Key Benefits:
On 8 October 2014 (State 1 Er November 2014)
The Swiss Federal Council,
Having regard to art. 5, para. 4, and 6 L Federal Law of 3 October 2008 on Civil Intelligence (LFRC) 1 , given art. 10 A , para. 5, 15, para. 3 and 5, and 30 of the Federal Act of March 21, 1997, instituting measures for the maintenance of domestic security (SIMA) 2 ,
Stops:
This order regulates the operation, content and use of the following information systems of the Confederation Intelligence Service (CBC):
In this order, the following means:
1 The user who has the right to access an information system of the CBC only has access to the data it needs to perform the tasks assigned to it by the law.
2 The appropriate head of the CBC or his or her alternate shall decide on individual requests for access rights.
3 The SRC responds to the execution of the credentials.
1 Users of the CBC information systems can simultaneously access all of the CBC's information systems within the limits of their access rights. To this end, they have an appropriate research and distribution function.
2 Users can establish a relationship between the ISAS and ISIS information sources and an individual object to allow analysis across multiple systems.
1 Original documents can be entered by optical character recognition.
2 Original documents entered in electronic form do not need to be retained on paper.
1 The CBC may transmit personal data which is processed in its information systems to the authorities and offices listed in Annex 3 of the Order of 4 December 2009 on the Federal Intelligence Service (OSRC) 1 For the purposes and conditions set out therein.
2 The following provisions govern the transmission of personal data to a foreign service:
3 It is forbidden to transmit data when overriding public or private interests are opposed.
4 During each transmission, the CBC shall inform the addressee of the evaluation and the timeliness of the data transmitted.
5 He reports to the recipient:
1 The data shall be deleted within three months of the expiry of their retention period laid down in Art. 19, 26, 31, 36, 40 and 44.
2 In ISAS and ISIS, clearing the last referenced document source causes the object to be deleted.
3 In ISAS, the original document is deleted at the latest by the expiry of the shelf life.
4 In ISIS, clearing the last document source causes the referenced original document to be deleted.
5 The deleted data is transferred to an archive module.
1 The following provisions govern data security:
2 The CBC specifies in treatment regulations:
The CBC operates a portal that compiles data from publicly available information sources (open source access portal, ROSO portal).
1 The CBC operates a secure computer network (SiLAN network) separated from other computer networks.
2 It operates its information systems, manages file classification and operates the CBC intranet system in the SiLAN; network; the ISAS index and the ISIS index, as well as the PES, are not operated in the SiLAN network to ensure access External authorities.
3 All classified data can be processed in the SiLAN network, regardless of their classification level.
4 Only the collaborators of the SRC, the Intelligence Service Surveillance of the Federal Department of Defence, the Protection of Population and Sport (DDPS), the Army Intelligence Service and the Service Provider The information and communication (ICT provider) of the CBC who have been given the necessary rights have access to the SiLAN network. The representatives to whom the aforementioned services have given a right of access shall be subject by analogy to the same conditions of use.
1 The transmission of data outside the SiLAN network is governed by the order of 4 July 2007 concerning the protection of information 1 .
2 The Confederation funds the transmission of data to a central point of connection for the cantons.
3 The cantons are responsible for:
1 The RFSP determines the technical requirements that user terminals must meet. External authorities are only connected to the network when their terminals meet these requirements.
2 The CBC sets the terms and conditions for each information system in processing regulations.
1 The CBC is responding to its information systems.
2 The SRC's application management and quality assurance services respond to the training and technical support of the users of the CBC's information systems. These services ensure the implementation of the treatment regulations.
3 The CBC's ICT provider is responsible for the technical operation, maintenance and security of the information systems referred to in s. 1, let. A, b and d to f. The ICT provider of the National Central Alarm responds to the technical operation, maintenance and safety of the PES.
4 The service responsible for quality assurance checks the legality of the processing of data entered in the information systems referred to in Art. 1, let. C to f, its adequacy, effectiveness and accuracy. It carries out this control at least once a year for each information system according to a control plan.
The following provisions govern the right of persons to access data concerning them:
The structure of ISAS is based on art. 6 E LFRC.
1 The content of ISAS is based on art. 6 C LFRC.
2 Objects and documentary sources can be visually presented and this visual presentation can be recorded.
3 Annex 1 lists the personal data catalogue.
4 The DDPS defines the data fields.
5 The index contains data relating to all persons and organisations relevant to the tasks to be performed by external users of ISAS, subject to data which cannot be registered for reasons of protection Sources.
6 The index contains classified data up to the CONFIDENTIAL level.
The CBC staff responsible for capturing the data appreciate the relevance and accuracy of the personal data to be captured.
1 The CBC staff responsible for entering data periodically control the blocks of data contained in ISAS which contain objects relating to individuals or organizations.
