chore: track seed data in git for portable DB rebuilds

Seed JSON files (parsed legislation) are now committed so that
npm run build:db works on any machine without re-ingestion.
Raw source HTML and .db files remain gitignored.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
Mortalus
2026-02-19 20:46:04 +01:00
parent 1e28f8a6b1
commit 2c73695c7d
11 changed files with 1225 additions and 1 deletions

1
.gitignore vendored
View File

@@ -2,7 +2,6 @@ node_modules/
dist/
*.db
data/source/
data/seed/
!data/.gitkeep
.env
.env.*

View File

@@ -0,0 +1,92 @@
{
"id": "basic-law-human-dignity-1992",
"type": "statute",
"title": "חוק יסוד: כבוד האדם וחירותו",
"title_en": "Basic Law: Human Dignity and Liberty, 5752-1992",
"short_name": "BL-HDL",
"status": "in_force",
"issued_date": "1992-03-17",
"in_force_date": "1992-03-17",
"url": "https://m.knesset.gov.il/EN/activity/documents/BasicLawsPDF/BasicLawLiberty.pdf",
"provisions": [
{
"provision_ref": "sec1",
"section": "1",
"title": "Basic principles",
"content": "The basic human rights in Israel are based on the recognition of the value of the human being, the sanctity of his life, and his being a free person, and they shall be upheld in the spirit of the principles included in the Declaration of the Establishment of the State of Israel. Purpose"
},
{
"provision_ref": "sec1a",
"section": "1a",
"title": "Purpose",
"content": "The purpose of this Basic Law is to protect human dignity and liberty, in order to embed the values of the State of Israel as a Jewish and democratic state, in a basic law. Preservation of life, body and dignity"
},
{
"provision_ref": "sec2",
"section": "2",
"title": "Preservation of life, body and dignity",
"content": "One should not violate the life, body, or dignity of a human being as such. Protection of property"
},
{
"provision_ref": "sec3",
"section": "3",
"title": "Protection of property",
"content": "The property of a human being shall not be violated. Protection of life, body and dignity"
},
{
"provision_ref": "sec4",
"section": "4",
"title": "Protection of life, body and dignity",
"content": "Every human being is entitled to protection of his life, body and dignity. Personal liberty"
},
{
"provision_ref": "sec5",
"section": "5",
"title": "Personal liberty",
"content": "The liberty of a human being shall not be taken or restricted, by means of imprisonment, detention, extradition, or in any other manner. Departure from the State of Israel, and"
},
{
"provision_ref": "sec6",
"section": "6",
"title": "Departure from the State of Israel, and",
"content": "(a) Every person is free to exit Israel. entry to it Privacy and intimacy"
},
{
"provision_ref": "sec7",
"section": "7",
"title": "Privacy and intimacy",
"content": "(b) Every Israeli citizen who is abroad is entitled to enter Israel. (a) Every person has a right to privacy and to intimacy in his life. (b) There shall be no entry into the private premises of a person, without his permission. (c) No search shall be held on the private premises of a person, upon his body, in his body, or among his private effects. (d) The confidentiality of conversation of a person, his writings or his records shall not be violated. Violation of rights (Amendment No. 1)"
},
{
"provision_ref": "sec8",
"section": "8",
"title": "Violation of rights",
"content": "One is not to violate the rights accorded by this Basic Law save by means of a law that corresponds to the values of the State of Israel, which serves an appropriate purpose, and to an extent that does not exceed what is required, or on the basis of a law, as aforementioned, by force of an explicit authorization therein. Reservation regarding the security forces"
},
{
"provision_ref": "sec9",
"section": "9",
"title": "Reservation regarding the security forces",
"content": "The rights of persons serving in the Israel Defense Forces, the Israel Police, the Prisons Service, and other security organizations of the State, shall not be limited under this Basic Law, nor shall these rights be subject to conditions, save by virtue of a law, or by regulation enacted by virtue of a law, and to an extent that does not exceed what is required by the essence and nature of the service. Retention of laws"
},
{
"provision_ref": "sec10",
"section": "10",
"title": "Retention of laws",
"content": "This Basic Law shall not affect the validity of any law that existed prior to the inception of the Basic Law. Applicability"
},
{
"provision_ref": "sec11",
"section": "11",
"title": "Applicability",
"content": "Each and every government authority is obliged to respect the rights in accordance with this Basic Law. Stability of the law"
},
{
"provision_ref": "sec12",
"section": "12",
"title": "Stability of the law",
"content": "Emergency regulations do not have the power to change this Basic Law, to temporarily suspend it, or to lay down conditions to it. However, when a state of emergency exists in the State, by virtue of a declaration under article 9 of the Law and Administration Ordinance 5708-1948, emergency regulations may be enacted on the basis of the said article, that will involve denial or limitation of rights under this Basic Law, provided that the denial or limitation shall be for a worthy purpose, and for a period and an extent that do not exceed the required."
}
],
"definitions": []
}

View File

@@ -0,0 +1,67 @@
{
"id": "communications-law-1982",
"type": "statute",
"title": "חוק התקשורת (בזק ושידורים), תשמ\"ב-1982",
"title_en": "Communications Law (Telecommunications and Broadcasting), 5742-1982",
"short_name": "CommL",
"status": "in_force",
"issued_date": "1982-01-01",
"in_force_date": "1984-02-01",
"url": "https://www.nevo.co.il/law_html/law01/044_001.htm",
"description": "The Communications Law (Telecommunications and Broadcasting) 5742-1982 regulates telecommunications and broadcasting in Israel. It establishes licensing requirements, regulates network operators, and includes provisions relevant to privacy of communications and data security of telecommunications infrastructure.",
"provisions": [
{
"provision_ref": "sec1",
"section": "1",
"title": "Definitions",
"content": "Section 1. Definitions. In this Law: \"telecommunications\" - the transmission, emission, or reception of signs, signals, writing, images, sounds, or intelligence of any nature by wire, radio, optical, or other electromagnetic systems; \"telecommunications service\" - any service involving the provision of telecommunications; \"licensee\" - the holder of a license under this Law."
},
{
"provision_ref": "sec4",
"section": "4",
"title": "Licensing Requirement",
"content": "Section 4. Licensing Requirement. (a) No person shall provide a telecommunications service except under a license issued by the Minister of Communications. (b) The Minister may issue general licenses, special licenses, or individual licenses, and may prescribe conditions for each type of license."
},
{
"provision_ref": "sec13",
"section": "13",
"title": "Secrecy of Communications",
"content": "Section 13. Secrecy of Communications. (a) A licensee and any person employed by a licensee shall maintain the secrecy of communications transmitted through the licensee's network. (b) No person shall intercept, record, or disclose the contents of communications transmitted through a telecommunications network without the consent of the parties to the communication or authorization under law."
},
{
"provision_ref": "sec13A",
"section": "13A",
"title": "Data Protection Obligations",
"content": "Section 13A. Data Protection Obligations. (a) A licensee shall take appropriate measures to protect subscriber data and communications data from unauthorized access, use, or disclosure. (b) Subscriber data shall not be used for purposes other than the provision of telecommunications services, except with the subscriber's consent or as required by law."
},
{
"provision_ref": "sec30",
"section": "30",
"title": "Security Requirements",
"content": "Section 30. Security Requirements. (a) A licensee operating critical telecommunications infrastructure shall implement security measures as prescribed by the Minister of Communications. (b) The security measures shall address: (1) physical protection of infrastructure; (2) cybersecurity measures; (3) business continuity and disaster recovery; (4) incident reporting."
},
{
"provision_ref": "sec58",
"section": "58",
"title": "Electronic Direct Marketing",
"content": "Section 58. Electronic Direct Marketing. (a) No person shall send an electronic commercial message by means of facsimile, automatic dialing system, electronic mail, or short message service (SMS), unless the recipient has given his prior express consent. (b) Exception: a person may send electronic commercial messages to a person who provided his contact details in the context of a prior commercial transaction, provided that the message relates to similar products or services, and the recipient was given a reasonable opportunity to refuse to receive such messages."
}
],
"definitions": [
{
"term": "telecommunications",
"definition": "The transmission, emission, or reception of signs, signals, writing, images, sounds, or intelligence of any nature by wire, radio, optical, or other electromagnetic systems",
"source_provision": "sec1"
},
{
"term": "telecommunications service",
"definition": "Any service involving the provision of telecommunications",
"source_provision": "sec1"
},
{
"term": "licensee",
"definition": "The holder of a license under this Law",
"source_provision": "sec1"
}
]
}

View File

@@ -0,0 +1,67 @@
{
"id": "companies-law-1999",
"type": "statute",
"title": "חוק החברות, תשנ\"ט-1999",
"title_en": "Companies Law, 5759-1999",
"short_name": "CoL",
"status": "in_force",
"issued_date": "1999-02-15",
"in_force_date": "2000-02-01",
"url": "https://www.gov.il/en/departments/legalinfo/companies_law",
"description": "The Companies Law 5759-1999 is the primary legislation governing corporate entities in Israel. It covers incorporation, corporate governance, directors' duties, shareholders' rights, mergers, and dissolution. For cybersecurity compliance purposes, key sections address directors' duty of care regarding information systems (Sections 252-256), reporting obligations (Section 270A), and corporate liability for data breaches affecting shareholders.",
"provisions": [
{
"provision_ref": "sec1",
"section": "1",
"title": "Definitions",
"content": "Section 1. Definitions. In this Law: \"company\" - a body corporate incorporated under this Law or under one of the ordinances listed in the First Schedule; \"limited company\" - a company in which the liability of its shareholders is limited to the unpaid amount, if any, of the shares held by them; \"public company\" - a company whose shares are listed for trade on a stock exchange or have been offered to the public under a prospectus as defined in the Securities Law."
},
{
"provision_ref": "sec11",
"section": "11",
"title": "Legal Personality",
"content": "Section 11. Legal Personality. A company is a legal entity from the date of its incorporation and until its dissolution."
},
{
"provision_ref": "sec252",
"section": "252",
"title": "Duty of Care",
"content": "Section 252. Duty of Care. (a) An office holder shall act with the level of care with which a reasonable office holder would act in the same position and under the same circumstances, including taking reasonable measures to obtain information relevant to the business of the company and other information available to the office holder given the circumstances."
},
{
"provision_ref": "sec253",
"section": "253",
"title": "Business Judgment Rule",
"content": "Section 253. Business Judgment Rule. An office holder shall be deemed to have fulfilled his duty of care under Section 252, if he acted in good faith and in a manner in which a reasonable office holder would have acted under the same circumstances, provided the office holder had no personal interest in the decision, was informed of the relevant facts, and reasonably believed the decision to be in the best interests of the company."
},
{
"provision_ref": "sec254",
"section": "254",
"title": "Duty of Loyalty",
"content": "Section 254. Duty of Loyalty. (a) An office holder owes a duty of loyalty to the company, shall act in good faith and for the benefit of the company, and shall, inter alia: (1) refrain from any act involving a conflict of interest between the performance of his duties in the company and the performance of his other duties or his personal affairs; (2) refrain from any activity that is competitive with the company's business; (3) refrain from exploiting any business opportunity of the company to gain a personal advantage for himself or for another; (4) disclose to the company any information and provide any document related to the company's affairs which the office holder received by virtue of his position as office holder."
},
{
"provision_ref": "sec270A",
"section": "270A",
"title": "Reporting Requirements",
"content": "Section 270A. Reporting Requirements. A public company shall file periodic reports with the Securities Authority including financial statements, material events, and any information material to the value of its securities, including information regarding risks to the company's information systems and cyber threats."
}
],
"definitions": [
{
"term": "company",
"definition": "A body corporate incorporated under this Law or under one of the ordinances listed in the First Schedule",
"source_provision": "sec1"
},
{
"term": "public company",
"definition": "A company whose shares are listed for trade on a stock exchange or have been offered to the public under a prospectus as defined in the Securities Law",
"source_provision": "sec1"
},
{
"term": "office holder",
"definition": "A director, general manager, chief business manager, deputy general manager, vice general manager, or any person filling any of the above positions in the company, or any other manager directly subordinate to the general manager",
"source_provision": "sec1"
}
]
}

