I'm currently working on an academic journal article on privacy, data
protection and human rights, (basically on reconciling the right of privacy
with the need to use technology to tackle terrorism/fraud/cybercrime, etc -
with a particular emphasis on European legislation.
Would be grateful if anyone could recommend any useful sources of reference.
Thanks.
-----Original Message-----
From: Donald Henderson [mailto:[log in to unmask]]
Sent: Tuesday, August 19, 2003 4:29 PM
To: [log in to unmask]
Subject: Re: [data-protection] [bulk email] [data-protection] Email
!!!!!!! and H drive
Teresa,
You're straying into the murky world of RIP with your questions, which
is what part 3 is supposed to reconcile with DP.
Everything depends on the policy your organisation adopts and what it
tells its employees. Unwritten rules are normally only worth the paper
they're written on !
If the organisation says nothing is private and tells everyone, then
everything can be accessed. If it says things marked "private" belong to
individuals, it can still access them if there is a justifiable business
need (eg keeping the mail system working or investigating a possible
crime), but it is unlikely that a manager could justify forcing access
merely because an employee was off.
The key issue is adopting a policy and publicising it to all employees.
Donald Henderson
Information Security Manager
Perth & Kinross Council
-----Original Message-----
From: Teresa Gudge [mailto:[log in to unmask]]
Sent: 19 August 2003 14:39
To: [log in to unmask]
Subject: [bulk email] [data-protection] Email !!!!!!! and H drive
There is a question running around my head - and a lot of contradictory
answers and chasing it !!!!
I have an email box with my employer -- is my email box private ??
are my emails private ?? If I was on holiday and my manager wanted
access
to my emails for an urgent business need can he look in my in box ? and
the
same questions apply for the H drive.
There seems to be unwritten rules that the mail box and the H drive are
the
temporary property of the person logged in ..... but ultimately the
system
belongs to my employer doesn't it ... so ultimately can representatives
of
my employer i.e. my manager go into both places to search for documents
???
Of course we have policies and procedures saying that the email system
must
be used in the interests of the company, and we have shared drives so
that
individuals save work where other people can get to them ..... but of
course they still used the H drive
In part 3 of the Code of Practice from the ICs office it talks about
employees putting the word PRIVATE in the subject of the mail and then
employers cannot open it ..... but wouldn't that be abused !!!
And can anyone point me to the "written word" about this ????????????
HELP !!!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The information in this email is confidential and is meant solely for
the intended recipients. The information contained in this email may
not be the views of Perth & Kinross Council. It is possible for email
to be falsified and the sender cannot be held responsible for the
integrity of the information contained in it.
If you have received this email in error, any disclosure, copying, or
distribution of the information contained in it is strictly prohibited.
If you are not the intended recipient, please advise the sender
immediately and delete this email.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
********************
Please read these warnings and requirements:
This e-mail transmission is strictly confidential and intended solely for the addressee. It may contain privileged and confidential information and if you are not the intended recipient, you must not copy, distribute or take any action in reliance upon it. If you have received this e-mail in error, please notify the sender or [log in to unmask] and delete the e-mail transmission immediately.
Viruses: Although we have taken steps to ensure that this e-mail and attachments are free from any virus, we advise that in keeping with good computing practice the recipient should ensure they are actually virus free.
Security Warning: Please note that this e-mail has been created in the knowledge that internet e-mail is not a 100% secure communications medium. We advise that you understand this lack of security and take any necessary measures when e-mailing us.
Field Fisher Waterhouse reserve the right to read any e-mail or attachment entering or leaving its systems from any source without prior notice.
A list of partners is available at www.ffwlaw.com
Field Fisher Waterhouse, 35 Vine Street, London EC3N 2AA
Tel: +44(0)207 861 4000 Fax: +44(0)207 488 0084 CDE: 823
Field Fisher Waterhouse is regulated by the Law Society. Equity Incentives Limited, an incorporated legal practice wholly owned by Field Fisher Waterhouse, is regulated by the Law Society and authorised by the Financial Services Authority. Equity Incentives Limited trades under its own name and as FFW Corporate Finance
******************************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|