Talking of telephone permission, 30 years ago I had a cycling accident in
Holland and I was subsequently in hospital for 10 days.
My parents wished to come and visit. My father contacted my insurer and was
told that my insurance would cover the travel of both parents.
My father is normally very methodical but in the emergency situation he
didn't make a note of the name of the person who "authorised" both their
travel - and afterwards the insurance company had no record of the
conversation or of having given my father this information.
They said that they would only reimburse the travel of one person to visit.
These days, of course, banks and insurance companies announce that telephone
conversations are being recorded for training purposes. I would imagine that
this is also to avoid fraud.
I was wondering the other day whether an employee can verbally commit their
employer to a particular course of action. Maybe not, but certainly it would
be relevant if it resulted in taking a particular course of action.
I suspect that with computers that there would be more of a written record
of such a conversation and that my father today might have been given a
reference number which related to the conversation.
For the record I only received the money for one parent in the settlement by
the insurance company.
Nick Landua
----- Original Message -----
From: "Lee Gardiner" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Tuesday, May 23, 2006 1:54 PM
Subject: Re: [data-protection] FW: [data-protection] Using & Re-using phot
o's.
> That said I am sure most of us have added file notes where we have
> detailed
> the contents of a conversation and are happy for them to constitute part
> of
> the file, as is the third party we conversed with.
>
> Where is the difference if the conversation is about use of a photo or
> someone's individual responsibility for a piece of work?
>
> It all comes down to he said/she said in that context and signed consent
> saves all of the aggravation.
>
> Best to err on the side of caution.
>
> Lee
>
> -----Original Message-----
> From: Tim Trent [mailto:[log in to unmask]]
> Sent: 23 May 2006 13:49
> To: [log in to unmask]
> Subject: Re: [data-protection] FW: [data-protection] Using & Re-using
> photo's.
>
> Now let's assume you reprint the picture on 100,000 leaflets and are just
> about to distribute them. The person in the picture issues a section 10
> notice because they believe you are causing them damage and distress,
> which
> you may be.
>
> All that money wasted.
>
> I err on the side of getting a consent signed in writing and filed
> correctly.
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]] On Behalf Of Carter, Antoinette
> (MCS)
> Sent: 23 May 2006 13:44
> To: [log in to unmask]
> Subject: Re: [data-protection] FW: [data-protection] Using & Re-using
> photo's.
>
> Who are you ever going to need to prove consent to? That person knows
> they
> said "yes". Even if they change their mind, or even lie, what can they do
> to prove they didn't consent? If you've made a note "Betty said OK to
> use"
> and date it, that would be good enough for the ICO, and no complaint is
> realistically going to go any further than that.
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]] On Behalf Of John Hughes
> Sent: 23 May 2006 13:15
> To: [log in to unmask]
> Subject: [data-protection] FW: [data-protection] Using & Re-using photo's.
>
> On the strength of a phone call, how would you be able to prove that you
> had
> gained consent at a future time?
>
> -----Original Message-----
> From: Carter, Antoinette (MCS)
> [mailto:[log in to unmask]]
>
> Sent: 23 May 2006 13:14
> To: [log in to unmask]
> Subject: Re: [data-protection] Using & Re-using photo's.
>
>
> And consent doesn't have to be a signed consent form - a 3 second phone
> call
> could cover it: "Hi Betty, do you mind if I put that photo of us in the
> newsletter?" Answer: yes/no. Simple
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]] On Behalf Of Ibrahim Hasan
> Sent: 23 May 2006 12:02
> To: [log in to unmask]
> Subject: Re: [data-protection] Using & Re-using photo's.
>
> I agree with colleagues that consent is the best way.
>
> Please see Article on our website.
>
> Ibrahim Hasan
>
> Solicitor
> Act Now Training
> The Information Law Training Specialists www.actnow.org.uk Tel : 07808
> 079264
>
>
>
>
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]] On Behalf Of Nick Landau
> Sent: 23 May 2006 11:46
> To: [log in to unmask]
> Subject: Re: [data-protection] Using & Re-using photo's.
>
> A weekly paper I receive goes round a few social events taking pictures of
> participants in groups. Up to recently the people weren't identified.
> Now Hello-like the people's names are given - these people are just
> "ordinary"
> members of the public mainly.
>
> This exchange has made me think that maybe someone has complained about
> their picture being included and that the photographer asking everyone
> their
> name gives the subject the opportunity to say that they don't want their
>
> picture to appear.
>
> Nick Landau
>
>> ----- Original Message -----
>> From: "Tim Trent" <[log in to unmask]>
>> To: <[log in to unmask]>
>> Sent: Tuesday, May 23, 2006 11:28 AM
>> Subject: Re: [data-protection] Using & Re-using photo's.
>>
>>
>>> It is, at best, unwise.
>>>
>>> We always recommend a consent is signed for such purposes, even for
>>> internal publicity, that the consent is specific and enduring.
>>>
>>>
>>> Tim Trent - Consultant
>>> Direct: +44(0)1344 392644 Mobile:+44(0)7710 126618
>>> email: [log in to unmask]
>>> Marketing Improvement Limited, Abbey House, Grenville Place,
> Bracknell,
>>> United Kingdom, RG12 1BP
>>> http://www.marketingimprovement.com
>>>
>>>
>>>
>>>
>>> Important: This mail contains proprietary information some or all of
>>> which may be legally privileged. It is for the intended recipient
>>> only. If
> an
>>> addressing or transmission error has misdirected this email, please
>>> notify the author by replying to this email. if you are not the
>>> intended recipient you must not use, disclose, distribute, copy,
>>> print or rely on this email.
>>> If you are not the named recipient please notify us immediately.
