r PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-0-hoverPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTRAWMATERIALS PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-3PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCTION &OPERATION stage-4PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFEPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-5PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTLOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT
Security & Cyber Threats

Security & Cyber Threats

ICL operates numerous mining and chemical production sites, many of which contain potentially hazardous materials and valuable equipment. To ensure the security of these sites, as well as the security of ICL’s employees and neighboring communities, ICL invests significant effort and resources. \

ICL maintains a dedicated security policy based on implementing relevant Israeli and international laws and regulations. ICL’s security operations are conducted in full cooperation with local security forces. Security issues are examined routinely around the world as part of periodic internal controls.
Over the past few years, ICL has significantly improved its security readiness with respect to technological aspects and policy. This included the establishment of a global security policy and a uniform standard for all of ICL, which meets and exceeds relevant standards. ICL is also implementing a global Fraud Prevention Plan. Full cooperation exists between security and regulatory systems on all relevant security issues. The Security department cooperates with human resources as part of recruitment procedures, as well as with the legal, compliance,internal audit and CISO departments with respect to investigations and integrity. The Security department also advises, coordinates and distributes information to all ICL companies worldwide, and is also prepared to provide assistance in the event of an emergency at an ICL site.
In addition, ICL has implemented significant improvements in the security of our plants. These include: 

  • Improvements in the level of security training and competency of employees and contractors to meet strict regulations.
  • Improved measures/technological security systems peripheral cameras, motion detectors, radar,  sites access control, etc.
  • Improved security control centers for plants, some of which operate 24/7.
  • Establishment of control procedures, periodic security surveys and security checks at the entrance to the Company’s facilities.
  • Establishment of an information security integration forum to improve our response to security information events.
  • Physical & technological means to protect the server rooms in the business net and the ICS net (production). 

In Israel, where ICL operates a number of major production sites, the company implemented three-level “security rings” at each of its plants. The “security rings”  consist of an outer ring of physical security, including a fence and control gates; a middle ring of electronic security , including CCTV & sensors; and an inner ring of security management that includes control rooms, critical rooms & patrols, as well as operating procedures to deal with evolving threats. All security personnel are guided by the security division of the Israel police.

Emergency Preparedness – Earthquake Drill

Responding to Information Security and Cyber Threats

As ICL becomes more dependent on information technologies to conduct its operations, and as the number and sophistication of cyber-attacks increase, the risks associated with cyber security increase. ICL has taken many steps in recent years in response to the steady increase in the number and severity of security and cyber threats.

ICL is implementing a program to protect the Company’s IT and ICS (industrial control systems). This program includes separating information networks from computerized process networks, physical protection of computer rooms, servers and terminals and employee training. IT security personnel have been appointed, an integrated approach for addressing the issue has been formulated and work plans have been prepared and implemented globally. In addition, risk surveys were performed at all plants in Israel and at several plants located in other countries.
These activities are managed and controlled by ICL’s CISO (Chief Information Security Officer) and ICL’s global CIO. Quantitative goals have been established for implementing a multi-year work plan to advance these issues and to adapt ICL’s operations to numerous threats.

Cyber Security - Live training @ ICL’s Global Compliance Week

As part of ICL’s Global Compliance Week, that took place in the first half of 2019, employees participated in awareness training for information and cyber security. This was done in accordance with the recommendation of the Israeli Cyber Authority.

Other issues, such as data privacy, were also part of the training. ICL’s practices regarding data privacy are based on EU (GDPR) and Israeli regulations.

Sustainability Reporting Disclosures:
Disclosure: M&M Sector specidic DMA “Emergency Preparedness”

Discover More

We use cookies to provide our services and for analytic and marketing purposes. To find out more about our use of cookies, please see our privacy policy.
By continuing to browse our website, you agree to our use of cookies.