Canceling a transaction

Canceling a transaction according to the Consumer Protection Regulations 2010-1771
The right of cancellation as stated in these regulations will not apply to the product according to Its definition in the Computer Law 5555-1995.

  1. DEFINITIONS

    In this law -
    "Computer material" - software or information;
    "Computer" - a device that operates using software to perform arithmetic or logical processing of data, and its peripheral equipment, including a computer system, but excluding an auxiliary computer;
    "Auxiliary computer" - a computer capable of performing arithmetical calculation operations only and operations involving the execution of such operations;
    "Information" - data, signs, concepts or instructions, with the exception of software, expressed in a computer-readable language, and stored on a computer or other storage medium, provided that the data, signs, concepts or instructions are not intended for use on a computer only;
    "Output" - data, signs, concepts or instructions, produced, in any way, by a computer;
    "Computer readable language" - a form of expression suitable for delivery, interpretation or processing by a computer or computer aid only;
    "Software" - a set of instructions expressed in a computer-readable language, capable of causing a computer to function or an action to be performed by a computer,
    And it is embodied, imprinted or marked on a device or object, by electronic, electromagnetic, electrochemical, electro-optical or other means,
    Either it is inherent or unified with the computer in some way or it is separate from it, and all if it is not intended for use on an auxiliary computer only.


  2. DISRUPTION OR INTERFERENCE WITH A COMPUTER OR COMPUTER MATERIAL

    Whoever illegally commits one of these, his sentence is three years imprisonment:
    (1) disrupts the normal operation of a computer or interferes with its use;
    (2) Deletes computer material, causes a change in it, disrupts it in any other way or interferes with its use.


  3. FALSE INFORMATION OR FALSE OUTPUT

    (A)
    The one who does one of these is sentenced to five years in prison:
    (1) Transmits to another or stores in a computer false information or performs an action regarding information so that the result is false information or false output;
    (2) Writes software, transfers software to another or stores software on a computer, so that the result of its use is false information or false output, or operates a computer while using said software.
    (B)
    In this section, "false information" and "false output" - information or output that is misleading, depending on the purposes of their use.


  4. UNLAWFUL ACCESS TO COMPUTER MATERIAL

    The one who unlawfully accesses computer material located on the computer is sentenced to three years in prison; for this purpose, "intrusion into computer material" - intrusion through.
    Calling or connecting to a computer, or by turning it on, but with the exception of intrusion into computer material, which is wiretapping according to the Wiretapping Law, 1979-1979.


  5. PENETRATING COMPUTER MATERIAL TO COMMIT ANOTHER OFFENCE

    Whoever commits an act prohibited according to section 4 in order to commit an offence according to any law, except according to this law, his penalty is five years imprisonment.


  6. PROHIBITED ACTIONS IN THE SOFTWARE

    (A)
    The editor of the software in such a way that he is capable of performing any of the actions listed below, with the purpose of performing them illegally, shall be sentenced to three years imprisonment:
    (1) Disrupting the normal operation of a computer or interfering with its use;
    (2) Deleting computer material, causing it to be changed, disrupting it in any other way or interfering with its use;
    (3) Actions that result in false information or false output, as defined in section 3(b);
    (4) Penetration of computer material, as defined in section 4, located in the computer;
    (5) Eavesdropping, as defined in the Eavesdropping Law, 1979-1979;
    (6) Violation of privacy as stated in Section 2 of the Privacy Protection Law, 1981-5771.
    (B)
    Who distributes or offers to the public, transfers to another, injects into anothers computer or installs on anothers computer a password, access code or information.
    Similarly, for one of the actions listed in subsection (a) to be carried out illegally, the penalty is three years imprisonment.
    (C)
    Who distributes or offers to the public, transfers to another, injects into anothers computer or installs into anothers computer software or device thati.
    To perform an action from the actions listed in subsection (a), so that said action is performed illegally, the penalty is five years imprisonment.


  7. LAW AND JUDGMENT

    The law applicable to these regulations and/or to any action and/or to a conflict arising from it, is Israeli law only.


If you have any questions or suggestions about this Agreement, please contact us at support@levelforecast.com

© 2010-2024 Levelforecast inc. All rights reserved.

Terms of use | Privacy Policy | Canceling transaction

Disclaimer: The LevelForecast, doesn't provide personal investment or financial advice to individuals, or act as personal financial, legal,
or institutional investment advisors, or individually advocate the purchase or sale of any security or investment or the use of any particular financial strategy.
All investing and forecasts and investment strategies include the risk of loss for some or even all of your capital. Before pursuing any financial strategies
discussed on this website, you should always consult with a licensed financial advisor.