Home » Privacy » data » Data Retention law’s In Switzerland

Data Retention law’s In Switzerland

Disclosure: All information on this site is harmless and purely for educational purposes which is why we post only authentic, unbiased information! The affiliate links are really there for discounts for our readers and for us to earn small commissions that help us stay afloat! Thanks!

Information assurance and information security are fundamental sacred rights ensured by the Swiss Constitution. Swiss information insurance law is set out in the Swiss Federal Data Protection Act of 19 June 1992 (DPA) and the going with Swiss Federal Ordinance to the Federal Act on Data Protection of 14 June 1993 (DPO).

Further information security arrangements overseeing specific issues (e.g., the handling of representative or therapeutic information) are spread all through countless administrative acts. As Switzerland is neither an individual from the European Union (EU) nor of the European Economic.

Area (EEA), it has no broad obligation to execute or agree to EU laws. Accordingly, Swiss information assurance law has a few quirks that vary from the lawful system given by the EU General Data Protection Regulation (GDPR).

Notwithstanding, due to Switzerland’s area in the focal point of Europe and its nearby monetary relations with the EU, Swiss law is by and large entirely impacted by EU law, both regarding substance and understanding. A closer arrangement of Swiss information security law with the GDPR is additionally one of the points of the progressing change of the DPA, which the Swiss Federal Council started in April 2015. 

Information Protection Act

Information assurance in Switzerland is likewise regulated by the Swiss Federal Data Protection Act (DPA) which contains: 

  • General leads to the guarantee of information 
  • Regulations about information preparing by people, associations and government specialists 
  • The obligations and assignments for the Federal Data Protection and Information Commissioner, the principle supervisory position 

As indicated by the Act, individual information handling must conform to the accompanying general standards: 

  • Principle of legitimateness – Personal information must be prepared legally 
  • Principle of proportionality – Personal information preparing must be completed following some essential honesty and must be proportionate 
  • The policy of fittingness – Personal information must be handled for a reason showed at the hour of accumulation, that is clear from the conditions, or that is accommodated by law 
  • Principle of straightforwardness – The collection of individual information and the reason for handling must be clear to the information subject 

Processing of sensitive information and personality profile is likewise shrouded in the Act, and the processors of such should acquire the express consent of information subjects. Touchy information and personality profile may contain information that allows an assessment of the fundamental qualities of an individual’s character.

The unjustified revelation of such information to outsiders is viewed as an information assurance rupture and is liable to fines. Each datum gathering must be freely expressed, and the subject of such accumulation must be advised about the reasons for information gathering and preparing, the character of the information controller and the classes of information beneficiaries if divulgence of information is arranged. Any individual can demand an information controller to state whether their knowledge is being prepared. 

The information subject must know 

  • All accessible information concerning the information subject 
  • The reason for preparing 
  • The classifications of individual information being handled 
  • Other gatherings associated with the handling. 

If the accumulation or handling of individual information is unlawful, an information subject can demand information preparing to be halted and personal data to be pulverized. 

The information controller must guarantee a proper degree of information security by executing specific and hierarchical assurance measures and ensure the classification, accessibility, and trustworthiness of the information. 

Treats must be utilized if the information subject is educated regarding such use and is given the decision to deactivate treats (quit system). 

Extra certainties and measurements: 

  • The held email and versatile correspondence information spread time of half-year (precisely 179 days). 
  • During this period, an aggregate of 7’112 database sections on the cell phone was recorded. Of these, 2’610 passages for Internet associations (36.7%, 14.6 every Day), 3’085 SMS/MMS (43.4%, 17.2 every day) and 1’417 sections for calls (19.9%, 7.9 every day) 
  • Balthasar caused an aggregate of 5’161’133’870 Bytes (5.2 GB – 28.8 MB every day) Internet traffic with his cell phone. Of which 979’745’187 Bytes (980 MB – 5.5 MB every day) were transferred and 4’181’388’683 Bytes (4.2 GB – 23.4 MB every day) were downloaded. 
  • As the area of the cell phone is distinguished with each telephone call, each instant message and each Internet association, we can investigate Balthasar’s development. His most elevated speed was around 180 km/h during a train ride on 09.04.2013 at 15:15. By and large, he has voyage a separation of at any rate 16’000 km during a half year. 
  • Email metadata is also recorded as a feature of the information maintenance. Inside a half year, Balthasar has gotten an aggregate of 14’638 Emails (82 every day) from about 6’500 individuals. He has sent 1’654 Emails (9 every day) to 600 individuals.

For more details, kindly visit https://iclg.com/practice-areas/data-protection-laws-and-regulations/switzerland.


Unlock the power of online security with our in-depth reviews and expert insights. Discover the best VPNs, password managers, and privacy tools to safeguard your digital world.