As a DPA person I think a "Living individual" is more descriptive and clear to the general public than "natural individual" and considering DPA is about an individual rights lets not alienate them with the revision of the DPA let's get it right first time x lets make it so the public understand what it is not just us IG Specialists where terminology is reserved for those who practice in the field. There are two aspects - DPA specialists and the data subject I think it is in everyone's interest to ensure we address both, that way it will be less of a drain on an organisations resources (i.e in explaining terminology only IG Specialists understand - does not need to be that way) and more open and transparent for the public. Just my personal opinion.
Sent from my iPhone
Trish-louise Bailey
07545 445799
[log in to unmask]
On 23 Dec 2011, at 14:32, "Baines, Jonathan" <[log in to unmask]> wrote:
> A couple of weeks ago, after the Draft Regulation was leaked, I entered into correspondence on twitter with a barrister and former legal adviser to numerous govt departments, on why, when giving effect to the 1995 Directive, the Uk had chosen to use the term "living individual" in the DPA, rather than the former's "natural person". Although we didn't get to the bottom of it (maybe there is no bottom of it), I use this as an example of a use of twitter as much more than an alert.
>
> Jonathan Baines
> Legal and Democratic Services
> Buckinghamshire County Council
> 01296 383681
>
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of chris pounder
> Sent: Friday 23 December 2011 13:30
> To: [log in to unmask]
> Subject: Re: [data-protection] Twitter and Tweeters
>
> I agree with Simon.
>
> If it takes 27 pages to describe personal data, the useful discourse available in 140 Chars is virtually nil.
>
> Only use is as an alert
>
> C
>
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Simon Howarth
> Sent: 22 December 2011 20:37
> To: [log in to unmask]
> Subject: -----SPAM----- Re: [data-protection] Twitter and Tweeters
>
> I will just add another angle to this. As someone in their 5th decade I presume I am not the oldest here (nor the youngest). I am on Twitter and joined specifically for DP/Privacy information. However, after two weeks of living with it I switched it off.
>
> I agree to some extent that it's like being in a busy café, and people drop in and out of the conversation, but I would add that a significant amount of that conversation is complete and utter drivel. The actual useful information you get is not much, and everything that is spoken about of any importance is generally pretty quickly available through more meaningful channels in more than 140 characters.
>
> One individual who tweets a lot just left me sitting there like a living question mark - but I accept, it may be just me as forum posts they have made indicate that they are in fact an intelligent human being!
>
> It's also so full of people that want to be first to tweet or re-tweet, that I began to see it as irrelevant. I have no doubt it's mainly me with the issues. But frankly, it's pants.
>
> AND I never got contacted by any of these nubile people mentioned! :(
>
> Simon Howarth @SSHowarth - follow me on twitter, as I move seamlessly through the ether....
>
> MERRY XMAS TO ONE AND ALL
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Lawrence Serewicz
> Sent: 22 December 2011 13:59
> To: [log in to unmask]
> Subject: Re: [data-protection] Twitter and Tweeters
>
> Yes, that is correct. I was trying to have the image of sitting in a large cafetaria, like at school, where you sit with your mates or people of interest. However, unlike this list, people can and do pop into the conversation. :)
>
> As this is a moderated list we are, thankfully, spared the twitterbots of nubile young women (why is it always nubile young women?) selling viagra or telling you that you have won a gift card?
>
> For the most part you can follow whom you want and get a direct feed on their topics and interest. However, unlike this list, your chances of getting a response are much lower on twitter (in general).
>
> However, both are excellent tools or personal learning networks, as someone described them to me, so I do recommend that people leverage *both* lists as 95% of the tweeters are not on this list so you will have to follow them to learn from them.
