{"id":14358,"date":"2021-04-04T15:47:33","date_gmt":"2021-04-04T12:47:33","guid":{"rendered":"https:\/\/www.genie.co.il\/?p=14358"},"modified":"2024-07-29T17:23:35","modified_gmt":"2024-07-29T14:23:35","slug":"privacy-protection-law","status":"publish","type":"post","link":"https:\/\/www.genie.co.il\/en\/privacy-protection-law\/","title":{"rendered":"The Privacy Protection Law - you should take it personally"},"content":{"rendered":"<p><strong>\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df \u2013 \u05de\u05e0\u05db&quot;\u05dc Genie\u00a0<\/strong><\/p>\n<p>\u05d1\u05e2\u05d9\u05db\u05d5\u05d1 \u05e7\u05dc\u05d9\u05dc \u05d5\u05d0\u05d5\u05e4\u05d9\u05d9\u05e0\u05d9 \u05e9\u05e0\u05de\u05e9\u05da \u05e9\u05e0\u05d9\u05dd, \u05d0\u05d5\u05e9\u05e8 \u05d1\u05e7\u05e8\u05d9\u05d0\u05d4 \u05e8\u05d0\u05e9\u05d5\u05e0\u05d4 \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d4\u05ea\u05d9\u05e7\u05d5\u05df \u05dc\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea. \u05d4\u05d7\u05d5\u05e7 \u05de\u05d2\u05d3\u05d9\u05e8 \u05d0\u05ea \u05e0\u05d5\u05e9\u05d0 \u05d4\u05d2\u05e0\u05ea \u05d4\u05de\u05d9\u05d3\u05e2, \u05de\u05d1\u05d8\u05dc \u05ea\u05e7\u05e0\u05d5\u05ea \u05de\u05d9\u05d5\u05e9\u05e0\u05d5\u05ea \u05d5\u05de\u05e7\u05e0\u05d4 \u05e1\u05de\u05db\u05d5\u05d9\u05d5\u05ea \u05de\u05e9\u05de\u05e2\u05d5\u05ea\u05d9\u05d5\u05ea \u05d9\u05d5\u05ea\u05e8 \u05dc\u05e8\u05d2\u05d5\u05dc\u05d8\u05d5\u05e8 \u05d1\u05d0\u05d5\u05e4\u05df \u05e9\u05de\u05ea\u05e7\u05e8\u05d1 \u05dc\u05d7\u05d5\u05e7 \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea \u05e9\u05dc \u05d4\u05d0\u05d9\u05d7\u05d5\u05d3 \u05d4\u05d0\u05d9\u05e8\u05d5\u05e4\u05d9 (GDPR), \u05d0\u05da \u05e2\u05d3\u05d9\u05d9\u05df \u05dc\u05d0 \u05de\u05e2\u05e0\u05d9\u05e7 \u05dc\u05d0\u05d6\u05e8\u05d7\u05d9\u05dd \u05e9\u05dc\u05d9\u05d8\u05d4 \u05de\u05dc\u05d0\u05d4 \u05d1\u05e9\u05d9\u05de\u05d5\u05e9 \u05e9\u05e0\u05e2\u05e9\u05d4 \u05d1\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc\u05d4\u05dd.<\/p>\n<p>\u05d1\u05de\u05d0\u05de\u05e8 \u05d6\u05d4 \u05d0\u05e2\u05e1\u05d5\u05e7 \u05d1\u05e2\u05e7\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4\u05d7\u05d5\u05e7, \u05d1\u05de\u05d8\u05e8\u05d5\u05ea\u05d9\u05d5 \u05d5\u05d1\u05d4\u05e9\u05e4\u05e2\u05d5\u05ea\u05d9\u05d5 \u05e2\u05dc \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d5\u05d4\u05e2\u05e1\u05e7\u05d9\u05dd \u05e9\u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd \u05d1\u05de\u05d0\u05d2\u05e8\u05d9 \u05de\u05d9\u05d3\u05e2. \u05d4\u05d9\u05e2\u05e8\u05db\u05d5\u05ea \u05e0\u05db\u05d5\u05e0\u05d4 \u05ea\u05d0\u05e4\u05e9\u05e8 \u05dc\u05db\u05dd \u05dc\u05db\u05d1\u05d3 \u05d0\u05ea \u05e4\u05e8\u05d8\u05d9\u05d5\u05ea \u05d4\u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05e9\u05dc\u05db\u05dd \u05d5\u05dc\u05d7\u05e1\u05d5\u05da \u05de\u05e2\u05e6\u05de\u05db\u05dd \u05e7\u05e0\u05e1\u05d5\u05ea \u05db\u05d1\u05d3\u05d9\u05dd, \u05d0\u05d9\u05e9\u05d5\u05dd \u05e4\u05dc\u05d9\u05dc\u05d9 \u05d5\u05e4\u05d2\u05d9\u05e2\u05d4 \u05d1\u05de\u05d5\u05e0\u05d9\u05d8\u05d9\u05df<\/p>\n<p>Your customers live, buy and hang out online and on social networks and you, as marketers who know how to leverage their consumer behavior, benefit from valuable big data, which allows you to get to know your customers and sell more to them. But all this goodness has a price: the possibility of violating their privacy.<\/p>\n<p><strong>Privacy protection - a law with teeth<br \/>\n<\/strong>&quot;A person shall not harm the privacy of another, without his consent.&quot; This is the language of the Basic Law on Human Dignity and Freedom from 1981 which states that violation of privacy is a criminal offense and a civil wrong. In 2017, the Knesset approved the privacy protection regulations, which detail the manner in which the information security obligation is applied to any entity that manages or processes a database of personal information.