In message
<[log in to unmask]>, at
10:20:51 on Tue, 8 Jun 2010, Donald Henderson <[log in to unmask]>
writes
>From what Brenda indicated, I assume the police are relying on Schedule
>2(4) and Schedule 3(3)(a). My understanding is that the police only
>actively look for missing persons when they consider them to be at
>risk or a risk to others...
Luckily, as it's sensitive data, 3.3 should apply and says:
"...in order to protect the vital interests of the data subject
*or another person*" (my emphasis)
so there's some scope for the "vital interests of another person"
applying to the "risk to others" situation.
Whereas 2.4 only says:
"The processing is necessary in order to protect the vital
interests of the data subject"
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|