Someone else might have already quoted this but "Freedom of Information Act
Awareness Guidance No 22:
Vexatious and Repeated Requests" states:
"While giving maximum support to individuals genuinely seeking to exercise
the new
right to know, the Commissioner's general approach will be sympathetic
towards
authorities where a request, which may be the latest in a series of
requests, would
impose a significant burden and:
. clearly does not have any serious purpose or value;
. is designed to cause disruption or annoyance;
. has the effect of harassing the public authority; or
. can otherwise fairly be characterised as obsessive or manifestly
unreasonable."
I suppose that the number of rolls of toilet paper (to quote Lord Falconer)
might be unreasonable if I requested it, but not if a manufacturer of toilet
paper.
Nick Landau
----- Original Message -----
From: "Paul Dodgson" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Monday, July 03, 2006 8:55 AM
Subject: Re: [data-protection] Anonymity when making FOI requests of your
own organisation
Hi
Couple of points
It was Baroness Ashton? Who said it is not the identity of the
requestor that is important, it is the substance of the request.
It is very easy to create multiple email addresses which look ok, we do
not have an obligation to confirm identity so we comply, unless the
requests suggest vexatious or repeated should be considered, you must
then be able to defend you position if challenged.
If someone called themself Fred Checker, I would still respond with due
care and diligence, not forgetting to add the copyright notice!
Regards
Paul
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Tony Bowden
Sent: 02 July 2006 19:37
To: [log in to unmask]
Subject: Re: [data-protection] Anonymity when making FOI requests of
your own organisation
On Sun, Jul 02, 2006 at 03:39:32PM +0100, Kevin Broadfoot wrote:
> Alternatively if you received 9 requests from [log in to unmask]
> or
> 9 from [log in to unmask] then I think you would be justified
in
> taking a closer look at them. Of course that doesn't mean that you
have
> to do that but you may if you wish to do so.
Of course, 9 requests isn't really very many. I've probably made at
least 50 requests off my local council so far this year, and the
disclosure logs from various other authorities shows that there are
persistent requestors with most of them, with no indication that any of
them should be classed as vexatious.
Tony
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list
owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
_______________________________________________________________________
Leicestershire County Council - rated a 'four-star' council by the Audit
Commission
_______________________________________________________________________
This e-mail and any files transmitted with it are confidential. If you are
not the intended recipient, any reading, printing, storage, disclosure,
copying or any other action taken in respect of this e-mail is prohibited
and may be unlawful. If you are not the intended recipient, please notify
the sender immediately by using the reply function and then permanently
delete what you have received.
Incoming and outgoing e-mail messages are routinely monitored for compliance
with Leicestershire County Council's policy on the use of electronic
communications. The contents of e-mails may have to be disclosed to a
request under the Data Protection Act 1998 and the Freedom of Information
Act 2000.
The views expressed by the author may not necessarily reflect the views or
policies of the Leicestershire County Council.
Attachments to e-mail messages may contain viruses that may damage your
system. Whilst Leicestershire County Council has taken every reasonable
precaution to minimise this risk, we cannot accept any liability for any
damage which you sustain as a result of these factors. You are advised to
carry out your own virus checks before opening any attachment.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|