using a database for unauthorized direct-mailing services, and delivering information in violation of regulatory guidelines.
IDC MarketScape

Securiti named a Leader in the IDC MarketScape for Data Privacy Compliance Software

Read the Report

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View

Latest

View More

Accelerating Safe Enterprise AI with Gencore Sync & Databricks

We are delighted to announce new capabilities in Gencore AI to support Databricks' Mosaic AI and Delta Tables! This support enables organizations to selectively...

View More

Building Safe, Enterprise-grade AI with Securiti’s Gencore AI and NVIDIA NIM

Businesses are rapidly adopting generative AI (GenAI) to boost efficiency, productivity, innovation, customer service, and growth. However, IT & AI executives—particularly in highly regulated...

Key Differences from DLP & CNAPP View More

Why DSPM is Critical: Key Differences from DLP & CNAPP

Learn about the critical differences between DSPM vs DLP vs CNAPP and why a unified, data-centric approach is an optimal solution for robust data...

DSPM Trends View More

DSPM in 2025: Key Trends Transforming Data Security

DSPM trends in 2025 provides a quick glance at the challenges, risks, and best practices that can help security leaders evolve their data security...

The Future of Privacy View More

The Future of Privacy: Top Emerging Privacy Trends in 2025

Download the whitepaper to gain insights into the top emerging privacy trends in 2025. Analyze trends and embed necessary measures to stay ahead.

View More

Personalization vs. Privacy: Data Privacy Challenges in Retail

Download the whitepaper to learn about the regulatory landscape and enforcement actions in the retail industry, data privacy challenges, practical recommendations, and how Securiti...

Nigeria's DPA View More

Navigating Nigeria’s DPA: A Step-by-Step Compliance Roadmap

Download the infographic to learn how Nigeria's Data Protection Act (DPA) mapping impacts your organization and compliance strategy.

Decoding Data Retention Requirements Across US State Privacy Laws View More

Decoding Data Retention Requirements Across US State Privacy Laws

Download the infographic to explore data retention requirements across US state privacy laws. Understand key retention requirements and noncompliance penalties.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New