Long Memory time!
In Issue 18 (Summer 1994) of that estimable journal "Data Protection News"
(written by Chris Pounder and Freddy Kosten in one of their earlier
incarnations at Hoskyns) there was a detailed checklist under the heading
Software Design: the data protection considerations. IT development staff
in my authority found this useful, although of course it was written with
the 1984 Act in mind. Maybe Chris P has revised it for the new Act?
Stuart
-----Original Message-----
From: Paul Couldrey [mailto:[log in to unmask]]
Sent: 02/03/2001 09:52
To: [log in to unmask]
Subject: Project Development
Morning all !!
A quick question on a snowy Friday, does anyone have a protocol/procedure or
literature about the DP issues to be addressed at the start of a new
project. I think I know the appropriate questions to ask but another
perspective of the situation would help.
Paul Couldrey
Data Protection Officer
Wolverhampton City Council
Email Disclaimer
****************************************************************************
********************
DISCLAIMER: This email and files transmitted are confidential and are
intended solely for the use of the intended recipient. If you are not the
intended recipient, or the person responsible for delivering it to the
intended recipient, you may not copy, disclose, distribute or use it in any
unauthorised manner. If you have received this email in error please notify
us by telephone on 01902-554455 or by email to
[log in to unmask] and then delete it and any attachments
accompanying it. Please note that Wolverhampton City Council cannot
guarantee that this message or any attachments are virus free or have not
been intercepted and amended.
Any views or opinions expressed within this email are those of the author
and may not necessarily reflect those of Wolverhampton City Council and no
contractual arrangement is intended to arise from this communication.
****************************************************************************
********************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote also confirms that this email message has been swept by
MIMEsweeper for the presence of computer viruses.
www.mimesweeper.com
**********************************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|