Where they able to access the course work/whatever off-site ? That would
make the stats meaningless.
Brenda Scourfield
Team Leader
I.T. Division
Pembrokeshire County Council
County Hall
Haverfordwest
SA61 1 TP
Tel 01437 775380
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [SMTP:[log in to unmask]] On Behalf Of Samantha Hill
> Sent: 02 March 2007 14:01
> To: [log in to unmask]
> Subject: Re: Access to computer log-in details
>
> Dear All
>
> Thanks very much for everyone's helpful comments. The general consensus
> seems to be that we shouldn't be giving this access without the students'
> consent and as I'm not comfortable that the schedule 2 condition works,
> I'll go back to the lecturer and refuse access.
>
> I'm grateful for the responses - it helps to know others have the same
> opinion when I know I'm about to be told that the DPA is pure bureaucracy
> and gets in the way of others trying to do their job - again! TGIF!
>
> Samantha
>
> PS My colleagues laughed when I told them we had to complete our
> dissertations on typewriters with carbon paper and a bottle of Tippex.
> Most asked what carbon paper was. The youth of today!
>
> Samantha Hill
> Complaints & Information Disclosure Officer
> University House
> Tel: 02392 843642
>
>
> >>> "Carter, Antoinette (MCS)" <[log in to unmask]>
> 02/03/2007 12:41 >>>
> I agree with you that the Schedule 2 condition is not clear. I think in
> any event you would be well-advised to tell the lecturer to speak to his
> students first before resorting to this type of action. It strikes me
> that unless it is a computing course, the students are not under any
> obligation to complete a certain number of hours at their PCs, so
> tracking their log-in periods is inappropriate. There was a time (when
> I was young!) when you could complete a course without the aid of a
> computer at all!
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues
> [mailto:[log in to unmask]] On Behalf Of Samantha Hill
> Sent: 02 March 2007 11:56
> To: [log in to unmask]
> Subject: [data-protection] Access to computer log-in details
>
> Dear All
>
> I would appreciate your comments on a question that has arisen here.
>
> A lecturer has requested the log-in records for students to a particular
> computing system as he believes there will be a correlation between
> recent poor exam results and the amount of times the students have
> accessed this computer system. In providing the log-in records we would
> be disclosing the personal data of the students as I think the purpose
> is to be able to say Student A accessed the system once for 5 minutes
> and got 10% whereas Student B accessed the system 10 times for an hour
> each time and got 70%.
>
> As far as I can find out we have not told the students that we will be
> doing this, nor that the findings will be discussed with the external
> examiner who is bound to question the low marks, so I have problems with
> disclosing the student's personal data - unless the sixth condition of
> Schedule 2, that the processing is necessary for the purposes of
> legitimate interests of the data controller, can be used.
>
> I would be grateful for comments on whether this processing would be
> considered a legitimate purpose and/ or others experience of a similar
> situation.
>
> Thanks very much
>
> Samantha Hill
> University of Portsmouth
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask] All user
> commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list
> owner
> [log in to unmask]
> Full help Desk - please email [log in to unmask] describing your
> needs
> To receive these emails in HTML format send the command:
> SET data-protection HTML to [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> This message is for the use of the intended recipient(s) only.
>
> If you have received this message in error, please notify the sender and
> delete it.The British Council accepts no liability for loss or damage
> caused by software viruses and you are advised to carry out a virus check
> on any attachments contained in this message. Our purpose is to build
> mutually beneficial relationships between people in the UK and other
> countries and to increase appreciation of the UK's creative ideas and
> achievements. The British Council is registered in England as a charity.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list
> owner
> [log in to unmask]
> Full help Desk - please email [log in to unmask] describing your
> needs
> To receive these emails in HTML format send the command:
> SET data-protection HTML to [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
**************************************************************************************************************
This document should only be read by those persons to whom it is addressed, and be used by them for its intended purpose; and must not otherwise be reproduced, copied, disseminated, disclosed, modified, distributed, published or actioned. If you have received this email in error, please notify us immediately by telephone on 01437 775882 and delete it from your computer immediately. This email address must not be passed on to any third party nor be used for any other purpose.
Pembrokeshire County Council Website - http://www.pembrokeshire.gov.uk
This signature also confirms that this email message has been swept for the presence of computer viruses and malicious code.
***************************************************************************************************************
Dim ond y sawl y mae'r ddogfen hon wedi'i chyfeirio atynt ddylai ei darllen, a'i defnyddio ganddynt ar gyfer ei dibenion bwriadedig; ac ni ddylid fel arall ei hatgynhyrchu, copio, lledaenu, datgelu, addasu, dosbarthu, cyhoeddi na'i rhoi ar waith chwaith. Os ydych chi wedi derbyn yr e-bost hwn trwy gamgymeriad, byddwch cystal a rhoi gwybod i ni ar unwaith trwy ffonio 01437 775882 a'i ddileu oddi ar eich cyfrifiadur ar unwaith. Ni ddylid rhoi'r cyfeiriad e-bost i unrhyw drydydd parti na'i ddefnyddio ar gyfer unrhyw ddiben arall chwaith.
Gwefan Cyngor Sir Penfro - http://www.pembrokeshire.gov.uk
Mae'r llofnod hwn hefyd yn cadarnhau bod y neges e-bost hon wedi cael ei harchwilio am fodolaeth firysau cyfrifiadurol a chod maleisus.
***************************************************************************************************************
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|