Certainly is a secondary purpose. Sounds like a joint data controller
venture,
unless the Mayor of London organises a 'data processor' agreement with the
Commissioner. The precise use the data was put too would be very
important,
along with retention periods.
Would it be a good method for obtaining police intelligence?
Ian
----- Original Message -----
From: "Tarling, Jeremy" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Thursday, July 19, 2001 11:06 AM
Subject: second purpose?
> Some of you may have seen in the news that the Mayor of London is
> introducing congestion charging in London. This works by hi-tech cameras
> being set up around every road that leads into the centre of London. The
> cameras photograph every car registration that enters the zone, and the
> vehicle owner is charged five pounds.
>
> However, in the BBC's South East news last night it appears that Scotland
> yard have asked if they can be a party to these data as it will be a
useful
> tool, in the fight against terrorism and organised crime.
>
> Is it just me, or does that sound like secondary processing? I'm thinking
> principles 1 and 2 especially. Or are the police able to claim an
exemption
> along the lines of 'investigation of crime' or 'national security' maybe?
>
> Either way, it rings alarm bells in terms of civil liberties with me - a
> small step from terrorist and organised crime prevention to spotting
> disqualified drivers, then people who haven't paid their parking tickets
> ......
>
> Then again, as someone one said "if you have nothing to hide, you have
> nothing to fear". Was that Michael Howard?
>
> best regards
> Jeremy Tarling
> Distribution and Data Protection Manager
> Qualifications and Curriculum Authority
> tel. 0207 509 5399
>
>
>
>
>
> Qualifications and Curriculum Authority
> 83 Piccadilly
> London W1J 8QA
> Switchboard: 020 7509 5555
> http://www.qca.org.uk
>
>
> DISCLAIMER
> This e-mail and any files transmitted with it, including replies and
> forwarded copies (which may contain alterations) subsequently transmitted
> from QCA, are confidential and solely for the use of the intended
recipient.
> If you are not the intended recipient or the person responsible for
> delivering it to the intended recipient, you have received this e-mail in
> error and any use of its content is strictly prohibited. If you have
> received this e-mail in error please notify the IT network manager by
e-mail
> to [log in to unmask] and include a copy of this message. Please
then
> delete this e-mail and destroy any copies of it.
>
> Opinions, conclusions and other information contained in this message that
> do not relate to the official business of QCA shall not be understood as
> endorsed or given by it.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|