I am often asked about information to prove my identity over the phone -
clearly this is based on the information that I have previously supplied -
eg for telephone banking.
In this instance, it is not an absolute proof of my identity - rather it
makes it likely that I am the same as the person who previously set up the
bank account.
We know that a very determined fraudster can produce new identities eg there
was a recent case of people being sentenced having been found with numerous
driving licences
Fortunately most of us aren't those.
Nick Landau
----- Original Message -----
From: "Roland Perry" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Tuesday, October 31, 2006 1:18 PM
Subject: Re: [data-protection] Verification of requestor identity - subject
access
> In message <[log in to unmask]>, at 10:34:52 on Tue, 31 Oct
> 2006, Nigel Roberts <[log in to unmask]> writes
>>Birth certicates are different, as there is statutory provision about
>>them.
>>
>>Anything where there is statutory provision (and nowadays, where that
>>statutory provision is HR compliant i.e. proportionate) is OK.
>>
>>Birth certicates (used to prove birth!) clearly are acceptable under those
>>considerations.
>
> That misses the point. The suggestion was that you shouldn't be asking for
> additional information (that you don't already hold), perhaps also because
> there's nothing to compare it against to show its veracity.
>
> This is just as true of a birth certificate as any other document,
> irrespective of whether or not the law allows an exception for you to
> scrape and store all those extra details off my birth certificate should I
> decide to show it to you.
>
> If you want another example, what about a certified redacted copy of my
> driving licence that doesn't show what classes of vehicle I'm allowed to
> drive?
> --
> Roland Perry
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|