The Schengen Information System (SIS) is an extensive database used by European countries to maintain and share information about individuals and entities for the purposes of national security, border control, and law enforcement. Here are detailed insights into its function, history, and context:
History
- Established as part of the Schengen Agreement signed in 1985 by Belgium, Germany, France, Luxembourg, and the Netherlands to allow for free movement of people across their borders.
- The first version, SIS 1, was launched in 1995, initially for the original Schengen countries.
- With the expansion of the European Union (EU), SIS was upgraded to SIS II, which went live in 2013 to accommodate the growing number of member states and to enhance its capabilities.
Functionality
- Purpose: The primary goal of SIS is to enhance internal security within the Schengen Area by enabling authorities to share alerts on wanted or missing persons, lost or stolen objects, and individuals or objects of interest to public security.
- Data Categories: SIS holds data on:
- Persons wanted for arrest for surrender or extradition.
- Missing persons, particularly children.
- Individuals to be refused entry or stay within the Schengen Area.
- Objects like firearms, vehicles, identity documents, and banknotes.
- Access and Use: Only authorized personnel from police, border control, customs, and judicial authorities can access the system. Information can be used for:
- Border checks.
- Identity checks within the Schengen Area.
- Assistance in criminal investigations and judicial proceedings.
Technical Details
- SIS II uses a distributed architecture where each country has its own national system (N.SIS II) connected to a central system (C.SIS).
- The system supports real-time data exchange, ensuring that information is immediately available across all member states.
Legal Framework
Challenges and Developments
- Expansion to non-EU countries like Norway, Iceland, Switzerland, and Liechtenstein.
- Issues with data quality, ensuring that information entered into the system is accurate and up-to-date.
- Enhancements in functionality to deal with new threats like terrorism and organized crime.
For more information, consult these sources:
Explore related topics: