-----Original Message-----
From: [log in to unmask]
[mailto:[log in to unmask]]
Sent: Tuesday, February 19, 2002 9:22 AM
To: Duncan Smith
Cc: [log in to unmask]
Subject: Re: Don't use data processors!
Colette, hi
"... In effect it means that the data controller will be liable for any
breach of the Act which occurs while its data are in the hands of the
processor."
This is my point. If I, a data controller, use a data processor and
they screw up, I am responsible. If I use another data controller and
they screw up, they are responsible. Don't use data processors!
As you point out ..
" ... I think the thing to remember is responsibility for the data under
the law... It is [As] responsibility to ensure that B has appropriate
systems/procedures in place to comply with the act before entering into
an arrangement with them."
This is I believe NOT the case when two consenting data controllers get
together.
Duncan S Smith
Principal Consultant
e-mail: [log in to unmask]
gsm: +44 (0)777 556 8180
Company Profiles
"The process of Improvement"
----------------------------------------------------------------
The information transmitted is intended only for the person or entity to
which it is addressed and may contain confidential and/or privileged
material. Any review, retransmission, dissemination or other use of, or
taking of any action in reliance upon, this information by persons or
entities other than the intended recipient is prohibited. If you
received this in error, please contact the sender and delete the
material from any computer.
This footnote confirms that this email message has been swept by Norton
Antivirus software for the presence of computer viruses.
Company Profiles Huntingdon UK +44(0)1480 461671
-----------------------------------------------------------------
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|