Digital Transformation.
Powered by Security.
Don't have an account yet? Register now to make sure you don't miss any news and to access exclusive content for professionals.
Public bodies manage particularly sensitive data and are obliged to protect it accordingly. The new privatim resolution once again raises the very specific question: How are cloud offerings compatible with the effective protection of sensitive data?
The Conference of Swiss Data Protection Commissioner (Privatim) states in its recently published resolution, «that the use of SaaS solutions from international providers for public bodies is only permitted if the personal data that is particularly sensitive or subject to a statutory duty of confidentiality is encrypted by the relevant body itself. The cloud provider must not have access to the key.» [1]
As specialists in information protection, we have long shared this view and see it as an important orientation for public administrations.
In the private sector, information is usually classified according to confidentiality levels - from «internal» to «confidential» or «secret». The classification «confidential» and higher is typically considered particularly worthy of protection, which usually includes customer data, personnel data, information on research and development, financial figures or M&A initiatives, etc.
Private companies can - within the legal framework - consciously decide what risk they want to take or whether or not they want to give up confidentiality. Of course, this does not apply to highly regulated sectors with a particular focus on data protection.
The situation is different for public authorities: They manage data that affects citizens and entire institutions. An individual risk assessment is not enough here. Public administration must be guided by clear guidelines - this is exactly what data protection officers and their committees are there for.
The privatim resolution now makes it unmistakably clear that the protection of particularly sensitive data must have top priority when using cloud services.
The privatim resolution is not a cloud ban, but a clarification of data sovereignty.
Two central principles can be derived from the perspective of information protection:
A structured process is needed for these principles to take effect in everyday life:
First of all, it must be clarified what type of data is being worked with. Experience has shown that purely manual classification by end users leads to many errors. Automatic classification, on the other hand, reaches its limits as soon as information is combined: A very confidential overall picture can suddenly emerge from several inconspicuous components. This is where supplementary solutions such as data loss prevention or data governance approaches provide support. [2]
Zero Trust must not end at the network, but must also consider the data level.
When transferring or storing data, it is necessary to check where the data flows to and how the destination is characterized:
The necessary protective measures are derived from this.
Different approaches are indicated depending on the scenario:
For public bodies, risk-taking is not a private matter, but a state responsibility.
Many organizations rely heavily on legal expertise and the applicable law. This is important, but it is no substitute for technical and organizational protective measures. Compliance does not automatically mean security or that the risk of data leaks is sufficiently reduced.
International developments - such as extraterritorial access rights of individual states - mean that smaller countries can no longer fully rely on a uniform global legal system. The Swiss Data Protection Commissioner's resolution takes this reality into account: public administrations must protect sensitive data in such a way that they remain under their own control, even when using cloud services.
How can sensitive data be protected in modern cloud environments so that public bodies can maintain data sovereignty and at the same time benefit from the advantages of SaaS services?
In information protection, this challenge can only be met by proprietary encryption concepts.
This is precisely where our «Centraya» encryption solution comes in, through
For public administration, this means that zero trust must not end at the network boundary, but must be extended to the data level - especially in the cloud.
We would be happy to show you what such a strategy could look like in your organization.
[1] privatim. (November 24, 2025). privatim.ch. From https://www.privatim.ch/de/privatim-verabschiedet-resolution-zu-internationalen-cloud-losungen/ retrieved
[2] Data Loss Prevention (DLP) helps to detect and prevent unwanted data outflows - for example when sending emails, uploading to the cloud or saving to external data carriers. Data governance defines the organizational framework for handling data, for example who is allowed to see, process or export which information, how long it must be stored and when it must be deleted.
[3] One Digital rights management solution (DRM) protects files by encrypting them and controlling their use granularly. It therefore determines who may open, edit, forward or print a file and for how long it may be used, even if it has already left the company's own infrastructure.
Find out more about trends. After registering, you can download factsheets and other specialist articles from our Trend Sites.
Our experts will be happy to answer any questions you may have on this trend topic.