View File

@@ -0,0 +1,201 @@
{
"id": "computer-law-1995",
"type": "statute",
"title": "חוק המחשבים, תשנ\"ה-1995",
"title_en": "Computers Law, 5755-1995",
"short_name": "CL",
"status": "in_force",
"issued_date": "1995-07-25",
"in_force_date": "1995-10-25",
"url": "https://www.unodc.org/cld/uploads/res/document/computer-law_html/Israel_Computers_Law_5755_1995.pdf",
"provisions": [
{
"provision_ref": "sec1",
"chapter": "Chapter One: Definitions",
"section": "1",
"title": "Definitions",
"content": "In this Law “computer material” - software or information; “computer” - a device that operates by means of software program for performing arithmetic or logic processing of data, as well as its peripheral equipment, including computers system, but excluding auxiliary computer; “auxiliary computer” - a computer capable of performing arithmetical calculation actions only and actions entailed in performing such actions; “information” - data, signs, concepts or instructions, excluding software program, which are expressed in computer-readable language, and which are stored in a computer or another means of storage, provided that the data, signs, concepts or instructions are not intended for use solely in an auxiliary computer; “output” - data, signs, concepts or instructions that are produced, in any manner, by a computer; “computer-readable language” - a form of expression suitable for delivery, interpretation or processing by a computer or an auxiliary computer only; “software program” - a set of commands expressed in computerreadable language, which is capable of causing a computer to function or to perform an action, and is embodied, imprinted, or marked on a device or object, by electronic, electromagnetic, electrochemical, electro-optic means or any other means, or is imprinted or integrated with the computer in any manner or is separate from it, and all if not intended for use solely in an * Published in Sefer Hachukkim 5755 No. 1534, 25 July 1995 p. 366 (P.L. 5754 No. 2278 p. 478). auxiliary computer. Disrupting or interfering with a computer or computer material"
},
{
"provision_ref": "sec2",
"chapter": "Chapter Two: Computer Offenses",
"section": "2",
"title": "",
"content": "A person who unlawfully does one of the following, shall be liable to imprisonment for a period of three years: (1) Disrupts the proper operation of a computer or interferes with its use; (2) Deletes computer material, alters it, disrupts it in any other way or interferes with its use. False information or false output"
},
{
"provision_ref": "sec3",
"chapter": "Chapter Two: Computer Offenses",
"section": "3",
"title": "",
"content": "3. (a) A person who does one of the following shall be liable to imprisonment for a period of five years: (1) Transfers to another person or stores in a computer false information or performs an action with respect to information so it would result in the production of false information or false output; (2) Writes software program, transfers software program to another person or stores software program in a computer, so it would result in the production of false information or false output, or operates a computer while using software program as aforesaid. (b) In this section, “false information” and “false output” - information or output that can mislead, pursuant to the objectives of their use. Unlawful penetration into computer material"
},
{
"provision_ref": "sec4",
"chapter": "Chapter Two: Computer Offenses",
"section": "4",
"title": "",
"content": "A person who unlawfully penetrates computer material located in a computer, shall be liable to imprisonment for a period of three years; for this purpose, “penetration into computer material” - penetration by means of communication or connection with a computer, or by operating it, but excluding penetration into computer material which constitutes eavesdropping under the Eavesdropping Law, 5729 1979. Penetration into computer material in order to commit another offense"
},
{
"provision_ref": "sec5",
"chapter": "Chapter Two: Computer Offenses",
"section": "5",
"title": "",
"content": "A computer virus"
},
{
"provision_ref": "sec6",
"chapter": "Chapter Two: Computer Offenses",
"section": "6",
"title": "",
"content": "6. (a) A person who composes a software program in a manner that A person who performs an act prohibited under Section 4, in order to commit an offense under any law, excluding this Law, shall be liable to imprisonment for a period of five years. enables it to cause damage to or disruption of a non-specific computer or computer material, in order to unlawfully cause damage to or disruption of a computer or computer material, whether specific or non-specific, shall be liable to imprisonment for a period of three years. (b) A person who transfers software program to another, or who infiltrates another's computer with, a software program that is capable of causing damage or disruption as aforesaid in Subsection (a), in order to unlawfully cause the aforesaid damage or disruption, shall be liable to imprisonment for a period of five years. Civil wrongs"
},
{
"provision_ref": "sec7",
"chapter": "Chapter Three: Torts",
"section": "7",
"title": "",
"content": "7. An act among those specified below is a civil wrong under the Civil Torts Ordinance [New Version], and the provisions of that Ordinance shall apply to it (1) Unlawful disruption of the use of a computer or of computer material, in any manner whatsoever, including by unlawfully taking a thing that embodies computer material; (2) Deletion of computer material, causing a change in it or disrupting it in any other manner, where done unlawfully. Burden of proof"
},
{
"provision_ref": "sec8",
"chapter": "Chapter Three: Torts",
"section": "8",
"title": "",
"content": "8. In a lawsuit filed under this Chapter, the defendant shall bear the burden of proving that the action was done lawfully. Compensation"
},
{
"provision_ref": "sec9",
"chapter": "Chapter Three: Torts",
"section": "9",
"title": "",
"content": "9. No compensation shall be granted in a lawsuit under this Chapter, unless it was proven that the damage was caused as a result of the negligence of the defendant. Clause A: Laws of Evidence Amendment to the Evidence Ordinance No. 11"
},
{
"provision_ref": "sec10",
"chapter": "Chapter Four: Legislative Amendments",
"section": "10",
"title": "",
"content": "10. In Chapter Two of the Evidence Ordinance [New Version], 5731 1971, (1) In Article Five (a) In the Article's headline, “institutional record” shall replace “bank records”; (b) Sections 35 and 36 shall be replaced by the following: “Definitions"
},
{
"provision_ref": "sec35",
"chapter": "Chapter Four: Legislative Amendments",
"section": "35",
"title": "",
"content": "35. In this article \"legal proceeding\" - any civil or criminal proceeding in Court, in which evidence may be presented; \"institution\" - the State, a local authority, business or anyone who provides a service to the public; \"business\" - including an occupation; \"output\" - as defined in the Computers Law,5755-1995; \"institutional record\" - a document, including output, which is prepared by an institution during the course of the regular work of the institution; \"banking corporation\" - as defined in the Banking (Licensing) Law, 5741 1980, and including the Bank of Israel. Admissibility of an institutional record"
},
{
"provision_ref": "sec36",
"chapter": "Chapter Four: Legislative Amendments",
"section": "36",
"title": "",
"content": "36. (a) An institutional record will constitute admissible evidence for proving the veracity of its content in any legal proceeding, if all of the following are met (1) The institution regularly, in the course of its work, keep documentation of the event that is the subject of the record in close proximity to its occurrence; (2) The method of collecting data which is the subject of the record and the method of documenting the record testify to the veracity of the content of the record; (3) If the record is output it was proven in addition that (a) The way the record is produced testifies to its credibility; (b) The institution regularly adopts reasonable protection measures against penetration into computer material and against disruption of the computer's operation. (b) If the record is output, the date of documenting the data that comprises the basis of the output will be considered, for the purposes of subsection (a)(1), as the date of the record's documentation. (c) The directives of Subsection (a) shall not apply to a record that was documented by one of the investigative authorities or the criminal prosecution and is submitted in a criminal proceeding by such an authority. This Subsection does not disqualify or restrict the submission of such record, if it is possible to submit it in accordance with the stipulations of Section 39B. (d) If evidence is admitted under this Section, the opposing side will be entitled to conduct a crossexamination of witnesses it summons to testify, in order to refute the evidence, if these witnesses are connected to the party on whose behalf the evidence was submitted.” (c) Section 37 shall be deleted; (d) Section 38 shall be replaced by the following: “Non-compulsion of submission of an institutional record of a banking corporation"
},
{
"provision_ref": "sec38",
"chapter": "Chapter Four: Legislative Amendments",
"section": "38",
"title": "",
"content": "In the course of a legal proceeding in which a banking corporation is not a party, a banker or an official of a banking corporation, shall not be compelled to submit an institutional record of a banking corporation whose content is subject to verification under this Clause, or to testify about transactions or accounts registered in the institutional record, unless under a court warrant issued for a special reason.” (e) In Section 39 (1) The headline shall be replaced by “Permission to examine an institutional record of a banking corporation”; (2) In Subsection (a), the words “that is within the institutional record of a banking corporation” shall replace the words “that is within a bank book” ; (3) In Subsection (b), the words “the banking corporation” shall replace the words “the bank\"; the words “to the banking corporation” shall replace “to the bank”, and the word “instruction” shall be deleted. (f) The following shall be inserted after Section 39: “Expert opinion"
},
{
"provision_ref": "sec39A",
"chapter": "Chapter Four: Legislative Amendments",
"section": "39A",
"title": "",
"content": "If the output is a statement of opinion in a matter of science, research, art, professional knowledge or a medical matter, the output will not be admissible as evidence unless it was submitted in accordance with the directives of the law that apply to the submission of testimony on these matters. Reservation of laws"
},
{
"provision_ref": "sec39B",
"chapter": "Chapter Four: Legislative Amendments",
"section": "39B",
"title": "",
"content": "39B. (a) The directives of this Clause will not qualify evidence that is inadmissible due to another reason, excluding the hearsay rule, and shall not disqualify or limit the submission of evidence that is admissible according to the aforementioned rules or another law. (b) In this Section and in Section 39A, \"law\" includes a decided ruling.” (2) In Clause F (a) The following shall be added after Section 41: “Copy of institutional record"
},
{
"provision_ref": "sec41A",
"chapter": "Chapter Four: Legislative Amendments",
"section": "41A",
"title": "",
"content": "41A. The content of an institutional record can be proven by a photocopy of the record. Status of output"
},
{
"provision_ref": "sec41B",
"chapter": "Chapter Four: Legislative Amendments",
"section": "41B",
"title": "",
"content": "41B. For the purpose of this Clause, output that is an institutional record will not be considered a copy of the document from which it was produced, but as the original.” (b) In Section 42, the words “this article” shall replace “Section 41”, and “this Section” shall replace “the aforesaid Section”. Clause B: Laws of Search and Seizure Amendment to the Criminal Procedure (Arrest and Search) Ordinance No. 6"
},
{
"provision_ref": "sec11",
"chapter": "Chapter Four: Legislative Amendments",
"section": "11",
"title": "",
"content": "11. In the Criminal Procedure (Arrest and Search) Ordinance [New Version], 5729 1969 (1) In Section 1 (a) In the definition “object”, the words “computer material or animal” shall replace “or animal”. (b) The following shall be inserted after the definition of “object”: “Computer”, “computer material” and “output” as defined in the Computers Law, 5755 1995”. (2) The following shall be added after Section 23: “Penetration into computer material"
},
{
"provision_ref": "sec23A",
"chapter": "Chapter Four: Legislative Amendments",
"section": "23A",
"title": "",
"content": "23A. (a) Penetration into computer material and production of output in the course of such penetration shall be considered as a search and shall be performed by an official who is trained to carry out such actions; for this purpose, “penetration into computer material” - as it defined under Section 4 of the Computers Law, 5755 1995. (b) Notwithstanding the provisions of this Chapter, a search as aforesaid in Subsection (a) shall not be conducted, unless by an warrant of a judge under Section 23, which explicitly specifies the permission to penetrate into computer material or to produce output, as the case may be, and the conditions for the search and its purposes. (c) Receiving information from communication between computers incidental to a search under this Section will not be considered eavesdropping under the Eavesdropping Law, 5729 1979.” (3) In Section 32 (a) Subsection (b) shall be marked (c), and in it, the words “this section” shall replace “subsection (a)”; (b) The following shall be inserted after Subsection (a): “(b) Notwithstanding the provisions of this Chapter, a computer or an object that embodies computer material shall not be seized if it is found in the use of an institution as defined in Section 35 of the Evidence Ordinance [New Version], 5731 1971, other than by a court warrant; a warrant that has been issued not in the presence of the possessor of the computer or the object that embodies computer material, shall be given for a period that does not exceed 48 hours; for this purpose, the Sabbath and holidays shall not be considered; a Court may extend the order after giving the possessor an opportunity to be heard.” Promulgating Regulations"
},
{
"provision_ref": "sec12",
"chapter": "Chapter Five: Regulations",
"section": "12",
"title": "",
"content": "12. The Minister of Justice is charged with the implementation of this Law and may, with the approval of the Constitution, Law and Justice Committee of the Knesset, promulgate regulations as to any matter relating to its implementation. Commencement"
},
{
"provision_ref": "sec13",
"chapter": "Chapter Five: Regulations",
"section": "13",
"title": "",
"content": "13. This Law shall come into force three months from the date of its publication. Yitzhak Rabin David Libai Prime Minister Minister of Justice Ezer Weizman Shevach Weiss President of the State Speaker of the Knesset"
}
],
"definitions": [
{
"term": "computer material",
"definition": "software or information",
"source_provision": "sec1"
},
{
"term": "computer",
"definition": "a device that operates by means of software program for performing arithmetic or logic processing of data, as well as its peripheral equipment, including computers system, but excluding auxiliary computer",
"source_provision": "sec1"
},
{
"term": "auxiliary computer",
"definition": "a computer capable of performing arithmetical calculation actions only and actions entailed in performing such actions",
"source_provision": "sec1"
},
{
"term": "information",
"definition": "data, signs, concepts or instructions, excluding software program, which are expressed in computer-readable language, and which are stored in a computer or another means of storage, provided that the data, signs, concepts or instructions are not intended for use solely in an auxiliary computer",
"source_provision": "sec1"
},
{
"term": "output",
"definition": "data, signs, concepts or instructions that are produced, in any manner, by a computer",
"source_provision": "sec1"
},
{
"term": "computer-readable language",
"definition": "a form of expression suitable for delivery, interpretation or processing by a computer or an auxiliary computer only",
"source_provision": "sec1"
}
],
"_knesset_metadata": {
"israelLawId": 2000357,
"hebrewName": "חוק המחשבים, התשנ\"ה-1995",
"knessetNum": 13,
"publicationDate": "1995-07-25T00:00:00",
"latestPublicationDate": "2012-07-17T00:00:00",
"validityDesc": "תקף",
"lastUpdatedDate": "2022-05-04T11:50:29.67"
}
}