> This
>>> email
>>> and any attachment(s) are believed to be virus-free, but it is the
>>> responsibility of the recipient to make all the necessary virus
> checks.
>>> This
>>> email and any attachments to it are copyright of Marketing
> Improvement
>>> Limited unless otherwise stated. Their copying, transmission,
>>> reproduction in whole or in part may only be undertaken with the
>>> express
> permission,
>>> in
>>> writing, of Marketing Improvement Limited.
>>>
>>>
>>>
>>> -----Original Message-----
>>> From: This list is for those interested in Data Protection issues
>>> [mailto:[log in to unmask]] On Behalf Of Steel, Rachael
>>> Sent: 23 May 2006 11:16
>>> To: [log in to unmask]
>>> Subject: [data-protection] Using & Re-using photo's.
>>>
>>> Dear List Members,
>>>
>>> In your opinions is it right or wrong to carry out the following
> action:
>>>
>>> Take a photo of a call centre worker with a colleague in the
> background,
>>> use
>>> the photo internally for an article, then re-use it by sending it to
> the
>>> local weekly newspaper to use for an article without checking with
> the
>>> individuals in the photo first.
>>>
>>> Your thoughts and opinions would be greatly appreciated.
>>>
>>> Thanks
>>> Rachael Steel
>>> Information Management Officer
>>> Corporate Development
>>> Thurrock Council
>>> Civic Offices
>>> New Road
>>> Grays Thurrock
>>> Essex RM17 6SL
>>> Tel: (01375) 652470
>>> Email: [log in to unmask]
>>>
>>>
>>>
>>> The information in this e-Mail and any attachment(s) are intended to
> be
>>> confidential and may be legally privileged. Access to and use of its
>>> content by anyone else other than the addressee(s) may be unlawful
>>> and will
> not
>>> be
>>> recognised by Thurrock Council for business purposes. Thurrock
> Council
>>> cannot accept any responsibility for the accuracy or completeness of
> this
>>> message as it has been transmitted over a public network.
>>>
>>> Any opinions expressed in this document are those of the author and
> do
>>> not
>>> necessarily reflect the opinions of Thurrock Council.
>>>
>>> Any attachment(s) to this message has been checked for viruses, but
>>> please rely on your own virus checker and procedures.
>>>
>>> If you contact us by e-mail, we will store your name and address to
>>> facilitate communications.
>>>
>>> Senders and recipients of email should be aware that under the UK
> Data
>>> Protection and Freedom of Information legislation these contents may
> have
>>> to
>>> be disclosed in response to a request.
>>>
>>> Under the Regulation of Investigatory Powers Act 2000, any email sent
> to
>>> or
>>> from this address may be accessed by someone other than the recipient
> for
>>> system management and security purposes.
>>>
>>> ____________________________________________________________________
>>> This message has been checked for all known viruses by the
> MessageLabs
>>> Virus
>>> Control Centre. For further information visit
>>> http://www.messagelabs.com/stats.asp
>>>
>>> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>> All archives of messages are stored permanently and are
>>> available to the world wide web community at large at
>>> http://www.jiscmail.ac.uk/lists/data-protection.html
>>> If you wish to leave this list please send the command
>>> leave data-protection to [log in to unmask]
>>> All user commands can be found at : -
>>> http://www.jiscmail.ac.uk/help/commandref.htm
>>> Any queries about sending or receiving message please send to the
> list
>>> owner
>>> [log in to unmask]
>>> (all commands go to [log in to unmask] not the list please)
>>> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>
>>> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>> All archives of messages are stored permanently and are
>>> available to the world wide web community at large at
>>> http://www.jiscmail.ac.uk/lists/data-protection.html
>>> If you wish to leave this list please send the command
>>> leave data-protection to [log in to unmask]
>>> All user commands can be found at : -
>>> http://www.jiscmail.ac.uk/help/commandref.htm
>>> Any queries about sending or receiving message please send to the
> list
>>> owner
>>> [log in to unmask]
>>> (all commands go to [log in to unmask] not the list please)
>>> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> This message is for the use of the intended recipient(s) only.
>
> If you have received this message in error, please notify the sender and
> delete it.The British Council accepts no liability for loss or damage
> caused
> by software viruses and you are advised to carry out a virus check on any
> attachments contained in this message. Our purpose is to build mutually
> beneficial relationships between people in the UK and other countries and
> to
> increase appreciation of the UK's creative ideas and achievements. The
> British Council is registered in England as a charity.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
>
> ========================================================================
> ===
> This e-mail and any files transmitted with it are confidential. If you are
> not the intended recipient, any reading, printing, storage, disclosure to
> another person, copying or any other action taken in respect of this
> e-mail
> is prohibited and may be unlawful. If you are not the intended recipient,
> please notify the sender immediately by using the reply function and then
> permanently delete the email from your inbox.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> This message is for the use of the intended recipient(s) only.
>
> If you have received this message in error, please notify the sender and
> delete it.The British Council accepts no liability for loss or damage
> caused
> by software viruses and you are advised to carry out a virus check on any
> attachments contained in this message. Our purpose is to build mutually
> beneficial relationships between people in the UK and other countries and
> to
> increase appreciation of the UK's creative ideas and achievements. The
> British Council is registered in England as a charity.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
>
> **********************************************************************
> This email and any files transmitted with it are confidential and
> intended solely for the use of the individual or entity to whom they
> are addressed. If you have received this email in error please notify
> the system manager.
>
> This footnote also confirms that this email message has been swept by
> MIMEsweeper for the presence of computer viruses using Sophos
> anti-virus software.
>
> www.mimesweeper.com
> www.sophos.com
> **********************************************************************
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list
> owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|