I also would generally leave it to the ICO in most cases - the typical ones where the perpetrator has given into temptation and there is no directly malicious intent - which is not to say it is not criminal. Which certainly indicates most cases of inappropriate access should be reported to ICO even if other risk factors may be sketchy.
The exception would probably be where there was some additional factor e.g. deliberate download of a database or records. Certainly any case where a perpetrator was suspected to be acting for gain e.g. selling data to claims chasers I would involve the police directly and not wait for ICO wheels to grind.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|