<\/p>\n<p>In fact, the privacy protection regulations are a revolution in information security regulation in Israel. They impose on you, business owners, companies and organizations that hold databases containing personal information, administrative, technological and legal obligations regarding the way you secure the information - and this according to the sensitivity of the information in your possession:<\/p>\n<p>\u00b7 Security level for the database with a single authority.<br \/>\n\u00b7 Basic security level for information, such as: full name, phone, address.<br \/>\n\u00b7 Medium security level - social security number, medical information, financial information, consumption habits, political opinions, beliefs and more.<br \/>\nHigh level of security - business and public databases that are designed to collect information for the purpose of providing it to others, or that contain sensitive information about 100,000 people or more, or that the number of authorized persons to access this information exceeds 100.<\/p>\n<p>For each level of security, the law defines regulations detailing the manner of application that will ensure the privacy of the record holders:<br \/>\nWriting an information security procedure, performing physical controls to protect the information, such as access control or security cameras, response procedures to information security incidents, mapping the computer systems connected to the databases, how information security is managed, and more.<\/p>\n<p><strong>Do not meet the requirements of the law? You will find that his bite hurts.<br \/>\n<\/strong>The enforcement of the Privacy Protection Law is already felt on the ground and the members of the Authority for the Protection of Privacy are no slouch... The authority has administrative enforcement capabilities in all sectors of the economy and the authority to investigate criminal investigations, up to the point of filing charges.<\/p>\n<p>Therefore, if you want to avoid heavy fines and a criminal record, get ready today to protect your customers&#039; privacy. Our privacy protection teams at Genie, which include highly experienced information security managers and legal advisors, will accompany you in the planning and implementation of privacy protection solutions, in a structured process that includes 5 steps - until you meet the requirements of the law:<\/p>\n<p><strong>1. Mapping the databases<br \/>\n<\/strong>Mapping all the computer systems and databases that are in the possession of the organization and contain sensitive information to which the Privacy Protection Law refers: databases of customers, leads, employees, suppliers and more (yes, even an innocent Excel file on the laptop of Tzipi from sales, may complicate you...).<\/p>\n<p><strong>2. Checking the level of information security<br \/>\n<\/strong>Identifying the level of information security required in the relevant databases.<\/p>\n<p><strong>3. Gap survey<br \/>\n<\/strong>Finding the gaps between what is present and what is desired in the organization&#039;s information security systems.<\/p>\n<p><strong>4. Application and implementation<br \/>\n<\/strong>Writing a procedure for the protection of information and implementing information security tools to comply with the requirements of the Privacy Protection Law.<\/p>\n<p><strong>5. Management folder<br \/>\n<\/strong>Preparation of a management folder to respond to information incidents and to present the information protection system in a surprise audit<br \/>\nof the Authority for the Protection of Privacy.<\/p>\n<p>Successfully!