top of page
Blurred blue circle

Privacy Protection - Information Security

Mapping, registering and managing databases, conducting periodic risk surveys, writing privacy impact assessments, analyzing business processes, assisting with system development, writing security procedures and assisting directors in fulfilling corporate obligations under the Privacy Protection-Information Security Regulations.

Why choose consulting services for privacy protection regulations?

Choosing professional consulting services in the field of privacy protection regulations - information security may prove to be a decision with strategic advantages, and offers many advantages.

The service will assist, accompany and guide businesses and organizations through the complex process of achieving compliance and compliance with the law, and maintaining compliance over time.

Services in this field include mapping, registration, periodic updating, and management of databases for the Privacy Protection Authority at the Ministry of Justice, along with performing periodic risk assessments, writing privacy impact assessment documents, and analyzing business processes.

This comprehensive approach ensures that all aspects will be examined and the required response will be provided.


Consulting services can identify potential gaps in an organization's information security and recommend customized solutions tailored to the organization's profile.

The service includes writing, sealing, and updating the database security procedures, supplementary guidelines, supplementary architecture diagrams, and more.

Derby Cyber's privacy protection consulting services provide a professional response to directors and officers in fulfilling the corporation's obligations under the Privacy Protection-Information Security Regulations.

What are the privacy protection regulations – information security?

The Privacy Protection - Information Security Regulations, which came into effect in 2018, serve as a cornerstone in the landscape of managing and securing personally identifiable data.

These regulations are intended to establish a uniform and minimum standard for handling personal data databases, and to ensure that organizations in various sectors comply with the requirements of internationally accepted privacy protection regulations, such as the European Union's General Data Protection Regulation (GDPR).

The regulations divide database security into three distinct levels: basic, medium, and high, each of which requires specific controls and safeguards based on a number of criteria.

The differences between database levels are based, among other things, on the scope of records in the database, the number of people with access rights, and the sensitivity of the information stored, ranging from medical and financial details to basic contact information.

The primary goal is to protect personal data from unauthorized access, misuse, or breaches, thereby protecting individuals’ privacy. Failure to comply with these regulations can lead to serious consequences for businesses, including financial fines and criminal charges, as well as potential damage to reputation and public trust.

רקע_6x.png

Contact us

bottom of page