>If (A) has not provided his/her address, how do you know they are who they
say they >are and that what they say is true? Does (A) have a malicious
intent towards (B)
Very good point - I'd fallen into a trap there :-)
Also a good illustration of the need to ask the "What will happen"
questions, take a decision based on the evidence available and document the
reasoning. If it's the correct decision all well and good. If it's the
wrong decision the organisation has a defence against criticism.
Graham
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|