In message <[log in to unmask]>, at
17:09:53 on Fri, 21 Nov 2008, Phil Bradshaw <[log in to unmask]>
writes
>Given the history of the last 12 months or so , and setting aside the araldite
>solution, does anyone agree with the proposition that failure to implement
>appropriate endpoint security software giving policy based granular control of
>what data can be transferred to portable media (and who by) must now be
>regarded as a breach of DP principle 7 ?
You need control over the form of portable media [1], as well as the
data. But granular control (if by that you mean allowing people to only
transfer small essential extracts of the data) is good too.
[1] I was at a conference earlier in the week and this chain of
consequences was floated as a theory:
Some laptops were lost, so the word went round that taking them home was
banned unless encrypted.
The IT people didn't have the means to implement encryption overnight,
so this meant that taking home laptops was in effect banned.
People still needed to take data home, in order to get their job done
(I've discussed this earlier).
So they used memory sticks, which weren't banned (nor encrypted).
It's easier to mislay a memory stick than a laptop. So in the short term
the problem gets worse, not better.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|