Israeli laws applicable to cybersecurity include the Israeli Computers Law, the Protection of Privacy Law, the Copyright Law, the Penal Law, the Defense Export Control Law, the Regulation of Security in Public Bodies Law, and the (proposed, but not yet enacted) Cyber Defense Bill. Further details are provided below.
The primary Israeli law governing data protection is the Protection of Privacy Law, 5741-1981 (the PPL), enacted in 1981. The PPL applies to any entity that manages or possesses a database, including both private and public entities. A "database" is defined in the Law as a collection of information maintained in electronic form, excluding:
“Information” is defined as data on the personality, personal status, intimate affairs, health condition, economic status, vocational qualifications, opinions or beliefs of a person.
The PPL requires that certain databases be formally registered with the Registrar of Databases, as further detailed in 3.3 Legal Requirements.
The Protection of Privacy Regulations (Data Security) 5777-2017 ("Data Security Regulations") are an omnibus set of rules promulgated by the Israeli Parliament (Knesset) in March 2017, and effective as of May 2018. These regulations require Israeli organisations, companies and public agencies that own, manage or maintain a database containing personal data to implement prescriptive security measures, whose main objective is the prevention of cybersecurity incidents as further described in 3.3 Legal Requirements.
In case of a violation of the provisions of the PPL or any of the regulations promulgated thereunder, the PPA may take the measures detailed in 1.3 Administration and Enforcement Process.
The Israeli Computers Law, 5755-1995 is a statute that combines penal and tort provision. It specifies certain computer-related misconduct that comprises criminal offences punishable by imprisonment and in some cases also gives rise to actionable tort claims.
The criminalised acts comprise, among others:
The Regulation of Security in Public Bodies Law, 5758-1998, authorises the Israeli Security Agency and the National Cyber Directorate (NCD) to issue binding directives to organisations operating critical infrastructures on matters related to information security and cybersecurity, and inspect such organisations' compliance with those directives. Organisations subject to this regime include telecommunications and internet providers, transportation carriers, the Tel Aviv Stock Exchange, the Israeli Internet Association ("Israeli ccTLD Registry"), utility companies and others.
The Israeli Defense Export Control Law, 5766-2007 and its regulations, govern the state's control of the export of defence equipment, the transfer of defence know-how and the offering of defence-related services, for reasons of national security, foreign relations, international obligations and other vital interests of the state of Israel.
In 2018, the Israeli government published a proposal for a Cyber Defense and National Cyber Directorate Bill. That bill had proposed to grant far-reaching and unprecedented powers to the NCD, such as compelling organisations to produce any information or document required to handle cyber-attacks and authority to issue instructions to organisations, including instructions to carry out acts on the organisation’s computerised material, for the purpose of handling cyber-attacks. That bill did not materialise into law, but the government reintroduced a revised version of the bill in March 2021. The revised version, now named the Powers for Strengthening Cyber Defense (Provisional Measure) Bill, (the "Cyber Defense Bill") would require that the NCD obtain a court order authorising it to instruct organisations to carry out acts on the organisations' computer systems. The court order would be obtainable only after the NCD has liaised with the organisation, explained the need and the rationale for the acts sought and gave the organisation a reasonable opportunity to address the cyber-attack in question by itself. Stakeholders opposing the new Cyber Defense Bill indicate that among other issues, the Cyber Defense Bill's arrangements do not properly inter-operate with the existing regulatory landscape in Israel.
Data breach notification and incident response requirements are codified in a number of laws and vary depending on the organisation that suffered from the incident (bank, company, etc) as further described in 3.3 Legal Requirements.
The Privacy Protection Authority (PPA), within the Israeli Ministry of Justice, is the Israeli privacy regulator. The PPA is responsible for enforcing the PPL and has investigative powers in relation to violations of the PPL and the Data Security Regulations, including on issues relating to the cybersecurity of databases containing personal data. The PPA engages both in proactive investigation of data breaches and in responsive investigation amid complaints. Since the data breach notification obligation took effect in May 2018, most data security incidents are detected and reported by information security researchers and "white hat hackers". According to the 2019–20 biennial report, the PPA received a total of 220 reports of data security incidents in 2019 and 2020, 105 of which were investigated by the PPA.
The Banking Supervision Department within the Bank of Israel is responsible, among other issues, for enforcing the data breach rules relating to cybersecurity incidents at banks and credit card companies. The Supervision Department conducts audits at banks, and initiates investigations upon information provided to it by banking institutions, or on its own accord.
