You know, now you mention it, that also strikes me. I suspect it was the
nature of the topic that brought it to mind. (I did put the name of the
site beside the tiny link, by the way)
The challenge is, though, that you can put the "alleged" full details and
also the tiny url side by side. Example:
http://validandwonderfulsite.com next to http://tinyurl/concealment (that
leads to http://nautghtysexsitethatihopedoesnotexist.com )
I think all one can say is that, wherever the tiny link leads, the employee
receiving it must be adjudged to be blameless by any employer monitoring
internet use, simply because the url was concealed
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Nick Landau
Sent: 22 August 2006 11:14
To: [log in to unmask]
Subject: Re: [data-protection] Data Protection (Processing of Sensitive
Data) Order 2006
When accessing the tinyurl site which linked to the
http://www.complianceandprivacy.com/ site it occured to me that this was a
way to receive a website on my computer that I would choose not to look at.
It is probably a good practice to put both the full website details as well
as the short link. I have never done this though!
Nick Landau
----- Original Message -----
From: "Tim Trent" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Tuesday, August 22, 2006 10:51 AM
Subject: [data-protection] Data Protection (Processing of Sensitive Data)
Order 2006
>I picked this one up from the Compliance and Privacy site:
> http://tinyurl.com/gvykf
>
> It doesn't affect my own company or clients that I have currently, and
> it probably doesn't affect many on this discussion list in terms of
> the processing and disclosure, but it has seemed to slip under the radar.
>
> I hadn't thought about the implications until I clicked the "Discuss
> this article" link at the foot. I was in "Those with nothing to hide
> have nothing to fear" thought mode, I suppose. The post on that
> discussion forum from "dazed" (don't people pick strange names?)
> highlighted something that I wonder if the lawmakers have thought
> through - that of those who are convicted and thus whose data is
> disclosed, and then who are subsequently cleared on appeal.
>
> What happens to their credit status. I know that, at the time, it's
> the least of their worries, but is the process there to undo that
> which has been done? And, come to that, how will they know that it
> needs to be done (as
> individuals) and start the "undoing" process going?
>
> Before you say "no smoke without fire", consider the link in Peter
> Andrews's reply to dazed that goes to The Times Online, where it
> appears that at least some of Operation Ore's evidence is deeply
> flawed. It could mean "there but for the grace of god go we" if we
> use the wrong payment processor online.
>
>
>
> Tim Trent - Consultant
> Direct: +44(0)1344 392644 Mobile:+44(0)7710 126618
> email: [log in to unmask]
> <blocked::mailto:[log in to unmask]>
> Marketing Improvement Limited, Abbey House, Grenville Place,
> Bracknell, United Kingdom, RG12 1BP
> <blocked::http://www.marketingimprovement.com/>
> http://www.marketingimprovement.com
>
>
>
>
>
> Important: This mail contains proprietary information some or all of
> which may be legally privileged. It is for the intended recipient
> only. If an addressing or transmission error has misdirected this
> email, please notify the author by replying to this email. if you are
> not the intended recipient you must not use, disclose, distribute,
> copy, print or rely on this email.
> If you are not the named recipient please notify us immediately. This
> email and any attachment(s) are believed to be virus-free, but it is
> the responsibility of the recipient to make all the necessary virus
> checks.
> This
> email and any attachments to it are copyright of Marketing Improvement
> Limited unless otherwise stated. Their copying, transmission,
> reproduction in whole or in part may only be undertaken with the
> express permission, in writing, of Marketing Improvement Limited.
>
>
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|