{"id":794,"date":"2023-12-19T09:43:03","date_gmt":"2023-12-19T09:43:03","guid":{"rendered":"https:\/\/www.kali.co.il\/en\/?page_id=794"},"modified":"2025-04-03T08:56:00","modified_gmt":"2025-04-03T08:56:00","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/www.kali.co.il\/en\/information-security-policy\/","title":{"rendered":"Information security policy"},"content":{"rendered":"<ol>\n<li><strong>Background<\/strong><\/li>\n<\/ol>\n<p>Kali Group (hereinafter: the Company) ascribes great importance to protecting the privacy of its employees, its customers and their employees.<\/p>\n<p>The Company, being a \u2018holder\u2019 of a database as such term is defined in the Protection of Privacy Law, takes action in connection with the databases in which it is deemed a \u2018holder\u2019 within the framework of its provision of its services to its customers, as set forth hereinbelow.<\/p>\n<p>Terms not expressly defined herein will have the meaning ascribed to them in the Protection of Privacy Law and in the Protection of Privacy (Information Security) Regulations promulgated by virtue thereof.<\/p>\n<p>Computerized information systems are a pivotal, key component of the Company\u2019s organizational infrastructure and support its business activity. The Company\u2019s information systems, data and computerized information form a vital asset which must be protected against exposures and\/or damages which could be detrimental to the Company\u2019s goals, objectives and ongoing management or to the privacy of the information\u2019s subjects.<\/p>\n<p>In this policy: Information \u2013 is every datum pertaining and\/or related to the Company\u2019s business activity and located on physical and digital platforms; Sensitive Information \u2013 is information belonging to the Company, the exposure whereof, or damage whereto, could cause damage to the Company\u2019s ongoing activity.<\/p>\n<p>Information Security and Cyber Protection are the entirety of actions and measures which must be taken and implemented for the purpose of protecting the Information against unauthorized malicious or inadvertent penetration, leaking, damage, destruction, exposure and\/or modification of information. The Information Security and Cyber Protection actions are intended to ensure the information\u2019s confidentiality, integrity, reliability and availability, including \u2013 protecting the confidentiality of the information of the Company\u2019s employees, customers and suppliers and of any other person regarding whom information is located on the Company\u2019s information systems, minimizing operating risks, preventing financial and reputational damages, complying with legal requirements and guaranteeing the continuity of the Company\u2019s activity.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li><strong>Purpose<\/strong><\/li>\n<\/ol>\n<p>The purpose of the document is to establish a policy for securing the Company\u2019s information systems and computerized information, defining the security objectives, executive processes, measures for implementation, fundamental principles for implementing security, and providing orientation and support on the subject of Information Security and Cyber Protection.<\/p>\n<p>The key subjects specified herein are as follows:<\/p>\n<ol>\n<li>Presenting the Company\u2019s concept and its commitment to the subject of Information Security and Cyber Protection.<\/li>\n<li>Establishing guiding principles for implementing Information Security at the Company and raising the awareness of all entities at the Company to Information Security and Cyber Protection subjects.<\/li>\n<li>Prescribing duties, powers, responsibilities, a procedural and organizational framework, and allocating resources for Information Security and Cyber Protection activity at the Company.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li><strong>Jurisdiction<\/strong><\/li>\n<\/ol>\n<p>The policy is binding upon all of the Company\u2019s employees, including external service providers, including contractors, subcontractors and outsourcing providers. The policy applies to all of the computerized systems used by the Company, including servers, databases and any other computing and communication medium administered, owned and\/or controlled by the Company.<\/p>\n<ol start=\"4\">\n<li><strong>Management\u2019s statement on Information Security and Cyber Protection<\/strong><\/li>\n<\/ol>\n<p>The policy principles prescribed herein were formulated by the Company\u2019s information security and cyber protection commissioner and were approved by the management.<\/p>\n<p>In any event of a change to the policy\u2019s rules or of a non-negligible change to the technological environment, the policy document must be reapproved.<\/p>\n<p>After the policy has been approved and updated, all relevant entities (management, employees, suppliers, et cetera) must be informed of the changes made.<\/p>\n<p>Once a quarter, a discussion will be held on the subject of Information Security in the databases pursuant to the Protection of Privacy Law and its regulations. The entities participating in the discussion will be: the members of the management, the information security commissioner and the computing infrastructures manager.