Observation on posts here :
Assuming the organisation is not using the more sophisticated computer
solutions like PIM and CRM's then using the simple CLI (where a number is
simply displayed to a phone display) would require a cordinated
communication to all staff to instruct them as to actions to take when the
number is displayed. You'd be lucky if everyone could remember these actions
where large numbers of potential recipient staff are involved. Effective
employer controls via CLI monitoring by staff at the recipient phone end
dependant on numbers of staff and the will of the organisation to carry
through.
Blocking an incoming call automatically is a bit more cost effective but may
not be practical in some cases given any given telephone number can be used
by an unknown number of people. You will have no visibility of who the phone
line subscriber is without a making a complaint report to the telecom
regulators. They may not be able to disclose subscriber identity data to you
but may, after investigation, arrange for termination of the subscribers
service if breach of contract proven. This subscriber may be undertaking a
criminal activity (harassment) if they are the caller, but proving the link
is not easy.
Linking a phone number to an individual in databases uses assumptions, and
the resultant database may not be accurate.
The existance of a log cannot stop the calls but may assist in the
collection of evidence, so its DPA registered purpose is presumably crime
prevention?. You will not have sufficient control of the telecoms systems to
stop the caller terrorising / abusing your staff. The caller can call from
anywhere. e.g. telephone boxes, mobile phones, land lines, maybe even voice
over IP. . Creating logging databases is one thing, proving they link
accurately to a living individual is another matter. A determined
'nuisance' caller can drive up your admin costs of implementing controls for
very little proven benefit..
David Wyatt
----- Original Message -----
From: "Roland Perry" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Monday, February 09, 2004 5:59 PM
Subject: Re: [data-protection] amending records
> In message <[log in to unmask]>, [log in to unmask] writes
> >I can't see how a phone number can be used to identify someone to protect
> >staff - can you please expand on this and explain how this works?
>
> CLI? Person about to answer the phone adopts a different attitude as a
> result.
> --
> Roland Perry
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|