Hi,
This was supposed to be a Friday afternoon light relief thing, but it's
taken me so long to fathom it out that everyone has probably gone home now.
I have tried to do a flowchart to show the decision route for working out
if personal data can be processed for a further purpose. I hope that it
relects the legislation properly, and would be grateful if anyone can
point out glaring or even minor errors. Because it is a chart (and
because the majority of the audience aren't DPA specialists) there isn't
room for the very finer points, but I think this represents the general
gist.
If this seems to be accurate, I am very happy for anyone else to use it
(no credit or reference needed) if they think it might be of benefit.
Cheers
Graeme
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|