<\/p>\n<ol start=\"5\">\n<li><strong>Information Security objectives<\/strong><\/li>\n<\/ol>\n<p>Information Security and Cyber Protection is an essential element for the protection of personal information in the Company\u2019s possession, for minimizing the operating risks, mitigating financial and reputational damages and complying with the requirements of law and regulation, <em>inter alia<\/em>:<\/p>\n<p>The Protection of Privacy Law, 5741-1981, the regulations thereunder (particularly the Protection of Privacy (Information Security) Regulations, 5777-2017 and the directives of the Authority for the Protection of Privacy; and the Computer Law, 5755-1995).<\/p>\n<ol start=\"6\">\n<li><strong>Principles of the Information Security and Cyber Protection policy<\/strong><\/li>\n<\/ol>\n<p>The collection of Information, its storage, the duration of the period during which it is protected and the manner of using it will be carried out subject to the requirements of law and of the regulation applying to the Company.<\/p>\n<p>The level of protection of the Information stored on the Company\u2019s computing systems will be determined according to such Information\u2019s nature, classification, and the risk derived therefrom.<\/p>\n<p>Databases will be protected as required by the law, pursuant to the specification provided in the protection of privacy policy and pursuant to the privacy commissioner\u2019s directives.<\/p>\n<p>The Company will implement reasonable and customary measures, methods and procedures for maintaining the Information\u2019s availability and protecting it against destruction, damage and\/or unauthorized modification, and for the reduction of information security and cyber risks, all as required by the provisions of any law.<\/p>\n<p>Human and computer entities will be allowed access to Information only to the extent required for carrying out their duties and only if such entities have been authorized for such purpose.<\/p>\n<p>Information Security and Cyber Protection will be implemented in accordance with the Defense in-Depth (DiD) principle. Each layer of defense will be independent from another layer\u2019s defense. Thus, several Information Security and cyber defenses will be implemented, offering different and diverse capabilities for securing the communication \/ operating systems \/ applications layers, et cetera.<\/p>\n<ol start=\"7\">\n<li><strong>Information Security and Cyber Protection domains<\/strong><\/li>\n<\/ol>\n<p>The measures for implementing the Company\u2019s Information Security and Cyber Protection policy include defining duties, powers, responsibilities, the enforcement of procedures and guidelines on the use of technological tools, implementation and application of Information Security and Cyber Protection in preparing for emergencies.<\/p>\n<p>Information Security and Cyber Protection includes:<\/p>\n<ol>\n<li>Securing private, personal and\/or sensitive Information about the Company\u2019s employees.<\/li>\n<li>Physically securing computing equipment, communication equipment, cables and any medium for the storage of Information, securing entrances to, and exits from, areas where the computing systems and communication media are located.<\/li>\n<li>Securing end stations, workstations, laptops, communication equipment and any other equipment, including the various kinds of output media (paper, magnetic and optical) which digitally carry Information.<\/li>\n<li>Logically securing software, processes, applications, databases, servers, communication traffic and databases.<\/li>\n<li>Controlling the provision of Information to external entities.<\/li>\n<li>Information Security in personnel management.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"8\">\n<li><strong>Powers, responsibilities and information security management<\/strong><\/li>\n<\/ol>\n<p><strong>The Company\u2019s management<\/strong><\/p>\n<p>The Company\u2019s management is committed to advancing the Company\u2019s purposes by efficiently protecting the information assets, procuring the information\u2019s integrity and reliability, maintaining the availability of the information systems, implementing security controls subject to regulation and in accordance with the risks, protecting the Company\u2019s goodwill by upholding the principles of confidentiality, integrity, reliability and availability of the databases in its possession, allocating resources for establishing security and control systems and for operating them at regular frequency, maintaining and constantly enhancing them.<\/p>\n<p>The Company\u2019s management will appoint a permanent subcommittee, which will act as an information security and cyber protection steering committee (hereinafter: the \u201c<strong>Steering Committee<\/strong>\u201d or the \u201c<strong>Committee<\/strong>\u201d).<\/p>\n<p><strong>The Steering Committee<\/strong><\/p>\n<p>The Committee will constitute a supreme executive framework on behalf of the Company\u2019s management for coordination and decision-making on Information Security and Cyber Protection subjects at the Company.<\/p>\n<p>The Committee is responsible, <em>inter alia<\/em>, for maintaining and updating this policy document, its resolutions and directives, at least once every three years. The Committee will convene every quarter and be composed on the Company\u2019s management and the computing infrastructures manager.<\/p>\n<p>As part of the Committee, the Committee will summon and employ additional relevant entities, including external experts and consultants.<\/p>\n<p>The Company is committed to the protection of privacy, both by virtue of laws and regulations and, primarily, by virtue of its commitment to values and human rights. The Company\u2019s ability to ensure the protection of privacy also arises from the existence of Information Security and Cyber Protection mechanisms.