I think we ALL got this twice.
MODERATOR/LIST MANAGER:
THIS is abuse of our list. Please take relevant and necessary action
forthwith.
I admit I feel that me persona details have now been used OUTSIDE the scope
for which they were collected, since I received it as a personal email. To
me it is a prima facie breach of the Data Protection Act 1998. Oddly IO
wouldn't object in such a strong manner if the message had ONLY been sent to
THIS list as an internal list distribution.
This also leads me to the security of this list. Since I can discover by a
simple command who all the recipients are, is this list itself within the
act?
-----Original Message-----
From: Roland Perry [mailto:[log in to unmask]]
Sent: 24 September 2001 09:53
To: [log in to unmask]
Subject: Re: Employment Opportunity - Data Protection Manager
In article <22567525326BD511A54300306E01C81E0F5FB0@EXCHANGE01>, sean
wilkes <[log in to unmask]> writes
>If the following is of interest please contact me to discuss.
I think I've seen it all now!!!
I got a similar email to my personal email address, starting with the
immortal words:
"My apologies for the SPAM, but I am desperate."
Desperate for what? Desperate to get your email account terminated??
>Sean Wilkes
>CONSULTANT
>
>The IT Recruitment Network. White Hart House, Park Street, Colnbrook,
>Berkshire. SL3 0HS
>T: +44 (0) 1753 768520
>M: +44 (0) 787 9482527
>F: +44 (0) 1753 687675
>E: [log in to unmask] <mailto:[log in to unmask]>
>W: www.itrnet.co.uk <http://www.itrnet.co.uk>
>
>The IT Recruitment Network is a member of the Pertemps Group of companies.
>Reg. Co. 3208790
>
>Ref DPBB_22677/SW
>
>Job Title Data Protection Manager
>
>Job Description
>* London based organisation are seeking a Data Protection Manager to
>ensure that projects are developed and operated to be fully compliant with
>the requirements of the Data Protection Act (DPA) 1998 and best data
>protection practice.
>* You will develop, consult on, agree, issue and maintain a range of
>policies and guidelines on data protection issues (including but not
limited
>to the DPA, subject access, privacy, data retention, CCTV, direct
>marketing/research, data matching) to ensure that staff are aware of their
>responsibilities under the Act.
>* The post holder will contribute to the preparation and monitoring
of
>budgets and financial forecasts for the group or workstream & will have
some
>responsibility for a shared pool of administrative and other support staff.
>Line management responsibility may be required in response to business
>growth and development.
>* Minimum of 3-5 years experience in dealing with data protection
>issues either under the 1984 or 1998 Acts in an organisation, preferably, a
>Local Authority or Government department.
>* Managing the specification, implementation and maintenance of data
>protection requirements for a complex project or business initiative.
>* Negotiation with the Information Commissioner and/or legal
>representatives with regard to data protection issues.
>* Candidates will be expected to demonstrate the following knowledge:
>o Thorough understanding of the Data Protection Act 1998 and related
>Statutory Instruments.
>o Thorough understanding of data protection Codes of Practice issued
>by the Information Commissioner.
>o Possess or be able to quickly acquire a detailed understanding of
>the proposed projects.
>
>Start Date ASAP
>
>Duration Permanent
>
>Location Central London
>
>Rate to £40k + benefits - DOE
>
>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
>all commands go to [log in to unmask] not the list please!
>^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|