r PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-0-hoverPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTRAWMATERIALS PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-3PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCTION &OPERATION stage-4PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFEPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-5PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTLOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT
Security & Cyber Threats

Security & Cyber Threats

ICL operates numerous mining and chemical production sites, many of which contain potentially hazardous materials and valuable equipment. To ensure the security of these sites, as well as the security of ICL’s employees and neighboring communities, ICL invests significant efforts and resources.

We maintain a dedicated security policy based on implementing relevant Israeli and international laws and regulations. Our security operations are conducted in full cooperation with local security forces. Security issues are examined routinely around the world as part of our periodic internal controls.
Over the past few years, we have significantly improved our security readiness with respect to technological aspects and policy. This included the establishment of a global security policy and a uniform standard for all of ICL, which meets and exceeds relevant standards. We are also implementing a global Fraud Prevention Plan. Full cooperation exists between security and regulatory systems on all relevant security issues. The Security department cooperates with human resources as part of recruitment procedures, as well as with the legal, compliance and internal audit departments with respect to investigations and integrity. The Security department also advises, coordinates and distributes information to all ICL companies worldwide, and is also prepared to provide assistance in the event of an emergency at an ICL site.
In addition, we have implemented significant improvements in the security of our plants. These include:

  • Improvements in the level of security training and competency of employees and contractors to meet strict regulations.
  • Improved measures/technological security systems (peripheral cameras, motion detectors, radar, entry control for transporters, etc).
  • Improved security control centers for plants, some of which operate 24/7.
  • Establishment of control procedures, periodic security surveys and security
    checks at the entrance to the Company’s facilities.
  • Establishment of an information security integration forum to improve our response to security information events.

In Israel, where we operate a number of major production sites, we implemented a three-level security network at each of our plants. It consists of an outer ring of physical security, including a fence; an electronic security ring, including sensors; and an inner ring of security management that includes control rooms, as well as operating procedures to deal with evolving threats. All security personnel are guided by the security division of Israel Police.

Emergency Preparedness – Earthquake Drill

Responding to Information Security and Cyber Threats

As we become more dependent on information technologies to conduct our operations, and as the number and sophistication of cyber-attacks increase, the risks associated with cyber security increase. ICL has taken many steps in recent years in response to the steady increase in the number and severity of security and cyber threats.

We are implementing a program to protect the Company’s IT and ICS (industrial control systems). This program includes separating information networks from computerized process networks, physical protection of computer rooms, servers and terminals and employee training. IT security personnel have been appointed, an integrated approach for addressing the issue has been formulated and work plans have been prepared and implemented globally. In addition, risk surveys were performed at all plants in Israel and at several plants located in other countries.
These activities are managed and controlled by ICL’s CISO (Chief Information Security Officer) and ICL’s global CIO. Quantitative goals have been established for implementing a multi-year work plan to advance these issues and to adapt ICL’s operations to numerous threats.

Sustainability Reporting Disclosures:
Disclosure: M&M Sector specidic DMA “Emergency Preparedness”
We use cookies to provide our services and for analytic and marketing purposes. To find out more about our use of cookies, please see our privacy policy.
By continuing to browse our website, you agree to our use of cookies.