Betty,
Not that this is a topic close to my heart at the moment : -), but don't
forget that there are opportunities for data controllers in common and
joint data controllers. You may for example reach an agreement with the
funding body that you jointly decide on the purposes for which personal
data is processed. Just remember that if you intend to use existing
personal data, the use and disclosure were all included as part of ‘fair
processing information’ when it was originally acquired otherwise breach
1 and 2!
Duncan S Smith
Principal Consultant
e-mail: [log in to unmask]
gsm: +44 (0)777 556 8180
Company Profiles
"The process of Improvement"
----------------------------------------------------------------
The information transmitted is intended only for the person or entity to
which it is addressed and may contain confidential and/or privileged
material. Any review, retransmission, dissemination or other use of, or
taking of any action in reliance upon, this information by persons or
entities other than the intended recipient is prohibited. If you
received this in error, please contact the sender and delete the
material from any computer.
This footnote confirms that this email message has been swept by Norton
Antivirus software for the presence of computer viruses.
Company Profiles Huntingdon UK +44(0)1480 461671
-----------------------------------------------------------------
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|