In message <[log in to unmask]>,
GRAHAM Susan <[log in to unmask]> writes
>Has anyone encountered a situation where an individual used the DPA
>maliciously by making SARs to disrupt the work of the organisation
>rather than because they wanted to see what information the organisation
>held? I don't mean individuals who then used the information they
>obtained to sue/wreak vengeance in some other way, but someone who only
>makes the request to put the organisation through hoops.
This has happened from time to time with ISPs. Often it's a journalist
just trying to stir up a "privacy" story.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|