Laurence Bebbington on 19 March 2004 at 11:21 said:-
> Another significant problem with Durant (and the Johnson case
> also, I think) is that the water was dreadfully muddied by
> the fact that the SAR procedures appeared to be being used
> for purposes for which they were not really intended.
Is the use of SAR not merely an indication of the wider paradox associated
with privacy matters - every body wants, but does not necessarily wish
others to have.
E.g. E-mail not always being seen as private, until that lack directly
affects the organisation or individual in some way.
Commercially the more informed you are about your markets and
competitors the better - but your competitors should know less about you.
Many organisations not wanting persons to copy website content, so
they may profile each visit - Individuals using off-line browsers or/and
advertising filtering software to obtain some privacy in browsing, hence
avoiding some profiling and targeted marketing.
Nation states maintaining their secrets, but wanting to obtain
secrets from all others.
To attempt a constraint of the type Durrant intimates with regard to SAR,
would seem to very clearly illustrate associated issues.
Perhaps globally there should be sufficient order to properly accept a
perception of a need for tight restrictions of that nature, but that would
mean every body should deny any ability to meet a great many perceived needs
in response to demands made of them.
Possibly the water is not so muddied, but merely indicative of a plural
society.
From that viewpoint subject access could be seen as a mechanism for
individuals which provides some balance to the greater capabilities of
social structures(organisations).
N.B. I noticed plural was associated with plundering in the thesaurus -
jestingly, that could have replaced.
Ian W
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|