The Capital Markets, Insurance and Savings Authority operates within the Israeli Ministry of Finance. It is responsible for enforcing the data breach rules relating to cybersecurity incidents at insurance companies, financial institutions and financial data service providers. Following the security incident of the insurance company Shirbit (as further explained in 8.2 Significant Audits, Investigations or Penalties), which was reported to the Capital Markets Authority, the deputy commissioner of the Capital Markets Authority said that, in light of the rapidly evolving cyberthreats, supervision of financial entities will be increased. The deputy commissioner reported that over 20 penetration tests had recently been carried out on 20 different entities to check compliance with the Capital Market Authority’s guidelines. The Capital Markets Authority also conducts audits at covered entities, and initiates investigations upon information provided to it by covered entities, or on its own accord.
The NCD’s activities are specified in 2.3 Over-Arching Cybersecurity Agency.
Should a violation of the PPL occur or be suspected, the PPA will consider the circumstances, the severity and the nature of the violation. It will: (i) initiate administrative enforcement proceedings; or (ii) in egregious cases, initiate a criminal investigation, in co-operation with the cyber prosecution unit at the State Attorney’s Office.
As part of the administrative enforcement proceedings, the PPA may: demand the correction of the deficiencies; prohibit the use of data by suspending or revoking the registration of the database; and impose administrative fines. Administrative fines are imposed in accordance with the Administrative Offenses Law, 1985. Fines range from ILS2,000 to ILS25,000, depending on the nature of violation and the nature of the database owner (an individual or a legal entity). Continuous violations can carry an additional fine of 10% of the originally imposed fine, for each day in which the violation continues past the "cease and desist" date determined by the PPA.
The Banking Supervision Department and the Capital Markets Authority operate at the administrative level. They investigate incidents and may issue directives and administrative fines.
The Financial Data Services Law, 5782-2021, effective from April 2022, grants new enforcement and investigative powers in relation to the provision of financial data services (ie, the collection, transfer, and online use of financial data). The law specifies privacy protection and cybersecurity obligations regarding consumers’ financial information. It grants expansive enforcement and investigative powers to the Securities Authority over financial bodies that violate the law, such as retention of financial information for longer than permitted by the law, or use of information for purposes other than those for which it was collected.
The matter is not applicable in this jurisdiction.
In 2018 and 2021, the Israeli Government published proposals for a Cyber Defense Bill, as explained further in 1.1 Laws.
In December 2020, the Banking Supervision Department at the Bank of Israel amended the requirements regarding data breach notifications and added the New Reporting Directive No 880, Reporting Technological Failure Incidents and Cyber Incidents. The Directive outlines the scope of information that must be provided to the Supervision Department at each phase, as further detailed in 2.5 Financial or Other Sectoral Regulators.
The Financial Data Services Law includes a notification obligation to the Securities Authority (in addition to the PPA) regarding any severe security incident (as defined under 5.1 Definition of Data Security Incident, Breach or Cybersecurity Event) at a financial data service provider.
Insurance companies and financial institutions are required to report any cybersecurity incidents and data breaches to the Capital Markets Authority.
An organisation experiencing a data breach may turn to the NCD or the Police’s National Cyber Unit for assistance in handling and investigating the incident and its origin; however, this is not a requirement by law.
Enforcement
The enforcement by the regulators in Israel is relatively less aggressive than the enforcement of regulators in the EU and the USA.
According to the 2019–20 biennial report published in 2021, the PPA brought a total of 195 enforcement actions in 2019 and 2020, 105 of them following severe data breaches. A list of enforcement actions is available on the Privacy Protection Authority's website and a summary is included in its biennial report.
In addition, there are currently no penalties imposable by the PPA for failing to comply with the data breach notification requirement in the Data Security Regulations. A proposed amendment to the law is aimed to empower the PPA with authority to impose penalties.
The Israeli Model
At a high level, the Israeli privacy regime is slightly more similar to the EU omnibus model. Substantively, the Israeli framework comprises of rules governing traditional notions of privacy, alongside an outdated set of rules governing data protection (with the exception of the rules for data security measures, which are recent and modern).
Recently, the PPA has been pushing to overhaul Israel’s privacy regime to modernise it to more closely resemble the EU’s General Data Protection Regulation (GDPR). In late January 2022, the Knesset’s plenum approved in first reading a new bill to amend the PPL. Among other issues, the bill aims to amend some of the PPL’s definitions to bring them closer to the GDPR. For example, the bill proposes to change the term “database owner” to “database controller” and “sensitive information” to “especially sensitive information”, whose definition is akin to the GDPR’s “special categories of data”.
The proposed amendment to the PPL, which passed first reading in late January 2022, aims to grant the PPA much-needed rigorous supervisory and enforcement powers, including a much broader authority to impose penalties.
