What is Amendment 13?
Amendment 13 is the largest reform of the Israeli Privacy Protection Law, 5741-1981, since the original statute. The Knesset approved it on 7 August 2024; commencement was deferred one year to 14 August 2025 to allow organizations to prepare.
The objective: modernize Israeli privacy law for the digital era, bring it closer to the principles of the GDPR, and give the Israeli Privacy Protection Authority real enforcement teeth.
Who must appoint a Data Protection Officer (DPO)?
The obligation applies to five categories:
- Public bodies — government ministries, local authorities, regional and local councils, health funds (kupot cholim), public hospitals, and every body listed in the schedule to the law.
- Holders of personal data on behalf of public bodies — SaaS vendors serving authorities, outsourcing providers to ministries, software suppliers to health funds, external call centers for cities.
- Data brokers — entities whose principal occupation is the collection and sale of data, holding more than 10,000 records.
- Bodies performing systematic large-scale monitoring — behavioral tracking, location data, profiling in eCommerce.
- Bodies processing sensitive personal data on a large scale — banks, insurance companies, healthcare systems, and most large organizations processing medical, financial or minors’ data.
Full breakdown and calculator: who must appoint a DPO.
What changed? Highlights of the reform
Eight key changes you must know:
- DPO obligation — did not exist in Israeli law. Now mandatory.
- Narrowed database registration — only data brokers and public bodies must register. Others are exempt from registration but not from the substantive duties.
- Purpose binding — data collected for one purpose may not be processed for another. A meaningful change for organizations that practiced "collect now, decide later".
- Informed consent — consent must be informed, explicit, and revocable. The Authority’s 2026 guidance interpreted this strictly.
- Administrative monetary penalties — the Authority can impose fines from hundreds of thousands to millions of shekels, without prior court proceedings.
- Personal criminal liability — a new offences chapter with personal liability for decision-makers.
- Expanded enforcement powers — inspections, document production, sanctions, public naming of infringers.
- Reporting obligations — significant security incidents must be reported within a short window.
Penalties & risk
This is the section that makes CEOs sweat. Amendment 13 introduces a broad administrative enforcement regime in Israel:
- Base administrative penalty — tens to hundreds of thousands of shekels, scaled to severity.
- Aggravated penalty — up to millions of shekels for large organizations and systemic violations.
- Personal criminal liability — in serious cases, decision-makers (CEO, controllers) are personally exposed.
- Publication of infringers — the Authority publishes a list of offenders, with reputational damage.
- Loss of customer trust — a public data-breach event = direct hit to LTV and brand.
PPA guidance — required reading
The Israeli Privacy Protection Authority has published (and continues to publish) "gilui daat" guidance documents that clarify how it interprets the law. They drive enforcement:
- Informed consent — final version published 25 February 2026.
- DPO appointment — draft published 23 July 2025; final version forthcoming.
- Additional guidance on DPIA, employee monitoring and more — incremental.
Reading the guidance is essential — it is the authoritative source on how the law will be applied.
What to do now — by organization size
For an organization that has not yet started — first steps:
- Check the obligation — must your organization appoint a DPO? Use the calculator or read the full categories.
- Database mapping — what personal-data assets exist? Who holds them? Who is the controller?
- Gap analysis — where does the organization stand against Amendment 13?
- Appoint a DPO (if required) — internal or external. If external fits, here is the service.
- Action plan — a detailed plan to close gaps, with timelines and budget.
90-day Amendment 13 checklist
The common mistake is starting with a policy document. In practice, you start with ownership, databases and risk. A useful 90-day plan looks like this:
First week
- Assign internal ownership: CEO, legal counsel, operations lead or a compact steering group.
- Check whether the DPO obligation applies under the five statutory categories, not by intuition.
- Collect the current list of systems, vendors and databases: CRM, finance, HR, website, CCTV, customer systems.
First month
- Run initial data mapping: data categories, purposes, permissions, vendors, retention and deletion.
- Identify high-risk processing: medical or financial data, minors, monitoring, profiling, AI or cross-border transfers.
- Decide whether you need an outsourced DPO, an internal appointment or project-based support.
First quarter
- Close foundation gaps: appointment letters, privacy notices, incident procedure, access controls, DPAs and critical vendors.
- Create management reporting: what closed, what was deferred, who owns it and what risk remains open.
- Build the annual program: training, DPIAs for sensitive projects, vendor review and document refresh.
Where Amendment 13 hits different sectors
Amendment 13 does not look the same in every organization. The same baseline duty translates into different operational risk by sector:
- Local authorities and municipal corporations — almost always mandatory DPO, with resident, welfare, education, billing and tender data. See DPO for local authorities.
- Kibbutzim and cooperative societies — members, welfare, clinic, education, expansion residents and subsidiaries inside a sensitive community structure. See Amendment 13 for kibbutzim.
- Public-sector vendors — a private company can still be a data holder for a public body and inherit a higher documentation burden. See DPO for public-sector vendors.
- SaaS and startups — Amendment 13, GDPR, SOC 2 and enterprise questionnaires collide in the same sales cycle. See DPO for SaaS and startups.
- Nonprofits, healthcare and education — limited budget does not cancel sensitive data: donors, patients, students, volunteers and employees.
Common mistakes I keep seeing
- Paper appointment — there is a DPO name, but no authority, time, deliverables or reporting path to management.
- Partial mapping — only the “big” systems are mapped while Excel, WhatsApp, CCTV, forms and smaller SaaS vendors are ignored.
- Weak vendor contracts — vendors process personal data without a DPA, role definition, incident SLA or audit right.
- No management ownership — everyone assumes legal, IT or an external provider is handling it. In practice no one owns the plan.