Feeds

Israel's data protection laws given EU approval

Officially as safe as Canada

Reducing security risks from open source software

Israel has formally joined the list of seven countries whose data protection laws are considered strong enough for companies there to receive and process personal data from companies in the European Union.

The European Commission has formalised a decision taken last October to deem Israel's data protection laws 'adequate' for the purposes of the Data Protection Directive.

That Directive prevents personal data being sent out of the EU unless to a country whose laws give it the same protection as it would have in the EU. Israel now joins six other countries with that status.

They are Switzerland, Argentina, the Bailiwick of Guernsey, the Isle of Man, the Bailiwick of Jersey and Canada, as long as the recipient of the information is subject to the Canadian Personal Information Protection and Electronic Documents Act.

Data can be sent to organisations in the US if they subscribe to the US Department of Commerce's Safe Harbor Privacy Principles.

The decision to approve Israel's data protection laws was made for the Commission by its Vice President Viviane Reding.

See: The decision (4-page / 718KB PDF)

Copyright © 2011, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Maximizing your infrastructure through virtualization

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.