JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for DATA-PROTECTION Archives


DATA-PROTECTION Archives

DATA-PROTECTION Archives


data-protection@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

DATA-PROTECTION Home

DATA-PROTECTION Home

DATA-PROTECTION  2005

DATA-PROTECTION 2005

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: Handling a SAR outside the Act

From:

Tim Trent <[log in to unmask]>

Reply-To:

Tim Trent <[log in to unmask]>

Date:

Tue, 12 Jul 2005 13:22:21 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (252 lines)

The way of phrasing the question is really easy.

"George, than you for your request.  I'm calling you to say we will be
acknowledging it formally, and to tell you exactly what happens next.  We
also want to get this exactly right for you.  (general informational chat)
Is there a particular area that interests you most? ....."

Pretty obviously there is a need for sensitivity.  It is not a conversation
to go at like a bull at a gate, but it starts to reassure the enquirer that
the enquiry is being taken seriously.  Obviously if hostility is met then
the call closes very early.  But note that the structure ensures that
"lawful business" is handled up front.

Tim Trent - Consultant
Direct: +44(0)1344 392644 Mobile:+44(0)7710 126618
email: [log in to unmask]
Marketing Improvement Limited, Abbey House, Grenville Place, Bracknell,
United Kingdom, RG12 1BP
http://www.marketingimprovement.com

 
  

Important: This mail contains proprietary information some or all of which
may be legally privileged. It is for the intended recipient only. If an
addressing or transmission error has misdirected this email, please notify
the author by replying to this email. if you are not the intended recipient
you must not use, disclose, distribute, copy, print or rely on this email.
If you are not the named recipient please notify us immediately.  This email
and any attachment(s) are believed to be virus-free, but it is the
responsibility of the recipient to make all the necessary virus checks. This
email and any attachments to it are copyright of Marketing Improvement
Limited unless otherwise stated. Their copying, transmission, reproduction
in whole or in part may only be undertaken with the express permission, in
writing, of Marketing Improvement Limited.



-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Tim Turner
Sent: 12 July 2005 13:12
To: [log in to unmask]
Subject: Re: [data-protection] Handling a SAR outside the Act
Sensitivity: Confidential

I agree with Antoinette (and with Tim Trent's point about good customer
service). The fact that the applicant's motive cannot be used as an excuse
to withhold data doesn't make the question unacceptable. If you can develop
a polite, diplomatic dialogue with the applicant, they won't find anything
to object to or complain about. On the other hand, if they get the sense
that you're trying to evade or deflect the request, they'll be rightly
annoyed. If the person handling the request is sufficiently sensitive and
open, I don't see how asking a few questions to focus or understand the
request  is a breach of anything. They can always say no.

Not that I necessarily achieve this harmonious approach myself (I have three
SARs on the go just now, and I doubt they're big fans), but my applicants
usually tell me what they're doing before I have a chance to ask.

