In article <[log in to unmask]>,
Trent,Tim <[log in to unmask]> writes
>What this recruiter has done is to remind us of the inherent insecurities of
>JISCMail. We should consider, therefore, if JISCMail security should be
>tightened.
What's really happened, is that we have been reminded why there is a
Data Protection Act.
You simply cannot pretend that your email address is a secret, and rely
upon security-by-obscurity to avoid people mis-using it. No, we must
have a law which says that such personal information must not be mis-
used.
Would the members of the list like to make a collective complaint (or
have the administrators do it) to the Information Commissioner, and
thereby get a ruling once and for all that (while the IC admits that
email addresses *are* personal data) when we can prove we've not given
consent [1], the perpetrator should be prosecuted.
[1] The problem at the moment is that regulators wring their hands over
individual spam emails, and say "well, how do you know that you didn't
put your email address down when applying for exhibition ticket, years
ago, and fail to tick the opt-out box, and this company has got the
details from the exhibition organisers." However, in this instance I
think we can prove where the addresses came from.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|