As mentioned in 1.6 System Characteristics, this is the most recent attempt to overhaul the PPA, which resumed in late 2021 and is ongoing in 2022. The new bill encompasses five main amendments, as described in 1.8 Significant Pending Changes, Hot Topics and Issues. The Shirbit data breach incident, disclosed in late 2020, attracted significant public attention and regulatory scrutiny, as further detailed in 8.2 Significant Audits, Investigations or Penalties.
There have been a few reports of significant "black hat hackers" (or state-sponsored) data breach incidents against public agencies and commercial companies in Israel. In 2020, Iran launched a cyber-attack against Israel’s water supply infrastructure, attempting to increase the levels of chlorine in six water facilities that supply fresh drinking water to Israeli homes. The attack was reportedly unsuccessful in causing any operational impact.
In October 2021, a series of Israeli targets were attacked, most likely orchestrated by Iranian hacker groups. The attacks crippled systems of one major hospital and blocked the access to multiple sites hosted on the servers of one Israeli hosting company. The hackers also leaked some of the personal information obtained from the attacks, including the information of users of one dating website and of patients of a major chain of medical institutes. In November 2021, Israeli internet providers were issued an order requiring them to block the access to any website containing the leaked information. As of February 2022, the investigation of the attacks is still ongoing.
A significant development impacting the financial sector is the enactment of the Financial Data Services Law in November 2021. As mentioned in 1.3 Administration and Enforcement Process, the law regulates the field of financial data services. It requires financial bodies interested in providing financial data services to obtain a designated licence from the Israeli Securities Authority. Subject to the consumer’s consent, licensed financial bodies can receive and transmit consumers’ financial data to and from other financial bodies, via a designated online system.
Because the relationship between the financial bodies and their data sources involves the transfer of voluminous personal information, the law specifies detailed provisions regarding the manner of collection, use, storage and transfer of financial information, as well as provisions regarding cybersecurity and security incident handling. The law adopts the PPL’s principles such as consent, choice, purpose limitation and data minimisation, and in some cases even extends their scope. For example, the Financial Data Services Law gives data subjects a broader right to correct data. According to the law, the financial body must investigate any reported “flaw" in the consumer’s financial data – a broad term which also includes a cybersecurity malfunction leading to unauthorised access to or unauthorised disclosure of the data, regardless of who submitted the report. In comparison, the PPL’s right to correct data is only exercisable by the data subjects themselves, and only where the data was found to be incorrect, incomplete, unclear or outdated. The law’s provisions will take effect in phases, starting April 2022.
For more details regarding enforcement and publicly disclosed developments, please see 8.1 Regulatory Enforcement or Litigation.
One of the hot topics to be tackled this year is the bill to amend the PPL. It was approved in parliamentary first reading at the end of January 2022 and proceeded to deliberations in the Constitution, Law and Justice Committee of the Knesset. The bill includes the following five key amendments.
Amendments to PPL’s Definitions
The bill proposes to amend the definition of “personal information”, which currently only covers certain types of personal information. The proposal would extend it to “any information about an individual, who is directly or indirectly identified or identifiable by reasonable measures”. It also proposes to rewrite the definition of “sensitive information” as “especially sensitive information”, and expand its scope to include genetic information, biometric identifiers, and criminal records. Importantly, the term “holder” would change to resemble “processor” under GDPR, and be defined as anyone with “authorisation to use the information stored in the database to provide services” to the database owner.
Limitations to the Database Registration Obligation
The bill proposes to minimise the scope of the obsolete duty to register databases. The obligation would only apply to:
However, it is unclear whether such amendment would actually downscale the registration obligation because the bill would expand the definition of “personal information” indefinitely, thereby also expanding the definition of “database” and, in turn, the scope of databases subject to compulsory registration.
Lawful Management
The bill proposes to add a provision prohibiting the management or possession of a database whose information was created, received, accumulated, or collected in violation of the law or any other legal provisions. This would introduce a severe limitation on processing information. This is seemingly consistent with GDPR’s legal bases for processing, but does not conform with Israeli law which only recognises two legal bases: (i) a data subject’s consent or (ii) the provision of a privacy notice to the data subject.
Use Limitation
The current version of the PPL codifies the principle of purpose-limitation by banning the use of information about an individual’s private affairs for any purpose other than the purpose for which it was collected. The bill proposes to significantly expand this prohibition to not only apply to information, but to “knowledge about an individual’s private affairs” as well. It goes so far as to prohibit controllers and processors from allowing others to do so as well. In addition, the bill suggests to prohibit individuals from using or holding such information or knowledge without the permission of the database owner.
