Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Data Regulation in Switzerland’s Financial Sector

Contributors

Salma Khan

Data Privacy Analyst

CIPP/Asia

Syed Tatheer Kazmi

Associate Data Privacy Analyst, Securiti

CIPP/Europe

Listen to the content

Introduction

In Switzerland's financial sector, data regulation is not merely a legal obligation but a cornerstone of trust and operational integrity. Financial institutions handle vast amounts of sensitive personal and financial data daily, facilitating innovation while exposing themselves to significant risks. Data breaches, cyber threats, and regulatory non-compliance can lead to severe consequences, including financial loss, reputational damage, and legal repercussions.

For the purpose of this blog, "financial institutions" refers to a broad range of entities operating in Switzerland's financial sector, including banks, insurance companies, investment firms, payment service providers, and other entities subject to relevant laws and regulations. We will examine the evolving regulatory landscape governing data privacy, security, governance, and Artificial intelligence (AI) in Switzerland's financial sector, outlining the key obligations and compliance measures necessary for financial institutions to navigate this complex environment effectively.

Overview of Regulatory Framework

To mitigate the risks in the financial sector, financial institutions must establish robust data governance frameworks that prioritize privacy, security, and compliance. These frameworks should align with key regulations, including the Federal Act on Data Protection (FADP), the Data Protection Ordinance (DPO), the Anti-Money Laundering Act (AMLA), the Banking Act, the Financial Market Infrastructure Act (FinMIA), and the Financial Market Supervision Act (FINMASA).

Regulatory bodies such as the Federal Data Protection and Information Commissioner (FDPIC), the Swiss Financial Market Supervisory Authority (FINMA), and the National Cyber Security Centre (NCSC) provide oversight and guidance to enhance resilience against cyber threats and ensure regulatory adherence.

Data Privacy in the Financial Sector & How Securiti Can Help

Data Collection

Under Article 19 of the FADP, financial institutions must inform customers about their data collection practices. This includes providing customers with clear and sufficient information to enable them to exercise their rights effectively. Specifically, financial institutions must disclose:

  • The identity and contact details of the data controller.
  • Categories of personal data collected (if not directly obtained from the data subject).
  • Purposes for which the data is processed.
  • Recipients or categories of recipients to whom the data is transmitted, including details on cross-border transfers such as the destination country or international organization.

Securiti’s Privacy Notice Module automates and customizes privacy notices for compliance with global data laws, ensuring transparency and real-time updates.

The FADP mandates that personal data processing must comply with legal requirements. Unlike some other frameworks, the FADP does not impose specific lawful basis requirements for private entities. However, financial institutions must ensure that when consent is used as a legal basis for data processing, it must be informed, specific, and freely given. Explicit consent is mandatory for processing sensitive personal data or conducting high-risk profiling, as outlined in Articles 6(6) and 6(7) of the FADP.

The retention period for data in the financial sector can vary depending on specific circumstances and regulatory requirements. Generally, financial institutions must adhere to the Swiss Code of Obligations, which, under Article 958(f), mandates a ten-year retention period for accounting records. This requirement is also reflected in other laws, such as Article 7 of the AMLA. Additionally, Article 6(4) of the FADP requires that personal data be deleted or anonymized once it is no longer needed unless other legal obligations apply.

Securiti’s Data Privacy solution automates compliance with evolving global privacy regulations and principles.

Data Processing Principles

Article 6 of the FADP outlines essential principles for data processing, which financial institutions must follow:

  • Lawfulness: All data processing must be processed lawfully.
  • Good Faith and Proportionality: Data processing must be fair, transparent, and limited to what is necessary for its intended purpose.
  • Purpose Limitation: Personal data must be collected and processed only for specific, clearly defined purposes that the data subject can recognize.
  • Accuracy: Financial institutions must ensure that the customer’s data is accurate. They must take all appropriate measures to correct, delete or destroy data that are incorrect or incomplete insofar as the purpose for which they are collected or processed is concerned.

Securiti’s Data Privacy solution automates compliance with evolving global privacy regulations and principles.

