I understand that UMIST or University of Manchester won a tender to put some
guidance on software design together for the Commissioner.
According to the ITT issude bt=y the OIC, the guidance was supposed to have
been available about last Easter!
C
-----Original Message-----
From: [log in to unmask]
Sent: 20 June 2002 09:51
To: [log in to unmask]
Subject: Re: technological measures to implement the EU Data directive
req uirements
Saundra et al,
Your question is still not very clear, I am afraid. Are you referring to
software/technology used for supporting compliance with the Data
Protection Act?
If the answer to the question above is yes, then I believe that you will
need to look into a number of different areas such as:
1. audit trail
2. disclosure
3. security
4. data access
5. retention time
6. notification
7...etc
Software can be used to support or even maintain compliance in areas
such as the above. Some software e.g., for data access, is provided by
the operating system or the database depending where you store personal
data. Some software needs to be developed specifically for ensuring
compliance e.g., for managing disclosures or for audit purposes.
Babis
*******************************************
Dr Babis Theodoulidis
CRIM - Centre for Research in Information Management
Department of Computation - UMIST
PO Box 88, Sackville Street, Manchester, M60 1QD, UK
Tel: +44 161 200 3309
Fax: +44 161 200 3324
http://www.crim.co.umist.ac.uk/
*******************************************
> -----Original Message-----
> From: This list is for those interested in Data Protection
> issues [mailto:[log in to unmask]] On Behalf Of
> [log in to unmask]
> Sent: 19 June 2002 16:53
> To: [log in to unmask]
> Subject: Re: technological measures to implement the EU Data
> directive req uirements
>
>
> Saundra,
>
> We don't apply any special ones for standard systems. We
> utilise the facilities within the operating system, this is
> generally sufficient.
>
> Andrew
>
>
> -----Original Message-----
> From: Saundra Kae Rubel [mailto:[log in to unmask]]
> Sent: 19 June 2002 16:43
> To: [log in to unmask]
> Subject: technological measures to implement the EU Data
> directive requirements
>
>
> To Ian and the rest of the list:
>
> Ian replied very graciously to my request, which prompts me
> to reformat my question.
>
> What technological systems, software etc, are European Union
> member states utilizing to meet the requirements of the EU
> Data Directive and/or the individual requirements of the
> member states interpretation of the Directive?
>
> I hope that is more focused.
>
> Thank you
>
> Saundra
>
>
> Saundra Kae Rubel
> Privacy and Web Related Laws Compliance Manager
>
www.saundrakaerubel.com <http://www.saundrakaerubel.com/> linked from
Wall Street Executive Library, CIO Career Sources, Hoover Library,
Kresge Library, <http://www.mainecite.org/> http://www.mainecite.org
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All
archives of messages are stored permanently and are available to the
world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command leave
data-protection to [log in to unmask] All user commands can be
found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
________________________________________________________________________
This e-mail has been scanned for all viruses by Star Internet using
MessageLabs SkyScan services. For more information visit: www.star.net.uk.
________________________________________________________________________
******************** E-mail confidentiality notice ********************
This message is intended for the addressee only. It is private,
confidential and may be covered by legal professional privilege or
other legal or attorney/client privilege. If you have received this
message in error, please notify us and remove it from your system.
If you require assistance, please contact our London office
(telephone +44 (0) 20 7490 4000).
Masons is an international law firm with offices in London, Bristol,
Edinburgh, Glasgow, Leeds, Manchester, Brussels, Dublin, Hong Kong,
Guangzhou and Singapore.
Further information about the firm and a list of partners is
available for inspection at 30 Aylesbury Street, London EC1R OER
or from our Web site at www.masons.com
***********************************************************************
________________________________________________________________________
This e-mail has been scanned for all viruses by Star Internet using MessageLabs SkyScan services. For more information visit: www.star.net.uk.
________________________________________________________________________
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|