In a message dated 22/02/2002 09:25:12 GMT Standard Time,
[log in to unmask] writes:
<< I think the best practice is to contact the person and ask exactly what it
is that they want, and if they are unsure often assistance to identify
possible dates times etc, this seems to fall in line with the new ethos of
information access. >>
-----------
This approach could be challenged, particularly in light of comments on the
monitoring of e-mails.
Scenario: Data Subject (DS) requests copies of all e-mails constituting
personal data about DS. Data Controller (DC) says: tell me exactly what you
want, dates, subject lines, etc". DS says: "how could I possibly know these
details if the emails were about me rather than to or from me?" DC replies:
"Well if you don't tell us we can't find them." DS reminds boss: "I thought
you were monitoring e-mails using keyword searching and that any text string
could be found using this search engine? Could you not try putting my name
in as the search criterion?" (NB DS is a former member of the IT department).
It could be said that in organisations with such a search facility a DS need
only supply a few basic details in order for it to constitute sufficient
"reasonably required" information in order to locate the data.
Ian Buckland
MD
Keep IT Legal Ltd
Please Note: The information contained in this document does not replace or
negate the need for proper legal advice and/or representation. It is
essential that you do not rely upon any advice given without contacting your
solicitor. If you need further explanation of any points raised please
contact Keep I.T. Legal Ltd at the address below:
55 Curbar Curve
Inkersall, Chesterfield
Derbyshire S43 3HP
(Reg 3822335)
Tel: 01246 473999
Fax: 01246 470742
E-mail: [log in to unmask]
Website: www.keepitlegal.co.uk
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|