>
> Best,
>
> Lawrence
>
>
> Lawrence W. Serewicz
>
> Principal Information Management Officer Assistant Chief Executive's Office Room 140/4 Durham County Council Durham
> DH1 5UF
>
> Tel 0191-372-8371
> ________________________________________
> From: Baines, Jonathan [[log in to unmask]]
> Sent: Thursday, December 22, 2011 1:52 PM
> To: Lawrence Serewicz; [log in to unmask]
> Subject: RE: [data-protection] Twitter and Tweeters
>
> I would agree with all this Lawrence, but alter one sentence slightly:
> "twitter is like a conversation in a very large and busy public cafeteria *filled with people you have specifically chosen to listen to*..."
>
> Jonathan Baines
> Legal and Democratic Services
> Buckinghamshire County Council
> 01296 383681
>
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Lawrence Serewicz
> Sent: Thursday 22 December 2011 13:33
> To: [log in to unmask]
> Subject: Re: [data-protection] Twitter and Tweeters
>
> Ibrahim,
> Thanks for an excellent resource. I do recommend that if you are interested in twitter that you check out these listings. They are a great resource.
> My only caveat is this: Twitter is limited to 140 characters so you will not find developed arguments or reasoned debate. For the most part you will find links, references, and quick passing comments.
>
> I do not tweet or blog about FOI/DPA topics in large part because of this list. What is fascinating and helpful about this list is that people develop ideas and when they do, you can see their logic and test your own against it. I have been on this list for just over 5 years, and on similar lists forthe past 17 years, and the opportunity to discuss and debate, as well as read others debating and discussing, has been invaluable. The knowledge and inisght of the participants and practitioners has been excellent.
>
> To put it into a metaphor, twitter is like a conversation in a very large and busy public cafeteria where you may overhear a good conversation or you may be heard. However, there is always a lot of noise in the background.
> This list is a like a members only restaurant where people come for a specific purpose. The food and conversation in both settings will be good although the setting's difference will change the quality and consistency.
>
> Enjoy the meal whereever you eat.
>
> Best,
>
> Lawrence
> P.S. I'm on holiday so until the new year, adieu.
>
> Lawrence W. Serewicz
>
> Principal Information Management Officer Assistant Chief Executive's Office Room 140/4 Durham County Council Durham
> DH1 5UF
>
> Tel 0191-372-8371
> ________________________________________
> From: This list is for those interested in Data Protection issues [[log in to unmask]] On Behalf Of Ibrahim Hasan [[log in to unmask]]
> Sent: Thursday, December 22, 2011 10:03 AM
> To: [log in to unmask]
> Subject: [data-protection] Twitter and Tweeters
>
> Colleagues may have found that from time to time the bulletin boards go a bit quiet, despite the fact that there are many topical DP and FOI issues in the media.
>
> Often this is because the debate and discussion is taking place on Twitter.
>
> I appreciate that this may not be everyones cup of tea but, if you are interested, there are many information law commentators on Twitter that you can follow.
>
> A good stating point is the list produced by Judith Townend of 105 Legal and Media Tweeters to follow:
>
> http://inforrm.wordpress.com/2011/12/22/law-and-media-tweets-and-tweeters-up
> dated-105-people-to-follow-judith-townend/
>
> It so happens that we are at the top of the list - BUT ONLY because it is in alphabetical order.
>
> Other tweeters on the list and worth a follow (in alphabetical order of
> course!) are @bainesy1969 @FoIManUK @FOIMonkey @tim2040.
>
> Colleagues may have other suggestions.
