Security and monitoringThe University makes use of a variety of technological and other measures for security and monitoring, for the purposes outlined in the University’s procedures, including its information security policy and guidelines for the appropriate use of information resources. These security and monitoring activities are conducted in a manner that respects the privacy of the data subject, subject to the provisions of the law.
Cookies and other technologiesThe University uses various cookies that are necessary to operate the website, for statistical purposes and to save your preferences. It may also use essentially similar technologies for the ongoing operation of the website. You may configure your browser to allow or disable cookies as you choose.
CamerasAs a rule, the use of cameras in the various campuses for security, teaching, research and work purposes will be carried out in accordance with the provisions of the law and in adherence to privacy protection principles and University procedures.
Transfer of informationThe transfer of information between organizations, when necessary, will be carried out while ensuring the protection of privacy. The transfer of information to any third parties whatsoever, whether in Israel or abroad, will occur only in the following circumstances:
- The transfer of information aligns with the purpose for which the information was given.
- The data subject has agreed to transfer the information.
- The transfer of information is carried out according to a judicial order, or according to a mandatory requirement of an official authority subject to the provisions of the law.
- The transfer of information complies with the provisions of the law regarding the transfer of information between public bodies.
- Reliable third parties assist us in the operation of our services, managing our ongoing activity or providing services to the data subject, under an obligation to maintain confidentiality and uphold the legal rights of the data subjects.
Direct mailingThe University may from time to time send you advertising and marketing information connected to the University or its services. This information will be sent to you in accordance with the law, and you may revoke your consent at any time to stop receiving such messages.
If you are a student, you may opt out at any time through the Sheilta system.
ConfidentialityAny University employee or service provider granted access to information is required to sign a confidentiality agreement that ensures the information remains confidential and is used solely within the scope of their designated duties.
Protection of information and responsibilityThe University, along with its database holders and administrators, is committed to securing the information in accordance with the legal security standards applicable to the database, as well as the University’s internal information security protocols and contractual obligations.
We implement safeguards to minimize the risk of damage, data loss, or unauthorized access or use of information, including policy guidelines for University staff and users of its information resources.
Data Retention and Deletion
Information collected by the University will be kept for the time necessary to achieve the purposes for which it was collected, including meeting regulatory, contractual, academic or legal requirements. At the end of the relevant period, the University will take reasonable steps to delete the information or make it unidentifiable, so that it cannot be attributed to the data subject, unless there is a legal requirement or a legitimate need to continue to keep it for a longer period.
The University regularly reviews the necessity of retaining information and employs mechanisms to manage, reduce, and update data in line with the principles of purpose limitation and data minimization.
Changes to the policyThe University may change the provisions of this policy from time to time. Any changes will be communicated by publishing the updated policy on the University’s website or through other means to inform users.