IF the CCTV images containing the student in question contain the images of
other individuals as well, precisely how may the student making the SAR
receive this data without breaking the law protecting the other individuals.
Come to that, has the student in question proved to you that the photograph
is of him/her? I can conceive of nefarious acts by showing the records to
the wrong person!
-----Original Message-----
From: Eagle, Dave [mailto:[log in to unmask]]
Sent: 30 October 2001 12:37
To: [log in to unmask]
Subject: Re: SAR - CCTV
I agree with Fiona, and the 40 days doesn't start until you get this
information.
Dave.
-----Original Message-----
From: Fiona Musgrave [mailto:[log in to unmask]]
Sent: Tuesday, October 30, 2001 12:23 PM
To: [log in to unmask]
Subject: Re: SAR - CCTV
I would suggest that you could go back to the student and request more
information, i.e. times, dates and places!
Fiona Musgrave (ext. 7258)
IT Team Principal/DP Officer
IT Services
> -----Original Message-----
> From: Caroline Lamb [SMTP:[log in to unmask]]
> Sent: 30 October 2001 12:03
> To: [log in to unmask]
> Subject: SAR - CCTV
>
> We have now had our first SAR from a student who wants every bit of data
> we
> hold (joy). He has also kindly sent us a fairly blurred 'photo, which he
> expects us to use to identify images of him from CCTV footage and then
> supply him with copies. The effort involved in this would be huge and the
> accuracy questionable! Also we only keep tapes for 7 days (unless an
> incident is reported) so what dates should we be looking at???
> Do we really have to do this???
> Would really appreciate any guidance from members of the list!
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> _____________________________________________________________________
> This message has been checked for all known viruses by Star Internet
> delivered through the MessageLabs Virus Scanning Service. For further
> information visit http://www.star.net.uk/stats.asp or alternatively call
> Star Internet for details on the Virus Scanning Service.
_____________________________________________________________________
This message has been checked for all known viruses by Star Internet
delivered through the MessageLabs Virus Scanning Service. For further
information visit http://www.star.net.uk/stats.asp or alternatively call
Star Internet for details on the Virus Scanning Service.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|