Enforcement Powers
The bill vastly extends the PPA’s enforcement powers, which the PPA has been claiming to lack for years. Among other things, the bill expands the PPA’s investigative and supervisory powers to include the power to investigate offences, seize materials, detain a person for investigative purposes, and more. In addition, it grants the PPA authority to impose fines in increasing amounts, relative to the number of data subjects whose information is stored in the database. The proposed baseline fines are ILS800,000, which can be multiplied up to four times.
The Data Security Regulations apply to all Israeli organisations, companies, and public agencies that own, manage, maintain or service a database containing personal data. The Data Security Regulations create four tiers of data security obligations, each subject to an escalating degree of information security requirements and security measures. The triggering criteria for each tier relates to the number of data subjects involved, the data's sensitivity (ie, special categories of data) and the number of people with access credentials.
The scope of the Security of Public Bodies Law extends only to the list of organisations expressly enumerated in the statutes' schedules. These are all organisations operating various types of critical infrastructure, including telecom and internet providers, transportation carriers, the Stock Exchange, the Israeli ccTLD Registry, utility companies and others.
The Cyber Defence Bill would have broad implications on operators of essential infrastructures, systems or services, including internet and communications services which are considered protectable vital interests. The Cyber Defense Bill would extend to organisations operating essential infrastructures, systems or services, and which are susceptible to activities designed to impair the use of a computer or computer material.
The PPA is responsible for enforcing the data security regulations, and the PPL generally, across all Israeli organisations, companies and public agencies.
The Banking Supervisor at the Bank of Israel is responsible for enforcing the data security and breach rules relating to incidents in banks and credit card companies.
The Supervisor of Capital Markets, Insurance and Savings within the Israeli Ministry of Finance is responsible for enforcing the data security and data breach rules relating to incidents at insurance companies.
The Securities Authority is responsible for enforcing the data security and data breach rules relating to incidents at financial bodies providing financial data services or acting as financial data sources under the Financial Data Services Law.
The NCD is responsible, among other things, to manage, control and carry out the overall, nationwide operational efforts to protect cyberspace as further described in 2.3 Over-Arching Cybersecurity Agency.
In 2015, the government established a National Cybersecurity Authority, and in 2018 merged it with the National Cyber Headquarters which was tasked with national-level capabilities in cyberspace. The agency resulting from that merger is the NCD. The executive decision on the establishment of the Cybersecurity Authority, which since then has been absorbed into the NCD, prescribes the primary roles as follows:
In 2018 and 2021, the government published proposals for cyber bills. More details are provided in 1.1 Laws.
The PPA is the Israeli privacy regulator. The PPA is responsible for enforcing the PPL, and has investigative powers in relation to violations of the PPL and the Data Security Regulations, as further described in 1.2 Regulators.
The Supervision Department at the Bank of Israel is responsible, among other issues, for enforcing cybersecurity and the data breach rules relating to cybersecurity incidents at banks and credit card companies. The Supervision Department has issued various regulatory requirements and guidelines for banks and other financial institutions regarding privacy and cybersecurity, such as the ones detailed in 3.3 Legal Requirements.
The Capital Markets, Insurance and Savings Authority operates within the Israeli Ministry of Finance, and is responsible for enforcing the data security and data breach rules relating to cybersecurity incidents at insurance companies and financial institutions.
The Securities Authority is responsible for enforcing the data security and data breach rules relating to incidents at financial bodies providing financial data services or acting as financial data sources under the Financial Data Services Law.
All relevant regulators and agencies have already been covered.
The PPA has issued guidance discussing the relation between the Data Security Regulations and ISO 27001. According to this guidance, organisations certified to ISO 27001 will have to additionally comply with a small subset of the full Data Security Regulations, so long as they also demonstrate that they actually follow the controls and requirements of ISO 27001.
In 2015, The Israeli Ministry of Health (MoH) issued a data security circular alerting all medical institutions (clinics, the Health Maintenance Organisation and hospitals) to the importance of cybersecurity and requiring them to certify to ISO 27799 on data security in healthcare-related information systems. Certification to this standard is a prerequisite to obtaining or renewing the medical institution’s permit. According to this circular, medical institutions may only use service providers who themselves are certified to either ISO 27001 or ISO 27799.
Specific references to “reasonable security” were repealed with the entry into force of the prescriptive Data Security Regulations in 2018. The preceding regulations required database owners to establish reasonable security measures.
Security Measures
The Data Security Regulations create four tiers of databases, each subject to an escalating degree of information security requirements and security measures:
The Data Security Regulations require anyone who owns, manages or maintains a database containing personal data to implement the following information security measures:
The Data Security Regulations also require organisations to monitor and document any event that raises suspicion of compromised data integrity or unauthorised use of data. In addition, any organisation that is subject to the Data Security Regulations is required to oversee and supervise its vendors' data security compliance on an annual basis.
