If any Apple snr management are watching this, you are missing a massive (lucrative in my personal opinion) trick with such intuitive technology that you have on offer - slight modifications may all that maybe needed to meet business security requirements; open a working dialogue with Adobe to incorporate their software and make the pricing attractive - I personally think they would be a force to be reckoned with!
Just my personal opinion that is.
Many thanks
Trish
Trish-louise Bailey
i-Governance (Information Goverance)
(Data Protection & Privacy, Freedom of Information, Information Security, Information Sharing & Confidentiality, Information Assurance, Records & Information Management)
Telford & Wrekin Council
Civic Offices
Coach Central
Telford
TF3 4HD
www.telford.gov.uk
em: [log in to unmask] or [log in to unmask] (Gov Connect - secure transmission)
tel: 01952 382537
mb: 07528 969455
-----Original Message-----
From: Simon Howarth [mailto:[log in to unmask]]
Sent: 10 June 2010 19:59
To: Bailey, Trish; [log in to unmask]
Subject: RE: [data-protection] Portable Scanning
Yes but being Apple it probably comes with a proprietry encryption
methodology that requires iTunes to be installed and will only download
Apple friendly stuff!!
On removable devices, I am involved (from a PIA view) in a project to
provide community nurses with tablet PC's (think ipad but much more basic)
and encryption has been an issue for the single device (it needs to talk to
a server which seems to be a big issue).
However, it's all about risk. If you can put in place assurances that the
scanner will be cleared after the information is transferred then maybe that
will be enough and it need not be encrypted. I think we all get a bit
precious about protecting information (with good reason), but it needs a
level head and proper risk assessment as to how critical the information may
be in one person's information went missing. For example if it is name and
address only on the documents, that's pretty innocuous given that just about
anyone can be found via half an hour's time and Google. However, if it is
sensitive medical information then no amount of "unencryption" is acceptable
in all likelihood.
I really don't think one size fits all, you have to decide what is
acceptable for your organization, the system and the project. Oh, and don't
forget how the applications fit with any information security policies you
may have in force.
Simon Howarth.
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Bailey, Trish
Sent: 10 June 2010 16:09
To: [log in to unmask]
Subject: Re: [data-protection] Portable Scanning
Hey ho, lets go iPAD great for portability??!! - just a joke.
Many thanks
Trish
Trish-louise Bailey
i-Governance (Information Goverance)
(Data Protection & Privacy, Freedom of Information, Information Security,
Information Sharing & Confidentiality, Information Assurance, Records &
Information Management)
Telford & Wrekin Council
Civic Offices
Coach Central
Telford
TF3 4HD
www.telford.gov.uk
em: [log in to unmask] or [log in to unmask] (Gov
Connect - secure transmission)
tel: 01952 382537
mb: 07528 969455
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Bradshaw, Phillip
Sent: 10 June 2010 11:49
To: [log in to unmask]
Subject: Re: Portable Scanning
The larger devices Ian mentions have not done well in user trials.
Partly physical reliability - though portable they are not really
designed to be lugged from place to place and soon breakdown.
Partly portability - on top of a laptop
Partly practicality of having to set up a 'mini-office' at each visit
Phillip Bradshaw
Information Manager
Democratic Services
Room CY4A, County Hall
EMail: [log in to unmask]
Phone: 029 2087 3346
Mobile : 07890 265987
Fax: 029 2087 3349
Fax: 029 2087 3349
You're digging it round and it ought to be square
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Griffiths, Ian
Sent: 10 June 2010 09:46
To: [log in to unmask]
Subject: Re: [data-protection] Portable Scanning
A viable alternative in hardware is to use a scanning device which does
not have internal memory. This will be the case for most A4-sized
document scanners, being that they use software installed on the
computer and write data directly to the computer. Safeguards already in
place should mean that this instead conforms. Obviously these larger
devices are not as portable.