Data Subjects’ Rights

Chapter 4 of the FADP grants data subjects several rights that financial institutions must facilitate. These rights include:

  • Right to information.
  • Right to access personal data.
  • Right to erasure of personal data.
  • Right to object to data processing.
  • Right to data portability.
  • Right not to be subjected to automated decision-making.

Under the FADP, deadlines for responding to data subject rights may vary. Access and data portability requests must be addressed within 30 days.

Securiti's Data Subject Request (DSR) Automation simplifies and streamlines the process of managing data subject requests and automates tasks such as access, deletion, and correction requests, ensuring compliance while reducing manual effort and risk.

Data Protection Impact Assessments (DPIAs)

Under Article 22 of FADP financial institutions must conduct DPIAs for processing activities likely to result in a high risk to the data subject's personality or fundamental rights. DPIAs should include:

  • A detailed description of the processing activities.
  • An assessment of associated risks.
  • Planned measures to mitigate risks.

Financial institutions are exempt from conducting DPIAs if processing:

  • It is mandated by a legal obligation.
  • Utilizes certified systems under Article 13 of FADP.
  • Aligns with an approved code of conduct under Article 11 of the FADP.

If residual risks persist after a DPIA, financial institutions must seek the opinion of the FDPIC unless they consult a qualified data protection advisor.

Given the financial sector's increasing adoption of cloud-based services, DPIAs are especially relevant for financial institutions migrating banking operations to the cloud, ensuring adequate safeguards for customer data.

Securiti’s Assessment automation solution helps organizations evaluate their internal protocols, ensuring the necessary technical and organizational measures are in place to prevent human errors.

Incident Response and Breach Notification

Under Article 24 of the FADP and Article 15 of the DPO, financial institutions must notify the FDPIC of data breaches likely to pose high risks to data subjects as quickly as possible. Notifications must, at minimum, include the following:

  • Details of the breach.
  • Potential consequences.
  • Mitigation measures undertaken or planned.

Additionally, data subjects must be informed when required in specific and comprehensible language for their protection or if directed by the FDPIC.

The financial institution is required to document breaches, including a summary of the incident's circumstances, its effects, and the measures taken. This documentation must be retained for at least two years from the time of the report.

Securiti’s Breach Management solution automates breach notifications and compliance actions, providing incident response workflows that help organizations respond to privacy incidents promptly and effectively.

Data Protection Officer (DPO)

While appointing a DPO is not mandatory for private businesses, Article 10 of the FADP encourages organizations to designate a DPO. A DPO can help financial institutions ensure compliance, oversee data protection practices, and act as a liaison with the FDPIC.

Securiti’s Data Mapping module can equip (DPOs) with tools to uphold stringent data security and governance protocols to catalog and map all data processing activities.

Record of Processing Activities (ROPA)

Maintaining a ROPA is critical for financial institutions, as it is generally unavoidable for banks and financial sector companies to ensure compliance and operational efficiency. RoPA enables them to monitor data flows, assess risks, and implement appropriate safeguards. Article 12 of the FADP highlights the importance of ROPA in defining the scope of data processing and aligning with governance frameworks, such as the FINMA’s circular. Small and medium-sized enterprises with minimal data processing risks may be exempt. Additionally, maintaining accurate records supports compliance with Article 7 of AMLA by ensuring transaction records and due diligence documentation are properly retained, regularly updated, and readily available for regulatory requests.

Securiti’s Assessment Automation module allows users to Automate records of processing (RoPA) aligning with global privacy regulations.

Cross-Border Transfers

Under the FADP, personal data can be transferred abroad if the destination country provides an adequate level of protection, as determined by the Federal Council (Annex 1 DPO). If the country lacks adequate protection, transfers are permitted if suitable safeguards are in place, such as Standard Contractual Clauses (SCCs), Binding Corporate Rules (BCRs), or specific contractual agreements.

If none of these safeguards apply, limited exceptions under Article 17 of the FADP may allow transfers. Organizations must inform data subjects of cross-border transfers and document them in their processing inventory. Non-compliance can result in legal penalties under Article 61(a) of the  FADP.