View File

@@ -0,0 +1,67 @@
{
"id": "credit-data-law-2002",
"type": "statute",
"title": "חוק נתוני אשראי, תס\"ב-2002",
"title_en": "Credit Data Law, 5762-2002",
"short_name": "CDL",
"status": "in_force",
"issued_date": "2002-01-01",
"in_force_date": "2002-01-01",
"url": "https://www.nevo.co.il/law_html/law01/999_611.htm",
"description": "The Credit Data Law 5762-2002 regulates the collection, processing, and dissemination of credit data in Israel. It establishes the Credit Data System, regulates credit bureaus, and provides individual rights regarding credit reports.",
"provisions": [
{
"provision_ref": "sec1",
"section": "1",
"title": "Purpose",
"content": "Section 1. Purpose. The purpose of this Law is to promote fair and efficient provision of credit while protecting the privacy of individuals in respect of information about their credit."
},
{
"provision_ref": "sec2",
"section": "2",
"title": "Definitions",
"content": "Section 2. Definitions. In this Law: \"credit data\" - data on the financial conduct of a person, including data about credit or financial obligations, debts, payment history, legal proceedings in connection with debts, bankruptcies, and restrictions on bank accounts; \"credit bureau\" - a body that collects, processes, and provides credit data; \"credit report\" - a report prepared by a credit bureau on the basis of credit data."
},
{
"provision_ref": "sec3",
"section": "3",
"title": "Credit Data System",
"content": "Section 3. Credit Data System. (a) The Bank of Israel shall operate a credit data system for the purpose of collecting and providing credit data. (b) The credit data system shall contain data provided by credit providers, enforcement authorities, and other sources as prescribed by law."
},
{
"provision_ref": "sec7",
"section": "7",
"title": "Right of Access",
"content": "Section 7. Right of Access. (a) Every person has the right to access the credit data held about him by a credit bureau. (b) A credit bureau shall provide a person with a copy of his credit report within 14 days of the request. (c) One credit report per year shall be provided free of charge."
},
{
"provision_ref": "sec8",
"section": "8",
"title": "Right of Correction",
"content": "Section 8. Right of Correction. (a) A person who finds that credit data held about him is inaccurate, incomplete, or misleading may request the credit bureau to correct the data. (b) The credit bureau shall investigate the request and, if the data is found to be inaccurate, correct it within 30 days."
},
{
"provision_ref": "sec15",
"section": "15",
"title": "Data Retention",
"content": "Section 15. Data Retention. (a) Credit data shall not be retained for more than 7 years from the date of the relevant event. (b) Data regarding debts that have been fully repaid shall not be retained for more than 3 years from the date of full repayment."
}
],
"definitions": [
{
"term": "credit data",
"definition": "Data on the financial conduct of a person, including data about credit, financial obligations, debts, payment history, legal proceedings in connection with debts, bankruptcies, and restrictions on bank accounts",
"source_provision": "sec2"
},
{
"term": "credit bureau",
"definition": "A body that collects, processes, and provides credit data",
"source_provision": "sec2"
},
{
"term": "credit report",
"definition": "A report prepared by a credit bureau on the basis of credit data",
"source_provision": "sec2"
}
]
}

