You could view the tape on your machines first. Assuming that there are no
third parties who could be identified in the footage, you could then allow
the 2 individuals to view the tape. If no-one else can be identified, I
don't see what harm could be done (unless they would get access to footage
from loads of other CCTV cameras while viewing their tape!)
Tim Turner
Data Protection Officer
Wigan Council
> ----------
> From: Julie Davenport[SMTP:[log in to unmask]]
> Reply To: Julie Davenport
> Sent: 09 June 2004 11:03
> To: [log in to unmask]
> Subject: [data-protection] Viewing CCTV footage
>
> Hello All,
>
> I've just received a query from our CCTV Control centre which I would like
> your views on please.
>
> An incident occured within the last 2 years involving 2 individuals. Our
> CCTV system caught the incident. At the time, the police seized the tape
> to conduct an investigation. According to form the Officer's involvement
> in the case is questionable.
>
> The case went through the Courts I don't know the outcome. But somewhere
> along the lines the individuals have got their hands on a non original
> tape from the Police.
>
> These individuals have attempted to watch the CCTV footage but can't view
> it on normal video recorders. The individuals have therefore made an
> appointment to view the footage today on our equipment.
>
> What would you do in these circumstances? Although the information was
> originally obtained by us, it has been disclosed by another organisation?
> Should we allow the individuals to view the tape? How about 3rd party
> data?
>
> I look forward to hearing from you.
>
> With kind regards,
>
> Julie Davenport
> Data Protection Adviser
> Wolverhampton City Council
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote also confirms that this email message has been swept by
MIMEsweeper for the presence of computer viruses using Sophos
anti-virus software.
www.mimesweeper.com
www.sophos.com
**********************************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|