WOW! Sounds to me as if this breaks at least SIX principles of the DPA. I know this is probably not the answer you want to hear but to give a full answer would require a LOT more info e.g.
1. Where did LG get info in first place?
2. Is it factual?
3. Who exactly is "Similar Organisations?
4. Etc. Etc.
I would also have thought that in recruiting staff, "similar organisations" wouldl have sufficient safeguards of their own in place.
Interested to hear what others have to say. I feel this one could go a LONG way!
Peter
Peter Wilson
Data Protection Officer
University of Paisley
>>> Andrea Owen <[log in to unmask]> 03/15/01 09:31am >>>
Details of how local government operate with regard to informing similar organisations about potential applicants has recently been highlighted to myself.
Is it lawful to write to organisations to inform them that if they receive an application from certain persons that they should contact your organisation to find out a bit more about them?
Is it lawful to hold this letter on such a 'just in case' basis? Or should it be permitted to be kept in order to help with the considering of which sources of information have the greatest likelihood of producing accurate and relevant information?
Is it lawful to retain personal information to support future potential vetting requests? (or police investigation?)
If a SAR is submitted how does the organisation stand if they do not reveal that either they hold information on that person after X amount of time and have them 'blacklisted' i.e. have written 'warning' letters requesting that the organisation be contacted to vet these persons?
And what is the position of the organisation where they do not intend to disclose content or existence of a 'warning' letter they may have received from another organisation?
Andrea Owen
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Legal disclaimer
--------------------------
The information transmitted is the property of the University of Paisley and is intended only for the person or entity
to which it is addressed and may contain confidential and/or privileged material. Statements and opinions expressed in this
e-mail may not represent those of the company. Any review, retransmission, dissemination and other use of, or taking
of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited.
If you received this in error, please contact the sender immediately and delete the material from any computer.
--------------------------
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|