We've had a go at providing guidance on this following the SI last
December. We slogged away at it for quite a while trying to get to grips
with the SI itself and then make it as straightforward as possible for
staff to deal with. We have just been told to go away and re-write it
because our Directors can't understand it.....!
I would love to see what any else has done
Donald Henderson
Information Security Manager
Perth & Kinross Council
-----Original Message-----
From: Broom, Doreen [mailto:[log in to unmask]]
Sent: 12 August 2003 10:32
To: [log in to unmask]
Subject: [data-protection] Dealing with requests from MSPs/MPs
***** THIS EMAIL WAS SENT VIA THE INTERNET *****
Hi All
I was wondering how you deal with specific requests from MSPs/MPs.
Sometimes there are high-profile cases reported in newspapers (usually
in
relation to Social Work) or an ex-partner may contact an MSP/MP to look
into
a matter as he/she may blame the other partner e.g. a child going into
care
and ask the MSP/MP to deal. Sometimes there is further information on
third
parties - how much information would you disclose? I presume the same
principles apply i.e. third party information should be deleted or each
case
be decided on a case by case basis if it would be reasonable to assume
that
the third party could be easily identifiable from the information
presented.
There are times when they can be very demanding and wish to find out the
information especially if mistakes have been made and wish this to be in
the
public domain and not wishing to be unhelpful or using DP to hide under
-
the information is usually very sensitive and we therefore have to
protect
individuals' privacy.
It would be great to hear from any of you who have had to deal with
similar
situations or any advice.....
Cheers - have a good day....
D
Doreen Broom
Access to Information Officer
[log in to unmask]
Tel: 01835 826516 (Direct Line)
**********************************************************************
This email is privileged, confidential and subject to copyright.
Any unauthorised use or disclosure of its content is prohibited.
The views expressed in this communication may not necessarily
be the views held by Scottish Borders Council
**********************************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The information in this email is confidential and is meant solely for
the intended recipients. The information contained in this email may
not be the views of Perth & Kinross Council. It is possible for email
to be falsified and the sender cannot be held responsible for the
integrity of the information contained in it.
If you have received this email in error, any disclosure, copying, or
distribution of the information contained in it is strictly prohibited.
If you are not the intended recipient, please advise the sender
immediately and delete this email.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|