Has any one developed and published a retention schedule listing the periods
for which different categories of data should be kept and under what
legislation?
regards
Pat
-----Original Message-----
From: Ian G Dean [mailto:[log in to unmask]]
Sent: 22 March 2002 11:05
To: [log in to unmask]
Subject: Re: destroying Personal Data
**********************************************************************
This e-mail is intended solely for the addressee and is strictly
confidential. If you are not the addressee, please do not read, print,
re-transmit, store or act in reliance on it or any attachments. Instead
please e-mail it back to the sender and delete the message from your
computer.
E-mail transmission cannot be guaranteed to be secure or error free and The
Co-operative Bank accepts no liability for changes made to this e-mail (and
any attachments) after it was sent or for viruses arising as a result of
this e-mail transmission.
Any unauthorised reproduction, dissemination, copying, disclosure,
modification, distribution and/or publication of this e-mail message is
strictly prohibited.
The Co-operative Bank p.l.c. is registered in England and Wales, number
990937. The registered office is at PO Box 101, 1, Balloon Street,
Manchester, M60 4EP.
**********************************************************************
Moira
As far as I am aware there is no requirement ot keep detailed records of
when
items were destroyed. If this were the case large businesses would have as
much
information about the info they have destroyed as the info they have which
is
current.
It is advisable to have an 'information retention policy' and detailed
guidance
on how long different types of information will be retained so that people
know
how long to keep information prior to destruction. Some information will
obviously need to be retained for legal requirements e.g. inland revenue,
however the majority will be based on the business need for retention. The
IC is
keen that information is not kept for any longer than necessary as required
by
the 5th principle
If this is a one off situation of destruction then it may be advisable to
keep a
record that all info collected on such and such a date was destroyed on xx
date.
hope this is useful
Regards
Ian G Dean
Data Protection Manager, The Co-operative Bank
____________________Reply Separator____________________
Subject: destroying Personal Data
Author: Moira Forbes <[log in to unmask]>
Date: 22/03/2002 10:54 AM
Can someone please clarify for me the procedure when deleting personal data.
Must every item and every individual record be recorded as destroyed (
which then by itself becomes P.D by having to record the destruction
against each D.S) or can more general terms be used.
My situation is that an extremely large amount of data has been collected.
Basic details of personal identifiers,collected during a canvassing process
to test knowledge level and provide subsequent requested information.
At the end of this process we have no need nor desire to retain this data.
Is it sufficient to say e.g 50,000 records from electoral roll at Feb 2002
for "given" area containing personal identifiers were dstroyed by shredding
at a "given" date?
Any thought extremely welcome.
Thanks
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|