Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Israel's Protection of Privacy Law

Operationalize PPL compliance with the most comprehensive PrivacyOps platform

Last Updated on September 29, 2023

Schedule Your
Personal Demo

Learn how you can leverage Securiti’s Data Command Center to address data security, privacy, governance, and compliance.

See a demo
Schedule your demo today

Enacted in 1981, Israel's Protection of Privacy Law (PPL) is one of the oldest data privacy regulations in the world. Since then, it has undergone several amendments and additions to ensure it remains applicable to modern data-related activities such as the automated processing of personal data.

The PPL provides comprehensive guidelines on the management and usage of databases to safeguard the privacy of Israelis' personal data. It also aims to ensure threats to Israelis' data privacy are minimal.

Under the PPL, Privacy Protection Authority (PPA) is the main supervisory unit established by the Minister of Justice with the approval of the Knesset's Constitution, Law, and Justice Committee. The individual who leads the PPA (Privacy Protection Authority) also holds the position of the Registrar of Databases.

Each year, no later than the 1st of April, the Registrar prepares a Protection of Privacy Report submitted by the Protection of Privacy Council to the Constitution, Law and Justice Committee of the Knesset, detailing the enforcement and supervisory activities in the preceding year with comments on how it plans to carry out its functions for the upcoming year.


The Solution

Securiti promises thorough compliance with Israel's Protection of Privacy Law and other relevant data privacy regulations thanks to its PI data discovery, DSR automation, documented accountability, and AI-process automation features.

Its data solutions and a plethora of similar modules, backed up by state-of-the-art artificial intelligence and machine-learning-based algorithms, make Securiti an ideal option for organizations that want to achieve effective and efficient compliance with the relevant regulatory requirements.

 

israel ppl compliance solution

Request a demo today to learn how Securiti can aid you and your organization's data compliance efforts in Israel.


Automate Processing of Rectification & Update Requests

PPL Sections: 13, 13A,14

Automate all data rectification and update requests and gain real-time updates on their progress via the central dashboard to ensure data accuracy.

data rectification process
data erasure request

Automate Erasure Requests

PPL Section: 17F(b)

Automate all data erasure requests and monitor real-time updates via the central dashboard.

Automate Erasure Requests

PPL Section: 17F(b)

Automate all data erasure requests and monitor real-time updates via the central dashboard.

Monitor & Track Consent

PPL Section: 1 , 2(6) , DTR Section: 2(1)

Ensure absolute compliance with the appropriate regulatory requirements via deep insights into all users' consent statuses via the central dashboard. This allows for any potential processing or transfer of data to occur only per the relevant consent requirements.

cookie tracking consent
data flow mapping

Map Data Flows

Data Transfers Regulations

Track data flows in and out of your organization's data infrastructure, trace this data, and catalog, transfer, and document business process flows internally and to service providers or third parties, including cross-border data transfers.

Automate DPIAs & Risk Assessments

Security Regulation 5

Automate the execution of a data protection impact assessment (DPIA) to ensure it is conducted at regular intervals, giving you ample time, data, and insights to take appropriate actions if necessary.

dpia risk assessment
data breach notification

Automate Data Breach Response Notifications

Security Regulations 11(a) + 11(c)

Automate data breach response notifications to all concerned stakeholders as soon as legally obliged by leveraging a knowledge database on security incident diagnosis and response.

Manage Vendor Risk

Security Regulation 15

Keep track of privacy and security readiness for all your service providers and processors from a centralized dashboard. Collaborate with vendors, automate data requests, and manage all vendor contracts and compliance documents from a consolidated platform.

israel vendor risk management
israel privacy policy management

Privacy Policy & Notice Management

Section: 11

Automate the generation of a privacy policy that adequately informs the users about your organization's data processing practices while fully complying with all applicable law provisions.