View File

@@ -0,0 +1,97 @@
{
"id": "data-security-regulations-2017",
"type": "statute",
"title": "תקנות הגנת הפרטיות (אבטחת מידע), תשע\"ז-2017",
"title_en": "Protection of Privacy Regulations (Data Security), 5777-2017",
"short_name": "DSR",
"status": "in_force",
"issued_date": "2017-03-21",
"in_force_date": "2018-05-08",
"url": "https://www.gov.il/en/departments/legalinfo/data_security_regulation",
"description": "The Protection of Privacy Regulations (Data Security) 2017 impose technical and organisational security requirements on database owners. They establish four security levels (basic, medium, high, critical) and mandate risk assessments, security policies, access controls, encryption, incident response procedures, and annual security audits. The regulations implement Section 17 of the Privacy Protection Law 1981.",
"provisions": [
{
"provision_ref": "reg1",
"section": "1",
"title": "Definitions",
"content": "Regulation 1. Definitions. In these Regulations: \"database security level\" - the security classification of a database as basic, medium, high, or critical, determined by the type and volume of data and the number of persons authorized to access it; \"security incident\" - an event in which there is a reasonable concern that database information has been exposed, used, or changed without authorization, or that the integrity or availability of the database has been compromised; \"security officer\" - a person appointed under Section 17B of the Privacy Protection Law to be responsible for information security."
},
{
"provision_ref": "reg2",
"section": "2",
"title": "Database Security Levels",
"content": "Regulation 2. Database Security Levels. (a) A database managed by a person who employs fewer than 10 employees, contains no sensitive information, and is not managed by a public body shall be classified as basic security level. (b) A database that does not meet the criteria for basic level and is not classified as high or critical level shall be classified as medium security level. (c) A database shall be classified as high security level if it contains sensitive information about more than 100,000 data subjects, or is managed by a public body that contains sensitive information. (d) A database shall be classified as critical security level if it contains information about more than 1,000,000 data subjects and if data leakage could endanger the physical safety or health of data subjects."
},
{
"provision_ref": "reg3",
"section": "3",
"title": "Security Procedures Document",
"content": "Regulation 3. Security Procedures Document. (a) The database owner shall prepare a document defining the security procedures for the database (hereinafter: \"security procedures document\"). (b) The security procedures document shall include: (1) a description of the database, its purposes, and the types of information it contains; (2) a description of the physical and logical environment of the database; (3) a list of persons authorized to access the database, specifying the type and scope of authorization for each; (4) the risks to the database and the measures taken to address them; (5) the types of security incidents that may occur and the measures for handling them."
},
{
"provision_ref": "reg4",
"section": "4",
"title": "Access Control",
"content": "Regulation 4. Access Control. (a) The database owner shall define for each authorized person the scope of their authorization and the type of actions they are permitted to perform. (b) Authorization to access the database shall be granted only to persons for whom such access is necessary for the performance of their duties. (c) The database owner shall employ means to prevent unauthorized access to the database."
},
{
"provision_ref": "reg5",
"section": "5",
"title": "Physical Security",
"content": "Regulation 5. Physical Security. The database owner shall employ physical means to protect the database infrastructure and the information stored therein from unauthorized access, damage, or destruction."
},
{
"provision_ref": "reg6",
"section": "6",
"title": "Communication Security",
"content": "Regulation 6. Communication Security. (a) The database owner shall employ means to protect information transmitted electronically from the database against unauthorized access. (b) A database at high or critical security level shall employ encryption for electronic transmission of information outside the organization."
},
{
"provision_ref": "reg7",
"section": "7",
"title": "Monitoring and Logging",
"content": "Regulation 7. Monitoring and Logging. (a) The database owner shall maintain a log documenting access to the database, including the identity of the person accessing, the date and time of access, and the actions performed. (b) The log shall be maintained for a period of not less than 24 months for databases at medium security level, and not less than 5 years for databases at high or critical security level."
},
{
"provision_ref": "reg8",
"section": "8",
"title": "Security Incidents",
"content": "Regulation 8. Security Incidents. (a) The database owner shall establish procedures for identifying and handling security incidents. (b) When a severe security incident occurs in a database at high or critical security level, the database owner shall report the incident to the Registrar immediately. (c) The database owner shall document each security incident, the measures taken to address it, and actions taken to prevent recurrence."
},
{
"provision_ref": "reg9",
"section": "9",
"title": "Annual Security Audit",
"content": "Regulation 9. Annual Security Audit. (a) The database owner shall conduct a periodic examination of compliance with these Regulations and with the security procedures document. (b) For databases at high or critical security level, the examination shall be conducted at least once every 18 months by a qualified external auditor."
},
{
"provision_ref": "reg10",
"section": "10",
"title": "Outsourced Processing",
"content": "Regulation 10. Outsourced Processing. (a) Where the database owner engages a third party to process information in the database, the database owner shall enter into a written agreement with that third party specifying: (1) the types of information to be processed; (2) the security measures to be employed; (3) the obligation to return or destroy the information upon termination of the engagement. (b) The database owner shall verify that the third party complies with the security requirements applicable to the database."
},
{
"provision_ref": "reg11",
"section": "11",
"title": "Transition and Implementation",
"content": "Regulation 11. Transition and Implementation. (a) These Regulations shall come into force on 8 May 2018. (b) With respect to databases existing on the date these Regulations come into force, the database owner shall comply with these Regulations within 12 months of the date they come into force."
}
],
"definitions": [
{
"term": "database security level",
"definition": "The security classification of a database as basic, medium, high, or critical, determined by the type and volume of data and the number of persons authorized to access it",
"source_provision": "reg1"
},
{
"term": "security incident",
"definition": "An event in which there is a reasonable concern that database information has been exposed, used, or changed without authorization, or that the integrity or availability of the database has been compromised",
"source_provision": "reg1"
},
{
"term": "security officer",
"definition": "A person appointed under Section 17B of the Privacy Protection Law to be responsible for information security",
"source_provision": "reg1"
}
]
}

View File

@@ -0,0 +1,67 @@
{
"id": "electronic-signature-law-2001",
"type": "statute",
"title": "חוק חתימה אלקטרונית, תס\"א-2001",
"title_en": "Electronic Signature Law, 5761-2001",
"short_name": "ESL",
"status": "in_force",
"issued_date": "2001-08-07",
"in_force_date": "2001-08-07",
"url": "https://www.gov.il/en/departments/legalinfo/electronic_signature_law",
"description": "The Electronic Signature Law 5761-2001 provides the legal framework for electronic signatures and electronic documents in Israel. It recognizes three types of electronic signatures with varying levels of legal effect and establishes a certification authority regime.",
"provisions": [
{
"provision_ref": "sec1",
"section": "1",
"title": "Definitions",
"content": "Section 1. Definitions. In this Law: \"electronic signature\" - an electronic creation designed to serve as a signature and attached to or associated with an electronic message; \"secure electronic signature\" - an electronic signature that satisfies all of the following: (1) it is unique to its signatory; (2) it is capable of identifying the signatory; (3) it was created using means that the signatory can maintain under his sole control; (4) it is linked to the data to which it relates in such a manner that any subsequent change in the data is detectable; \"certified electronic signature\" - a secure electronic signature that is backed by a valid certificate from a licensed certification authority."
},
{
"provision_ref": "sec2",
"section": "2",
"title": "Legal Validity of Electronic Signature",
"content": "Section 2. Legal Validity of Electronic Signature. (a) A certified electronic signature shall be deemed to have the same legal validity as a handwritten signature. (b) An electronic message to which a certified electronic signature is attached shall be deemed to be a signed document for all purposes under any law. (c) A secure electronic signature that is not certified shall be admissible as evidence of the identity of the signatory and of the signatory's intent to identify with the content of the electronic message."
},
{
"provision_ref": "sec3",
"section": "3",
"title": "Presumptions",
"content": "Section 3. Presumptions. Where a certified electronic signature is attached to an electronic message: (1) the signature shall be presumed to be that of the person named in the certificate as the signatory, unless the contrary is proved; (2) it shall be presumed that the signatory intended to identify with the content of the electronic message, unless the contrary is proved."
},
{
"provision_ref": "sec4",
"section": "4",
"title": "Certification Authority",
"content": "Section 4. Certification Authority. (a) No person shall operate as a certification authority for purposes of issuing certificates for certified electronic signatures unless he is licensed under this Law. (b) The Registrar of Certification Authorities shall be appointed by the Minister of Justice."
},
{
"provision_ref": "sec5",
"section": "5",
"title": "Conditions for License",
"content": "Section 5. Conditions for License. A license to operate as a certification authority shall be granted to an applicant who satisfies the following conditions: (1) he is a corporation registered in Israel; (2) he has adequate technical means and professional staff; (3) he maintains appropriate security measures; (4) he has adequate financial resources; (5) he carries professional liability insurance."
},
{
"provision_ref": "sec14",
"section": "14",
"title": "Government Use",
"content": "Section 14. Government Use. The Minister of Justice may, by regulations, determine that a government agency shall accept electronic messages bearing a certified electronic signature in lieu of documents bearing a handwritten signature."
}
],
"definitions": [
{
"term": "electronic signature",
"definition": "An electronic creation designed to serve as a signature and attached to or associated with an electronic message",
"source_provision": "sec1"
},
{
"term": "secure electronic signature",
"definition": "An electronic signature that is unique to its signatory, capable of identifying the signatory, created using means under the signatory's sole control, and linked to the data such that changes are detectable",
"source_provision": "sec1"
},
{
"term": "certified electronic signature",
"definition": "A secure electronic signature backed by a valid certificate from a licensed certification authority",
"source_provision": "sec1"
}
]
}

View File

@@ -0,0 +1,62 @@
{
"id": "freedom-of-information-law-1998",
"type": "statute",
"title": "חוק חופש המידע, תשנ\"ח-1998",
"title_en": "Freedom of Information Law, 5758-1998",
"short_name": "FoIL",
"status": "in_force",
"issued_date": "1998-05-19",
"in_force_date": "1999-05-19",
"url": "https://www.gov.il/en/departments/legalinfo/freedom_of_information_law",
"description": "The Freedom of Information Law 5758-1998 establishes the right of every citizen or resident to receive information from public authorities. It sets out the procedures for requesting information and the grounds for refusal.",
"provisions": [
{
"provision_ref": "sec1",
"section": "1",
"title": "Right to Information",
"content": "Section 1. Right to Information. Every Israeli citizen or resident has the right to receive information from a public authority, in accordance with the provisions of this Law."
},
{
"provision_ref": "sec2",
"section": "2",
"title": "Definitions",
"content": "Section 2. Definitions. In this Law: \"public authority\" - a Government Ministry, the Knesset, the judiciary, local authorities, statutory corporations, government companies, and other bodies exercising public functions as designated by the Minister of Justice; \"information\" - any information held by a public authority, whether in writing, recorded, photographed, filmed, or by electronic or optical means."
},
{
"provision_ref": "sec7",
"section": "7",
"title": "Request for Information",
"content": "Section 7. Request for Information. (a) A request for information shall be submitted in writing to the public authority that holds the information. (b) The request shall specify the information sought. (c) The applicant need not state the reason for the request."
},
{
"provision_ref": "sec8",
"section": "8",
"title": "Duty to Respond",
"content": "Section 8. Duty to Respond. (a) A public authority shall respond to a request for information within 30 days. (b) The response may be an affirmative or a negative response, or a partial response. (c) If the public authority does not respond within the prescribed period, the request shall be deemed to have been refused."
},
{
"provision_ref": "sec9",
"section": "9",
"title": "Grounds for Refusal",
"content": "Section 9. Grounds for Refusal. (a) A public authority may refuse a request for information if the information: (1) may harm state security, foreign relations, or public safety; (2) may harm the privacy of a person; (3) is classified as confidential under any law; (4) relates to internal deliberations of the public authority; (5) may prejudice ongoing investigations or legal proceedings; (6) constitutes a trade secret or commercial information whose disclosure may cause economic harm."
},
{
"provision_ref": "sec17",
"section": "17",
"title": "Appeal",
"content": "Section 17. Appeal. (a) A person whose request for information was refused, or who received a partial response, may appeal to the administrative court within 45 days of the date of the decision."
}
],
"definitions": [
{
"term": "public authority",
"definition": "A Government Ministry, the Knesset, the judiciary, local authorities, statutory corporations, government companies, and other bodies exercising public functions",
"source_provision": "sec2"
},
{
"term": "information",
"definition": "Any information held by a public authority, whether in writing, recorded, photographed, filmed, or by electronic or optical means",
"source_provision": "sec2"
}
]
}

