Hi,
I am interested in finding out the business processes different
organisations use for extracting information from databases. Given a
DPA SAR and a database, do you have a set methodology for searching this
database for information. Are there a set number of stages defined in
your organisation for dealing with this situation which presumably must
occur quite often. If for example, you find an instance of the data-
subject in the database, how do you know if you have extracted all the
information? What happens when you have 1000+ databases of information
containing personal information...
Hope you can help.
Ben Cawley
Manchester Metropolitan University
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|