In message <000001c4805a$b1c5d1c0$6a3468d5@com>, at 11:54:03 on Thu, 12
Aug 2004, Ian Welton <[log in to unmask]> writes
>How would electronic audit trails be dealt with? Would there be a need to
>delete the enquiry entry which resulted from a s.29 request? If so how is
>the integrity and evidential value of the audit trail maintained?
I don't know what standards apply to that sort of audit trail.
Is there a requirement for a similar audit trail every time an
"internal" enquiry is made from the database?
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|