View File

@@ -0,0 +1,444 @@
{
"id": "privacy-protection-law-1981",
"type": "statute",
"title": "חוק הגנת הפרטיות, תשמ\"א-1981",
"title_en": "Protection of Privacy Law, 5741-1981",
"short_name": "PPL",
"status": "in_force",
"issued_date": "1981-03-11",
"in_force_date": "1981-09-11",
"url": "https://ics.uci.edu/~kobsa/privacy/israel.htm",
"provisions": [
{
"provision_ref": "sec1",
"chapter": "CHAPTER ONE: INFRINGEMENT OF PRIVACY",
"section": "1",
"title": "Prohibition of infringement of privacy",
"content": "1. Prohibition of infringement of privacy No person shall infringe the privacy of another without his consent."
},
{
"provision_ref": "sec2",
"chapter": "CHAPTER ONE: INFRINGEMENT OF PRIVACY",
"section": "2",
"title": "What is infringement of privacy",
"content": "2. What is infringement of privacy Any of the following constitutes an infringement of privacy: (1) Spying on or trailing a person in a manner likely to harass him, or any other harassment; (2) listening in prohibited under any Law; (3) photographing a person while he is in a private domain; (4) publishing a person's photograph under circumstances, in which the publication is likely to humiliate him or to bring him into contempt; (5) copying or using, without permission from the addressee or the writer, the contents of a letter or of any other writing not intended for publication, unless the writing is of historical value or fifteen years have passed since the time when it was written; (6) using a person's name, appellation, picture or voice for profit; (7) infringing an obligation of secrecy laid down by law in respect of a person's private affairs; (8) infringing an obligation of secrecy laid down by explicit or implicit agreement in respect of a person's private affairs; (9) using, or passing on to another, information on a person's private affairs, otherwise than for the purpose for which it was given; (10) publishing or passing on anything that was obtained by way of an infringement of privacy under paragraphs (1) to (7) or (9); (11) publishing any matter that relates to a person's intimate life, state of health or conduct in the private domain."
},
{
"provision_ref": "sec3",
"chapter": "CHAPTER ONE: INFRINGEMENT OF PRIVACY",
"section": "3",
"title": "Definition of terms",
"content": "3. Definition of terms In this Law \"person\" does not - for purposes of sections 2,7,13,14 and 25 - include a body corporate; \"consent\" - explicit or implied consent; \"holder, in connection with database\" - a person, who has a database in his permanent possession and who is entitled to use it; \"publication\" has the meaning it has in the Defamation (Prohibition) Law, 5725-1965 \"photography\" includes filming; \"use\" includes disclosure, transfer and delivery."
},
{
"provision_ref": "sec4",
"chapter": "CHAPTER ONE: INFRINGEMENT OF PRIVACY",
"section": "4",
"title": "Infringement of privacy - a civil wrong",
"content": "4. Infringement of privacy - a civil wrong An infringement of privacy is a civil wrong, and the provisions of the Civil Wrongs Ordinance (New Version) shall apply to it, subject to the provisions of this Ordinance."
},
{
"provision_ref": "sec5",
"chapter": "CHAPTER ONE: INFRINGEMENT OF PRIVACY",
"section": "5",
"title": "Infringement of privacy - an offense",
"content": "5. Infringement of privacy - an offense If a person willfully infringes the privacy of another in any of the ways stated in section 2 (1), (3) to (7) and (9) to (11), then he is liable to five years imprisonment."
},
{
"provision_ref": "sec6",
"chapter": "CHAPTER ONE: INFRINGEMENT OF PRIVACY",
"section": "6",
"title": "Trifling act",
"content": "6. Trifling act No right to bring a civil or criminal action under this Law shall accrue through an infringement that has no real significance. CHAPTER TWO: PROTCTION OF PRIVACY IN DATA BASE"
},
{
"provision_ref": "sec7",
"chapter": "CHAPTER TWO: PROTCTION OF PRIVACY IN DATA BASE",
"section": "7",
"title": "Definition",
"content": "7. Definition In this Chapter and in Chapter Four - \"data security\" - protection of the integrity of data, or protection of the data against exposure, use or copying, all when done without due permission; \"data base\" - a collection of data, kept by magnetic or optical means and intended for computer processing, exclusive of - (1) a collection for personal use other than for business purposes; or (2) a collection that includes only names, addresses and ways of communicating, which by itself does not create any characterization that infringes on the privacy of the people whose names are included in it, or condition that neither the owner of the collection, nor a body corporate under his control owns an additional collection, \"information\" - data on the personality, personal status, intimate affairs, state of health, economic position, vocational qualifications, opinions and beliefs of a person, \"sensitive information\" - (1) data on a person's personality, private family relations, state of health, economic condition, opinions and faith, (2) information which the Minister of Justice - by order with approval by the Knesset Constitution, Law and Justice Committee - designated as sensitive information. \"data base manager\" - the active manager of the body, which owns or holds a data base, or a person authorized for this person by the aforesaid manager; \"Registrar\" - a person qualified to be appointed Magistrates Court judge, whom the Government appointed by, notice in Reshumot, to keep the \"Register of Data Bases\" (hereafter: Register) as said in section 12; \"integrity of information\" - the identity of data in the data base to the source from which they were derived, without having been changed, delivered or destroyed with due permission. Article One: Data Bases"
},
{
"provision_ref": "sec8",
"chapter": "Article One: Data Bases",
"section": "8",
"title": "Registration and use of data base",
"content": "8. Registration and use of data base (a) No person shall manage or possess a data base that the must be registered under this section, unless one of the following holds true: (1) the data base was registered in the Register; (2) an application for registration of the data base was submitted and the provisions of section 10 (b1) are complied with, (3) the data base must be registered under subsection (e) and the Registrar's instructions included permission to operate and keep the data until it is registered. (b) No person shall use information in a data that must be registered under this section, except for the purposes for which the data base was set up. (c) The obligation of registration in the Register falls on the owner of the data base, and the owner of the data base must register it if one of the following applies, (1) the data base includes information about more than 10,000 persons; (2) the data base includes sensitive information; (3) the data base includes information about persons and the information was not provided to the data base by them, on their behalf or with their consent; (4) the data base belongs to a public body, within its definition in section 23; (5) the data base is used for direct mail, as said in section 17c. (d) The provision of subsection (c) shall not apply to a data base which only includes information made public by lawful authority, or which was opened to public inspection by lawful authority. (e) The Registrar may, for special reasons which shall be recorded, order hat the obligation to register be in effect for data bases that are exempt of the obligation to register under subsection (c) and (d); a said order shall be served on the owner of the data base, and in it the registrar shall spell out directions for the operation and maintenance of the data base until its registration; the owner of the data base may appeal against a decision of the Registrar under this subsection before the District Court within 30 days after he was served notice of the Registrar's decision."
},
{
"provision_ref": "sec9",
"chapter": "Article One: Data Bases",
"section": "9",
"title": "Application for registration",
"content": "9. Application for registration (a) An application for registration of a data base shall be submitted to the Registrar. (b) An application for registration of a base shall specify - (1) the identities of the owner of the data base, of the person who holds possession of the data base, and their addresses in Israel; (2) the purposes of setting up the data and the purposes for which the information is intended; (3) the types of information to be included in the data base; (4) particulars on the transfer abroad of information; (5) particulars on the constant receipt of information from a public body, as defined in section 23, the name of the public body that provides the information provided, exclusive of particulars delivered by consent of the persons who are subjects of the information. (c) The Minster may-by regulations - prescribe further particulars to be stated in the application for registration. (d) The owner or possessor of a data base shall notify the Registrar of every change in any of the particulars specified in subsection (b) or prescribed under subsection (c), and of the discontinuation of the operation of the data base."
},
{
"provision_ref": "sec10",
"chapter": "Article One: Data Bases",
"section": "10",
"title": "Power of Registrar",
"content": "10. Power of Registrar (a) When an application for registration of a data base has been submitted - (1) the Registrar shall register it in the Register within 90 days after the application was submitted to him, unless he has reasonable grounds to assume that the data base is used or is liable to be used for illegal activities or as a cover for them, or that the information included in it was obtained, accrued or was collected in violation of this Law or in violation of the provisions of any enactment. (2) The Registrar may register a purpose different from that specified in the application, register a number of purposes for a data base, of order that several applications be submitted instead of the application that was submitted, all if he concludes that doing so is appropriate to the actual activity of the data base, (3) The Registrar shall refuse to register a data base under paragraph (1) or use his powers under paragraph (2) only after he gave the applicant an opportunity to state his case. (b) The owner of a data base may appeal before the District Court against a decision by the Registrar under subsection (a), within 30 days after he was served notice of the decision. (b1) If the Registrar did not register the data base within 90 days after the day on which the application was submitted and if he did not inform the applicant of his refusal to register, or of a delay in the registration for special reasons which shall be specified in his notice - then the applicant may operate or keep the data base, even if it is not registered. (b2) If the Registrar informed the applicant of his refusal to register the data base, or of a delay as said in subsection (b1), then the applicant must not operate or keep the data base, except when the Court has decided otherwise. (b3) The Registrar shall strike the registration of a data base from the Register, if the owner of the data base informed him that the information in that data base has been deleted and if he supported his notice by affidavit; if the data base was kept by a person different from the owner of the data base, then the notice shall also be supported by an affidavit of the person who kept it. (c) The Registrar shall supervise compliance with the provisions of this Law and of the regulations thereunder. (d) The Minister of Justice shall, by order with approval by the Knesset Constitution, Law and Justice Committee, set up a unit for the supervision of data base, for their registration and for the security of the information in them: the size of the unit shall be according to the needs of supervision. (e) The Registrar shall head the supervision unit and he shall appoint inspectors to carry out the supervision under this Law, only persons with suitable professional training in computers, information security and the use of authorities under this Law shall be appointed inspectors, if the Israel Police expressed no objection to their appointment for reasons of public security. (f) In order to perform his duties, an inspector may - (1) require any concerned person to deliver to him information and documents related to a data base, (2) to enter any place in respect of which it is reasonable to assume that a data base is operated there, to conduct a search there and to seize any object, if he satisfied that it is necessary to do, so in order to assure implementation of this Law and to prevent violation of its provisions: the provisions of the Criminal Procedure Ordinance (Arrest and Searches) (New Version) 5792-1969 shall apply to any object seized under this section: arrangements for entry into a military installation or into an military installation or into an installation of a security authority, within its meaning in section 19(c), shall be prescribed by the Minister of Justice, in consultation with the Minister in charge of the security authority, as the case may be; in this paragraph: \"object\" includes computer material and output, within their definitions in the Computers Law 5755-1995: (3) notwithstanding the provisions of paragraph (2), he shall enter a said place that is used only for residential purposes only under an order from a Magistrates Court judge. Note: The designation of both the preceding and the following subsections as \"(f)\" is the result of an apparent eitor in the Hebrew original of Amendment No. 4 - Tr. (f) If the possessor or the owner of a data base infringes any provision of this Law or of regulations thereunder, or if he fails to comply with a request made to him by the Registrar, then the Registrar may apply to the District Court fir an order that cancels the registration of the data in the Register or suspends it for a period prescribed by the Court. (g) The Registrar and any person who acts on his behalf shall be treated as State employees."
},
{
"provision_ref": "sec10A",
"chapter": "Article One: Data Bases",
"section": "10A",
"title": "Privacy protection report",
"content": "10A. Privacy protection report The Privacy Protection Council shall submit to the Knesset Constitution, Law and Justice Committee, not later than April 1 of each year, a report prepared by the Registrar about enforcement and supervision activities during the year that preceded the submission of the report, together with the Council's comments."
},
{
"provision_ref": "sec11",
"chapter": "Article One: Data Bases",
"section": "11",
"title": "Notice to accompany request for information",
"content": "11. Notice to accompany request for information Any request to a person for information, with the intention to keep and use it in a data base, shall be accompanied by a notice that indicates - (1) whether that person is under a legal obligation to deliver that information, or whether its delivery depends on his volition and consent; (2) the purpose for which the information is requested; (3) to whom the information is to be delivered and for what purpose."
},
{
"provision_ref": "sec12",
"chapter": "Article One: Data Bases",
"section": "12",
"title": "Register of data bases",
"content": "12. Register of data bases (a) The Registrar shall keep a Register of data bases, which shall be open for inspection by the public. (b) The Register shall include the registration particulars stated in section 9. (c) Notwithstanding the provisions of subsections (a) and (b), the particulars said in section 9 (b) (3), (4) and (5) shall not be open to inspection by the public for data bases of security authorities."
},
{
"provision_ref": "sec13",
"chapter": "Article One: Data Bases",
"section": "13",
"title": "Right to inspect information",
