In article <[log in to unmask]>,
[log in to unmask] writes
>I have been struggling with this as well.
>
>I think the news item I saw was ambiguous in that the Commissioner talks
>about "someone" retriving the message.
>
>If this "someone" is the sender of the message, I cannot see the problem,
>
>If however, my manager can retrieve my sent messages, I can.
>
>Does the software permit the latter> This is the only way which I can see a
>DP problem
>
>C
The Manager could be acting with his rights as system controller under
the Lawful Business Regulations (assuming everyone has been notified of
the possibility). That's if it's a "snooping" exercise.
I read it rather as "oops, pressed the wrong button, can I un-send
please". In which case if the message is destroyed it's not an
interception either (the bit bucket is not an infringing recipient). The
manager (or sysadmin) could arrange this for you without themselves
seeing the content of the message. But I thought the "story" was
empowering the users to do this for themselves.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|