Roland Perry on Tuesday, March 22, 2005 at 4:13 PM said:-
> Odd then, that almost every other agency interested in
> identity wants more than this.
>
> And what databases do they use to turn this into an audit
> trial of my addresses?
That question raises issues about principle two and the structure of
databases.
Purposes so often become very blurred and difficult in peoples minds when
search factors for databases are considered.
Which brings to mind a similar issue which occurred during the inception of
the Goldfish credit card, consider today something like Google and the
impact of purposes in that sphere. Privacy is not something which seems to
be included, and results in organisations/individuals making arrangements
which provide them with privacy in other ways.
Ian W
The contents of this e-mail are specifically intended to further knowledge
about privacy and data protection. As such they should not be processed for
any other purpose.
> -----Original Message-----
> From: This list is for those interested in Data Protection
> issues [mailto:[log in to unmask]] On Behalf Of
> Roland Perry
> Sent: Tuesday, March 22, 2005 4:13 PM
> To: [log in to unmask]
> Subject: Re: Interview notes
>
>
> In message
> <[log in to unmask]>
> , at 14:17:20 on Tue, 22 Mar 2005, "Smith, Tony"
> <[log in to unmask]> writes
> >I believe that they go by name and date and place of birth.
>
> Odd then, that almost every other agency interested in
> identity wants more than this.
>
> And what databases do they use to turn this into an audit
> trial of my addresses?
>
> >However, since my name is "Tony Smith" I suspect that there
> may be more
> >than one person with the same name and date and place of birth.
>
> Indeed.
> --
> Roland Perry
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to
> the list owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|