"content": "13. Right to inspect information (a) Every person is entitled to inspect - in person, through a representative authorized by him in writing, or through his guardian - any information about him which is kept in a data base. (b) The owner of a data base shall, at the request of a person said in subsection (a) (hereafter: applicant), make it possible to inspect the information in the Hebrew, Arabic or English language. (c) The owner of a data base may refrain from delivering to the applicant information that relates to his state of physical or mental health, if he believes that the information may cause severe harm to the applicant's physical or mental health or endanger his life; in such a case the owner of the data base shall deliver the information to a physician or psychologist on the applicant behalf. (c1) The provisions of this section shall not obligate the owner of a data base to deliver information in violation of its privileged status, as prescribed under any enactment, unless the applicant's is the person for whose benefit the privilege is intended. (d) The manner and conditions in which the right to inspect information can be exercised, and payment therefor shall be prescribed by regulations. (e) The provisions of this section and of section 13A shall not apply - (1) to the data of a security authority, within its meaning in section 19 (c); (1a) to the data base of the Prisons Service; (2) to the data base of a tax authority, within its meaning in the Tax Law Amendment (Exchange of Information Between Tax Authorities) Law 5727 - 1967; (3) when the security or the foreign relations of the State or the provisions of any enactment require that information about any person not be disclosed to him; (4) to the data base of any body, in resect of which the Minister of Justice determined in consultation with the Minister of Defense or the Minister of Foreign Affairs, as the case may be, and with approval by the Knesset Defense and Foreign Affairs Committee - that it includes information which the State's defense or foreign affairs require that it not be disclosed (hereafter' secret information), however, any person who requests to examine the information about himself stored in that data base shall be entitled to examine the information that is not secret information; (5) to a data base about investigation and law enforcement by an authority lawfully authorized to investigate an offense, so determined by the Minister of Justice by order with approval of the Knesset Constitution, Law and Justice Committee."
},
{
"provision_ref": "sec13A",
"chapter": "Article One: Data Bases",
"section": "13A",
"title": "Inspection of material not of the owner of a data base",
"content": "13A. Inspection of material not of the owner of a data base Without derogating from the provisions of section 13- (1) if the owner of a data base keeps it with another (in this section- possessor) - then he shall refer the applicant to the possessor, stating his address, and he shall instruct the possessor in writing that ha make the inspection possible; (2) if the applicant first applied to the possessor, then the possessor shall inform him whether he holds information about him, and also of the name and address of the owner of the data base. 14 .Amendment of information (a) If, on inspecting information about himself, a person finds that it is not correct, not complete, not clear or not up to date, he may request the owner of the base or - if that owner is foreign resident - its possessor to amend or delete the information. (b) If the owner of a data base agrees to a request under subsection (a), he shall make the necessary changes in the information and he shall communicate it to every person who received the information from him within a period prescribed by regulations. (c) If the owner of a data base refuses to comply with a request under subsection (a), he shall give notice to that effect - in the form and manner prescribed by regulations - to the person who made the request. (d) The possessor must correct information, if the owner of the data base agreed to the requested correction, or if a Court ordered the correction to be made."
},
{
"provision_ref": "sec15",
"chapter": "Article One: Data Bases",
"section": "15",
"title": "Appeal to Court",
"content": "15. Appeal to Court A person who requested information may - in the form and manner prescribed by regulations - appeal to a Magistrates' Court against a refusal by the owner of a data base to enable him to make inspection under section 13 or section 13A, and against a notice of refusal under section 14(c)."
},
{
"provision_ref": "sec16",
"chapter": "Article One: Data Bases",
"section": "16",
"title": "Secrecy",
"content": "16. Secrecy No person shall disclose any information obtained by him by virtue of his functions as an employee, manager or possessor of a data base, save for the purpose of performing his work or of implementing this Law or under a Court order in connection with a legal proceeding; if a request has been made before a proceeding was instituted, it shall be heard in a Magistrates' Court; if a person violates the provisions of this section, he shall be liable to five years imprisonment."
},
{
"provision_ref": "sec17",
"chapter": "Article One: Data Bases",
"section": "17",
"title": "Penalty",
"content": "17. Penalty The owner of a data base, the possessor of a data base and the manager of a data base are each individually responsible for the protection of the information in the data base."
},
{
"provision_ref": "sec17A",
"chapter": "Article One: Data Bases",
"section": "17A",
"title": "Possessor of data bases of different owners",
"content": "17A. Possessor of data bases of different owners (a) A possessor of data bases of different owners shall make sure that only persons explicitly authorized therefor in a written agreement between him and the owner of that data base be allowed access to each data base. (b) A possessors of at least five data bases that require registration under section 8, shall annually deliver to the Registrar a list of data bases in his possession, standing the names of the owners of the data bases, an affidavit that the persons authorized to have access to each data base have been designated in agreements between him and the owners, and the name of the person in charge of security said in section 17B."
},
{
"provision_ref": "sec17B",
"chapter": "Article One: Data Bases",
"section": "17B",
"title": "Security officer",
"content": "17B. Security officer (a) The bodies specified below must appoint suitable trained persons to be in charge of information security (hereafter: security officer): (1) a person who holds five data bases that require registration under section 8; (2) a public body, as defined in section 23; (3) banks, insurance companies and companies engaged in ranking or evaluating credit ratings. (b) Without derogating from the provisions of section 17, the security officer shall be responsible for the security of information in data bases kept by the bodies said in subsection (a). (c) A person found guilty of an heinous offense or of an offense against the provisions of this Law shall not be appointed security officer. Article Two: Direct Mail 17C Definitions In this Article - \"direct mail\" - an individual approach to persons, based on their belonging to a population group determined by one or more characteristics of persons whose names are included in a data base; \"approach\" - includes in writing, in print, by telephone, by facsimile, by computerized means and by some other means; \"direct mail services\" - the provision of direct mail services to others by way of transferring lists, adhesive labels or data by any means whatsoever."
},
{
"provision_ref": "sec17D",
"chapter": "Article Two: Direct Mail",
"section": "17D",
"title": "Direct mail",
"content": "17D. Direct mail No person shall operate or hold a data base used for direct mail services, unless he is registered in the Register, and unless one of his registered purposes is direct mail services."
},
{
"provision_ref": "sec17E",
"chapter": "Article Two: Direct Mail",
"section": "17E",
"title": "Stating source of information",
"content": "17E. Stating source of information No person shall operate or hold a data base used for direct mail services, unless he has a record stating the source from which he obtained every collection of data used for purposes of the data base and the date of its receipt, as well as the purpose to whom he gave any said collection of data."
},
{
"provision_ref": "sec17F",
"chapter": "Article Two: Direct Mail",
"section": "17F",
"title": "Deletion of information from data base used for direct mail",
"content": "17F. Deletion of information from data base used for direct mail (a) Every direct mail approach shall include, clearly and prominently - (1) a statement that it is a direct mail approach, also stating the registration number in the data base Register of the data base used for the direct mail services; (2) notice that the recipient of the approach has the right to be deleted from the data base as said in subsection (b), and also whom to address for that purpose; (3) the identity and address of the data base that includes the information according to which the approach was made, and the sources from which the owner of the data base received that information. (b) Every person is entitled to demand - in writing - from the owner of a data base used for direct mail that information related to him be deleted from the data base. (c) Every person is entitled to demand - in writing - from the owner of a data base used for direct mail or from the owner of a data base which includes information on the basis of which the approach was made, that information related to him not be given to any person, to a category of persons or to certain persons, either for a limited period of time o permanently. (d) When a person has informed an owner of a data base of his demand said in subsections (b) or (c), then the owner of the data base shall act in accordance with the demand and shall inform that person, in writing, that he has done so. (e) If the owner of a data did not give notice as said in subsection (d) within 30 days after he received the demand, then the person to whom the information relates may apply to a Magistrates Court in the manner set by regulations that it order the owner of the data base to act as aforesaid. (f) The rights under this section of a deceased person included in a data base shall also be held by his spouse, his child and his parent."
},
{
"provision_ref": "sec17G",
"chapter": "Article Two: Direct Mail",
"section": "17G",
"title": "Applicability to items of knowledge",
"content": "17G. Applicability to items of knowledge The provisions of this Article shall apply to items of knowledge that relates to a person's private affairs, even if they do not constitute information, to the same extent that they apply to information."
},
{
"provision_ref": "sec17H",
"chapter": "Article Two: Direct Mail",
"section": "17H",
"title": "Not applicable to public body",
"content": "17H. Not applicable to public body This Article shall not apply a public body, within its meaning in section 23(1), when it performs its tasks under an enactment."
},
{
"provision_ref": "sec17I",
"chapter": "Article Two: Direct Mail",
"section": "17I",
"title": "Saving of enactments",
"content": "17I. Saving of enactments The provisions of this Article are intended to add to the provisions of any enactment. CHAPTER THREE: DEFENSES"
},
{
"provision_ref": "sec18",
"chapter": "CHAPTER THREE: DEFENSES",
"section": "18",
"title": "Defenses",
"content": "18. Defenses In any criminal or civil proceeding for infringement of privacy, it shall be a good defense if one of the following is the case: (1) the infringement was committed by way of a publication protected under section 13 of the Defamation (Protection) Law 5725-1965 ; (2) the defendant or accused committed the infringement in good faith in any of the following circumstances; (a) he did not know and need not have known that an infringement of privacy might occur; (b) the infringement was committed under circumstances, under which the infringer was under a legal, moral, social or professional obligation to commit it; (c) the infringement was committed in defense of a legitimate personal interest of the infringer; (d) the infringement was committed in the lawful pursuit of the infringer's occupation and in the ordinary course of his work, as long as it was not committed by way of publication; (e) the infringement was committed by way of taking a photograph in the public domain, or of publishing a photograph taken there, and the injured party appears in it coincidentally; (f) the infringement was committed by way of a publication protected under paragraphs (4) to (11) of section 15 of the Defamation (Prohibition) Law 5725 - 1965; (3) the infringement involved a public interest that justified it under the circumstances of the case, on condition that - if the infringement was committed by way of publication - the publication was not untruthful."
},
{
"provision_ref": "sec19",
"chapter": "CHAPTER THREE: DEFENSES",
"section": "19",
"title": "Exemption",
"content": "19. Exemption (a) No person shall bear responsibility under this Law for an act which he is empowered to do by Law. (b) A security authority or a person employed by it or acting on its behalf shall bear no responsibility under this Law for an infringement reasonably committed within the scope of their functions and for the purpose of their performance. (c) For purpose of this section, \"security authority\" - any of the following: (1) the Israel Police; (2) the Intelligence Branch of the General Staff of the Israel Defense Forces, and the Military Police; (3) the General Security Services; (4) the Institute for Intelligence and Special Assignments."
},
{
"provision_ref": "sec20",
"chapter": "CHAPTER THREE: DEFENSES",
"section": "20",
"title": "Onus of proof",
"content": "20. Onus of proof (a) If an accused or defendant proves that he committed an infringement of privacy under any of the circumstances said in section 18(2) and that it did not exceed the limits reasonable under those circumstances, he shall be presumed to have committed it in good faith. (b) The accused or defendant shall be presumed not to have committed the infringement of privacy in good faith, if - in committing it - he knowingly exceeded what was reasonably necessary for purposes of the matters protected by section 18(12). (c) If an accused person or defendant pleads a defense under section 18(2)(d), he shall be presumed not to have infringed privacy in good faith if he infringed it in violation of the rules or principles of professional ethics that apply to him by Law or which are accepted by the members of the profession to which he belongs."
},
{
"provision_ref": "sec21",
"chapter": "CHAPTER THREE: DEFENSES",
"section": "21",
"title": "Rebuttal of defense pleas",
"content": "21. Rebuttal of defense pleas If an accused or defendant produces evidence or testifies in person to prove one of the defense pleas provided by this Law, the prosecutor or plaintiff may produce rebutting evidence; this provision shall not derogate from the Court's power under any Law to permit the production of evidence by the parties."
},
{
"provision_ref": "sec22",
"chapter": "CHAPTER THREE: DEFENSES",
"section": "22",
"title": "Mitigating circumstances",
"content": "22. Mitigating circumstances In passing sentence or awarding compensation, the Court may also take the following into account in favor of the accused or defendant; (1) that the infringement of privacy was merely a repetition of something said before and that he mentioned the source on which he relied; (2) that he did not intend to commit an infringement; (3) if the infringement was committed by way of publication - that ha has apologized and has taken steps to discontinue the sale or distribution of copies of the publication that contains the infringement, provided the apology was published in the same place and in the same dimensions and manner in which the infringing matter had been published, and that it was unqualified. CHAPTER FOUR: DELIVERY OF INFORMATION BY PUBLIC BODIES"
},
{
"provision_ref": "sec23",
"chapter": "CHAPTER FOUR: DELIVERY OF INFORMATION BY PUBLIC BODIES",
"section": "23",
"title": "Definitions",
"content": "23. Definitions In this Chapter - \"public body\" - (1) a Government department and other State institution, a local authority and any other body that performs lawful public functions; (2) a body designated by the Minister of Justice, by order with approval by the Knesset Constitution, Law and Judiciary Committee, provided the order specifies the categories of information and of items which the body is entitled to deliver and to receive. (3) Repealed"
},
{
"provision_ref": "sec23A",
"chapter": "CHAPTER FOUR: DELIVERY OF INFORMATION BY PUBLIC BODIES",
"section": "23A",
"title": "Applicability to information",
"content": "23A. Applicability to information The provisions of this Chapter shall apply even to those items about a person's private affairs which do not constitute information, just as they apply to information."
},
{
"provision_ref": "sec23B",
"chapter": "CHAPTER FOUR: DELIVERY OF INFORMATION BY PUBLIC BODIES",
"section": "23B",
"title": "Must not deliver information",
