All right, I will then restrict myself to the following.
And when did tangential comments, amusing anecdotes etc start being
forbidden.
There are lots of tangential issues to the Data Protection Act.
And whatever happened to Friday afternoon?
Nick Landau
----- Original Message -----
From: "Matthew Stephenson" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Friday, March 02, 2007 2:07 PM
Subject: Re: [data-protection] Access to computer log-in details
I hate to be a stick in the mud but is this relevant to either the
question asked or DP?
I'm not having a go at you specifically Nick but this list does seem to
get bogged down with non-issues, tangential comments and navel gazing
rather than addressing real DP issues.
I know numerous people that have unsubscribed from this list because of
the bulk of irrelevant emails and finally I feel that I have to say
something. Is it just me?
Matt Stephenson
(speaking personally of course)
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Nick Landau
Sent: 02 March 2007 13:27
To: [log in to unmask]
Subject: Re: [data-protection] Access to computer log-in details
Samantha refers to a "particular computing system" - no doubt that there
is any problem with the amount of overall time that they spend on the
computer.
For instance, I recently attended a part-time SQL course and I was given
access to the Oracle server at the university.
In fact, it was possible to obtain the material for the course without
attending it as all the lecturer notes, examples and answers were posted
on the website.
I am glad to say (for the benefit of your academic colleagues) that
attending the lectures and the personal response to our queries did make
some difference.
In fact, for those of us who were concerned with credits they wouldn't
issue these if we didn't attend, I think, 70 per cent of the lectures.
Nick Landau
----- Original Message -----
From: "Carter, Antoinette (MCS)" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Friday, March 02, 2007 12:41 PM
Subject: Re: [data-protection] Access to computer log-in details
I agree with you that the Schedule 2 condition is not clear. I think in
any event you would be well-advised to tell the lecturer to speak to his
students first before resorting to this type of action. It strikes me
that unless it is a computing course, the students are not under any
obligation to complete a certain number of hours at their PCs, so
tracking their log-in periods is inappropriate. There was a time (when
I was young!) when you could complete a course without the aid of a
computer at all!
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Samantha Hill
Sent: 02 March 2007 11:56
To: [log in to unmask]
Subject: [data-protection] Access to computer log-in details
Dear All
I would appreciate your comments on a question that has arisen here.
A lecturer has requested the log-in records for students to a particular
computing system as he believes there will be a correlation between
recent poor exam results and the amount of times the students have
accessed this computer system. In providing the log-in records we would
be disclosing the personal data of the students as I think the purpose
is to be able to say Student A accessed the system once for 5 minutes
and got 10% whereas Student B accessed the system 10 times for an hour
each time and got 70%.
As far as I can find out we have not told the students that we will be
doing this, nor that the findings will be discussed with the external
examiner who is bound to question the low marks, so I have problems with
disclosing the student's personal data - unless the sixth condition of
Schedule 2, that the processing is necessary for the purposes of
legitimate interests of the data controller, can be used.
I would be grateful for comments on whether this processing would be
considered a legitimate purpose and/ or others experience of a similar
situation.
Thanks very much
Samantha Hill
University of Portsmouth
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask] All user
commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This message is for the use of the intended recipient(s) only.
If you have received this message in error, please notify the sender and
delete it.The British Council accepts no liability for loss or damage
caused
by software viruses and you are advised to carry out a virus check on
any
attachments contained in this message. Our purpose is to build mutually
beneficial relationships between people in the UK and other countries
and to
increase appreciation of the UK's creative ideas and achievements. The
British Council is registered in England as a charity.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|