<br \/>\n<strong>Guy Hochman - CEO <\/strong><strong>Genie<\/strong><strong>\u00a0<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df \u2013 \u05de\u05e0\u05db&quot;\u05dc Genie\u00a0 \u05d1\u05e2\u05d9\u05db\u05d5\u05d1 \u05e7\u05dc\u05d9\u05dc \u05d5\u05d0\u05d5\u05e4\u05d9\u05d9\u05e0\u05d9 \u05e9\u05e0\u05de\u05e9\u05da \u05e9\u05e0\u05d9\u05dd, \u05d0\u05d5\u05e9\u05e8 \u05d1\u05e7\u05e8\u05d9\u05d0\u05d4 \u05e8\u05d0\u05e9\u05d5\u05e0\u05d4 \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05d4\u05ea\u05d9\u05e7\u05d5\u05df \u05dc\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea. \u05d4\u05d7\u05d5\u05e7 \u05de\u05d2\u05d3\u05d9\u05e8 \u05d0\u05ea \u05e0\u05d5\u05e9\u05d0 \u05d4\u05d2\u05e0\u05ea \u05d4\u05de\u05d9\u05d3\u05e2, \u05de\u05d1\u05d8\u05dc \u05ea\u05e7\u05e0\u05d5\u05ea \u05de\u05d9\u05d5\u05e9\u05e0\u05d5\u05ea \u05d5\u05de\u05e7\u05e0\u05d4 \u05e1\u05de\u05db\u05d5\u05d9\u05d5\u05ea \u05de\u05e9\u05de\u05e2\u05d5\u05ea\u05d9\u05d5\u05ea \u05d9\u05d5\u05ea\u05e8 \u05dc\u05e8\u05d2\u05d5\u05dc\u05d8\u05d5\u05e8 \u05d1\u05d0\u05d5\u05e4\u05df \u05e9\u05de\u05ea\u05e7\u05e8\u05d1 \u05dc\u05d7\u05d5\u05e7 \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea \u05e9\u05dc \u05d4\u05d0\u05d9\u05d7\u05d5\u05d3 \u05d4\u05d0\u05d9\u05e8\u05d5\u05e4\u05d9 (GDPR), \u05d0\u05da \u05e2\u05d3\u05d9\u05d9\u05df \u05dc\u05d0 \u05de\u05e2\u05e0\u05d9\u05e7 \u05dc\u05d0\u05d6\u05e8\u05d7\u05d9\u05dd \u05e9\u05dc\u05d9\u05d8\u05d4 \u05de\u05dc\u05d0\u05d4 \u05d1\u05e9\u05d9\u05de\u05d5\u05e9 \u05e9\u05e0\u05e2\u05e9\u05d4 \u05d1\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc\u05d4\u05dd. \u05d1\u05de\u05d0\u05de\u05e8 \u05d6\u05d4 \u05d0\u05e2\u05e1\u05d5\u05e7 \u05d1\u05e2\u05e7\u05e8\u05d5\u05e0\u05d5\u05ea [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":14360,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[111],"tags":[161,129,100,105],"class_list":["post-14358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-articles","tag-genie","tag-guy-hochman","tag-100","tag-105"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea - \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea<\/title>\n<meta name=\"description\" content=\"\u05d4\u05d1\u05d8\u05d9\u05d7\u05d5 \u05e2\u05db\u05e9\u05d9\u05d5 \u05d0\u05ea \u05e2\u05de\u05d9\u05d3\u05ea\u05db\u05dd \u05d1\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05d7\u05d5\u05e7 \u05d1\u05ea\u05d4\u05dc\u05d9\u05da \u05e9\u05dc 5 \u05e9\u05dc\u05d1\u05d9\u05dd\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genie.co.il\/en\/privacy-protection-law\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea - \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea\" \/>\n<meta property=\"og:description\" content=\"\u05d4\u05d1\u05d8\u05d9\u05d7\u05d5 \u05e2\u05db\u05e9\u05d9\u05d5 \u05d0\u05ea \u05e2\u05de\u05d9\u05d3\u05ea\u05db\u05dd \u05d1\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05d7\u05d5\u05e7 \u05d1\u05ea\u05d4\u05dc\u05d9\u05da \u05e9\u05dc 5 \u05e9\u05dc\u05d1\u05d9\u05dd\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genie.co.il\/en\/privacy-protection-law\/\" \/>\n<meta property=\"og:site_name\" content=\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/genie.support\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-04T12:47:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-29T14:23:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/04\/gdpr-3385166_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eyal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:site\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eyal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/\"},\"author\":{\"name\":\"Eyal\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/person\\\/1025ced5f0bbcccec1753c418a98c8be\"},\"headline\":\"\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea &#8211; \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea\",\"datePublished\":\"2021-04-04T12:47:33+00:00\",\"dateModified\":\"2024-07-29T14:23:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/\"},\"wordCount\":10,\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/gdpr-3385166_1280.jpg\",\"keywords\":[\"genie\",\"\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df\",\"\u05de\u05d7\u05e9\u05d5\u05d1 \u05e2\u05e0\u05df\",\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\"],\"articleSection\":[\"\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/\",\"name\":\"\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea - \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/gdpr-3385166_1280.jpg\",\"datePublished\":\"2021-04-04T12:47:33+00:00\",\"dateModified\":\"2024-07-29T14:23:35+00:00\",\"description\":\"\u05d4\u05d1\u05d8\u05d9\u05d7\u05d5 \u05e2\u05db\u05e9\u05d9\u05d5 \u05d0\u05ea \u05e2\u05de\u05d9\u05d3\u05ea\u05db\u05dd \u05d1\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05d7\u05d5\u05e7 \u05d1\u05ea\u05d4\u05dc\u05d9\u05da \u05e9\u05dc 5 \u05e9\u05dc\u05d1\u05d9\u05dd\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/gdpr-3385166_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/gdpr-3385166_1280.jpg\",\"width\":1280,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/privacy-protection-law\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/cyber-security-articles\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea &#8211; \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.genie.co.il\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"alternateName\":\"\u05d2'\u05d9\u05e0\u05d9\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"width\":190,\"height\":66,\"caption\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/genie.support\",\"https:\\\/\\\/x.com\\\/geniesupport\",\"https:\\\/\\\/www.instagram.com\\\/genie.computing.services\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/genie\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/computingservices\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/person\\\/1025ced5f0bbcccec1753c418a98c8be\",\"name\":\"Eyal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g\",\"caption\":\"Eyal\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea - \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea","description":"\u05d4\u05d1\u05d8\u05d9\u05d7\u05d5 \u05e2\u05db\u05e9\u05d9\u05d5 \u05d0\u05ea \u05e2\u05de\u05d9\u05d3\u05ea\u05db\u05dd \u05d1\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05d7\u05d5\u05e7 \u05d1\u05ea\u05d4\u05dc\u05d9\u05da \u05e9\u05dc 5 \u05e9\u05dc\u05d1\u05d9\u05dd","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genie.co.il\/en\/privacy-protection-law\/","og_locale":"en_US","og_type":"article","og_title":"\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea - \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea","og_description":"\u05d4\u05d1\u05d8\u05d9\u05d7\u05d5 \u05e2\u05db\u05e9\u05d9\u05d5 \u05d0\u05ea \u05e2\u05de\u05d9\u05d3\u05ea\u05db\u05dd \u05d1\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05d7\u05d5\u05e7 \u05d1\u05ea\u05d4\u05dc\u05d9\u05da \u05e9\u05dc 5 \u05e9\u05dc\u05d1\u05d9\u05dd","og_url":"https:\/\/www.genie.co.il\/en\/privacy-protection-law\/","og_site_name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","article_publisher":"https:\/\/www.facebook.com\/genie.support","article_published_time":"2021-04-04T12:47:33+00:00","article_modified_time":"2024-07-29T14:23:35+00:00","og_image":[{"width":1280,"height":768,"url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/04\/gdpr-3385166_1280.jpg","type":"image\/jpeg"}],"author":"Eyal","twitter_card":"summary_large_image","twitter_creator":"@geniesupport","twitter_site":"@geniesupport","twitter_misc":{"Written by":"Eyal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/#article","isPartOf":{"@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/"},"author":{"name":"Eyal","@id":"https:\/\/www.genie.co.il\/#\/schema\/person\/1025ced5f0bbcccec1753c418a98c8be"},"headline":"\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea &#8211; \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea","datePublished":"2021-04-04T12:47:33+00:00","dateModified":"2024-07-29T14:23:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/"},"wordCount":10,"publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"image":{"@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/04\/gdpr-3385166_1280.jpg","keywords":["genie","\u05d2\u05d9\u05d0 \u05d4\u05d5\u05db\u05de\u05df","\u05de\u05d7\u05e9\u05d5\u05d1 \u05e2\u05e0\u05df","\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1"],"articleSection":["\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/","url":"https:\/\/www.genie.co.il\/privacy-protection-law\/","name":"\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea - \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea","isPartOf":{"@id":"https:\/\/www.genie.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/#primaryimage"},"image":{"@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/04\/gdpr-3385166_1280.jpg","datePublished":"2021-04-04T12:47:33+00:00","dateModified":"2024-07-29T14:23:35+00:00","description":"\u05d4\u05d1\u05d8\u05d9\u05d7\u05d5 \u05e2\u05db\u05e9\u05d9\u05d5 \u05d0\u05ea \u05e2\u05de\u05d9\u05d3\u05ea\u05db\u05dd \u05d1\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d4\u05d7\u05d5\u05e7 \u05d1\u05ea\u05d4\u05dc\u05d9\u05da \u05e9\u05dc 5 \u05e9\u05dc\u05d1\u05d9\u05dd","breadcrumb":{"@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genie.co.il\/privacy-protection-law\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/#primaryimage","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/04\/gdpr-3385166_1280.jpg","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/04\/gdpr-3385166_1280.jpg","width":1280,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/www.genie.co.il\/privacy-protection-law\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","item":"https:\/\/www.genie.co.il\/"},{"@type":"ListItem","position":2,"name":"\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","item":"https:\/\/www.genie.co.il\/cyber-security-articles\/"},{"@type":"ListItem","position":3,"name":"\u05d7\u05d5\u05e7 \u05d4\u05d2\u05e0\u05ea \u05d4\u05e4\u05e8\u05d8\u05d9\u05d5\u05ea &#8211; \u05db\u05d3\u05d0\u05d9 \u05e9\u05ea\u05d9\u05e7\u05d7\u05d5 \u05d0\u05d5\u05ea\u05d5 \u05d0\u05d9\u05e9\u05d9\u05ea"}]},{"@type":"WebSite","@id":"https:\/\/www.genie.co.il\/#website","url":"https:\/\/www.genie.co.il\/","name":"genie computing services for businesses","description":"","publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genie.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.genie.co.il\/#organization","name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","alternateName":"\u05d2'\u05d9\u05e0\u05d9","url":"https:\/\/www.genie.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","width":190,"height":66,"caption":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1"},"image":{"@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/genie.support","https:\/\/x.com\/geniesupport","https:\/\/www.instagram.com\/genie.computing.services\/","https:\/\/www.linkedin.com\/company\/genie\/","https:\/\/www.youtube.com\/user\/computingservices"]},{"@type":"Person","@id":"https:\/\/www.genie.co.il\/#\/schema\/person\/1025ced5f0bbcccec1753c418a98c8be","name":"Eyal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g","caption":"Eyal"}}]}},"_links":{"self":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts\/14358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/comments?post=14358"}],"version-history":[{"count":4,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts\/14358\/revisions"}],"predecessor-version":[{"id":20569,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts\/14358\/revisions\/20569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media\/14360"}],"wp:attachment":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media?parent=14358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/categories?post=14358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/tags?post=14358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}