Another test to apply is whether "specific information relating to an
individual" in an unstructure pile of papers is "readily acessible" (1(1)of
the Act).
I generally interpret this as meaning that if I can't locate what I want
within 5 minutes, the it is not "readily available" (and the data subject
does not get to know about it).
(Life in the risk-taking private sector can have its rewards)
Regards to all
Martin Hoskins
One 2 One
-----Original Message-----
From: Sally Justice [mailto:[log in to unmask]]
Sent: 7 December 2001 09:55
To: [log in to unmask]
Subject: Re: Structured Files
# >The usual example I give in data protection seminars is an
# >unstructured pile of paper in the middle of the floor in an
# >academic's office (but I have seen such "systems" in other
# >peoples' offices as well). Disproportionate effort might be
# >needed to establish whether or not personal data actually existed
# >let alone to find it!
YES I do this as well, I use two photos, first one is a pile in an
office and then a photo where the person has made it neater by
filing carefully on top of the filing cabinet! the point is that all
staff who keep personal data must be provided with a lockable
cabinet to store personal data etc. Anybody want such photos I can
stick mine or other peoples on our web site?
Sally Justice
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
NOTICE AND DISCLAIMER:
This email (including attachments) is confidential. If you have received
this email in error please notify the sender immediately and delete this
email from your system without copying or disseminating it or placing any
reliance upon its contents. We cannot accept liability for any breaches of
confidence arising through use of email. Any opinions expressed in this
email (including attachments) are those of the author and do not necessarily
reflect our opinions. We will not accept responsibility for any commitments
made by our employees outside the scope of our business. We do not warrant
the accuracy or completeness of such information.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|