>
>
> Regards
>
> Ibrahim Hasan
> Solicitor and Director
> Act Now Training Limited
>
> For training without the strain of the train:
> www.actnow.org.uk<http://www.actnow.org.uk>
>
> Follow me on Twitter: http://twitter.com/ActNowTraining
>
> ________________________________
>
> All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html
>
> Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):
>
> * Leaving this list: send leave data-protection to
> [log in to unmask]<mailto:[log in to unmask]&BODY=LEAVE%20data-pro
> tection>
> * Suspending emails from all JISCMail lists: send SET * NOMAIL to
> [log in to unmask]<mailto:[log in to unmask]&BODY=SET%20*%20NOMAIL
>>
> * To receive emails from this list in text format: send SET
> data-protection NOHTML to
> [log in to unmask]<mailto:[log in to unmask]&BODY=SET%20data-prote
> ction%20NOHTML>
> * To receive emails from this list in HTML format: send SET
> data-protection HTML to
> [log in to unmask]<mailto:[log in to unmask]&BODY=SET%20data-prote
> ction%20HTML>
>
> All user commands can be found at
> http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]<mailto:[log in to unmask]>
>
> Any queries about sending or receiving messages please send to the list owner [log in to unmask]<mailto:data-protection-request@jiscma
> il.ac.uk>
>
> (Please send all commands to
> [log in to unmask]<mailto:[log in to unmask]> not the list or the moderators, and all requests for technical help to [log in to unmask]<mailto:[log in to unmask]>, the general office
> helpline)
>
> ________________________________
>
>
> Help protect our environment by only printing this email if absolutely necessary. The information it contains and any files transmitted with it are confidential and are only intended for the person or organisation to whom it is addressed. It may be unlawful for you to use, share or copy the information, if you are not authorised to do so. If you receive this email by mistake, please inform the person who sent it at the above address and then delete the email from your system. Durham County Council takes reasonable precautions to ensure that its emails are virus free. However, we do not accept responsibility for any losses incurred as a result of viruses we might transmit and recommend that you should use your own virus checking procedures.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list owner
> [log in to unmask]
> Full help Desk - please email [log in to unmask] describing your needs
> To receive these emails in HTML format send the command:
> SET data-protection HTML to [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> Buckinghamshire County Council
> Visit our Web Site : http://www.buckscc.gov.uk Buckinghamshire County Council Email Disclaimer
>
> This Email, and any attachments, may contain Protected or Restricted information and is intended solely for the individual to whom it is addressed. It may contain sensitive or protectively marked material and should be handled accordingly. If this Email has been misdirected, please notify the author or [log in to unmask] immediately. If you are not the intended recipient you must not disclose, distribute, copy, print or rely on any of the information contained in it or attached, and all copies must be deleted immediately. Whilst we take reasonable steps to try to identify any software viruses, any attachments to this Email may nevertheless contain viruses which our anti-virus software has failed to identify. You should therefore carry out your own anti-virus checks before opening any documents.
>
> Buckinghamshire County Council will not accept any liability for damage caused by computer viruses emanating from any attachment or other document supplied with this email.
>
> All GCSx traffic may be subject to recording and / or monitoring in accordance with relevant legislation.
>
> The views expressed in this email are not necessarily those of Buckinghamshire County Council unless explicitly stated.
>
> This footnote also confirms that this email has been swept for content and for the presence of computer viruses.
>
>
>
> Help protect our environment by only printing this email if absolutely necessary. The information it contains and any files transmitted with it are confidential and are only intended for the person or organisation to whom it is addressed. It may be unlawful for you to use, share or copy the information, if you are not authorised to do so. If you receive this email by mistake, please inform the person who sent it at the above address and then delete the email from your system. Durham County Council takes reasonable precautions to ensure that its emails are virus free. However, we do not accept responsibility for any losses incurred as a result of viruses we might transmit and recommend that you should use your own virus checking procedures.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list owner
> [log in to unmask]
> Full help Desk - please email [log in to unmask] describing your needs
> To receive these emails in HTML format send the command:
> SET data-protection HTML to [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list owner
> [log in to unmask]
> Full help Desk - please email [log in to unmask] describing your needs
> To receive these emails in HTML format send the command:
> SET data-protection HTML to [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list owner
> [log in to unmask]
> Full help Desk - please email [log in to unmask] describing your needs
> To receive these emails in HTML format send the command:
> SET data-protection HTML to [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list owner
> [log in to unmask]
> Full help Desk - please email [log in to unmask] describing your needs
> To receive these emails in HTML format send the command:
> SET data-protection HTML to [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|