Shirley,
I would have thought that there would be no breach of principle eight as
long as there is no connection of the non - EEA based UK military network to
another in the country where they are situated. My understanding is that
transmission through a non EEA country is not the same as actually
processing within it - so there should be no Principle 8 issue there. Of
course, there are going to be significant P7 issues required (encryption
etc). The Data Controller (Armed forces) will not actually be further
disclosing or if they are this should only be to a data processor who will
process only in accordance with the data controllers instructions. In such
cases a data processor agreement with appropriate security controls should
be established in order to meet the adequacy required.
Have a look at
http://ico-cms.amaze.co.uk/DocumentUploads/transborder%20dataflows.pdf
Peter Lane
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]]On Behalf Of Myers, Shirley
Sent: 07 April 2004 15:19
To: [log in to unmask]
Subject: UK Military bases outside the EEA
Just a quick question I hope.
As far I understand, UK military bases outside the EEA are counted as UK
territory. However, if there is a flow of personal data between the
military base outside the EEA and the UK, how does the DPA impact on this
regarding principle 8?
**********************************************************************
This e-mail and any files transmitted with it are private and intended
solely for the use of the individual or entity to whom they are addressed.
If you are not the intended recipient, the e-mail and any files have been
transmitted to you in error and any copying, distribution or other use of
the information contained in them is strictly prohibited.
Nothing in this e-mail message amounts to a contractual or other legal
commitment on the part of the Government unless confirmed by a communication
signed on behalf of the Secretary of State.
The Driving Standards Agency computer systems may be monitored and
communications carried on them recorded, to secure the effective operation
of the system and for other lawful purposes.
This footnote also confirms that this e-mail message has been swept for the
presence of computer viruses.
**********************************************************************
The original of this email was scanned for viruses by the Government Secure
Intranet (GSi) virus scanning service supplied exclusively by Energis in
partnership with MessageLabs.
On leaving the GSi this email was certified virus-free
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|