Paul
I would guess the comments made allude to Section 7(4)(b)
Is it reasonable to supply without consent of other data subjects by
anticipating the data subjects potential use (Crystal ball anyone?) - Is
this why a certain broadcaster had edited videos?
Controller unlikely to be ables to achieve consent of others - 7(4)a - as
they would not necessarily know the identity of other persons in the video.
Controller can therefore choose between applying 7(5) - trying to supply
with an edited image or 7(4)- do not supply as the other individuals are
potentially identifiable to someone.
Hmm difficult choice ;-)but at least the Act allows the choice to be
applied.
Given the interesting angles on CCTV debate think Ill add this slant to our
DPA training. Using the commissioners video - identify all the
participants as data subjects and win a fiver. Wonder what the odds are?
David Wyatt
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]]On Behalf Of Paul Couldrey
> Sent: 31 May 2001 09:23
> To: [log in to unmask]
> Subject: CCTV Advice
>
>
> On a related issue, a collegue of mine attended the IFSEC2001
> conference at
> the NEC lasweek, jon bamford from the commissioner's office was a guest
> speaker. Apparently he stated that it is not always neccessary
> to blur the
> faces of third parties even if they are identifiable, the thread of the
> argument was that the intention of the data subject is the
> pivitol issue of
> whether to blank third party faces, he gave the example of a
> person who just
> wants an image of themselves = no need to blank faces, as oppossed to a
> person who wants to identify everyone in the area at the time of
> an accident
> to contact possible witnesses = blank faces (identity of third
> parties being
> sought without consent).
> Now I'm confused I was of the opionion that if the images were
> c;ear enougfh
> that a person could be identitified then their image should be blurred etc
> to avoid a third party disclosure, the intention of the data subject being
> irrelevant, I can't find anything in section 7 of the ACt that
> requires the
> data controller to obtain information as to the intention for requesting
> subject access.
> Is this the new case? has jon bamford been misquoted??
>
> Answers on a postcard to the group
>
> Paul Couldrey
> Data Protection Officer
> Wolverhampton City Council
>
> Email Disclaimer
>
> ******************************************************************
> ******************************
> DISCLAIMER: This email and files transmitted are confidential and
> are intended solely for the use of the intended recipient. If you
> are not the intended recipient, or the person responsible for
> delivering it to the intended recipient, you may not copy,
> disclose, distribute or use it in any unauthorised manner. If you
> have received this email in error please notify us by telephone
> on 01902-554455 or by email to [log in to unmask]
> and then delete it and any attachments accompanying it. Please
> note that Wolverhampton City Council cannot guarantee that this
> message or any attachments are virus free or have not been
> intercepted and amended.
> Any views or opinions expressed within this email are those of
> the author and may not necessarily reflect those of Wolverhampton
> City Council and no contractual arrangement is intended to arise
> from this communication.
>
> ******************************************************************
> ******************************
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|