D POINTER on 06 December 2001 at 20:47 said:-
> I suppose it's a bit like having an encrypted file that you no longer
> have the key for. But maybe technology can crack any of these
> algorithms nowadays?
Sadly, I had to deal with one in that very circumstance. Unfortunately
everybody was aware of what and who the file referred to, its just nobody
could get into it. So it was off to search the INTERNET for a password
cracker which would work. (Do not put password crackers on your networks).
The password crackers available out there are an eye opener.
It was not an amusing situation at the time, although I can laugh now :-)
Ian
> -----Original Message-----
> From: D POINTER [mailto:[log in to unmask]]
> Sent: 06 December 2001 20:47
> To: Ian Welton
> Subject: Re: Structured Files
>
>
> > Date sent: Thu, 6 Dec 2001 20:32:51 -0000
> > Send reply to: Ian Welton <[log in to unmask]>
> > From: Ian Welton <[log in to unmask]>
> > Subject: Re: Structured Files
> > To: [log in to unmask]
> >
> > Su Goulding on the 06 December 2001 at 17:18 said:-
> > > It could have an internal structure (e.g. date order)
> which renders it
> > > useful as a filing system, but which does not make any one
> > > person's data readily accessible - outside the Act.
> >
> > What about the circumstance where the contents of an
> unstructured filing
> > system can be accessed following retrieval of material from
> another system,
> > or source, which indicates where the data within that
> unstructured system
> > can be found? Does the data not become an 'accessible
> record' although
> > held within an unstructured system.
> >
> > Does the debate and method of filing, by whatever method,
> become a mute
> > point, if the definition 'from that data or any other data
> in the possession
> > of or likely to come into possession of the data
> controller' is considered
> > in locating personal data?
> >
> > I personally have significant difficulty in identifying any
> circumstance
> > where personal data held in any system, could not be
> identified and traced.
> > Can anybody think of one?
> >
> > Ian W
>
> One where the data (about Kings and such like) is written on clay
> tablets in an ancient forgotten language not readable now by
> anyone (the last person able to read it having died).
> OK a bit far-fetched - the germ is from a TV programme a month or
> so ago, where there were only a few people in the world that could
> decipher the unusual script, and they all were probably getting on
> in years.
> I suppose it's a bit like having an encrypted file that you no longer
> have the key for. But maybe technology can crack any of these
> algorithms nowadays?
>
> David
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|