"content": "23B. Must not deliver information (a) A public body must not deliver information, unless it is information that has been published under lawful authority, or unless it has been made available for public inspection under lawful authority, or unless the person to whom the information refers agreed to its delivery. (b) The provisions of this section shall not prevent a security authority, as defined in section 19, from accepting or delivering information in the performance of its function, as long as the acceptance or delivery was not forbidden by legislation."
},
{
"provision_ref": "sec23C",
"chapter": "CHAPTER FOUR: DELIVERY OF INFORMATION BY PUBLIC BODIES",
"section": "23C",
"title": "Limitation on prohibition",
"content": "23C. Limitation on prohibition Notwithstanding the provisions of section 23B, delivery of information shall be permitted - if it is not prohibited by legislation or by professional ethics - (1) between public bodies, when one of the following holds true: (a) delivery of the information is part of the authority or of the functions of whoever delivers the information and it is required in order to implement legislation or for a purpose within the authority or the function of whoever delivers or receives the information; (b) the information is delivered to a public body which is entitled to demand the information lawfully from any other source; (2) from a public body to a Government department or to another State institution, or between aforesaid departments or institutions, if delivery of the information is required for the implementation of any legislation or for a purpose within the authority or within the scope of activity of whoever delivers or receives the information; however, information provided on condition that it not be delivered to others shall not be delivered as aforesaid."
},
{
"provision_ref": "sec23D",
"chapter": "CHAPTER FOUR: DELIVERY OF INFORMATION BY PUBLIC BODIES",
"section": "23D",
"title": "Obligations of public body",
"content": "23D. Obligations of public body (a) If a public body regularly delivers information in accordance with section 23C, then it shall specify that fact on all its lawful requests for information. (b) If a public body delivers information in accordance with section 23C, then it shall keep a record of the information delivered. (c) If a public body regularly receives information in accordance with section 23C and stores that information in a data base, then it shall so inform the Registrar, and that information shall be included in the list of data bases under section 12. (d) If a public body received information in accordance with section 23C, then it shall use it only within the framework of its authority and functions. (e) In connection with the obligation, under any Law, to maintain confidentiality, information delivered to a public body under this Law shall be treated like any information obtained by that body from any other source, and all the rules applicable to the body that delivered the information shall also apply to the body that receives it."
},
{
"provision_ref": "sec23E",
"chapter": "CHAPTER FOUR: DELIVERY OF INFORMATION BY PUBLIC BODIES",
"section": "23E",
"title": "Surplus information",
"content": "23E. Surplus information (a) If information which may be delivered under sections 23B or 23C is located in a single file, together with other information (hereafter: surplus information), then the body that delivers the information may deliver the requested information to the recipient body together with the surplus information. (b) The delivery of surplus information under subsection (a) shall be conditional upon the establishment of procedures that will prevent any use at all being made of the surplus information received; the said procedures shall be prescribed by regulations and - as long as they have not been prescribed by regulations - the body that requests the aforesaid information shall specify procedures in writing and it shall deliver a copy of them to the body that delivers information, on its request."
},
{
"provision_ref": "sec23F",
"chapter": "CHAPTER FOUR: DELIVERY OF INFORMATION BY PUBLIC BODIES",
"section": "23F",
"title": "Permitted delivery does not infringe privacy",
"content": "23F. Permitted delivery does not infringe privacy A delivery of information, which is permitted under this Law, shall not constitute an infringement of privacy, and the provisions of sections 2 and 8 shall not apply to it."
},
{
"provision_ref": "sec23G",
"chapter": "CHAPTER FOUR: DELIVERY OF INFORMATION BY PUBLIC BODIES",
"section": "23G",
"title": "Regulations on delivery of information",
"content": "23G. Regulations on delivery of information The Minister of Justice may, with approval by the Knesset Constitution, Law and Justice Committee, make regulations on ways of the delivery of information by public bodies. 23H. Repealed CHAPTER FIVE: MISCELLANEOUS"
},
{
"provision_ref": "sec24",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "24",
"title": "The State",
"content": "24. The State This Law shall apply to the State."
},
{
"provision_ref": "sec25",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "25",
"title": "Death of injured party",
"content": "25. Death of injured party (a) If a person, whose privacy was infringed, dies within six months after the infringement without having filed an action or complaint in respect thereof, then his spouse, child or parent, or - if he left no spouse, child or parent - his brother or sister may file an action or complaint in respect of that infringement within six months after his death. (b) If a person, who filed an action or complaint in respect of an infringement of privacy, dies before the proceeding is concluded, then his spouse, child or parent or - if he left no spouse, child or parent - his brother or sister may, within six months after his death, notify the Court that they wish to proceed with the action or complaint, and upon that notification they shall take the place of the plaintiff or complainant."
},
{
"provision_ref": "sec26",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "26",
"title": "Prescription",
"content": "26. Prescription The period of prescription of civil actions under this Law is two years."
},
{
"provision_ref": "sec27",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "27",
"title": "Applicability of certain provisions of the Defamation (Prohibition) Law",
"content": "27. Applicability of certain provisions of the Defamation (Prohibition) Law The provisions of sections 21,23 and 24 of the Defamation (Prohibition) Law 5725 - 1965, shall apply, mutatis mutandis, to legal proceeding for infringement of privacy."
},
{
"provision_ref": "sec28",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "28",
"title": "Evidence of a person's bad reputation, character or past",
"content": "28. Evidence of a person's bad reputation, character or past In a criminal or civil proceeding for infringement of privacy, no evidence shall be produced, and no witness shall be examined on the bad reputation or on the character, past, activities or options of the injured party."
},
{
"provision_ref": "sec29",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "29",
"title": "Additional orders",
"content": "29. Additional orders (a) In a criminal or civil proceeding for infringement of privacy, the Court may order, in addition to any penalty and other relief - (1) that distribution of copies of the infringing matter be prohibited or that they be confiscated; a confiscation order under this paragraph is effective against any person who has such material in his possession for sale, distribution or storage, also if he is not a party to the proceeding; if the Court ordered confiscation, then it shall direct how to dispose of the confiscated copies; (2) that all or part of the judgment be published; publication shall be at the expense of the accused or defendant, in a place, of a size and at the manner prescribed by the Court; (3) that the infringing matter be surrendered to the injured party; (4) that the unlawfully received information be deleted, or that use of the said information - or of the surplus information, as defined in section 23E - is prohibited, or it may make any other in respect of the information. (b) The provisions of this section shall not prevent keeping a copy of a publication in public libraries. archives and the like - unless the Court imposes a restriction also on that by a confiscation order under subsection (a) (1) - and they shall not prevent an individual keeping a copy of a publication."
},
{
"provision_ref": "sec30",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "30",
"title": "Responsibility for publication in newspaper",
"content": "30. Responsibility for publication in newspaper (a) If an infringement of privacy is published in a newspaper, within its meaning in the Press Ordinance (hereafter: newspaper), then the criminal and civil responsibility for the infringement shall be borne by the person who brought the material to the newspaper and thereby caused its publication, by the editor of the newspaper and by the person who actually decided on the publication of the infringement in the newspaper, and civil responsibility shall also be borne by the publisher of the newspaper. (b) In a criminal case under this section, it shall be a good defense for the editor of the newspaper that he took reasonable steps to prevent the publication of the infringement or that he did no know of the publication. (c) In this section, \"editor\" of a newspaper includes an acting editor within the scope of the powers or functions of the body that transmits or receives the information."
},
{
"provision_ref": "sec31",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "31",
"title": "Responsibility of printer and distributor",
"content": "31. Responsibility of printer and distributor If an infringement of privacy was published in print, except in a newspaper published under a valid license at intervals of not less than forty days, then criminal and civil responsibility for the infringement shall also be borne by the possessor of the printing press, within its meaning in the Press Ordinance, on which the infringement was printed, and by the person who sells or otherwise distributes the publication; however, they shall not bear responsibility unless they knew or ought to have known that the publication contained and infringement of privacy. 31 A. Penalties in due diligence offenses (a) If a person does one of the following, then he is liable to one year imprisonment: (1) he operates, keeps or uses a data base in violation of section 8; (2) he delivers false particulars in an application for the registration of a data base, an required in section 9: (3) he does not deliver particulars or delivers false particulars in a notice attached to a request for information under section 11; (4) he does not comply with the provisions of sections 13 and 13A, concerning the right to inspect information kept in a data base, or he does not correct a data base according to the provisions of section 14: (5) he grants access to a data base in violation of the provisions of section 17 A (a). or does not deliverdocuments or an affidavit in accordance with the provisions of section 17 A (b) to the Registrar; (6) does not appoint a security officer for the protection of information under section 17B. (7) operates or keeps a data base used for direct mail services in violation of the provisions of sections 17D to 17F; (8) delivers information in violation of sections 23B to 23E. (b) An offense under this section does not require that criminal intent or negligence be proven."
},
{
"provision_ref": "sec31B",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "31B",
"title": "Civil wrong",
"content": "31B. Civil wrong An act or omission in violation of the provisions of Chapters Two or Four, or in violation of regulations made under this Law, shall constitute a civil wrong under the Civil Wrongs Ordinance (New Version)."
},
{
"provision_ref": "sec32",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "32",
"title": "Material inadmissible as evidence",
"content": "32. Material inadmissible as evidence Material obtained by the commission of an infringement of privacy shall not be used as evidence in Court without the consent of the injured party, unless the Court, for reasons which shall be recorded, permits it to be so used, or if the infringer, who is a party to the proceeding, has a defense or enjoys exemption under this Law."
},
{
"provision_ref": "sec33",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "33",
"title": "Amendment of Civil wrongs Ordinance",
"content": "33. Amendment of Civil wrongs Ordinance Section 34A of the Civil Wrongs Ordinance (New Version) is hereby repealed."
},
{
"provision_ref": "sec34",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "34",
"title": "Amendment of Criminal Procedure Law",
"content": "34. Amendment of Criminal Procedure Law In the Schedule to the Criminal Procedure Law 5725-1965, the following paragraph shall be added after paragraph (12): \"(13) offenses under the Protection of Privacy Law 5741-1981.\""
},
{
"provision_ref": "sec35",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "35",
"title": "Saving of Laws",
"content": "35. Saving of Laws The provisions of this Law shall not derogate from the provisions of any other Law."
},
{
"provision_ref": "sec36",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "36",
"title": "Implementation and regulations",
"content": "36. Implementation and regulations The Minister of Justice is charged with the implementation of this Law and be may, with approval by the Knesset Constitution, Law and Justice Committee, make regulations on any matter that relates to its implementation and, inter alia, on - (1) conditions for keeping and safeguarding information in data bases; (2) conditions for transmitting information to or from data bases outside the boundaries of the State; (3) rules of conduct and ethics for owners, possessors and operators of data bases; (4) provisions on the deletion of information when a data base ceases to function."
},
{
"provision_ref": "sec36A",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "36A",
"title": "Fees",
"content": "36A. Fees (a) The Minister may, with approval by the Knesset Constitution, Law and Justice Committee, set fees for registration and inspection under this Law. (b) The fees collected under this section shall b allocated to the Registrar and to the supervision unit for their activities under this Law."
},
{
"provision_ref": "sec37",
"chapter": "CHAPTER FIVE: MISCELLANEOUS",
"section": "37",
"title": "Effect",
"content": "37. Effect Chapter Two shall go into effect six months after the date of publication of this Law."
}
],
"definitions": [
{
"term": "consent",
"definition": "explicit or implied consent",
"source_provision": "sec3"
},
{
"term": "holder, in connection with database",
"definition": "a person, who has a database in his permanent possession and who is entitled to use it",
"source_provision": "sec3"
},
{
"term": "data security",
"definition": "protection of the integrity of data, or protection of the data against exposure, use or copying, all when done without due permission",
"source_provision": "sec7"
},
{
"term": "data base",
"definition": "a collection of data, kept by magnetic or optical means and intended for computer processing, exclusive of - (1) a collection for personal use other than for business purposes",
"source_provision": "sec7"
},
{
"term": "information",
"definition": "data on the personality, personal status, intimate affairs, state of health, economic position, vocational qualifications, opinions and beliefs of a person, \"sensitive information\" - (1) data on a person's personality, private family relations, state of health, economic condition, opinions and faith, (2) information which the Minister of Justice - by order with approval by the Knesset Constitution, Law and Justice Committee - designated as sensitive information. \"data base manager\" - the active manager of the body, which owns or holds a data base, or a person authorized for this person by the aforesaid manager",
"source_provision": "sec7"
},
{
"term": "Registrar",
"definition": "a person qualified to be appointed Magistrates Court judge, whom the Government appointed by, notice in Reshumot, to keep the \"Register of Data Bases\" (hereafter: Register) as said in section 12",
"source_provision": "sec7"
},
{
"term": "integrity of information",
"definition": "the identity of data in the data base to the source from which they were derived, without having been changed, delivered or destroyed with due permission. Article One: Data Bases",
"source_provision": "sec7"
}
],
"_knesset_metadata": {
"israelLawId": 2000234,
"hebrewName": "חוק הגנת הפרטיות, התשמ\"א-1981",
"knessetNum": 9,
"publicationDate": "1981-03-11T00:00:00",
"latestPublicationDate": "2024-08-14T00:00:00",
"validityDesc": "תקף",
"lastUpdatedDate": "2025-09-15T12:29:13.027"
}
}