2 To this end, they carry out the following tasks:
3 Periodic monitoring occurs whenever a block of data is completed. The following maximum time limits apply to data from the following areas:
4 The service responsible for ensuring quality ensures compliance with paras. 2 and 3 by providing in-house training and regular checks. It carries out these checks at least once a year according to a control plan.
1 The following retention periods are applicable to documentary sources recorded in ISAS:
2 The retention period for original documents is 45 years.
1 ISIS includes:
2 The DDPS defines the data fields.
1 ISIS contains data necessary to carry out the domestic security intelligence tasks under SIMA.
2 It contains data concerning natural and legal persons, organisations, objects and events.
3 It can also contain sensitive data and personality profiles.
4 Annex 1 lists the personal data catalogue.
5 The index contains data on all persons and organizations relevant to the tasks that external users of ISIS must perform, subject to data that cannot be recorded in the index for reasons of Source protection.
6 The index contains classified data up to the CONFIDENTIAL level.
1 The CBC staff responsible for entering data input the information into ISIS. Prior to the seizure of new information, they are required to assess whether this information confirms or negates the relevance of the person or organization concerned in performing the intelligence tasks that SIMA assigns to the CBC.
2 Collaborators assess on the basis of the source, type of transmission, content and information available if the data are secure or uncertain, and mark them accordingly.
3 The data are entered provisionally and are marked accordingly.
4 Objects and documentary sources can be visually presented and this visual presentation can be recorded.
5 Data relating to persons or organizations contained in the original documents may be reused only when an object concerning the person or organization in question has been established.
1 The quality assurance service verifies that the data has been entered legally. For this purpose, it shall, in particular, assess whether their relevance is sufficient, if the treatment restrictions referred to in Art. 3 SIMA has been complied with and the evaluation of the data is accurate.
2 It confirms the definitive seizure of these data by marking them accordingly.
3 He erases the data that he has not confirmed.
1 The quality assurance service shall carry out an overall assessment of the data block no later than five years after the entry of the relevant article. It then proceeds to an overall assessment of the data block every three years at least.
2 It verifies, in light of the existing hazards and risks, whether the data block is still required to maintain domestic security and to perform other intelligence tasks that SIMA assigns to the CBC. It clears the data that the CBC no longer needs.
3 Data marked as uncertain for more than three years can only continue to be used up to the next global assessment if the following conditions are met:
4 The service responsible for ensuring quality notes on the blocks of data which can continue to be used that it has carried out their overall assessment.
5 Objects marked for more than three years as data relating to third parties are deleted at the global assessment.
1 Documentary sources recorded in ISIS may be retained for up to 15 years, subject to para. 2.
2 The following retention periods apply to the following documentary sources recorded in ISIS:
1 CERS may retain for up to five years the data they have entered under SIMA in the course of their intelligence work for the Confederation.
2 At the end of this period, they are required to destroy this data.
1 CBC collaborators have online access to the data contained in ISIS.
2 The following authorities have online access to the index as follows:
3 Schedule 2 sets out the individual access rights.
1 The NEP is an on-line information system for the presentation, evaluation and analysis of the internal and external security situation and security policy measures.
2 It consists of the following records, which contain the following data:
1 The PES contains:
2 Annex 3 lists the personal data catalogue.
The retention period of the data contained in the PES and the original documents relating thereto shall be no more than three years.
1 The authorities and offices referred to in Annex 3 OSRC 1 Have access to the PES for the purposes and conditions set out therein.
2 In the event of an event involving an increased security risk, the Director of the CBC may grant, for a limited period of time to private services and to foreign security and police authorities, access to certain contents of the PES if one of the The following conditions are met:
3 The CBC may apply to the authorities and services referred to in para. 1 that they inform him of the use of the data.
4 Appendix 4 sets out the individual access rights.
1 RS 121.1
1 The P4 module is an information system which allows the processing and analysis of information about the entry into Switzerland or the exit of Swiss territory from nationals of certain foreign countries.
2 It consists of a classification system for the seizure and consultation of data transmitted to the CBC by the customs control bodies.
1 Module P4 contains the following data:
2 Annex 5 lists the personal data catalogue.
1 The CBC's collaborators have on-line access to the data contained in Module P4.
2 The staff of the SRC responsible for the research programme to process and analyse the entry into Switzerland and the exit of the Swiss territory from nationals of certain foreign countries may, in addition, enter, amend or delete data in Module P4, provided that the tasks required by law are fulfilled by the law.
3 The DDPS intelligence monitoring collaborators have online access to the data contained in Module P4 for the duration of their inspections.
4 Annex 6 sets out the individual access rights.
The retention period for the data contained in Module P4 and the original documents relating to it is not more than five years.
