Inter­pel­la­ti­on Schwa­ab (15.3396): Is the fede­ral government’s data requi­ring spe­cial pro­tec­tion safe?

Inter­pel­la­ti­on Schwa­ab (15.3396): Is the fede­ral government’s data requi­ring spe­cial pro­tec­tion safe?

Sub­mit­ted text

I put the fol­lo­wing que­sti­ons to the Fede­ral Council:

1. what types of data are invol­ved in the con­tract men­tio­ned in the expl­ana­to­ry memo­ran­dum, which was award­ed to Hew­lett Packard?

2. what assu­ran­ces does the Fede­ral Coun­cil have that this data will not be dis­c­lo­sed to other intel­li­gence ser­vices, espe­ci­al­ly US intel­li­gence services?

3 What does the Fede­ral Coun­cil intend to do to ensu­re that the con­trac­tu­al obli­ga­ti­ons regar­ding data secu­ri­ty are also com­plied with? What sanc­tions are envi­sa­ged in the event of non-compliance?

4. the media release of 23 April 2015 men­ti­ons “com­pli­ance with the gui­de­lines of the fede­ral admi­ni­stra­ti­on”. Which gui­de­lines are we tal­king about?

5. whe­re is the data stored? Are they sub­ject to Swiss law exclu­si­ve­ly at all times?

6. if the data is stored exclu­si­ve­ly in Switz­er­land, can the Fede­ral Coun­cil ensu­re that no copies are sent to other countries?

7. what hap­pens to the data if the hosting pro­vi­der goes bank­rupt (cf. Fede­ral Council’s rep­ly to my Que­sti­on 14.1064)?

8. why were for­eign pri­va­te com­pa­nies con­side­red? Why can’t the ser­vice be deve­lo­ped intern­al­ly? Why could no Swiss com­pa­ny be considered?

9. why does the Fede­ral Office of Infor­ma­ti­on Tech­no­lo­gy, Systems and Tele­com­mu­ni­ca­ti­on (FOITT) not invo­ke the excep­ti­ons under Artic­le 3(2) of the Fede­ral Law of 16 Decem­ber 1994 on Public Procurement?

Justi­fi­ca­ti­on

On April 23, 2015, the FOITT announ­ced the award of two con­tracts with a total volu­me of 197 mil­li­on Swiss francs. The cloud will be deve­lo­ped with Hew­lett Packard. The com­pa­ny Terada­ta is respon­si­ble for the data sto­rage pro­ject. This order volu­me amounts to 137 mil­li­on Swiss francs.

Hew­lett Packard is a US com­pa­ny. Terada­ta (Schweiz) GmbH is the sub­si­dia­ry of a US com­pa­ny. Under U.S. coun­ter­ter­ro­rism laws (e.g. For­eign Intel­li­gence and Sur­veil­lan­ce Act; cf. Inter­pel­la­ti­on 13.3033), howe­ver, the­se com­pa­nies can be requi­red to dis­c­lo­se to U.S. intel­li­gence agen­ci­es all data in their pos­ses­si­on wit­hout noti­fy­ing the owners of the data. It must be ensu­red that the fede­ral government’s data is spared this fate.

State­ment of the Fede­ral Council

By way of intro­duc­tion, it should be noted that the Fede­ral Office of Infor­ma­ti­on Tech­no­lo­gy, Systems and Tele­com­mu­ni­ca­ti­on (FOITT) has pro­cu­red a plat­form for an inter­nal fede­ral pri­va­te cloud, which is ope­ra­ted by the FOITT its­elf. It is the­r­e­fo­re not, as could be infer­red from the que­sti­ons, a ser­vice in a public cloud which would be ope­ra­ted by an exter­nal provider.

1. as a ser­vice pro­vi­der, the FOITT will pro­vi­de its ser­vice reci­pi­en­ts (inte­re­sted fede­ral offices and other fede­ral admi­ni­stra­ti­ve units) with stan­dar­di­zed pri­va­te cloud ser­vices on this plat­form, such as vir­tu­al ser­vers. It is up to the indi­vi­du­al admi­ni­stra­ti­ve units to deci­de which data will be mana­ged via the plat­form; it can be assu­med that both unclas­si­fi­ed and “Inter­nal” and “Con­fi­den­ti­al” clas­si­fi­ed data will be pro­ce­s­sed or stored on this plat­form. Over the next peri­od of time, this plat­form will replace a simi­lar plat­form that is alre­a­dy ope­ra­ted by the BIT in the BIT data cen­ters using Hew­lett-Packard tech­no­lo­gy. In the pro­cess, new func­tion­a­li­ties will be available to BIT cus­to­mers, offe­ring grea­ter fle­xi­bi­li­ty and auto­ma­ti­on in the pro­vi­si­on and use of the platform.

