I have only completed the first two parts so far but I would say it
should be used as the Standard we should all start from. Then the
advice we all give can only get better from a common point.
Perhaps those who are "experienced" could take the test to see for them
selves if they are above that starting point. This would also give a
certain amount of confidence to those who want to employ a Data
Protection Professional/ Consultant.
Mike.
There are others who teach this course, but Masons are excellent.
>>> Tim Trent <[log in to unmask]> 06/27/03 01:15pm >>>
I'm a little lost. Why put it to bed?
By the way the sole positive replies about it seem to be from those who
are
qualified. Do others have opinions they would like to share, please?
I am
trying to make an objective assessment of both the qualification and
the
need to either recommend it to clients or to offer training in it
through my
own firm.
So far I have not managed to form a commercial view of its personal
value
(ie to BE qualified) or its business value (to provide education
leading to
qualifications)
Tim Trent
----- Original Message -----
From: "DPCS Associates" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Thursday, June 26, 2003 2:33 PM
Subject: [data-protection] ISEB in Data Protection
Should this one be put to bed?
Fred Foy
(ISEB Qualified)
This communication is intended for the person(s) or company named
aboved,
and may be confidential, legally privileged and protected in law.
Unauthorised disclosure or copying of this information may be unlawful.
If
you receive this communication in error please contact the sender
immediately and delete the material from any computer
The information contained in this communication does not replace or
negate
the need for legal advice. We offer no statements regarding the legal
acceptability of the information contained in this communication.
028 9261 3064
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
**************************************************
This e-mail is confidential, may be privileged, and is for
sole use of the intended recipient.If received in error,
please contact the sender and delete the e-mail & attachments.
We believe that this e-mail is virus free, and the information
is accurate, but no warranty is given to this effect, and
no responsibility can be accepted.
**************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|