Case studies can be found in the Commissioner's Annual Reports.
Bob Gibbs.
L.B.Newham.
-----Original Message-----
From: Aston Information Security [mailto:[log in to unmask]]
Sent: 24 January 2002 18:12
To: [log in to unmask]
Subject: Prominent Cases
Hi All
Is anyone aware of any high profile successful cases that have been carried
out by the OIC?
I am not, and I was wondering whether other European countries are having
more success or are more committed to enforcing the Act. Or am I wrong?
Comments please
many thanks
Jason
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
**********************************************************************
Important:
This e-mail is intended for the above named person only and should be
treated as confidential. If this has come to you in error you should take
no action based on it, nor should you copy or show it to anyone;
please telephone us immediately.
**********************************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|