Securiti’s Data Access Governance (DAG) tool allows organizations to oversee and manage access to personal data across different jurisdictions.

Privacy by Design and by Default

Article 7 of the FADP mandates that financial institutions integrate privacy into their service design through Privacy by Design and Privacy by Default principles:

  • Privacy by Design: Data protection should be embedded into financial products and services from inception. This includes strong encryption, multi-factor authentication, and pseudonymization techniques for fraud detection.
  • Privacy by Default: Customer-facing services must have the highest privacy settings enabled by default. Examples include anonymized transaction histories in digital banking apps and pre-selected minimal data-sharing options for loan applications.

With the increasing digitization of financial services, financial institutions must ensure compliance with these principles from the outset, minimizing privacy risks without requiring additional user intervention.

Securiti’s Data Privacy Management suite allows users to comply with Privacy by Design and by Default by embedding robust privacy controls into their ecosystem, ensuring continuous regulatory compliance.

Know Your Customer (KYC) Obligation

Under Section 1 of the AMLA, financial institutions must verify customer identities as part of the KYC process when establishing a business relationship. This prevents money laundering, fraud, and terrorist financing. Financial institutions must collect valid documentation to confirm identity and, for legal entities, verify the individuals representing them.

KYC requirements also apply to high-value transactions, especially cash or insurance-related ones. If suspicious activity is detected, identity verification is mandatory regardless of transaction size. Additionally, financial institutions must identify the beneficial owner to ensure transparency and compliance with anti-money laundering laws.

Securiti’s Data Privacy Module automates compliance with evolving global privacy regulations.

Data Security in the Financial Sector & How Securiti Can Help

As digitalization advances, cyber threats are a growing concern for financial institutions worldwide. To mitigate risks, Switzerland is strengthening cybersecurity through existing laws, regulatory guidance, and new legislative initiatives.

Cybersecurity Framework

While Switzerland does not have a single comprehensive cybersecurity law, various statutes, regulations, and guidelines govern cybersecurity in the financial services sector. Notable developments include the establishment of the National Cyber Security Centre (NCSC) and updated regulatory expectations for financial institutions.

The NCSC, established under the Ordinance on Protection against Cyber Risks, serves as Switzerland's central hub for cybersecurity expertise and coordination. Although it does not perform direct regulatory functions, the NCSC collaborates with entities such as the Swiss Financial Market Supervisory Authority to enhance national preparedness against cyber threats.

Cybersecurity Obligations for Banks and Financial Market Infrastructures

In addition to maintaining security measures as per Article 8 of FADP and Article 1 of  DPO, financial institutions in Switzerland must comply with various cybersecurity obligations to safeguard their networks. Article 47 of the Banking Act imposes strict confidentiality obligations, making unauthorized disclosure or exploitation of sensitive financial data a criminal offense, with penalties of up to five years' imprisonment or significant fines.

Under Article 3(f) of the Banking Act, financial conglomerates are required to identify, limit, and monitor cyber risks. These responsibilities are further detailed in FINMA’s Circular 2023/1,  key obligations  include:

  • Adopting internationally recognized Information and Communication Technology (ICT) standards and frameworks.
  • Regularly reporting cyber risks, incidents, and control measures to management.
  • Maintaining an up-to-date ICT inventory to swiftly identify vulnerabilities and respond effectively to cyberattacks.
  • Conducting vulnerability scans, and cyber exercises by qualified staff with adequate resources.

Article 14 of the FinMIA mandates that the financial market infrastructures operate IT systems that are suitable for their activities, ensure regulatory compliance, and include effective emergency arrangements to maintain business continuity. Under Article 23 FinMIA, systemically important financial market infrastructures are subject to special IT system requirements to further enhance their stability and resilience.

Cyberattack Reporting Obligations

Under Article 29(2) of the FINMASA, supervised financial institutions must report incidents of substantial importance to FINMA. This includes major cyberattacks affecting business-critical functions.

