** Reply to note from Ian Welton <[log in to unmask]> Fri, 19 Jul 2002 22:10:17 +0100
> I understood the disproportionate effort related merely to the delivery of
> the personal data, not finding it.
>
> If it related to finding the personal data required, then computer
> applications could completely ignore subject access issues, with data
> controllers simply claiming disproportionate effort.
Hi,
The key point of the question was that the data are not on servers any more. The
data can be on either user's own PCs and/or copied onto CDs. If the data is on
servers there is no point in saying disproportionate effort.
I think delivery is the easy part, finding the information is the difficult part.
It would all be different though if the SAR was in relation to data of
a particular case as communication would have taken place between (within reason)
identifiable individuals, hence it would be reasonable to search for that info.
Just a thought.
Charles
==============================================
Charles Christacopoulos, Data Protection & Management Information Officer,
Planning & Information, University of Dundee, Dundee, DD1 4HN, Scotland,
United Kingdom.
Tel: 44(0)1382-344891. Fax: 44(0)1382-201604.
http://www.somis.dundee.ac.uk/ http://somis2.ais.dundee.ac.uk/
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|