In message
<[log in to unmask]>, at
09:20:22 on Mon, 25 Oct 2010, Tim Trent
<[log in to unmask]> writes
>If they did not discipline the perpetrator then they show that their
>intent was to collect this data.
That simply doesn't follow. However, given the degree of interest in
this escapade, unless it was a deliberate publicity stunt I'm pretty
sure the perpetrators would not have come away scot free. Getting your
organisation into the headlines is exactly the kind of thing that
engineers dread doing.
>We should not go near technicalities. Our view as privacy folk is
>deliberately not a technical one here
You seemed to be exploring a technicality viz the definition of "several
moments". Hopefully that's been cleared up.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|