** Reply to note from [log in to unmask] Fri, 12 Apr 2002 09:13:35 +0100
> The nitty gritty point was the exact point on which there already
> appears to be some disagreement. A research company wants to collect
> vast amounts of our student records. We have warned students that data
> will go to HESA, but that's as far as we go. What I was asking,
> admittedly in a roundabout way, was whether we could pass the data to
> the company in question. The answer seems to be that we might use the
> disproportionate effort argument.
Hi,
I don't see a disagreement ... just different lengths of strings.
I said what I said because I was thinking of academic research data (medical
data, social work ... criminal, housing, children things etc). ... and
stand by my view :-)
Who is the research company working for? Yourselves, HESA, the government,
themselves. If yourselves then they are data processors, act on your behalf
etc, give them the data once you got a contract and so on. If they are
working for themselves you can tell them to pay you to seek permission from
the students (I assume you would be passing personal identifiers) or tell
them to get lost.
If they are contracted by some public body (send them to HESA comes to mind)
then how long is a piece of string. We had these arguments a while ago with
careers data, data going to HESA then passed on.
Sorry if I provided a contrary opinion. I shall keep quiet (with
difficulty).
Charles
==============================================
Charles Christacopoulos, Management Information Officer,
Planning & Information Group, University of Dundee, Dundee DD1 4HN,
Scotland, United Kingdom.
Tel: 44(0)1382-344891. Fax: 44(0)1382-201604.
http://www.somis.dundee.ac.uk/ http://somis2.ais.dundee.ac.uk/
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|