Sally Justice on 7 December 2001 at 09:55 said:-
> # >The usual example I give in data protection seminars is an
> # >unstructured pile of paper in the middle of the floor in an
> # >academic's office (but I have seen such "systems" in other
> # >peoples' offices as well).
Martin Hoskins on 07 December 2001 at 10:05 said:-
> Another test to apply is whether "specific information relating to an
> individual" in an unstructure pile of papers is "readily
> acessible" (1(1)of
> the Act).
Given that one of the tenants of information security is 'availability';
Could it be said that because some personal hard copy data was in an
unstructured pile, that it was not being maintained for the purpose, and
could not meet the requirements of principle seven.
If an unstructured pile of personal data does meet the requirements of the
purpose, then it must be arguable that it is excessive for that purpose.
Appropriate administration of processes is a requirement within the public
sector. Perhaps the private sector could get away with the overflowing desk
technique?
Ian W
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]]On Behalf Of Martin Hoskins
> Sent: 07 December 2001 10:05
> To: [log in to unmask]
> Subject: Re: Structured Files
>
>
> Another test to apply is whether "specific information relating to an
> individual" in an unstructure pile of papers is "readily
> acessible" (1(1)of
> the Act).
>
> I generally interpret this as meaning that if I can't locate
> what I want
> within 5 minutes, the it is not "readily available" (and the
> data subject
> does not get to know about it).
>
> (Life in the risk-taking private sector can have its rewards)
>
> Regards to all
>
> Martin Hoskins
> One 2 One
>
> -----Original Message-----
> From: Sally Justice [mailto:[log in to unmask]]
> Sent: 7 December 2001 09:55
> To: [log in to unmask]
> Subject: Re: Structured Files
>
>
> # >The usual example I give in data protection seminars is an
> # >unstructured pile of paper in the middle of the floor in an
> # >academic's office (but I have seen such "systems" in other
> # >peoples' offices as well). Disproportionate effort might be
> # >needed to establish whether or not personal data actually existed
> # >let alone to find it!
> YES I do this as well, I use two photos, first one is a pile in an
> office and then a photo where the person has made it neater by
> filing carefully on top of the filing cabinet! the point is that all
> staff who keep personal data must be provided with a lockable
> cabinet to store personal data etc. Anybody want such photos I can
> stick mine or other peoples on our web site?
>
> Sally Justice
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
>
>
> NOTICE AND DISCLAIMER:
> This email (including attachments) is confidential. If you
> have received
> this email in error please notify the sender immediately and
> delete this
> email from your system without copying or disseminating it or
> placing any
> reliance upon its contents. We cannot accept liability for
> any breaches of
> confidence arising through use of email. Any opinions
> expressed in this
> email (including attachments) are those of the author and do
> not necessarily
> reflect our opinions. We will not accept responsibility for
> any commitments
> made by our employees outside the scope of our business. We
> do not warrant
> the accuracy or completeness of such information.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|