Barbara,
I can't see why photocopies shouldn't be acceptable. In the very unlikely
event that you think someone is tampering with copies of someone else's
documents, just ask for an original document
But why are you asking for photographic proof of identity? If they are
posting it, how do you know what they will look like? Surely photo ID only
works when you see what the person looks like. A photo ID connects an
individual with an identity, if you don't know what the individual looks
like, it could be anyone's passport. If it is a form to be posted from long
distance, would you not be better off getting them to send a copy of
something with their signature on and then getting them to sign the SAR
form?
Just a thought
Regards
Matthew
Matthew Stephenson
Records Manager
London School of Economics
Houghton Street
London WC2A 2AE
Tel: 020 7955 6481
Fax: 020 7852 3646
> -----Original Message-----
> From: Smith, Barbara [SMTP:[log in to unmask]]
> Sent: Monday, November 19, 2001 12:26 PM
> To: [log in to unmask]
> Subject: SAR - proof of identity
>
> Hi,
>
> We are in the process of designing a Subject Access Request form which we
> would like to make postable for data subjects who live at a distance. What
> means of identity do others use? We would normally request a matriculation
> card, staff ID card, passport or driving licence which contains a
> photograph
> of the subject, but are photocopies of these acceptable?
>
> Any advice gratefully received,
> Barbara
>
> *******************************************************
> Barbara Smith
> Deputy Librarian
> Queen Margaret University College
> Clerwood Terrace
> Edinburgh
> EH12 8TS
>
> Tel: 0131-317-3175
> Fax: 0131-339-7057
> Email: [log in to unmask]
>
> ***********************************************************
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|