The Data Security Regulations introduce additional requirements applicable to databases subject to the intermediate level of security:
The Data Security Regulations introduce even further requirements applicable to databases subject to the highest level of security:
In addition, under the Data Security Regulations, owners of databases designated within an "intermediate" or "high" tier of security are required to notify data breaches to the PPA. The notification obligation for database at the intermediate level of security applies when the breach extends to any material portion of the database, while the notification obligation for database at the high level of security applies to any breach, regardless of its scope or materiality.
The notification must state the measures taken to mitigate the incident. In effect, the notification obligation depends on the database's security level, which in turn depends on the nature of the information stored in the database.
In certain circumstances, the PPA may order the organisation, after consultation with the Head of the National Cybersecurity Authority (now replaced by the NCD), to report the incident to all affected data subjects. Generally, if the breached data is not capable of identifying an individual, then the incident does not need to be reported, since it does not pertain to regulated "personal data".
Banks are required to report any cybersecurity incidents and data breaches pursuant to regulatory guidelines by the Supervision Department. In December 2020, the Supervision Department amended the requirements regarding data breach notification and added the New Reporting Directive No 880, Reporting Technological Failure Incidents and Cyber Incidents. Now, banks and credit card companies are required to report to the Supervision Department by phone within two hours following the discovery of the incident. Thereafter, an initial report will be given in writing within eight hours. Later on, reports will be submitted daily or if a critical development unfolded.
Insurance companies are required to report any cybersecurity incidents and data breaches pursuant to regulatory guidelines by the Capital Markets Authority.
The Israeli Securities Authority also published a position paper emphasising a publicly traded company’s duties of disclosure, both of general cybersecurity risks that a company faces as well as of specific incidents having material adverse effects on the company.
Registration with Regulatory Authority
The PPL requires that certain databases be registered with the Registrar of Databases, which operates within the PPA. The Law's provisions governing database registration apply to owners of databases that meet any of the following criteria:
Appointment of an Information Security Officer
Under the PPL, certain organisations are required to appoint an information security officer. These organisations include public entities, service providers who process five or more databases of personal data by commission for other organisations (ie, as processors) and organisations that are engaged in banking, insurance and creditworthiness evaluation.
The Security of Public Bodies Law requires certain public organisation listed under Schedules 4 and 5 of the statute to appoint a person responsible for securing essential computer systems in those organisations.
To ensure the data security officer’s independence, the Data Security Regulations require that the officer must be directly subordinate to the database manager, or to the manager of the entity that owns or holds the database. The Data Security Regulations prohibit the officer from being in a position that raises a conflict of interests. Substantively, the Data Security Regulations require the officer to establish data security protocols and an ongoing plan to review compliance with the Data Security Regulations. The officer must present findings of its review to the database manager and to the officer’s supervisor.
In January 2022, the Israeli PPA published a paper on the advisable appointment of data privacy officers in Israeli organisations, regardless of whether they are required to do so by law. The PPA explained that it views the voluntary appointment as a recommended best practice for organisations whose operations involve processing personal data. The paper states that an appointed data privacy officer is required to have in-depth knowledge of data protection laws and a sufficient understanding in the field of information technologies and information security. The paper recommends that the data privacy officer be involved in the organisation’s data protection-related matters from the outset, that it serve as the key liaison with the PPA on all matters involving the regulator, and that the data privacy officer need not be a member of the organisation’s senior management so long as they report to senior management.
The Data Security Regulations requires risk assessments and penetration tests at least once every 18 months for databases subject to the high level of security to conduct. The results of such assessments should be discussed and any required amendments or changes should be implemented.
Database owners are required to examine the security risks associated with engagements with service providers who are given access to the database, prior to such engagement. Under the Data Security Regulations, an agreement with the service provider should address the following matters:
The database owner must also perform periodic audits to ensure the service provider’s compliance with the above-mentioned obligations.
According to Directives 359A on the Proper Conduct of Banking Business (10/18), when banking corporations and other financial institutions wish to outsource their activities, they must:
There are no general regulations regarding use of cloud computing or cloud services.
In September 2021, the Supervisor of Banks issued a directive outlining the guidelines for maintaining data security when using cloud computing. According to the directive, banking corporations should:
A February 2022 preliminary opinion by the Ethics Committee of the Israeli Bar bans lawyers and law firms from using the services of free third-party tools for the management, storage and transfer of clients’ information (eg, Gmail, Dropbox, etc). The Israeli Bar considers those tools to be insufficiently secure. The preliminary opinion clarified that lawyers who use such tools will be deemed in breach of the confidentiality obligation they are subject to by virtue of the Bar Association Rules (Professional Ethics), 5746-1986.