Ian
________________________________
From: This list is for those interested in Data Protection issues on
behalf of Bailey, Trish
Sent: Thu 10/06/2010 09:40
To: [log in to unmask]
Subject: Re: [data-protection] Portable Scanning
I would keep searching for a more viable alternative, the above is in
case there is not one after an exhaustive search mind!
------------------------------------------------------------------------
---------------
Please consider the environment before printing this email.
------------------------------------------------------------------------
---------------
This email and any attachments are confidential and intended solely for
the use of the individual to whom it is addressed. Any views or
opinions presented are solely those of the author and do not necessarily
represent those of Liverpool Community College or associated companies.
You must not, directly or indirectly, use, disclose, distribute, print,
or copy any part of this message if you are not the intended recipient.
The message content of in-coming emails is automatically scanned to
identify Spam and viruses otherwise Liverpool Community College does not
actively monitor content. However, sometimes it will be necessary for
Liverpool Community College to access business communications during
staff absence.
Liverpool Community College has taken steps to ensure that this email
and any attachments are virus free. However, it is the responsibility
of the recipient to ensure that it is virus free and no responsibility
is accepted by Liverpool Community College for any loss or damage
arising in any way from its use.
------------------------------------------------------------------------
---------------
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask] All user
commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
**********************************************************************
Privileged/Confidential Information may be contained in this message. If you
are not the addressee indicated in this message (or responsible for delivery
of the message to such person), you may not copy or deliver this message to
anyone. In such case, you should destroy this message and kindly notify the
sender by reply email. Please advise immediately if you or your employer
does not consent to Internet email for messages of this kind. Opinions,
conclusions and other information in this message that do not relate to the
official business of the Council of the City and County of Cardiff shall be
understood as neither given nor endorsed by it. All e-mail sent to or from
this address will be processed by Cardiff County Councils Corporate E-mail
system and may be subject to scrutiny by someone other than the addressee.
**********************************************************************
Mae'n bosibl bod gwybodaeth gyfrinachol yn y neges hon. Os na chyfeirir y
neges atoch chi'n benodol (neu os nad ydych chi'n gyfrifol am drosglwyddo'r
neges i'r person a enwir), yna ni chewch gopio na throsglwyddo'r neges. Mewn
achos o'r fath, dylech ddinistrio'r neges a hysbysu'r anfonwr drwy e-bost ar
unwaith. Rhowch wybod i'r anfonydd ar unwaith os nad ydych chi neu eich
cyflogydd yn caniatau e-bost y Rhyngrwyd am negeseuon fel hon. Rhaid deall
nad yw'r safbwyntiau, y casgliadau a'r wybodaeth arall yn y neges hon nad
ydynt yn cyfeirio at fusnes swyddogol Cyngor Dinas a Sir Caerdydd yn
cynrychioli barn y Cyngor Sir nad yn cael sel ei fendith. Caiff unrhyw
negeseuon a anfonir at, neu o'r cyfeiriad e-bost hwn eu prosesu gan system
E-bost Gorfforaethol Cyngor Sir Caerdydd a gallant gael eu harchwilio gan
rywun heblaw'r person a enwir.
**********************************************************************
--
Scanned by iCritical.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
----------------------------------------------------------------------------
----------------------------------------
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom
they are addressed. If you have received this email in error
please notify the originator of the message.
Any views expressed in this message are those of the individual
sender, except where the sender specifies and with authority,
states them to be the views of Telford & Wrekin Council.
The content of this email has been automatically checked in
conjunction with the relevant policies of Telford & Wrekin Council.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
--------------------------------------------------------------------------------------------------------------------
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom
they are addressed. If you have received this email in error
please notify the originator of the message.
Any views expressed in this message are those of the individual
sender, except where the sender specifies and with authority,
states them to be the views of Telford & Wrekin Council.
The content of this email has been automatically checked in
conjunction with the relevant policies of Telford & Wrekin Council.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|