The ICO produce a very good CD and guidance on carrying out an information audit. It provides the mechanics of
doing an audit, at least.
Obviously there is skill then in interpeting findings, and also defining the scope of the audit, but I recommend
it - and its free. Go to www.ico.gov.uk and look for their publications...
Simon Howarth
Quoting Tracey Walters <[log in to unmask]>:
> Hi
>
> I have been requested to consider/investigate a Data Protection Audit for my
> College. Before I disappear beneath a heap of paperwork and disgruntled
> colleagues, I would be very interested to hear from colleagues on this list
> who may have already gone through, or are going through, or about to go
> through such a process.
>
> Have colleagues undertaken this in-house? If so, can I seek advice/guidance
> as to the audit systems used. Conversely have colleagues felt it preferable
> to place the audit in the hands of external consultants?
>
> Any thoughts and advice most welcome - on or off list.
>
> Apols if this topic has been much discussed before.
>
> Regards
>
>
>
>
>
> Tracey Walters
> Legal & Risk Officer
> City College Plymouth
> Tel: 01752 305735
>
>
> E-MAIL DISCLAIMER
>
> This e-mail and any attachments are intended for the named recipient
> only and are to be treated as confidential unless the College agrees
> otherwise.
> If you are not the intended recipient, please notify the sender immediately
> deleting this e-mail without making copies or using it in any way.
> The College may be legally obliged to disclose e-mail communications in a
> response to a legitimate request pursuant to both the Freedom of
> Information
> Act 2000 and the Data Protection Act 1998.
> City College Plymouth reserves the right to monitor, in
> accordance with its legal obligations, any and all aspects of its e-mail
> system, including the content of e-mails received, but will not do so
> routinely.
> City College Plymouth cannot guarantee that this e-mail or
> any attachments to it are virus free and does not accept any liability for
> any damage, costs or loss resulting from any virus infection.
> Any views expressed in the message are those of the sender and may not
> necessarily reflect the views of the College.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list
> owner
> [log in to unmask]
> Full help Desk - please email [log in to unmask] describing your
> needs
> To receive these emails in HTML format send the command:
> SET data-protection HTML to [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
--
Simon Howarth
The Information Edge
37 The Grange
Cottam
Preston
PR4 0LR
Office: 0870 991 3696
Mobile: 07836 365588
Webtech Systems trading as The Information Edge, registered in England No.
3428632. More information available at www.informationedge.co.uk
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|