2/3 The cloud plat­form is ope­ra­ted in the FOITT data cen­ters by FOITT employees. This is opti­mal for com­pli­ance with the gui­de­lines of the fede­ral admi­ni­stra­ti­on, espe­ci­al­ly with regard to secu­ri­ty. Hew­lett Packard only pro­vi­des the hard­ware. In order to fur­ther mini­mi­ze the risk of data leaka­ge, main­ten­an­ce ope­ra­ti­ons by the sup­plier are car­ri­ed out in such a way that the work can be moni­to­red. For this rea­son, in this par­ti­cu­lar case – in con­trast to mana­ged ser­vices, for exam­p­le – gua­ran­tees on the part of Hew­lett Packard are suf­fi­ci­ent, as the fede­ral govern­ment usual­ly demands from hard­ware sup­pliers. The­se gua­ran­tees include com­pli­ance with the obli­ga­ti­on to main­tain sec­re­cy and data pro­tec­tion, which were for­mu­la­ted in the WTO pro­ce­e­dings as man­da­to­ry cri­te­ria for the award of the con­tract in the draft con­tract and which Hew­lett Packard has accept­ed. In the event of data theft, the pro­vi­si­ons of cri­mi­nal law (for exam­p­le, Art. 143bis, 144bis StGB) are also applicable.

4. the gui­de­lines men­tio­ned include in par­ti­cu­lar the direc­ti­ves of the Fede­ral Coun­cil on ICT secu­ri­ty in the Fede­ral Admi­ni­stra­ti­on of 14 August 2013 (WIsB), which have been revi­sed and will come into force in the new ver­si­on on 1 Janu­ary 2016 (direc­ti­ves of 1 July 2015). The gui­de­lines men­tio­ned also include the spe­ci­fi­ca­ti­ons of the Fede­ral IT Stee­ring Com­mit­tee on ICT secu­ri­ty (see www.isb.admin.ch > Topics > Secu­ri­ty > Secu­ri­ty fun­da­men­tals > IT secu­ri­ty direc­ti­ves). In addi­ti­on, Swiss legis­la­ti­on on this topic, such as the Fede­ral IT Ordi­nan­ce of 9 Decem­ber 2011 (Bin­fV; SR 172.010.58), the Ordi­nan­ce of 4 July 2007 on the Pro­tec­tion of Fede­ral Infor­ma­ti­on (ISchV; SR 510.411), the Data Pro­tec­tion Act of June 19, 1992 (DPA; SR 235.1), the Ordi­nan­ce of June 14, 1993 on the Fede­ral Data Pro­tec­tion Act (DPA; SR 235.11), and the Govern­ment and Admi­ni­stra­ti­on Orga­nizati­on Act of March 21, 1997 (RVOG; SR 172.010). On 29 Janu­ary 2014, the Fede­ral Coun­cil deci­ded to draw up prin­ci­ples and prin­ci­ples to mini­mi­ze the risk of intel­li­gence spy­ing by instru­men­tal ICT pro­vi­ders. As a new ele­ment of the ICT secu­ri­ty pro­ce­du­res, a cor­re­spon­ding audit con­cept has been tested for sen­si­ti­ve pro­cu­re­ments sin­ce the end of 2014. This risk manage­ment method for redu­cing intel­li­gence spy­ing (Rina) has been incor­po­ra­ted into the new WIsB. As part of this work, the pro­cu­re­ment of a cloud plat­form was also tested and the sel­ec­ted orga­nizatio­nal and secu­ri­ty solu­ti­ons were jud­ged to be appropriate.

5/6 The data is loca­ted on the cloud plat­form, which is ope­ra­ted in the FOITT data cen­ters by FOITT employees. The­r­e­fo­re, the data always remains under Swiss law. Main­ten­an­ce ope­ra­ti­ons by the sup­plier are car­ri­ed out in such a way that the work can be moni­to­red. This mini­mi­zes the risk of data leaka­ge. Howe­ver, sin­ce every data plat­form is always expo­sed to a resi­du­al risk of data mis­ap­pro­pria­ti­on, no for­mal gua­ran­tee can be given against data misappropriation.

7. sin­ce no data sto­rage by a pri­va­te com­pa­ny is pro­vi­ded for, the que­sti­on of a pos­si­ble bank­rupt­cy of the hosting pro­vi­der does not arise.

On the one hand, it must be noted that the­re is no Swiss manu­fac­tu­rer for the tech­no­lo­gy put out to ten­der, in par­ti­cu­lar its hard­ware, which inte­gral­ly pro­du­ces the­se systems in Switz­er­land. On the other hand, the pro­cu­re­ments of the Fede­ral Admi­ni­stra­ti­on are sub­ject to WTO law, which is based on the prin­ci­ple of non-discrimination.

Based on estab­lished case law, the appli­ca­ti­on of the excep­ti­on clau­se under Artic­le 3(2) of the Fede­ral Act of 16 Decem­ber 1994 on Public Pro­cu­re­ment (SR 172.056.1) is only per­mis­si­ble under strict con­di­ti­ons. It must be pro­ven that alter­na­ti­ve, less com­pe­ti­ti­on-dis­tort­ing mea­su­res were exami­ned and that the­se did not pro­ve to be sui­ta­ble, i.e. suf­fi­ci­ent­ly risk-redu­cing. In the pre­sent case, the appli­ca­ti­on of such an excep­ti­on was not justified.

Aut­ho­ri­ty

Area

Topics

Rela­ted articles

Sub­scri­be