Jeremy,
Suggestion - Ask what people consider a reasonable retention period for
different types of specified data. Include amongst the data types some
pretty sensitive stuff.
Then for each data type ask why the retention periods identified are
appropriate.
During analysis consider whose interests are served by the answers, the data
subject or the organisation?
Will probably be worth thinking about any variations in answers between the
different data types (sensitive v less sensitive. e.g. medical condition
or sex life v reading material or friends and associates.) and why that
could be so.
This group would probably find the outcomes interesting.
Good Luck
Ian W.
----- Original Message -----
From: "Jeremy Ho" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Thursday, February 15, 2001 1:02 PM
Subject: Research into Privacy Issues
> Hi all,
>
> I realise that this is a UK mailing list so I'm not too sure if this
message will be considered appropriate. If it is indeed considered
inappropriate, I must stress that it is not done on purpose.
>
> Anyway, I'm a student from the School of Information Systems at Curtin
University of Technology, Western Australia. I'm currently doing my Honours
thesis on security and privacy. I came across this mailing list while
surfing the Internet for resources on privacy a while back.
>
> I know that many of you on the list have a wealth of experience in the
area of data protection. As such, I would be interested in knowing what
potential key issues/questions could be addressed/asked in the interviews I
am going to conduct i.e. how companies go about protecting the information
privacy of consumers. Your suggestions will be very much appreciated.
>
> Thanks again!
>
> Jeremy Ho
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|