Transfer of information to third parties
The transfer of information between organizations, when necessary, will be carried out while ensuring the protection of privacy. The transfer of information to any third parties, whether in Israel or abroad, will only occur in the following circumstances:
- The transfer of information aligns with the purpose for which the information was given.
- The data subject has agreed to transfer the information.
- The transfer of information is carried out according to a judicial order, or according to a mandatory requirement of an official authority, subject to the provisions of the law.
- Transfer of information to authorized entities, including the Council for Higher Education in Israel, the Ministry of Education, supervisory bodies, the Israel Tax Authority, and law enforcement authorities, shall be carried out in accordance with the applicable legal provisions governing the transfer of information between public bodies, as required and binding under the law.
- Trusted third-party service providers assist in the operation of our services, the management of our ongoing activities, and the provision of services to data subjects. These may include providers of information systems, payment processing, data storage, and external consultants. All such engagements are conducted under strict confidentiality obligations and in full compliance with applicable laws, while ensuring the protection of data subjects' rights.
- Research bodies and academic colleagues for the purpose of carrying out collaborative studies or scientific activity, provided that the information transferred complies with the rules of ethics and the law (in appropriate cases, after anonymization or pseudonymization).
- Foreign academic institutions – for the purpose of student exchanges, joint programs, or international studies, subject to the provisions of the law, including the mechanisms for the international transfer of information pursuant to the GDPR, as applicable.
- Insurance companies, financial institutions, and scholarships – in cases in which it is necessary to transfer information for the purpose of exercising the rights of students, visitors, donors, etc.
Security and monitoring
The University employs a variety of technological security, monitoring, and other measures to ensure information security and to comply with legal requirements, including University procedures, its information security policy, and the proper use of information resources. These monitoring and security measures are implemented in a manner that safeguards the privacy of data subjects and remains in compliance with applicable laws.
Cookies and other technologies
The University uses various cookies that are necessary to operate the website, for statistical purposes, and to save your preferences. It may also use essentially similar technologies for the ongoing operation of the website. You may configure your browser to allow or disable cookies as you choose.
Cameras
As a rule, the use of cameras in the various campuses for security, teaching, research, and work purposes will be carried out in compliance with applicable laws and in adherence to privacy protection principles and University procedures.
Direct mailing
The University may, from time to time, send you advertising and marketing information related to the University or its services. This information will be sent to you pursuant to the law, and you may revoke your consent at any time to stop receiving such messages.
If you are a student, you may opt out at any time through the Sheilta system.
Information security and confidentiality
The Open University is committed to protecting information confidentiality. The employees, faculty, and external suppliers operating on its behalf are committed to protecting confidentiality pursuant to internal agreements and procedures. The University implements organizational, physical, and technological security measures to reduce the risk of compromising information. They include the use of encryption, identification and authorization measures, firewalls, and traffic monitoring and authorization management tools, and the latest defenses pursuant to the Protection of Privacy (Data Security) Regulations, 2017.
Nonetheless, no system is completely immune to hacking or malfunction. Therefore, users should take care to keep their passwords and access details confidential, choose strong passwords, avoid sharing them with others, and exercise caution when using public or shared devices. If there is any concern about unauthorized exposure of access details, users should notify the Mashov Center as soon as possible so that appropriate protective measures can be taken.
Links to external sites
The Open University’s websites may include links to websites, services, and content that are not operated by the University, such as the Students’ Union, social media, and/or external parties (for example, the Israel Inter-University Computation Center – Mahba). These links are provided for users’ convenience only, do not constitute a recommendation, and the University bears no responsibility for them.
The University does not control or supervise the content, services, information collection practices, or protective measures of these external sites and is therefore not liable for any damage or infringement that may result from their use. Users who choose to access external websites through our site are advised to review the privacy policies and terms of use of those sites and to exercise their discretion.
Data Retention and Deletion
Information collected by the University will be retained for as long as necessary to fulfill the purposes for which it was collected, including compliance with regulatory, contractual, academic, or legal obligations. Upon the conclusion of the applicable retention period, the University will take reasonable measures to delete the information or anonymize it, such that it can no longer be associated with the data subject, unless there is a legal obligation or a legitimate interest requiring its continued retention.
The University regularly reviews the necessity of retaining information and employs mechanisms to manage, reduce, and update data in line with the principles of purpose limitation and data minimization.
Changes to the policy
The University may change the provisions of this policy from time to time. Any changes will be communicated by publishing the updated policy on the University’s website or through other means to inform users.