The matter is not relevant in this jurisdiction.
The Data Security Regulations require any Israeli organisation that owns, manages or maintains a database containing personal data to implement prescriptive security measures, whose main objective is the prevention of incidents. See 3.3 Legal Requirements for more information.
In addition, financial institutions and insurance companies are required to establish a security operation centre tasked with monitoring, detecting and mitigating cybersecurity risks.
The matter is not applicable in this jurisdiction.
The Regulation of Security in Public Bodies Law authorises the Israeli Security Agency and the NCD to issue binding directives to organisations operating critical infrastructures or essential services on matters related to information security and cybersecurity, and inspect such organisations’ compliance with those directives. Organisations subject to this regime include telecom and internet providers, transportation carriers, the Tel Aviv Stock Exchange, the Israeli Internet Association, utility companies and others.
These directives were not publicly disclosed.
There are no specific references to denial-of-service attacks in Israeli primary or secondary legislation. The Data Security Regulations prescribe the data security measures that organisations must implement, as explained in 3.3 Legal Requirements.
There are no specific references to IoT, supply chain or other systems in Israeli primary or secondary legislation. The Data Security Regulations prescribe the data security measures that organisations must implement, as explained in 3.3 Legal Requirements.
Under the Data Security Regulations, a potentially reportable data security incident is a “severe security incident”, defined as any of the following:
The PPA has also published a list of examples in which the obligation to notify the PPA arises:
The data breach notification requirements apply to databases containing “information” as defined in the PPL: data on the personality, personal status, intimate affairs, health condition, economic status, vocational qualifications, opinions and beliefs of a person.
Under the Data Security Regulations, owners of databases designated within an "intermediate" or "high" tier of security are required to notify data breaches to the PPA. See 3.3 Legal Requirements for information regarding the tiers.
The MoH has established a policy for cybersecurity in medical devices. The guidelines are directed both to manufacturers and importers seeking to market medical devices in Israel, and to healthcare providers using medical devices in the treatment of patients. The guidelines describe a myriad of essential and non-essential cybersecurity controls. Essential controls include access restriction, disaster recovery and resilience, encryption of wireless transmission. The guidelines also prescribe the cyber-risk-management measures that healthcare providers must implement when purchasing, installing and using medical devices.
There are no specific references to industrial control systems in Israeli primary or secondary legislation. The Security of Public Bodies Law applies to operators of critical infrastructures, but the security obligations that apply pursuant to that law are not publicly disclosed.
There are no specific references to IoT in Israeli primary or secondary legislation.
Under the Data Security Regulations, the notification obligation for a database at the intermediate level of security applies when the breach extends to any material portion of the database, while the notification obligation for a database at the high level of security applies to any breach, regardless of its scope or materiality. Where such a breach occurs in the systems of an entity that is either a financial data service provider or a financial data source under the Financial Data Services Law, the Securities Authority should be notified as well.
In certain circumstances, the PPA may order the organisation, after consultation with the Head of the National Cybersecurity Authority (now replaced by the NCD), to report the incident to all affected data subjects. Generally, if the breached data is not capable of identifying an individual, then the incident does not need to be reported, since it does not pertain to regulated "personal data".
A preliminary opinion, published by the Ethics Committee of the Israeli Bar in February 2022, established an exceptional reporting obligation for law firms experiencing a data breach involving their clients’ confidential information. Although the Data Security Regulations’ state that the PPA will determine whether an affected organisation should notify data subjects, the Ethics Committee requires lawyers to notify their clients of any data breaches that might affect their information.
Medical institutions are required to report to the MoH about any malfunction or an unplanned interruption in the operation of a service that is essential to the proper functioning of the medical institution (including computer services). Banks are broadly required to report any cybersecurity incidents and data breaches to the Banking Supervision Department if they have a material impact on the bank’s operations.
Insurance companies are broadly required to report any material cybersecurity incidents and data breaches to the Capital Markets Authority Department if they have a material impact on the insurance company’s operations.
Public companies are required to submit an immediate report to the Stock Exchange through the stock exchange reporting system when the security incident constitutes a “company material event”. Company’s material event means any event or matter that deviates from the ordinary business of the corporation “and which has or may have a material effect on the company”.
The common threshold applies to notification is the “materiality” or “significance” test. For companies subject to the intermediate level of security under the Data Security Regulations, this test examines whether a material part of the database was compromised.
For publicly traded companies or companies subject to oversight by the Banking Supervision Department, this test examines whether the incident has a material impact on the company, its operations, business continuity, customers, etc. For entities subject to oversight by the Banking Supervision the Capital Markets Authority, this test examines whether the incident is “significant” for systems with sensitive information which were compromised or suspended for more than three hours, or if there is an indication that sensitive information of the covered entities customers or employees was compromised or leaked.