Tim Turner
Wigan Council

> ----------
> From: 	Antoinette Carter[SMTP:[log in to unmask]]
> Reply To: 	[log in to unmask]
> Sent: 	12 July 2005 12:52
> To: 	[log in to unmask]
> Subject: 	Re: [data-protection] Handling a SAR outside the Act
> Sensitivity: 	Confidential
> 
> In my experience, when someone submits a SAR they are usually seeking 
> "justice" and I find that on the whole a discussion with them as to 
> how best to achieve their ultimate aim is very well received.  I have 
> found that people do not generally thank you for copying every last 
> piece of paper with their name on it in response to a SAR, and 
> targeting your response is in everyone's interests.  The cases I deal 
> with are invariably staff cases, and as we have a very low turnover of 
> staff, they have often been employed for a number of years, and 
> therefore have a mountain of personal data held by the organisation.  
> By actually inviting them to a strictly confidential meeting, on a one 
> to one basis, I can reassure them that I am there to help them, and we 
> can then narrow down the search to one that is quickly and easily 
> achieved, and which will actually help them.  For example, people 
> often don't want copies of their original job application etc., as 
> their "beef" concerns more recent history.  I often dangle the carrot 
> of saying "well, if we can restrict the search to this period of time 
> (for example) I can let you have it next week, instead of making you 
> wait 40 days for it".  I always say that they can ask me to widen the 
> search again at a later date, but only one has ever done so, and 
> no-one has ever complained about the way their SARs have been handled.  
> In fact, one even sent an e-mail to my boss saying that if HR had 
> handled their case half as sensibly as I had, they might never have 
> referred their case to an Employment Tribunal.  So I would agree with 
> Tim that it is about giving the SAR a high standard of service.
> 
> -----Original Message-----
> From: This list is for those interested in Data Protection issues 
> [mailto:[log in to unmask]] On Behalf Of Tim Trent
> Sent: 12 July 2005 12:28
> To: [log in to unmask]
> Subject: Re: [data-protection] Handling a SAR outside the Act
> Sensitivity: Confidential
> 
> I agree that the matter must be handled under the DPA because it was 
> effectively issued under it.
> 
> I agree that one is not "entitled" to extra information.  My practical 
> experience is different, because in practice a good, service oriented 
> approach ensuring that you comply in all respects with the law tends 
> to be a better approach than a pure DPA response.  So this is a 
> tightrope to be walked with care.
> 
> I view a conversation as reasonable provided Member Relations know 
> what they are doing.  If not, then it can make a potentially awkward 
> situation a bad one.
> 
> -----Original Message-----
> From: This list is for those interested in Data Protection issues 
> [mailto:[log in to unmask]] On Behalf Of Jim Whitaker
> Sent: 12 July 2005 12:22
> To: [log in to unmask]
> Subject: Re: [data-protection] Handling a SAR outside the Act
> Sensitivity: Confidential
> 
> Unless you need further information from them to help you identify 
> what information they are seeking, I would advise against asking them 
> for information about their request.
> 
> You are not entitled to it and it is likely to be seen as unhelpful.
> 
> Regards
> 
> Jim
> 
> ----------------------------------------------
> Jim Whitaker
> Head of Information Management and Internal Communications British 
> Educational Communications and Technology agency Millburn Hill Road
> Science Park    Telephone      024 7679 7452 
> Coventry                                  024 7641 6994 (Ext 3341)
> 
> CV4 7JJ         Fax                 024 7684 7071 
> ======================================================================
> ==
> =======
> -----Original Message-----
> From: Hodgetts, Jonathan
> [mailto:[log in to unmask]]
> Sent: 12 July 2005 12:17
> To: [log in to unmask]
> Subject: Re: [data-protection] Handling a SAR outside the Act
> Sensitivity: Confidential
> 
> Tim,
> Thank you for your reply.  It is clear to me that the member intends 
> for this to be actioned under the Act in that they ask:
> 
> "I would like to make a "Subject Access Request" under section 7(1) of 
> the
> 1998 Data Protection Act. Please could you provide me with complete 
> disclosure of any information concerning me (if you have any) that I 
> am entitled to view under the provision of the aforementioned act."
> 
> I think my main concern is should we be contacting the member to ask 
> the reason for their SAR, or could this be considered intrusive to 
> their privacy?
> 
> 
> 
> **********************************************************************
> This email and any files transmitted with it are confidential and 
> intended solely for the use of the individual or entity to whom they 
> are addressed.
> If you have received this email in error please notify the system 
> manager.
> 
> This footnote also confirms that this email message has been swept by 
> MIMEsweeper for the presence of computer viruses.
> 
> www.clearswift.com
> **********************************************************************
> 
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>        All archives of messages are stored permanently and are
>       available to the world wide web community at large at
>       http://www.jiscmail.ac.uk/lists/data-protection.html
>       If you wish to leave this list please send the command
>        leave data-protection to [log in to unmask]
>             All user commands can be found at : -
>         http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list 
> owner
>               [log in to unmask]
>   (all commands go to [log in to unmask] not the list please)
>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> 
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>        All archives of messages are stored permanently and are
>       available to the world wide web community at large at
>       http://www.jiscmail.ac.uk/lists/data-protection.html
>       If you wish to leave this list please send the command
>        leave data-protection to [log in to unmask]
>             All user commands can be found at : -
>         http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list 
> owner
>               [log in to unmask]
>   (all commands go to [log in to unmask] not the list please)
>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> 
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>        All archives of messages are stored permanently and are
>       available to the world wide web community at large at
>       http://www.jiscmail.ac.uk/lists/data-protection.html
>       If you wish to leave this list please send the command
>        leave data-protection to [log in to unmask]
>             All user commands can be found at : -
>         http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list 
> owner
>               [log in to unmask]
>   (all commands go to [log in to unmask] not the list please)
>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> 

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
              [log in to unmask]
  (all commands go to [log in to unmask] not the list please)
   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
              [log in to unmask]
  (all commands go to [log in to unmask] not the list please)
   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000
1999
1998


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager