The DISC Guide does have a small section on developing operability requirements for new IT systems and has a checklist of requirements within new systems to ensure compliance with relevant principles.
Peter
Peter Wilson
Data Protection Officer
University of Paisley
>>> "Yuill, Allan" <[log in to unmask]> 02/21/01 10:46am >>>
Richard,
The latest update to the BSI-DISC Data Protection Update Service is PD
0012-4:2000 Guide to Managing your Database. The guide provides practical
advice on reviewing and cleansing databases to ensure compliance with the
Act and, according to the blurb, includes advice on both building compliance
into system design and on the use of databases for marketing activities. I
don't have it to hand at the moment, so I can't comment on whether it
achieves the objectives.
Allan
-----Original Message-----
From: Richard Howley [mailto:[log in to unmask]]
Sent: Wednesday, 21 February 2001 10:32
To: [log in to unmask]
Subject: Fw: Guidelines for Info Systems Professionals
I recently sent this mail to the ODP and received a reply stating that no
such guidelines exist. Does anyone know of any?
regards
Richard
----- Original Message -----
From: "Richard Howley" <[log in to unmask]>
To: <[log in to unmask]>
Cc: "Richard Howley" <[log in to unmask]>
Sent: Tuesday, February 13, 2001 1:57 PM
Subject: Guidelines for Info Systems Professionals
> I am seeking references to any published guidelines that exist to assist
the
> developers of information systems develop more DP sensitive systems. Are
> there any such guidelines on the DP website?
>
> thanks
> richard
> _____________________________________________________________
> Richard Howley
> Academic Manager
> FTMS/De Montfort University Campus (Malaysia) Sdn Bhd
> De Montfort University
> Leicester
> LE1 9BH
>
> email: [log in to unmask]
> tel: +44 (0)1162 551 551
> fax: +44 (0)116 254 1891
> tel (mobile): 07951 084 593
> http://www.cse.dmu.ac.uk/~rgh
> http://www.dmu.ac.uk
> __________________________________________________________
>
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Legal disclaimer
--------------------------
The information transmitted is the property of the University of Paisley and is intended only for the person or entity
to which it is addressed and may contain confidential and/or privileged material. Statements and opinions expressed in this
e-mail may not represent those of the company. Any review, retransmission, dissemination and other use of, or taking
of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited.
If you received this in error, please contact the sender immediately and delete the material from any computer.
--------------------------
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|