Print

Print


I think it does make a difference. The file has to be structured by
reference to the data-subject, which for a personnel system will be the
employee not the next-of-kin.


Stuart Cashmore
Data Security Manager
McKesson Information Systems UK Ltd, No. 1 Nine Elms Lane, LONDON SW8 5RR

Tel.    020-7819 5083  (with Voicemail)
Mob.    07799-790019
Fax.    020-7819 5100
e-mail [log in to unmask]
<mailto:[log in to unmask]>




        -----Original Message-----
        From:   Jones, Rhys : Retail [SMTP:[log in to unmask]]
        Sent:   17 September 2001 12:58
        To:     [log in to unmask]
        Subject:        Re: Next-of-Kin details

        Cindy

        I didn't think this made any difference.  Provided that the record
is held
        as part of a manual file which is structured by any criteria, it
falls
        within the scope of the Act.  Therefore, the retention of an
individual's
        details within a manual file structured by reference to another,
e.g. a
        personnel file, will technically be subject to the requirements of
the Act.

        Rhys

        Rhys Jones
        Data Protection Team
        Tel: 7-2000-5106 (external 01565 615 106)

        > -----Original Message-----
        > From: Cindy Burnes [SMTP:[log in to unmask]]
        > Sent: 17 September 2001 12:10
        > To:   [log in to unmask]
        > Subject:      Re: Next-of-Kin details
        >
        > You might also consider that, as far as manual personnel records
are
        > concerned, the record may not amount to a 'relevant filing
system,' as it
        > arguably will not be structured by reference to the relevant
individuals
        > (next-of-kin).
        >
        > Cindy
        >
        > Subscriptions Department
        > Privacy & Data Protection
        > 44 Tregarvon Road London SW11 5QE
        > Tel. +44 (0)20 7924 1927
        > Fax. +44 (0)870 137 7871
        > http://www.privacydataprotection.co.uk
        >
        >  -----Original Message-----
        > From:   This list is for those interested in Data Protection
issues
        > [mailto:[log in to unmask]]  On Behalf Of Trent,Tim
        > Sent:   13 September 2001 12:01
        > To:     [log in to unmask]
        > Subject:        Re: Next-of-Kin details
        >
        > We are either getting the "emergency contact's" own signature on
the form
        > or
        > considering seriously writing to each and every one stating the
purposes
        > for
        > which their data is held, or asking each employee to revalidate
the
        > details
        > with a signature.
        >
        > Our data is pan EEA as well, which gives an interesting additional
        > perspective
        >
        > _____________________________________________________________
        > Tim Trent
        > Chief Privacy Officer EMEA
        > > Gartner
        > EMEA Marketing, Tamesis,  The Glanty,  Egham,  Surrey,  United
Kingdom,
        > TW20 9AW
        > Switchboard +44 (0)1784 431 611, Direct Line +44 (0)1784 267 335,
Mobile
        > +44 (0)7710 126 618
        > Visit our home on the web:  http://www.gartner.com
        >
        > The opinions expressed in this message are my own, and may or may
not
        > reflect those of my employer.  They are expressed as a part of the
        > discussion on the JISCMail mailing list on data protection and for
no
        > other purpose.  They have no legal standing and are offered as
part of
        > informed  and informal discussion.  They may NOT be attributed to
        > Gartner in any way.
        >
        >
        > -----Original Message-----
        > From: Peter Wilson [mailto:[log in to unmask]]
        > Sent: 13 September 2001 11:32
        > To: [log in to unmask]
        > Subject: Next-of-Kin details
        >
        >
        > Scenario:
        > Next-of-kin details are completed at the discretion of the
employee (for
        > emergency purposes use only)  If employee decides to complete
details box
        > is
        > it sufficient to tell the employee to inform the emergency contact
of the
        > fact that their details are held by employer or is the onus on the
        > employer
        > to inform contact of the fact?
        >
        > Any views?  How are others dealing with this ?  Or am I just
        > scaremongering?
        >
        > Peter.
        >
        > Peter Wilson
        > Data Protection Officer
        > University of Paisley
        >
        >
        >
        > Legal disclaimer
        > --------------------------
        >
        > The information transmitted is the property of the University of
Paisley
        > and
        > is intended only for the person or entity
        > to which it is addressed and may contain confidential and/or
privileged
        > material.  Statements and opinions expressed in this
        > e-mail may not represent those of the company.  Any review,
        > retransmission,
        > dissemination and other use of, or taking
        > of any action in reliance upon, this information by persons or
entities
        > other than the intended recipient is prohibited.
        > If you received this in error, please contact the sender
immediately and
        > delete the material from any computer.
        >
        > --------------------------
        >
        > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
        >     If you wish to leave this list please send the command
        >        leave data-protection to [log in to unmask]
        >             All user commands can be found at : -
        >     www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
        > all commands go to [log in to unmask] not the list please!
        > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
        >
        > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
        >     If you wish to leave this list please send the command
        >        leave data-protection to [log in to unmask]
        >             All user commands can be found at : -
        >     www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
        > all commands go to [log in to unmask] not the list please!
        > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
        >
        > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
        >     If you wish to leave this list please send the command
        >        leave data-protection to [log in to unmask]
        >             All user commands can be found at : -
        >     www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
        > all commands go to [log in to unmask] not the list please!
        > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

        Internet communications are not secure and therefore the Barclays
Group does
        not accept legal responsibility for the contents of this message.
Any views
        or opinions presented are solely those of the author and do not
necessarily
        represent those of the Barclays Group.

        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
            If you wish to leave this list please send the command
               leave data-protection to [log in to unmask]
                    All user commands can be found at : -
            www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
        all commands go to [log in to unmask] not the list please!
        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


----------------------------------------------------------------------------
The information contained in this e-mail is confidential and is intended
only for the named recipient(s). If you are not the intended recipient you
must not copy, distribute, or take any action or reliance on it.
If you have received this e-mail in error, please notify the sender.
Any unauthorised disclosure of the information contained in this e-mail
is strictly prohibited.
----------------------------------------------------------------------------

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^