To clarify these obligations, FINMA issued Guidance 03/2024, which builds upon previous requirements and incorporates findings from cyber risk supervision, including insights from on-site reviews and risk assessments. It provides additional clarification on reporting duties outlined in FINMA Guidance 05/2020, emphasizing the importance of timely reporting and cyber risk management.

Regarding the threshold for reporting, cyberattacks must be reported if they impact critical functions, meaning those where a successful or partially successful attack could result in system failure or operational disruption.

The timelines for reporting are as follows:

  • Financial institutions must submit a preliminary report to FINMA within 24 hours of identifying and assessing the criticality of the cyberattack.
  • A full incident report must be submitted within 72 hours via FINMA’s web-based survey and application platform.
  • Any new developments must be reported as they arise.

For cyberattacks classified as "high" or "severe" (as per Annex 1 of Guidance 05/2020), financial institutions are expected to provide a conclusive root cause analysis once the case has been fully processed. This report must detail:

  • The reason for the attack’s success.
  • Its impact on regulatory compliance and operations.
  • Mitigation measures implemented to prevent recurrence.

In cases of severe incidents, financial institutions must demonstrate the effectiveness of their crisis management framework as part of their final report.

Moreover, as per upcoming amendments to the Swiss Information Security Act, expected to be effective in the first half of 2025, critical infrastructure providers shall be obliged to report cyber-attacks on their IT resources to the NCSC within 24 hours.

Securiti’s Breach Management solution automates breach notifications and compliance actions, ensuring timely reporting of security incidents. 

Securiti’s Data Security Posture Management solution empowers organizations to mitigate data breach risks, safeguard data sharing, and enhance compliance while minimizing the cost and complexity of implementing data controls.

Outsourcing Risks

While outsourcing business functions allows financial institutions to scale and specialize, it also introduces potential vulnerabilities. To mitigate these risks, FINMA Guidance 03/2024 provides that if a financial institution outsources a significant function, particularly critical functions or substantial amounts of critical data, the service provider and any subcontractors must comply with the same regulatory requirements as the supervised financial institution. Maintaining an up-to-date inventory of all significant outsourced functions, including subcontractors, is considered essential for regulatory compliance. However, the financial institutions remain fully responsible for meeting supervisory requirements, which cannot be transferred to the service provider.

Securiti’s Vendor Risk Management solution automates vendor risk assessments, tracks subcontractor engagements, and data breaches, and provides automated alerts, supplier assessments, and security audits for ongoing third-party risk monitoring.

Securiti’s Data Access Governance (DAG) tool allows organizations to oversee and manage access to personal data across different jurisdictions.

Data Governance in the Financial Sector & How Securiti Can Help

Effective data governance ensures operational resilience, risk management, and regulatory compliance. To effectively address these areas, as per FINMA Guidance 03/2024, financial institutions must establish comprehensive frameworks that integrate both preventative and reactive measures. To achieve this, the following key areas require focus:

  • Board-level accountability is essential for integrating cyber risks into overall risk management. Financial institutions must oversee third-party data flows and enforce vendor compliance. Defining cyber risks, risk appetite, and tolerance helps set a strong foundation for mitigation and decision-making.
  • Effective risk mitigation starts with clear data classification and regular assessments. Financial institutions should implement continuous threat monitoring and penetration testing to detect vulnerabilities early and enhance security measures.
  • Strict access controls, continuous monitoring, and tested data recovery plans are necessary to prevent unauthorized access and ensure resilience against cyber threats, including ransomware. The recovery processes must guarantee data integrity and completeness.
  • Employee awareness programs are critical in mitigating social engineering risks, ensuring that they recognize and respond appropriately to potential cyber threats.
  • Cyber resilience testing, including red teaming and tabletop exercises, is crucial for validating data governance effectiveness. Independent audits and regular governance reviews ensure security controls remain aligned with regulatory expectations and evolving threats.
  • Clear reporting mechanisms are essential for transparency and compliance. Financial institutions must document risk exercises, internal reviews, and governance measures to demonstrate proactive data security management and regulatory adherence.

