I think it does make a difference. The file has to be structured by reference to the data-subject, which for a personnel system will be the employee not the next-of-kin. Stuart Cashmore Data Security Manager McKesson Information Systems UK Ltd, No. 1 Nine Elms Lane, LONDON SW8 5RR Tel. 020-7819 5083 (with Voicemail) Mob. 07799-790019 Fax. 020-7819 5100 e-mail [log in to unmask] <mailto:[log in to unmask]> -----Original Message----- From: Jones, Rhys : Retail [SMTP:[log in to unmask]] Sent: 17 September 2001 12:58 To: [log in to unmask] Subject: Re: Next-of-Kin details Cindy I didn't think this made any difference. Provided that the record is held as part of a manual file which is structured by any criteria, it falls within the scope of the Act. Therefore, the retention of an individual's details within a manual file structured by reference to another, e.g. a personnel file, will technically be subject to the requirements of the Act. Rhys Rhys Jones Data Protection Team Tel: 7-2000-5106 (external 01565 615 106) > -----Original Message----- > From: Cindy Burnes [SMTP:[log in to unmask]] > Sent: 17 September 2001 12:10 > To: [log in to unmask] > Subject: Re: Next-of-Kin details > > You might also consider that, as far as manual personnel records are > concerned, the record may not amount to a 'relevant filing system,' as it > arguably will not be structured by reference to the relevant individuals > (next-of-kin). > > Cindy > > Subscriptions Department > Privacy & Data Protection > 44 Tregarvon Road London SW11 5QE > Tel. +44 (0)20 7924 1927 > Fax. +44 (0)870 137 7871 > http://www.privacydataprotection.co.uk > > -----Original Message----- > From: This list is for those interested in Data Protection issues > [mailto:[log in to unmask]] On Behalf Of Trent,Tim > Sent: 13 September 2001 12:01 > To: [log in to unmask] > Subject: Re: Next-of-Kin details > > We are either getting the "emergency contact's" own signature on the form > or > considering seriously writing to each and every one stating the purposes > for > which their data is held, or asking each employee to revalidate the > details > with a signature. > > Our data is pan EEA as well, which gives an interesting additional > perspective > > _____________________________________________________________ > Tim Trent > Chief Privacy Officer EMEA > > Gartner > EMEA Marketing, Tamesis, The Glanty, Egham, Surrey, United Kingdom, > TW20 9AW > Switchboard +44 (0)1784 431 611, Direct Line +44 (0)1784 267 335, Mobile > +44 (0)7710 126 618 > Visit our home on the web: http://www.gartner.com > > The opinions expressed in this message are my own, and may or may not > reflect those of my employer. They are expressed as a part of the > discussion on the JISCMail mailing list on data protection and for no > other purpose. They have no legal standing and are offered as part of > informed and informal discussion. They may NOT be attributed to > Gartner in any way. > > > -----Original Message----- > From: Peter Wilson [mailto:[log in to unmask]] > Sent: 13 September 2001 11:32 > To: [log in to unmask] > Subject: Next-of-Kin details > > > Scenario: > Next-of-kin details are completed at the discretion of the employee (for > emergency purposes use only) If employee decides to complete details box > is > it sufficient to tell the employee to inform the emergency contact of the > fact that their details are held by employer or is the onus on the > employer > to inform contact of the fact? > > Any views? How are others dealing with this ? Or am I just > scaremongering? > > Peter. > > Peter Wilson > Data Protection Officer > University of Paisley > > > > Legal disclaimer > -------------------------- > > The information transmitted is the property of the University of Paisley > and > is intended only for the person or entity > to which it is addressed and may contain confidential and/or privileged > material. Statements and opinions expressed in this > e-mail may not represent those of the company. Any review, > retransmission, > dissemination and other use of, or taking > of any action in reliance upon, this information by persons or entities > other than the intended recipient is prohibited. > If you received this in error, please contact the sender immediately and > delete the material from any computer. > > -------------------------- > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > If you wish to leave this list please send the command > leave data-protection to [log in to unmask] > All user commands can be found at : - > www.jiscmail.ac.uk/user-manual/summary-user-commands.htm > all commands go to [log in to unmask] not the list please! > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > If you wish to leave this list please send the command > leave data-protection to [log in to unmask] > All user commands can be found at : - > www.jiscmail.ac.uk/user-manual/summary-user-commands.htm > all commands go to [log in to unmask] not the list please! > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > If you wish to leave this list please send the command > leave data-protection to [log in to unmask] > All user commands can be found at : - > www.jiscmail.ac.uk/user-manual/summary-user-commands.htm > all commands go to [log in to unmask] not the list please! > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Internet communications are not secure and therefore the Barclays Group does not accept legal responsibility for the contents of this message. Any views or opinions presented are solely those of the author and do not necessarily represent those of the Barclays Group. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm all commands go to [log in to unmask] not the list please! ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ---------------------------------------------------------------------------- The information contained in this e-mail is confidential and is intended only for the named recipient(s). If you are not the intended recipient you must not copy, distribute, or take any action or reliance on it. If you have received this e-mail in error, please notify the sender. Any unauthorised disclosure of the information contained in this e-mail is strictly prohibited. ---------------------------------------------------------------------------- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm all commands go to [log in to unmask] not the list please! ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^