Saundra et al,
Your question is still not very clear, I am afraid. Are you referring to
software/technology used for supporting compliance with the Data
Protection Act?
If the answer to the question above is yes, then I believe that you will
need to look into a number of different areas such as:
1. audit trail
2. disclosure
3. security
4. data access
5. retention time
6. notification
7...etc
Software can be used to support or even maintain compliance in areas
such as the above. Some software e.g., for data access, is provided by
the operating system or the database depending where you store personal
data. Some software needs to be developed specifically for ensuring
compliance e.g., for managing disclosures or for audit purposes.
Babis
*******************************************
Dr Babis Theodoulidis
CRIM - Centre for Research in Information Management
Department of Computation - UMIST
PO Box 88, Sackville Street, Manchester, M60 1QD, UK
Tel: +44 161 200 3309
Fax: +44 161 200 3324
http://www.crim.co.umist.ac.uk/
*******************************************
> -----Original Message-----
> From: This list is for those interested in Data Protection
> issues [mailto:[log in to unmask]] On Behalf Of
> [log in to unmask]
> Sent: 19 June 2002 16:53
> To: [log in to unmask]
> Subject: Re: technological measures to implement the EU Data
> directive req uirements
>
>
> Saundra,
>
> We don't apply any special ones for standard systems. We
> utilise the facilities within the operating system, this is
> generally sufficient.
>
> Andrew
>
>
> -----Original Message-----
> From: Saundra Kae Rubel [mailto:[log in to unmask]]
> Sent: 19 June 2002 16:43
> To: [log in to unmask]
> Subject: technological measures to implement the EU Data
> directive requirements
>
>
> To Ian and the rest of the list:
>
> Ian replied very graciously to my request, which prompts me
> to reformat my question.
>
> What technological systems, software etc, are European Union
> member states utilizing to meet the requirements of the EU
> Data Directive and/or the individual requirements of the
> member states interpretation of the Directive?
>
> I hope that is more focused.
>
> Thank you
>
> Saundra
>
>
> Saundra Kae Rubel
> Privacy and Web Related Laws Compliance Manager
>
www.saundrakaerubel.com <http://www.saundrakaerubel.com/> linked from
Wall Street Executive Library, CIO Career Sources, Hoover Library,
Kresge Library, <http://www.mainecite.org/> http://www.mainecite.org
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All
archives of messages are stored permanently and are available to the
world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command leave
data-protection to [log in to unmask] All user commands can be
found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|