We are either getting the "emergency contact's" own signature on the form or
considering seriously writing to each and every one stating the purposes for
which their data is held, or asking each employee to revalidate the details
with a signature.
Our data is pan EEA as well, which gives an interesting additional
perspective
_____________________________________________________________
Tim Trent
Chief Privacy Officer EMEA
> Gartner
EMEA Marketing, Tamesis, The Glanty, Egham, Surrey, United Kingdom,
TW20 9AW
Switchboard +44 (0)1784 431 611, Direct Line +44 (0)1784 267 335, Mobile
+44 (0)7710 126 618
Visit our home on the web: http://www.gartner.com
The opinions expressed in this message are my own, and may or may not
reflect those of my employer. They are expressed as a part of the
discussion on the JISCMail mailing list on data protection and for no
other purpose. They have no legal standing and are offered as part of
informed and informal discussion. They may NOT be attributed to
Gartner in any way.
-----Original Message-----
From: Peter Wilson [mailto:[log in to unmask]]
Sent: 13 September 2001 11:32
To: [log in to unmask]
Subject: Next-of-Kin details
Scenario:
Next-of-kin details are completed at the discretion of the employee (for
emergency purposes use only) If employee decides to complete details box is
it sufficient to tell the employee to inform the emergency contact of the
fact that their details are held by employer or is the onus on the employer
to inform contact of the fact?
Any views? How are others dealing with this ? Or am I just scaremongering?
Peter.
Peter Wilson
Data Protection Officer
University of Paisley
Legal disclaimer
--------------------------
The information transmitted is the property of the University of Paisley and
is intended only for the person or entity
to which it is addressed and may contain confidential and/or privileged
material. Statements and opinions expressed in this
e-mail may not represent those of the company. Any review, retransmission,
dissemination and other use of, or taking
of any action in reliance upon, this information by persons or entities
other than the intended recipient is prohibited.
If you received this in error, please contact the sender immediately and
delete the material from any computer.
--------------------------
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|