***** THIS EMAIL WAS SENT VIA THE INTERNET *****
That's life as I have discovered....most people who make an SAR usually have
some sort of grievance......
D
Doreen Broom
Access to Information Officer
[log in to unmask]
Tel: 01835 826516 (Direct Line)
> -----Original Message-----
> From: GRAHAM Susan [SMTP:[log in to unmask]]
> Sent: 20 August 2003 10:13
> To: [log in to unmask]
> Subject: Re: what constitutes an S AR?
>
> ***** THIS EMAIL WAS RECEIVED FROM THE INTERNET *****
>
> How would colleagues respond to a request that was downright abusive? The
scenario I have in mind is where the person is clearly making a SAR, has
paid their £10, but frames their request in highly offensive terms,
including abusing the member of staff to whom the request is made. I know
that the Act does not say that people have to be polite, but surely staff
should not be expected to put up with personal abuse?
>
> Susan Graham.
>
> -----Original Message-----
> From: Gibson, Martin [mailto:[log in to unmask]]
> Sent: 19 August 2003 17:40
> To: [log in to unmask]
> Subject: Re: [data-protection] what constitutes an S AR?
>
>
> As far as I know it only has to be in writing and an E Mail would
constitute
> in writing. The Act doesn't say the requesting individual has to be
polite!
>
> Martin Gibson
> data Protection Officer
> Bucks County Council
>
> -----Original Message-----
> From: Talbot Richard [mailto:[log in to unmask]]
> Sent: 19 August 2003 17:36
> To: [log in to unmask]
> Subject: what constitutes an S AR?
>
>
> is there some words that need to be used or can someone send an e-mail of
> abuse and include a statement that they also want to see their personnel
> file.
>
> > Richard Talbot
> > Data Protection Adviser
> >
> >
>
> The Information contained in this E-Mail and any subsequent correspondence
> is private and is intended solely for the intended recipient(s).
> For those other than the recipient any disclosure, copying, distribution,
> or any action taken or omitted to be taken in reliance on such information
> is prohibited and may be unlawful.
>
> Emails and other electronic communication with QinetiQ may be monitored.
> Calls to our Customer Contact Centre may be recorded for quality control,
> regulatory and monitoring purposes.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
>
> Visit our Web Site : http://www.buckscc.gov.uk
> **** Buckinghamshire County Council E-mail Disclaimer ********
> This email and any files transmitted with it are confidential
> and intended solely for the use of the individual or entity
> to whom they are addressed. If you are not the intended
> recipient, the use of the information by disclosure, copying
> or distribution is prohibited and may be unlawful. If you have
> received this email in error please notify the system manager
> at [log in to unmask]
> This footnote also confirms that this email message has been
> swept for content and for the presence of computer viruses.
> **** End of Disclaimer ***************************************
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command>
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
**********************************************************************
This email is privileged, confidential and subject to copyright.
Any unauthorised use or disclosure of its content is prohibited.
The views expressed in this communication may not necessarily
be the views held by Scottish Borders Council
**********************************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|