In a message dated 27/02/2002 18:16:56 GMT Standard Time,
[log in to unmask] writes:
<< Instead of utilising a data processor, I ensure that any processing of
personal data I want done by someone else is done as a data controller
in common. I take all necessary steps with regard to ‘fair processing
information’ and inform data subjects that their data will be passed to
another data controller, and accept the fact that 'my' personal data
once transferred to the other data controller can be used for what ever
purpose they determine. >>
-----------------
If only it were that easy! Principle One requires that the identity of your
data controller in common and the purposes for which they process the data
would have to be known by your data subjects, and (where necessary under
Schedules 2/3) consent obtained.
In addition, the disclosure for "whatever purpose they determine" could be in
breach of the Second Principle: The Act says: "In determining whether any
disclosure of personal data is compatible with the purpose or purposes for
which the data were obtained, regard is to be had to the purpose or purposes
for which the personal data are intended to be processed by any person to
whom they are disclosed."
So you can't get out of it that easily.
Ian Buckland
MD
Keep IT Legal Ltd
Please Note: The information contained in this document does not replace or
negate the need for proper legal advice and/or representation. It is
essential that you do not rely upon any advice given without contacting your
solicitor. If you need further explanation of any points raised please
contact Keep I.T. Legal Ltd at the address below:
55 Curbar Curve
Inkersall, Chesterfield
Derbyshire S43 3HP
(Reg 3822335)
Tel: 01246 473999
Fax: 01246 470742
E-mail: [log in to unmask]
Website: www.keepitlegal.co.uk
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|