As do articles in the EUCHR and the UN Declaration on Human Rights.
Apply the concepts I stated earlier in this thread to those relevant
articles, add a little more weight and human struggling to the cooking pot
and the outcome appears much the same.
Perhaps a look at reviewing those international legal frameworks would help
some? The exemptions could certainly do with a review, after all the
religious exemptions appear little utilised, if the DP situation is used as
a guide. Physical presence is not necessarily a good guide, but it is one
many use, especially in a world of changing priorities, where confusion
often seems to rule.
Ian W
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]]On Behalf Of Maurice Frankel
> Sent: 13 February 2003 18:29
> To: [log in to unmask]
> Subject: Re: What Use is Notification?
>
>
> >This question presupposes that the Data Protection Act might exist to
> >protect privacy. The word privacy does not appear anywhere
> in the Act. The
> >emphasis on privacy that comes from the Information
> Commissioner relies on
> >Article 8 of the Human Rights Act and the subsequent link
> with the 'lawful'
> >bit of DPA, rather than anything inherent in DPA that
> protects privacy.
>
> But references to "privacy" appear throughout the DP directive, both
> in the recitals and the Articles. Eg Article 1:
>
> "1. In accordance with this Directive, Member States shall protect
> the fundamental rights and freedoms of natural persons, and in
> particular their right to privacy with respect to the processing of
> personal data."
>
> Maurice Frankel
> Campaign for Freedom of Information
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|