Automate Data Security Controls

Section 17 + Security Regulation 2 + 4 + 6

Automate the deployment of effective data security measures that provide an appropriate degree of protection to all vital data assets by encrypting and masking data and restricting access to such data to a select few personnel.

israel privacy law Data Security Controls
israel privacy law access control management

Ensure Access Controls & Identity Management

Security Regulations: 7, 8, 9, 10

Deploy appropriate mechanisms and controls that ensure access to sensitive and critical data assets is reserved strictly for personnel that need access to such data. Additionally, maintain an extensive record of personnel accessing specific data assets for documentation and accountability purposes.


Key Rights Under Israel's Protection of Privacy Law

Here are key data subject rights that Israelis are entitled to per the PPL:

Right to Access

All Israelis have the right to inspect and access, either themselves or via a representative authorized by them, any information that may have been collected and stored on them in a database. This authorization should be based on a written agreement between the person who has the databases and the actual owner of each database. If the organization has five registered databases, then it must annually give a list to the Registrar. This list confirms who can access each database based on agreements and includes the security supervisor's name.


Right to Inspect

Each individual has the right to review information about themselves stored in a database. The database owner must facilitate this review upon the person's request, allowing them or their authorized representative (in writing) to examine the information in Hebrew, Arabic, or English.


Right to Rectification

All Israelis have the right to request the rectification of their personal data within a database. In case the owner of the database is not based in Israel, then the data processor is supposed to comply with the users’ request if the owner agrees to the request for rectification or a court orders a correction to be made. If such a request cannot be granted, the owner or the processor must inform the user in the form and manner prescribed within the regulations.


Right to Deletion

Every person is entitled to demand, in writing, of the owner of the database used for direct mailing that the information relating to him be deleted from the database.

Facts Related to Israel's Protection of Privacy Law

Here are some important facts to know about Israel's Protection of Privacy Law:

1

As per the Data Transfer Regulations, data from Israeli databases cannot be transferred abroad unless the receiving country's laws offer a protection level similar to Israeli Law;

2

While transferring the data outside of Israel, specific principles apply, such as fair and lawful usage, purpose limitation, accuracy, and data security;

3

According to PPL, a person or entity found guilty of infringing on citizens' privacy may be ordered to pay the injured person statutory damages not exceeding 50,000 shekels per offense;

4

In case a court finds a person or entity deliberately infringed on a citizen's privacy with the intent to cause harm, they may be ordered to the injured person 100,000 shekels;

5

A person found guilty of committing the specified offenses could face up to one year of imprisonment. These offenses include:

  • managing, possessing, or using a database in contravention of regulatory provisions,
  • intentionally providing false information during database registration, failing to provide accurate information upon request, and not complying with information inspection requests;
  • granting illegal database access or failing to provide required documents to the Registrar;
  • neglecting to appoint a mandated security supervisor, using a database for unauthorized direct-mailing services, and delivering information in violation of regulatory guidelines.
IDC MarketScape

Securiti named a Leader in the IDC MarketScape for Data Privacy Compliance Software

Read the Report

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View

Latest

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

View More

Accelerating Safe Enterprise AI: Securiti’s Gencore AI with Databricks and Anthropic Claude

Securiti AI collaborates with the largest firms in the world who are racing to adopt and deploy safe generative AI systems, leveraging their own...

View More

What are Data Security Controls & Its Types

Learn what are data security controls, the types of data security controls, best practices for implementing them, and how Securiti can help.

View More

What is cloud Security? – Definition

Discover the ins and outs of cloud security, what it is, how it works, risks and challenges, benefits, tips to secure the cloud, and...

View More

2025 Privacy Law Updates: Key Developments You Need to Know

Download the whitepaper to discover privacy law updates in 2025 and the key developments you need to know. Learn how Securiti helps ensure swift...

View More

Verifiable Parental Consent Requirements Under Global Privacy Laws

Download the whitepaper to learn about verifiable parental consent requirements under global privacy laws and simplify your compliance journey.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

India’s Telecom Security & Privacy Regulations View More

India’s Telecom Security & Privacy Regulations: A High-Level Overview

Download the infographic to gain a high-level overview of India’s telecom security and privacy regulations. Learn how Securiti helps ensure swift compliance.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New