Securiti's Data Governance module automates data discovery, classification, and lifecycle management to ensure compliance and enable efficient data control across environments.

AI in the Financial Sector & How Securiti Can Help

The Swiss financial sector is increasingly integrating AI to enhance efficiency, automate processes, and improve decision-making. However, this adoption comes with regulatory and operational challenges.

FINMA has highlighted key risks associated with AI in its Guidance 08/2024, including model biases, lack of explainability, cybersecurity threats, and dependency on third-party AI providers. While there are no AI-specific regulations as of yet, existing financial laws require financial institutions to incorporate AI risks into their governance and risk management strategies.

To ensure responsible AI use, FINMA advises financial institutions to maintain high data quality, conduct thorough testing, and establish independent reviews of AI models. Continuous monitoring and a clear understanding of AI-driven decisions are essential to mitigate potential legal and reputational risks.

Looking ahead to 2025, significant developments in AI governance are expected as regulators refine their frameworks in response to evolving risks and international standards.

Securiti's AI Security & Governance module protects AI systems by managing data security, privacy, and compliance, ensuring safe and ethical AI operations.

Conclusion

As financial services become more digitalized, Switzerland’s regulatory framework continues to evolve to address emerging risks in data privacy security, governance, and AI implementation. Financial institutions must remain compliant with existing laws while preparing for stricter oversight in areas such as cyber resilience and AI governance.

Securiti, a pioneer in the Data Command Center, provides a centralized platform that enables secure data usage and facilitates responsible GenAI integration. Through its unified approach to data intelligence, control, and orchestration across hybrid multi-cloud environments, Securiti helps financial institutions safeguard sensitive data, enhance customer trust, and navigate complex regulatory requirements with confidence.

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigation OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View
Spotlight 59:55

Building Safe
Enterprise AI

Watch Now View

Latest

Automating EU AI Act Compliance View More

Automating EU AI Act Compliance: A 5-Step Playbook for GRC Teams

Artificial intelligence is revolutionizing industries, driving innovation in healthcare, finance, and beyond. But with great power comes great responsibility—especially when AI decisions impact health,...

Navigating the Evolving Data Security Landscape View More

Navigating the Evolving Data Security Landscape: Why Detection Alone Isn’t Enough

Proactive vs. Reactive: Why Threat Detection Alone Falls Short in Data Protection In an era where digital transformation and AI adoption are accelerating at...

View More

An Overview of South Korea’s Basic Act on the Development of Artificial Intelligence and Creation of a Trust Base (Basic AI Act)

Gain insights into South Korea’s Basic Act on the Development of Artificial Intelligence and Creation of a Trust Base (Basic AI Act).

Navigating Data Regulations in Malaysia's Financial Sector View More

Navigating Data Regulations in Malaysia’s Financial Sector

Gain insights into data regulations in Malaysia’s financial sector. Learn how Securiti’s robust automation tools help organizations ensure swift compliance with Malaysia’s evolving regulatory...

Sensitive Personal Information (SPI) View More

Navigating Sensitive Personal Information (SPI) Under U.S. State Privacy Laws

Download the whitepaper to understand how U.S. state privacy laws define Sensitive Personal Information (SPI) and what governance requirements businesses must follow to ensure...

Navigating Data Regulations in the UAE Financial Services Industry View More

Navigating Data Regulations in the UAE Financial Services Industry

Download the whitepaper to explore key strategies and insights for navigating data regulations in the UAE's financial services industry. Learn about compliance with evolving...

Texas Data Privacy and Security Act (TDPSA) View More

Navigating the Texas Data Privacy and Security Act (TDPSA): Key Details

Download the infographic to learn key details about Texas’ Data Privacy and Security Act (TDPSA) and simplify your compliance journey with Securiti.

Oregon’s Consumer Privacy Act (OCPA) View More

Navigating Oregon’s Consumer Privacy Act (OCPA): Key Details

Download the infographic to learn key details about Oregon’s Consumer Privacy Act (OCPA) and simplify your compliance journey with Securiti.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New