Much intrusion into our lives can be "justified" by a "reasonable person" as
being a thing of "major use to society". However such things are also not
necessarily legal.
There is a major difference between collecting data speculatively and having
a legitimate and legal purpose for the collection.
One should not conclude, for example, that all drivers of white vans
allegedly abduct small children, and thus keep special records of them all.
To the originator of this thread: ASK for your record to be deleted. See
what happens. And tell us here!
-----Original Message-----
From: Fiona Musgrave [mailto:[log in to unmask]]
Sent: 28 November 2001 11:04
To: [log in to unmask]
Subject: Re: Car hire issue...
What if a crime comes to light in a years time, using that van?? Would that
not then be justified. Just a thought (thinking about some appeals on
Crimewatch and the like)!!
Fiona Musgrave
IT Team Principal/DP Officer
Carlisle City Council
> -----Original Message-----
> From: Duncan Langford [SMTP:[log in to unmask]]
> Sent: 28 November 2001 10:57
> To: [log in to unmask]
> Subject: Car hire issue...
>
> Yesterday I went with my daughter (who has no license) to hire a van,
> to move her belongings to a new flat.
>
> On the counter of the hire desk were two web cams, pointing outwards.
> As an essential part of the hiring process, one of these was pointed
> at me, and my image recorded.
>
> When I asked what would happen to this data, I was told it would be
> 'filed' indefinitely.
>
> Now, I can see how it might well be useful to have a picture of the
> person who doesn't return your van - but I don't see the
> justification for permanently storing that image after the van had
> been returned?
>
> A notice on the office wall warned of video surveillance - when I
> queried their policy, I was told it was 'covered by the notice'. I
> specifically did not give permission for any recording of my personal
> data, but this made no difference.
>
> We needed the van, so continued, under protest - but I'd certainly
> appreciate comments about the legality of this policy!
>
> - duncan
> --------------------------------------------------------------------------
> ---
> Dr Duncan Langford Computing Laboratory, University of Kent at Canterbury
> UK
> Practical Computer Ethics:McGrawHill Business Computer
> Ethics:AddisonWesley
> 'Internet Ethics' - MacMillan Press (UK) and St Martins Press (USA)
> --------------------------------------------------------------------------
> ---
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> _____________________________________________________________________
> This message has been checked for all known viruses by Star Internet
> delivered through the MessageLabs Virus Scanning Service. For further
> information visit http://www.star.net.uk/stats.asp or alternatively call
> Star Internet for details on the Virus Scanning Service.
_____________________________________________________________________
This message has been checked for all known viruses by Star Internet
delivered through the MessageLabs Virus Scanning Service. For further
information visit http://www.star.net.uk/stats.asp or alternatively call
Star Internet for details on the Virus Scanning Service.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|