No information has been provided.
Israeli legislation restricts the use of some practices and tools for network monitoring and cybersecurity defensive measures. We provide some examples below.
Monitoring Emails, Web Access, and Internet Traffic
As a threshold matter, these measures could constitute unlawful invasion of privacy, unlawful wiretapping or unlawful intrusion into another person’s computer, if they are performed without the informed consent of the person being monitored.
For example, in the context of employee monitoring, Israeli case law in the 2011 Isakov case held that an employer monitoring employees’ email accounts assigned to them by the employer is permissible, if the employer also establishes a policy that these email accounts are to be used only for work-related purposes and not for personal correspondence, and provided that certain other conditions are met. These other conditions include the prior, affirmative, informed and written consent by the employee to a policy establishing such employer monitoring, and further provided that the measures used for monitoring are proportionate and aimed only at legitimate business purposes.
See 6.2 Intersection of Cybersecurity and Privacy or Data Protection for more information.
Beacons
Use of beacons could arguably amount to unlawful intrusion into computer material, but could be defensible under the affirmative defences of necessity or self-defence.
Honeypots
Use of honeypots for detection purposes is likely permissible so long as it does not involve unlawful intrusion into the cyberthreat actors’ computers or invasion of their privacy (although these may in turn be defensible under the affirmative defences of necessity or self-defence). Use of honeypots for counter-attacks would amount to unlawful intrusion into the cyberthreat actors’ computers and other correlative offences.
Sinkholes
Use of sinkholes for deflection purposes is likely permissible so long as it does not involve unlawful intrusion into another person’s computer, invasion of their privacy or interference with the ordinary functioning of their computer (although these may in turn be defensible under the affirmative defences of necessity or self-defence).
Cybersecurity measures that involve various forms of monitoring emails, web access, and internet traffic could arguably give rise to actionable invasion of privacy, wiretapping or unlawful intrusion into another person’s computer, if they are performed without the informed consent of the person being monitored.
Although not focused on cybersecurity, the 2011 Isakov case of the Israeli National Labor Court expounded Israeli privacy law as applied to employers monitoring and accessing employees’ email communications. As further explained in 6.1 Cybersecurity Defensive Measures, the judgment sets forth a stringent set of prerequisites and conditions for permissible access: such access must be for a legitimate purpose, proportional, and subject to the prior consent of the employees to a workplace privacy policy that transparently discloses the employer’s envisioned activities of monitoring employees.
The data breach notification requirements to regulators compel the sharing of certain cybersecurity information with regulators.
The Cyber Defense Bill proposes to grant powers to the NCD, such as the ability to obtain a court order compelling organisations to take specific actions in response to or in preparation for a cyber-attack.
There is also no specifically codified exemption from liability to Israeli organisations that voluntarily share cybersecurity information with the government, although generally available affirmative defences could be invocable to insulate from, or at least downscale, such liability.
The NCD operates the Operational Center for Cyber Incident Management 119, which can be reached voluntarily in any case where there is a concern about a cybersecurity incident (phishing, DDOS, scraping, etc).
The Israeli Capital Markets, Insurance and Savings Authority (the “Authority”) at the Israeli Ministry of Finance, together with the Israeli National Cyber Directorate, launched an investigation into the cyber-attack perpetrated against the Israeli insurance company Shirbit.
The company's website and servers were shut down and sensitive information about the company's employees and insureds was compromised and offered for sale online. The sensitive information includes national ID cards and insurance claims history with medical records.
Following the incidents, the PPA – for the first time – exercised its power under the Data Security Regulations to require Shirbit to inform its insureds of the breach, with recommendations on what they can do to safeguard themselves. In November 2021, the Authority fined Shirbit ILS10.7 million, following a long investigation in which it found that Shirbit did not properly manage its cyber-risks.
In another instance, an employee of an Israeli offensive cybersecurity company misappropriated the company’s offensive cybertools and attempted to sell them for tens of millions of dollars on the darknet. He was apprehended, indicted and convicted in a plea-bargain.
The PPA recently completed its investigation of the 2020 data breach in the Elector app, used by two political parties during in February 2020 ahead of the general election. The breach compromised the full electoral register, leading to the unauthorised disclosure of the personal data of more than six million Israeli voters.
The PPA’s investigation concluded that the company that develops and operates the app, and the two political parties that used the app, all violated the PPL and the Data Security Regulations in their failure to implement data security measures. Although it found all three in violation of the PPL, the PPA decided to only fine Elector, and not the two political parties.
