This is more complex than it might appear at first
Most business cards get entered in (eg) an outlook contact list. And they
also get added to marketing databases. And consent has not been given for
those uses. Marketing databases are often part of global CRM systems. Data
is thus exported without consent from the EEA
So the rule is to ask! No-one ever objects to being asked. Never.
Tim Trent - Consultant
Direct: +44(0)1344 392644 Mobile:+44(0)7710 126618
email: [log in to unmask]
Marketing Improvement Limited, Abbey House, Grenville Place, Bracknell,
United Kingdom, RG12 1BP
http://www.marketingimprovement.com
Important: This mail contains proprietary information some or all of which
may be legally privileged. It is for the intended recipient only. If an
addressing or transmission error has misdirected this email, please notify
the author by replying to this email. if you are not the intended recipient
you must not use, disclose, distribute, copy, print or rely on this email.
If you are not the named recipient please notify us immediately. This email
and any attachment(s) are believed to be virus-free, but it is the
responsibility of the recipient to make all the necessary virus checks. This
email and any attachments to it are copyright of Marketing Improvement
Limited unless otherwise stated. Their copying, transmission, reproduction
in whole or in part may only be undertaken with the express permission, in
writing, of Marketing Improvement Limited.
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Paul Ticher
Sent: 09 December 2005 18:08
To: [log in to unmask]
Subject: Re: [data-protection] Business cards - Friday question
Business cards only count as personal data if they meet the definition of a
"relevant filing system" - which as Durant reminded us must be strictly
applied. They would therefore have to be a "set" of information
"structured" so that "specific information about particular individuals is
readily accessible". (That's provided the information has neither been
extracted and put on the computer nor is intended to be put on the
computer.)
Your guess is as good as mine, but I would say that the risks inherent in
using the data are so minute that it would be hard to use them for business
purposes in a way that did not comply with the Principles, even if they are
personal data.
Paul Ticher
0116 273 8191
22 Stoughton Drive North, Leicester LE5 5UB
I hereby require any recipient of this message not to use my personal data
for direct marketing purposes.
----- Original Message -----
From: "Mags McGinley" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Friday, December 09, 2005 4:12 PM
Subject: Business cards - Friday question
> Hi,
>
> Please excuse me if there is a really obvious answer to this. In order to
> review the DP practices or our organisation I have sent an email to a
> number of colleagues asking for various details about the personal data
> that they collect/transfer etc. A colleague has just asked me if the
> business cards he collects from people are relevant? Any views?
>
> Warm regards,
> Mags
> --
> Mags McGinley, Legal Research Associate
> Digital Curation Centre/AHRC Research Centre for Studies in Intellectual
> Property and Technology Law
> University of Edinburgh
> Appleton Tower, Crichton Street
> Edinburgh, EH8 9LE
> Tel: 00 44 (0)131 651 3836 Fax: 00 44 (0)131 651 3815
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|