<\/p>\n<p>Responsibility and tasks of the Steering Committee:<\/p>\n<ol>\n<li>Supervising and monitoring the upholding of the Information Security and Cyber Protection policy.<\/li>\n<li>The Committee will hold a discussion of the annual workplan on Information Security and Cyber Protection subjects and will approve it as a plan accepted for implementation.<\/li>\n<li>Receiving risk assessments from the information security and cyber protection commissioner and making their recommendation for dealing with such risks.<\/li>\n<li>The Committee will discuss significant cyber incidents and information security incidents, as well as the recommendations made by the professional entities for dealing with such incidents. The Committee will decide on the implementation of the recommendations to prevent the occurrence of such incidents in the future.<\/li>\n<\/ol>\n<p><strong>Information security and cyber protection implementer<\/strong><\/p>\n<p>The Information security and cyber protection implementer will be subordinated to the VP of Computing and Information Technologies and will be responsible for the implementation of Information Security and Cyber Protection subjects at the Company. If necessary, he may apply to various external professional entities, consultants and experts for help as may be required. The information security and cyber protection commissioner\u2019s duties and assignments are:<\/p>\n<ol>\n<li>Implementing a workplan consistent with the Information Security and Cyber Protection requirement, pursuant to the decision of the Company\u2019s management, to law and to regulation.<\/li>\n<li>Implementing an annual plan for training the Company\u2019s employees and raising awareness of Information Security and Cyber Protection subjects.<\/li>\n<li>Following up on the requirements on all of the Company\u2019s information systems and platforms and on its computerized systems.<\/li>\n<li>Supervising and controlling the implementation of the policy, information security procedures and work provisions.<\/li>\n<li>Conducting an ongoing assessment of Information Security and Cyber Protection risks and initiating risk surveys, resilience tests, penetration tests, cyber surveys, at the very least once every 18 months, which will reflect current risks to the systems of the Company\u2019s registered database.<\/li>\n<li>Regularly handling the approvals of the provision of information to external entities or the receipt of information from such entities.<\/li>\n<li>Information security auditing of all work environments.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><strong>Responsibility of the Company\u2019s employees<\/strong><\/p>\n<ol>\n<li>Every employee of the Company is committed to the subject of Information Security and Cyber Protection as an integral part of their professional responsibility by virtue of their position.<\/li>\n<li>Officials will strictly implement and enforce the information security procedures, encourage employee awareness on the subject and express support of the information security trustees\u2019 activity.<\/li>\n<li>The Company requires every one of its employees, suppliers, contractors and services providers (regular or occasional) to be committed to information security subjects, to be personally responsible for implementing the rules of the policy within the purview of their duties, and to immediately report risk factors and incidents which take place in the aspect of Information Security and Cyber Protection.<\/li>\n<li>Any employee and supplier who provides external service at the Company will sign a form of undertaking to maintain confidentiality and uphold the information security provisions.<\/li>\n<li>The commitment of officials will include, <em>inter alia<\/em>, the following:<\/li>\n<li>Using only their own user account on a computer.<\/li>\n<li>Using the organizational information only for the purpose of carrying out their duties.<\/li>\n<li>Protecting the confidentiality of the means of identification used for the purpose of accessing the Company\u2019s systems.<\/li>\n<li>Reporting security anomalies.<\/li>\n<li>Keeping documents and records in secure fashion.<\/li>\n<li>Securing the work environment.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"9\">\n<li><strong>Assessing Information Security and Cyber Protection risks<\/strong><\/li>\n<\/ol>\n<p>The Company will conduct a process of assessing Information Security and Cyber Protection risks on the information systems, communication systems and interfaces, including identifying, minimizing or preventing the security risks which could affect the information.<\/p>\n<p>This process will be based on a classification of information assets, the information security threats and the nature of the work on the Company\u2019s various systems.<\/p>\n<p>The result of the risk assessment will guide the Company\u2019s management in directing adequate resources to the implementation of security measures, controls and pinpointing the security risk surveys on the Company\u2019s various systems, providing a sensitivity hierarchy of the Company\u2019s various systems, based, <em>inter alia<\/em>, on the information\u2019s classification.<\/p>\n<p>The information security and cyber protection commissioner will conduct a risk survey every 18 months and upon the occurrence of a material change as has been specified.