In 2020, the PPA also launched another criminal investigation against two suspects regarding data protection violations at an undisclosed airline. A senior flight attendant allegedly gave access credentials to another suspect, who in turn used them to access the airline’s flight attendants’ database and review the sensitive personal information about the airline’s customers. This included information revealing the medical or health condition of customers. The case was forwarded to the Cyber Department in the State Attorney's Office for review and decision on prosecution.
Pursuant to the PPL, the PPA has broad authority to investigate any person and obtain any documents and information that relate to the operation and use of databases containing personal data. The PPA is also authorised to search for and seize evidence, including computerised material, located in any premises reasonably believed to be operating or using a database of personal data.
However, the PPA’s authority to impose fines is much more limited. It only extends to a subset of violations of the PPL and the maximum imposable fines are relatively low, up to ILS25,000. Notably, the PPA is not presently authorised to impose fines for failures to implement the required data security measures. As a result of its limited powers to impose fines, the PPA often resorts to merely publishing “findings of fault”, in order to publicly condemn violations.
These published “findings of fault” may motivate private actors to assert legal claims, including class actions lawsuits, against the wrongdoers.
Other than class action lawsuits, which are detailed in 8.5 Class Actions, there have been very few notable lawsuits based on privacy, data protection or data security grounds.
One rare example is a recent petition filed by an attorney advocating for privacy protections, requesting that the court enjoin political parties and the company that operates the Elector app from using the app in the upcoming general election in Israel, amid the data breach that occurred through their use of the app in 2020.
Class action lawsuits on privacy, data protection and data security are permitted, and have been ongoing in court in recent years. However, the Israeli Class Actions Law limits class action lawsuits based on privacy, data protection or data security grounds, to only those arising out of a consumer’s relationship with a business. A recent bill to amend the Class Actions Law was approved by the Ministerial Committee for Legislation and passed on to the Knesset for deliberation in early January 2022. The bill proposes to amend the law to allow class actions suits on grounds of violation of the PPL.
Virtually all class actions are disposed of by way of settlement, and class action lawsuits around privacy, data protection and data security are no different. However, the disposition of class action lawsuits is slow and lengthy, with some lawsuits pending for years. We provide two examples below.
In 2020 a motion for class action certification was filed, seeking damages amid an alleged data breach involving medical information of tens of thousands of patients of healthcare providers in Israel. The lawsuit was filed against Israel’s largest and third-largest health maintenance organisations as well as against two medical centres. It alleges that the breach was uncovered after a veterinarian who purchased used medical devices discovered that they still stored the medical history of patients. An expert opinion by a data security professional indicated that the information was not anonymised and was accessible to anyone operating these devices. The lawsuit alleges that as a result, medical records of approximately 78,882 people were exposed. The lawsuit seeks damages of ILS1.5 billion.
Another motion for class action certification was filed against the genealogy platform MyHeritage, seeking ILS100 million due to a data breach on the platform. A proposed settlement was filed for court approval in 2021. The proposal does not include payment of actual damages, but an offer to MyHeritage users to receive free access to a feature on the MyHeritage platform. The proposed settlement was formally opposed by a privacy advocacy association in Israel, and the court is expected to consider and decide on the proposed settlement in 2022.
Following Shirbit’s data breach incident, four lawsuits seeking class action certification were filed against Shirbit, which were joined to one class action in July 2021. The representative class is seeking hundreds of millions of Israeli shekels in damages.
When conducting diligence in corporate transactions, the issues most frequently investigated are the company’s efforts to comply with the Israeli Data Security Regulations, its use of external service providers to process data, the measures it uses for privacy notice and consent when collecting information from data subjects, the registration of its databases with the PPA and its cross-border data transfer activities.
In October 2018, the Israeli Securities Authority published a position paper titled "Cyber-Related Disclosures". The paper opined that companies must adequately disclose cyber-risks in their quarterly reports and prospectuses, as part of their general duty to disclose risks that the company faces. The paper also extends to similar reports required to be issued to the market as a matter of course, in case of cybersecurity events that have occurred, and which are not the part of the ordinary course of the business and present a potentially material impact on the company.
The document aims to increase the transparency required of public companies, but its impact on private companies is minor. Companies whose securities are not publicly traded can still largely refrain from public disclosures. The document also demands that cyber-issues will be addressed by the company’s board of directors.
All relevant issues have already been covered in the preceding sections.
Azrieli Sarona Tower – 53rd floor
121 Menachem Begin Rd.
Tel-Aviv, 6701203
Israel
+972 3 303 9000
+972 3 303 9001
Tel-Aviv@PearlCohen.com www.PearlCohen.com; www.law.co.il