1 The CBC operates in the SiLAN network the GEVER SRC information system, which enables the management, processing and control of mandates and cases.
2 Notwithstanding s. 12, para. 2 and 3, of the GEVER order of 30 November 2012 1 , classified data CONFIDENTIAL and SECRET can be recorded in GEVER SRC without being encrypted.
1 RS 172.010.441
1 GEVER SRC contains:
2 To the extent that source protection is guaranteed, the data used to establish the contents referred to in para. 1, let. A to c, can also be processed for five years in GEVER SRC.
1 The employees of the CBC may consult, seize, modify and delete data in GEVER SRC, provided that the duties required by law are fulfilled.
2 Annex 7 sets out the individual access rights.
The following retention periods apply to the data contained in GEVER SRC:
The ROSO intermediate storage space is an information system that allows for the evaluation of large amounts of data.
1 The ROSO intermediate storage space contains data from publicly available information sources.
2 Annex 8 lists the personal data catalogue.
1 The staff of the SRC can access, enter, modify or delete data stored in the ROSO intermediate storage space, provided that the performance of the tasks that the law assigns to them is Requires.
2 The DDPS intelligence monitoring collaborators have online access to the data contained in the ROSO intermediate storage space for the duration of their inspections.
3 Annex 9 sets out the individual access rights.
The data contained in the ROSO intermediate storage space can be kept for as long as the evaluation requires it, but for no more than six months.
The Order of 4 December 2009 on the information systems of the Federal Intelligence Service 1 Is repealed.
1 [ RO 2009 7041 , 2011 6081 , 2013 4359]
This order shall enter into force on 1 Er November 2014.
(art. 16, para. 3, and 22, para. 4)
(art. 20, para. 3, and 28, para. 3)
Function |
ISIS/ISAS |
ISIS - /ISAS - Index |
SRC Application Manager (technically) |
A |
A |
SRC Administrator (Technical) |
A |
A |
CBC Archivist |
E |
L |
SRC Domain Manager |
X |
L |
SRC Data Manager |
S |
L |
Data/triage person and the ComCenter SRC |
X |
L |
People capturing data from the SRC assessment |
X |
L |
People capturing cyber/collaborators data for control DJIMON SRC |
X |
L |
People entering information about searching for information |
X |
L |
Person capturing data at the Federal Situation Centre |
X |
L |
Contributor to the CBC Quality Service |
Z |
L |
Other CBC collaborators who need these data to perform the duties that the law assigns to them |
L |
L |
Contributor to the CBC Security Service |
S |
L |
SRCant |
- |
L |
Security of Information and Objects, Federal Chancellery, Federal Office of Police |
- |
L |
Legends
A = administrator privileges
E = read, mute, enter
L = read
S = read, statistics, audit
X = read, mute, enter, erase
Z = read, mute, enter, erase, statistic, audit
(art. 30, para. 2)
(art. 32, para. 4)
Events |
Situation Reports |
SRC PES |
|
Person capturing data at the Federal Situation Centre |
X |
X |
X |
Other CBC collaborators |
E |
E |
E |
Authorities as per Annex 3 OSRC 1 |
E |
E |
- |
SRC Administrator |
A |
A |
A |
Contributor to the CBC Quality Service |
Z |
Z |
Z |
Contributor to the CBC Security Service |
S |
S |
S |
CBC Archivist |
X |
X |
X |
Legends
A = administrator privileges
E = read, mute, enter
L = read
S = read, statistics, audit
X = read, mute, enter, erase
Z = read, mute, enter, erase, statistic, audit
(art. 34, para. 2)
(art. 35, para. 4)
SRC Administrator |
A |
P4 SRC Specialist Service Contributor |
X |
CBC Foreigner Service Collaborator |
L |
Collaborator Research Internal and External Security SRC |
L |
SRC Analyst |
L |
Federal Situation Centre Collaborator |
L |
Contributor to the CBC Security Service |
S |
Contributor to the SD Monitoring Service |
L* |
CBC Archivist |
X |
Legends
A = administrator privileges
X = read, mute, enter, erase
L = read
S = read, statistics, audit
* only for the duration of inspection
(art. 39, para. 2)
SRC Administrator |
A |
CBC staff |
X |
Contributor to the CBC Security Service |
S |
CBC Archivist |
X |
Legends
A = administrator privileges
X = read, mute, enter, erase
S = read, statistics, audit
(art. 42, para. 2)
(art. 43, para. 3)
SRC Administrator |
A |
CBC Archivist |
X |
SRC Contributor |
X |
Contributor to the CBC Security Service |
S |
Contributor to the SD Monitoring Service |
S* |
Legends
A = administrator privileges
X = read, mute, enter, erase
S = read, statistics, audit
* only for the duration of inspection