What if a crime comes to light in a years time, using that van?? Would that
not then be justified. Just a thought (thinking about some appeals on
Crimewatch and the like)!!
Fiona Musgrave
IT Team Principal/DP Officer
Carlisle City Council
> -----Original Message-----
> From: Duncan Langford [SMTP:[log in to unmask]]
> Sent: 28 November 2001 10:57
> To: [log in to unmask]
> Subject: Car hire issue...
>
> Yesterday I went with my daughter (who has no license) to hire a van,
> to move her belongings to a new flat.
>
> On the counter of the hire desk were two web cams, pointing outwards.
> As an essential part of the hiring process, one of these was pointed
> at me, and my image recorded.
>
> When I asked what would happen to this data, I was told it would be
> 'filed' indefinitely.
>
> Now, I can see how it might well be useful to have a picture of the
> person who doesn't return your van - but I don't see the
> justification for permanently storing that image after the van had
> been returned?
>
> A notice on the office wall warned of video surveillance - when I
> queried their policy, I was told it was 'covered by the notice'. I
> specifically did not give permission for any recording of my personal
> data, but this made no difference.
>
> We needed the van, so continued, under protest - but I'd certainly
> appreciate comments about the legality of this policy!
>
> - duncan
> --------------------------------------------------------------------------
> ---
> Dr Duncan Langford Computing Laboratory, University of Kent at Canterbury
> UK
> Practical Computer Ethics:McGrawHill Business Computer
> Ethics:AddisonWesley
> 'Internet Ethics' - MacMillan Press (UK) and St Martins Press (USA)
> --------------------------------------------------------------------------
> ---
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> _____________________________________________________________________
> This message has been checked for all known viruses by Star Internet
> delivered through the MessageLabs Virus Scanning Service. For further
> information visit http://www.star.net.uk/stats.asp or alternatively call
> Star Internet for details on the Virus Scanning Service.
_____________________________________________________________________
This message has been checked for all known viruses by Star Internet
delivered through the MessageLabs Virus Scanning Service. For further
information visit http://www.star.net.uk/stats.asp or alternatively call
Star Internet for details on the Virus Scanning Service.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|