Moti­on Eichen­ber­ger-Walt­her (16.3186): Exch­an­ge of tech­ni­cal information

Moti­on Eichen­ber­ger-Walt­her (16.3186): Exch­an­ge of tech­ni­cal information
Not yet dealt with in the Coun­cil. The Fede­ral Coun­cil pro­po­ses that the moti­on be rejected.

Sub­mit­ted text

The Fede­ral Coun­cil is invi­ted, in con­nec­tion with the review of the “Natio­nal Stra­tegy for the Pro­tec­tion of Switz­er­land against Cyber Risks (NCS)” to be sub­mit­ted after five years (in sum­mer 2017), to show how data pro­tec­tion, data secu­ri­ty and the fight against cyber­at­tacks (crime, espio­na­ge, theft of intellec­tu­al pro­per­ty) are cle­ar­ly demar­ca­ted from each other in legal terms so that data is pro­tec­ted but the exch­an­ge of tech­ni­cal infor­ma­ti­on is enab­led. A legal basis must be crea­ted for the exch­an­ge of tech­ni­cal information.

Justi­fi­ca­ti­on

Given the sen­si­ti­vi­ty of the data of vic­tims of cyber­at­tacks and the tech­ni­cal com­ple­xi­ty, a clear delinea­ti­on of the issues of data pro­tec­tion, data secu­ri­ty and the manage­ment of cyber­at­tacks seem urgent, as does the legal basis based on them, which allo­ws the exch­an­ge of tech­ni­cal infor­ma­ti­on under clear conditions. 

State­ment of the Fede­ral Council

The legal frame­work is as follows:

In the con­text of an ongo­ing cri­mi­nal inve­sti­ga­ti­on, the Code of Cri­mi­nal Pro­ce­du­re sets the frame­work of sec­re­cy or publi­ci­ty of the proceedings.

As far as infor­ma­ti­on from intel­li­gence sources is con­cer­ned, this will be regu­la­ted in the new Intel­li­gence Act (against which, howe­ver, a refe­ren­dum was held).

As a rule, tech­ni­cal infor­ma­ti­on pro­ce­s­sed in con­nec­tion with cyber­at­tacks does not con­sti­tu­te per­so­nal data; in the­se cases, the­re is no per­so­nal refe­rence. This does not app­ly to infor­ma­ti­on that allo­ws con­clu­si­ons to be drawn about the per­sons or com­pa­nies con­cer­ned. This means that tech­ni­cal infor­ma­ti­on does not in prin­ci­ple fall within the scope of the Data Pro­tec­tion Act (Fede­ral Act of 19 June 1992 on Data Pro­tec­tion, FADP; SR 235.1). Con­se­quent­ly, the­re is no need for deli­mi­ta­ti­on or (addi­tio­nal) pro­tec­tion here; the risk of a per­so­na­li­ty vio­la­ti­on is extre­me­ly low in the­se cases.

(Per­so­nal) data of vic­tims of cyber­at­tacks are alre­a­dy con­side­red per­so­nal data requi­ring spe­cial pro­tec­tion under the regime of the cur­rent FADP (if they rela­te to admi­ni­stra­ti­ve or [not pen­ding] cri­mi­nal sanctions/prosecutions); they are sub­jec­ted to increa­sed tech­ni­cal and orga­nizatio­nal pro­tec­tion, which is sufficient.

The Fede­ral Coun­cil now inter­prets the moti­on to mean that it should be pos­si­ble to exch­an­ge tech­ni­cal infor­ma­ti­on bet­ween the sta­te and the pri­va­te sec­tor for the pur­po­ses of prevention.

In the area of cri­ti­cal infras­truc­tures, a public-pri­va­te part­ner­ship bet­ween the sta­te and the pri­va­te sec­tor, the Report­ing and Ana­ly­sis Cen­ter for Infor­ma­ti­on Assu­rance MELANI, has exi­sted sin­ce 2004. MELANI brings tog­e­ther part­ners who are acti­ve in the field of com­pu­ter system and Inter­net secu­ri­ty and the pro­tec­tion of Swiss cri­ti­cal infras­truc­tures. Such coope­ra­ti­on requi­res a high degree of trust so that infor­ma­ti­on can be exch­an­ged bet­ween the partners.

An important cri­ter­ion here is that the infor­ma­ti­on sup­plier clas­si­fi­es his infor­ma­ti­on today accor­ding to an agreed system. If this infor­ma­ti­on is clas­si­fi­ed as con­fi­den­ti­al or even secret, he trusts the sta­te not to dis­c­lo­se it. This also applies to tech­ni­cal infor­ma­ti­on, as it is often pos­si­ble to draw con­clu­si­ons about the infor­ma­ti­on sup­plier, i.e. the inju­red par­ty, on the basis of this infor­ma­ti­on. The exch­an­ge of infor­ma­ti­on with fur­ther cir­cles can only take place within this frame­work. From today’s per­spec­ti­ve, the­re are no plans to chan­ge this prac­ti­ce, as it could jeo­par­di­ze the very good coope­ra­ti­on bet­ween MELANI and the ope­ra­tors of cri­ti­cal infrastructures.

The exch­an­ge of infor­ma­ti­on bet­ween MELANI and the ope­ra­tors of cri­ti­cal infras­truc­tures is also the sub­ject of the plan­ned Infor­ma­ti­on Secu­ri­ty Act (ISG). The ISG dis­patch is expec­ted to be adopted by sum­mer 2016 fol­lo­wing con­sul­ta­ti­on with parliament.

Sin­ce seve­ral are­as of law with diver­se inter­faces are invol­ved, the NCS coor­di­na­ti­on office works with the fede­ral offices respon­si­ble for the are­as to ensu­re that coor­di­na­ting coope­ra­ti­on is con­sist­ent­ly ensu­red in legis­la­ti­on and enforce­ment and that new chal­lenges can be respon­ded to quick­ly and coherently.

The mea­su­res listed here are alre­a­dy being imple­men­ted wit­hout accep­tance of the moti­on. In the view of the Fede­ral Coun­cil, the­re is no need for addi­tio­nal regulation.

Aut­ho­ri­ty

Area

Topics

Rela­ted articles

Sub­scri­be