In message <[log in to unmask]>, at 15:46:27 on
Thu, 23 Nov 2006, Kate McGinlay <[log in to unmask]> writes
>How widespread is it, and should this worry the average man in the
>street, that ACME investigations has their file. Even if they are using
>their powers supposedly for fraud. Is there not a real risk that by
>giving personal data to persons who are totally unqualified to conduct
>an investigative function could easily clone such identities. Is it
>therefore not a massive risk to give out data to organisations under
>section 29, so that as Chris says we must only deal with Police.
The telecoms industry decided that it was too much of risk, and so
supported the introduction of RIPA which although not perfect (what
scheme ever is) does have a well defined framework of who can ask for
what, and why.
TICO have published at least one report in the last year detailing how
they are concerned that private investigators are far too easily able to
[illegally] blag personal data.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|