<\/p>\n<ol start=\"10\">\n<li><strong>Information security procedures<\/strong><\/li>\n<\/ol>\n<p>The information security procedures, work provisions and work processes are derived from the Information Security and Cyber Protection policy, which specifies the management\u2019s concept of the Company\u2019s Information Security and Cyber Protection and the guiding principles for its implementation.<\/p>\n<p>A detailed information security procedure or an appropriate work provision will be written for each process at the Company dealing with the management, introduction, operating, maintenance, backup, provision and removal of information.<\/p>\n<p>The procedures\/provisions will be disseminated to all employees or relevant users and will undergo a process of review and updating as necessary, upon the occurrence of a significant change in the technological environment or following an information security incident, and at the very least once every two years.<\/p>\n<ol start=\"11\">\n<li><strong>Information security controls<\/strong><\/li>\n<\/ol>\n<p>Information security controls will be implemented pursuant to the Company\u2019s procedures and the work provisions in accordance with the security and cyber risk management, and will be the responsibility of the Computing Division, supervised by the VP of Information Systems.<\/p>\n<p>The Information Security and Cyber Protection procedures will include, at the very least, all of the following subjects:<\/p>\n<ol start=\"12\">\n<li>Physical security<\/li>\n<li>Logical and applied security<\/li>\n<li>Security of servers, workstations and operating systems<\/li>\n<li>Security of communication infrastructures<\/li>\n<li>Change management in information systems and computing systems<\/li>\n<li>Secure development<\/li>\n<li>Encryption<\/li>\n<li>Protection against malware and malicious\/hostile code<\/li>\n<li>User IDs and access authorizations, including hyper (high) authorizations<\/li>\n<li>Provision of information to external entities<\/li>\n<li>Proper use, including of email and internet<\/li>\n<li>Use of mobile computing devices and detachable media<\/li>\n<li>Remote access control<\/li>\n<li><strong>Control and monitoring<\/strong><\/li>\n<\/ol>\n<p>It is the responsibility of the information security and cyber protection commissioner to audit the computerized activities taking place at the Company, so as to ensure that the information is administered in a manner guaranteeing the integrity, reliability, confidentiality and availability of the information and the controlled use thereof.<\/p>\n<ol start=\"13\">\n<li><strong>Detecting and treating abnormal incidents<\/strong><\/li>\n<\/ol>\n<p>The information security and cyber protection commissioner will issue control reports from the various systems, indicating failed and successful login attempts to every system and\/or the abnormal activation of additional activities which could indicate a security issue. The information security and cyber protection commissioner will review the reports and determine whether abnormal incidents have occurred, and will report the moment a serious incident is discovered. The information security and cyber protection commissioner will formulate a procedure on \u201cResponse to Information Security and Cyber Protection Incidents\u201d, wherein he will specify the manner of dealing with such incidents.<\/p>\n<ol start=\"14\">\n<li><strong>Duty of reporting<\/strong><\/li>\n<\/ol>\n<p>It is the duty of every user to report to the information security and cyber protection commissioner of any use or attempted use of such user\u2019s user ID made other than by such user and of any concern of an information security breach. A serious incident will be reported to relevant entities outside the company pursuant to the provisions of law.<\/p>\n<ol start=\"15\">\n<li><strong>Business continuity<\/strong><\/li>\n<\/ol>\n<p>The Company has a business continuity document. The document specifies the mapping of the processes, the possible risks and the manner of treating them.<\/p>\n<ol start=\"16\">\n<li><strong>Updating the policy<\/strong><\/li>\n<\/ol>\n<p>The information security policy will be reviewed at least once a year by the information security and cyber protection commissioner, to ensure that the policy is upheld, validated, updated and that proper and effective adjustments are made thereto.<\/p>\n<p>The changes will be presented to the management for its approval.<\/p>\n<p>Technical updates to the policy will be brought to the management\u2019s attention retroactively.<\/p>\n<p>17.\u00a0<strong data-start=\"0\" data-end=\"43\">Right to Access and Correct Information<\/strong><\/p>\n<p class=\"\" data-start=\"47\" data-end=\"321\">You have the right to access your personal information held in the databases of the Kali Group and to request its correction if the information is incorrect, incomplete, or outdated, all in accordance with and subject to the provisions of the Privacy Protection Law, 1981.