Hi
Could not resist sharing this from an un-named colleague. Apols if it
has already been aired.
Look at the Statute Law Database
find the DPA 98
Look at Section 7
Follow Section 7 to section 12
After section 12 what comes next?
Another section 12!
Or try to paste this in
http://www.statutelaw.gov.uk/content.aspx?LegType=All+Legislation&title=
data+protection+act&searchEnacted=0&extentMatchOnly=0&confersPower=0&bla
nketAmendment=0&sortAlpha=0&TYPE=QS&PageNumber=1&NavFrom=0&parentActiveT
extDocId=492267&ActiveTextDocId=492278&filesize=21915
then
Look a the first section 12 and the second section 12 where it mentions
subsection (4)(c) - subsection 4 (c) does not exist.
Seriously, the advice received thus far is to consider each order in
context (oops we made a mistake let's give them some Yes Minister!)
We are all human (except the database that is!)
Paul
_______________________________________________________________________
Leicestershire County Council - rated a 'four-star' council by the Audit Commission
_______________________________________________________________________
This e-mail and any files transmitted with it are confidential. If you are not the intended recipient, any reading, printing, storage, disclosure, copying or any other action taken in respect of this e-mail is prohibited and may be unlawful. If you are not the intended recipient, please notify the sender immediately by using the reply function and then permanently delete what you have received.
Incoming and outgoing e-mail messages are routinely monitored for compliance with Leicestershire County Council's policy on the use of electronic communications. The contents of e-mails may have to be disclosed to a request under the Data Protection Act 1998 and the Freedom of Information Act 2000.
The views expressed by the author may not necessarily reflect the views or policies of the Leicestershire County Council.
Attachments to e-mail messages may contain viruses that may damage your system. Whilst Leicestershire County Council has taken every reasonable precaution to minimise this risk, we cannot accept any liability for any damage which you sustain as a result of these factors. You are advised to carry out your own virus checks before opening any attachment.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|