Kevin and everyone else,
there have been numerous cases of this nature prosecuted by the Information Commissioner under what was referred to as the Baird Project. Details of all the cases can be obtained from the annual report of the commissioner.
The Information Commissioner barely scratched the surface with this project and it is still as prolific as it was 30 years ago when I first became aware of this type of activity.
Let me leave you all with a thought. These guys don't do this for themselves.They do it for a client. That client could be your organisation. Just consider which departments in your organisation use the services of a debt collector, bailiff, investigator. If you are responsible for DP compliance in your organisation have you ensured that department is complying with DP. Have they instructed their agent (Data Processor) in accordance with The DPA. Have they ensured the agencies compliance. I think you might be very surprised if you audited that department.
Hope that helps.
Chris Brogan
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]]On Behalf Of Kevin Broadfoot
Sent: 20 April 2006 12:16
To: [log in to unmask]
Subject: Impersonating the tax man!
I am trying to track down a court case but only have a hazy memory of the
facts so wondered whether anyone on the list can help me out/remember more?
Some time ago (2-3 years ago) an individual(s)from a debt collecting
company was convicted after obtaining data by telephoning a number of
other companies and pretending on the phone that he was from the tax
office (or HM Customs). I'm not certain but I think the offence took
place in S Wales and I don't know whether he/they were prosecuted with an
unlawful obtaining offence under DPA or something else.
If anyone can remember more and let me know offline I'd be extremely
grateful.
rgds,
Kevin Broadfoot
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|