The personal information is being processed, otherwise it would not find its
way into the correct pigeon hole.
Principle one would be problematic if the individual(s) were not aware of
the data being used.
Principle three would appear to apply in that the address information was
excessive in detail for the purpose of that particular mathod of post.
It could be possible of course that the item(s) were mis-sent via the wrong
postal method as the inclusion of the address would normally indicate an
intention to use an external mail system, who would necessarily require full
address details. In which case it must be open to debate at which point
Principle 7 applies.
Of course, I suppose, any need to maintain an accurate address database of
peoples location within the organisation is removed if home addresses are
used. So Principle four could be an issue.
Normally enquiries like this one come about as the result of a complaint,
somebody being harmed or made vulnerable in some way, or a process being
made more difficult as a result of the action of people using it. Which
raises the question; Does the organisation have a generally recognised
method of addressing internal mail appropriate to its needs?
Having read Tim's, Steven's and Ian's responses, I see there is a form of
wide consensus, dependent on what the cause of the difficulty was, unusual
for information protection practices generally generated by much broader
issues.
Ian W
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Trevor Louth
Sent: Tuesday, October 14, 2003 10:21 AM
To: [log in to unmask]
Subject: Pigeon holes
Does anyone have a view about putting mail in staff pigeon holes if the mail
includes the home address? Trevor
This e-mail and any files that accompany it are intended only for the use of
the addressee/s, and may contain information that is privileged,
confidential or exempt from disclosure. If the reader is not an intended
recipient, any disclosure, distribution or other use of this e-mail is
prohibited. If you have received this e-mail in error, please delete it
from your system and notify the sender immediately. Any views or opinions
presented do not necessarily represent those of the College.
Thank you.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|