<\/p>\n<p class=\"\" data-start=\"323\" data-end=\"426\">To request access or correction, you may contact us at the following email address: <a class=\"cursor-pointer\" href=\"mailto:privacy@kali.co.il\" rel=\"noopener\" data-start=\"407\" data-end=\"425\">privacy@kali.co.il<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background Kali Group (hereinafter: the Company) ascribes great importance to protecting the privacy of its employees, its customers and their employees. The Company, being a \u2018holder\u2019 of a database as such term is defined in the Protection of Privacy Law, takes action in connection with the databases in which it is deemed a \u2018holder\u2019 within [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-794","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information security policy - english kali site<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kali.co.il\/en\/information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information security policy - english kali site\" \/>\n<meta property=\"og:description\" content=\"Background Kali Group (hereinafter: the Company) ascribes great importance to protecting the privacy of its employees, its customers and their employees. The Company, being a \u2018holder\u2019 of a database as such term is defined in the Protection of Privacy Law, takes action in connection with the databases in which it is deemed a \u2018holder\u2019 within [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kali.co.il\/en\/information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"english kali site\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T08:56:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kali.co.il\/en\/information-security-policy\/\",\"url\":\"https:\/\/www.kali.co.il\/en\/information-security-policy\/\",\"name\":\"Information security policy - english kali site\",\"isPartOf\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/#website\"},\"datePublished\":\"2023-12-19T09:43:03+00:00\",\"dateModified\":\"2025-04-03T08:56:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/information-security-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kali.co.il\/en\/information-security-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kali.co.il\/en\/information-security-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kali.co.il\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information security policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kali.co.il\/en\/#website\",\"url\":\"https:\/\/www.kali.co.il\/en\/\",\"name\":\"english kali site\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kali.co.il\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.kali.co.il\/en\/#organization\",\"name\":\"english kali site\",\"url\":\"https:\/\/www.kali.co.il\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kali.co.il\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2022\/11\/cropped-main_logo_kali.png\",\"contentUrl\":\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2022\/11\/cropped-main_logo_kali.png\",\"width\":249,\"height\":85,\"caption\":\"english kali site\"},\"image\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information security policy - english kali site","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kali.co.il\/en\/information-security-policy\/","og_locale":"en_US","og_type":"article","og_title":"Information security policy - english kali site","og_description":"Background Kali Group (hereinafter: the Company) ascribes great importance to protecting the privacy of its employees, its customers and their employees. The Company, being a \u2018holder\u2019 of a database as such term is defined in the Protection of Privacy Law, takes action in connection with the databases in which it is deemed a \u2018holder\u2019 within [&hellip;]","og_url":"https:\/\/www.kali.co.il\/en\/information-security-policy\/","og_site_name":"english kali site","article_modified_time":"2025-04-03T08:56:00+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.kali.co.il\/en\/information-security-policy\/","url":"https:\/\/www.kali.co.il\/en\/information-security-policy\/","name":"Information security policy - english kali site","isPartOf":{"@id":"https:\/\/www.kali.co.il\/en\/#website"},"datePublished":"2023-12-19T09:43:03+00:00","dateModified":"2025-04-03T08:56:00+00:00","breadcrumb":{"@id":"https:\/\/www.kali.co.il\/en\/information-security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kali.co.il\/en\/information-security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kali.co.il\/en\/information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kali.co.il\/en\/"},{"@type":"ListItem","position":2,"name":"Information security policy"}]},{"@type":"WebSite","@id":"https:\/\/www.kali.co.il\/en\/#website","url":"https:\/\/www.kali.co.il\/en\/","name":"english kali site","description":"","publisher":{"@id":"https:\/\/www.kali.co.il\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kali.co.il\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kali.co.il\/en\/#organization","name":"english kali site","url":"https:\/\/www.kali.co.il\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kali.co.il\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2022\/11\/cropped-main_logo_kali.png","contentUrl":"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2022\/11\/cropped-main_logo_kali.png","width":249,"height":85,"caption":"english kali site"},"image":{"@id":"https:\/\/www.kali.co.il\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/pages\/794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/comments?post=794"}],"version-history":[{"count":7,"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/pages\/794\/revisions"}],"predecessor-version":[{"id":876,"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/pages\/794\/revisions\/876"}],"wp:attachment":[{"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/media?parent=794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}