>Has anyone encountered a situation where an individual used the DPA
maliciously by >making SARs to disrupt the work of the organisation rather
than because they wanted >to see what information the organisation held?
We've had a tiny minority of cases where there has been suspicion of that -
from what one might call "local activists" :-) However, in each case the
applicant could have put forward an argument that the information was
required legitimately.
The easiest way of dealing with them has been to provide the information,
subject to valid exemptions - which probably frustrated the suspected
malicious/vexatious purpose anyway. In that way we can say, truthfully,
that we have responded properly and provided all the information we were
bound to provide.
Regards,
Graham
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|