View File

@@ -0,0 +1,61 @@
{
"id": "regulation-of-security-1998",
"type": "statute",
"title": "חוק הסדרת האבטחה בגופים ציבוריים, תשנ\"ח-1998",
"title_en": "Regulation of Security in Public Bodies Law, 5758-1998",
"short_name": "RSPBL",
"status": "in_force",
"issued_date": "1998-01-01",
"in_force_date": "1998-01-01",
"url": "https://www.nevo.co.il/law_html/law01/999_574.htm",
"description": "The Regulation of Security in Public Bodies Law 5758-1998 establishes security requirements for critical infrastructure and public bodies in Israel. It mandates the appointment of security officers and implementation of security measures for designated organizations.",
"provisions": [
{
"provision_ref": "sec1",
"section": "1",
"title": "Definitions",
"content": "Section 1. Definitions. In this Law: \"body subject to security\" - a body designated by the Minister of Public Security as requiring security regulation due to the nature of its activities or the risk of terrorism; \"security officer\" - a person appointed by a body subject to security to be responsible for security matters; \"security plan\" - a comprehensive plan for the protection of a body subject to security, its personnel, visitors, and assets."
},
{
"provision_ref": "sec2",
"section": "2",
"title": "Designation of Bodies",
"content": "Section 2. Designation of Bodies. (a) The Minister of Public Security may, by order, designate a body as a body subject to security if: (1) the body provides essential public services; (2) the body handles hazardous materials; (3) the body is a venue of public assembly; (4) the nature of the body's activities or its location creates a heightened risk requiring security regulation."
},
{
"provision_ref": "sec3",
"section": "3",
"title": "Security Officer",
"content": "Section 3. Security Officer. (a) A body subject to security shall appoint a security officer. (b) The security officer shall be responsible for: (1) preparing and implementing a security plan; (2) supervising security measures; (3) training personnel on security procedures; (4) reporting security incidents to the relevant authorities."
},
{
"provision_ref": "sec5",
"section": "5",
"title": "Security Plan",
"content": "Section 5. Security Plan. (a) The security officer shall prepare a security plan for the body. (b) The security plan shall address: (1) risk assessment; (2) physical security measures; (3) access control; (4) emergency procedures; (5) coordination with security forces."
},
{
"provision_ref": "sec8",
"section": "8",
"title": "Supervision",
"content": "Section 8. Supervision. The Israel Police shall supervise compliance with this Law and may inspect bodies subject to security to verify that security measures are implemented in accordance with the security plan."
}
],
"definitions": [
{
"term": "body subject to security",
"definition": "A body designated by the Minister of Public Security as requiring security regulation due to the nature of its activities or the risk of terrorism",
"source_provision": "sec1"
},
{
"term": "security officer",
"definition": "A person appointed by a body subject to security to be responsible for security matters",
"source_provision": "sec1"
},
{
"term": "security plan",
"definition": "A comprehensive plan for the protection of a body subject to security, its personnel, visitors, and assets",
"source_provision": "sec1"
}
]
}