ICO guidance on this is suitably precise and enlightening: "Although a
public authority may not designate a request as vexatious simply because the
applicant uses an obvious psudonym, it may be prompted by the use of the
pseudonym to consider whether the request is vexatious. It should not,
however, base any decisions as to disclosure upon the name supplied by the
applicant ...."
John Hughes
Mayday Healthcare NHS Trust
-----Original Message-----
From: Simon Howarth [mailto:[log in to unmask]]
Sent: 26 June 2006 22:05
To: [log in to unmask]
Subject: Re: [data-protection] Anonymity when making FOI requests of your
own organisation
I'm with you on this Tony.
I also do not agree that the FOIA precludes a "made up" name. I think this
irrelevant and the issues should centre on the request itself first, and the
requestor second.
Simon Howarth.
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Tony Bowden
Sent: 26 June 2006 21:47
To: [log in to unmask]
Subject: Re: [data-protection] Anonymity when making FOI requests of your
own organisation
On Mon, Jun 26, 2006 at 07:21:45PM +0100, Kevin Broadfoot wrote:
> Also, such an application if it was refused and went up to the
> Commissioner for a decision runs the risk of being declared 'frivolous'
> (s50 FOIA 2000).
Surely this falls under the same criteria as a "vexatious" request - i.e. it
must be the request, per se, that is frivolous or vexatious - not the
requestor?
Tony
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
==========================================================================
This e-mail and any files transmitted with it are confidential. If you are
not the intended recipient, any reading, printing, storage, disclosure to
another person, copying or any other action taken in respect of this e-mail
is prohibited and may be unlawful. If you are not the intended recipient,
please notify the sender immediately by using the reply function and then
permanently delete the email from your inbox.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|