The alleged advice from ICO is worthless without considering the context. The whole bit about conspiracy with Google is irrelevant.
I certainly don't read Art 15 as being retrospective. If I as an employee of a controller looked at a person's linked in profile 12 months ago, there is no processing of personal data today to attract art 15 rights unless my employer has some record of that which is in itself personal data.
Assuming (an interesting question in itself*) a URL to a linked in profile is itself PD the question then becomes: (a) does the controller have a record of that (my organisation does not keep access logs for long) and (b) did I make some note about the person in a file note / email.
I would ask subject for the URL of his linked in profile and search for that in logs. I would tell him what other searches I proposed to make - e.g. for his name in document stores and email logs and how. He will have the opportunity to suggest there search terms. If he suggests other search methods I will assess whether they are reasonable.
Pretty much standard for any 'unknown' data subject.
* While willing to accept that a URL for an individual's LinkedIn profile may be PD I don't think that means every URL to a webpage containing PD is the PD of those involved.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|