Hi Tim
Our organisation produces videos, CD ROMs and print publications and we
use the following forms to gain specific permission prior to
publication. We have a different form for adults and for children.
http://www.becta.org.uk/corporate/display.cfm?section=22&id=2225
Kind regards, Kathryn
Kathryn Billings
Freedom of Information Project/Publication Scheme
British Educational Communications and Technology agency (Becta),
Millburn Hill Road, Science Park, Coventry CV4 7JJ Direct dial
02476 797259 Via switchboard 024 7641 6994 extn 2140 Main fax 024
7641 1418
Please note that I work part-time. I am usually in the office at the
following times: Mon 9.30am - 2.30pm, Tues 9.30am - 2.30pm, Wed 9.30am -
1.30pm
-----Original Message-----
From: Tim Turner [mailto:[log in to unmask]]
Sent: 27 April 2004 15:43
To: [log in to unmask]
Subject: [data-protection] Photographs on the web
Hello
I'm touting for views on the use of photographs on the internet.
Following
Mrs Lindqvist's ordeals in the Swedish Courts (which sounds like a
certain
sort of bad movie), I'm not sure which way to go. Principle 8 seems to
tell
me that a clearly identifiable picture of a living person can only be
put on
an internet site with that person's permission. We're in the process of
ironing out an images policy, and I want to get this right. Would anyone
like to say what they do, on or off-list? It's tempting to go with
verbal
consent as most people in our photographs pose for them, know who we are
and
know what we intend to do with the image. However, I don't want to be
accused of transferring data outside Europe unfairly, so my current line
is
veering towards the use a consent form which specifically asks
permission
for putting a photo on the web. One DP friend even suggests using a form
which specifically spells out the dangers of transfers via the web. Any
different ideas?
Cheers
Tim Turner
Data Protection Officer
Wigan Council
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote also confirms that this email message has been swept by
MIMEsweeper for the presence of computer viruses using Sophos
anti-virus software.
www.mimesweeper.com
www.sophos.com
**********************************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote also confirms that this email message has been swept by
MIMEsweeper for the presence of computer viruses.
www.mimesweeper.com
**********************************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|