What if a crime comes to light in a years time, using that van?? Would that not then be justified. Just a thought (thinking about some appeals on Crimewatch and the like)!! Fiona Musgrave IT Team Principal/DP Officer Carlisle City Council > -----Original Message----- > From: Duncan Langford [SMTP:[log in to unmask]] > Sent: 28 November 2001 10:57 > To: [log in to unmask] > Subject: Car hire issue... > > Yesterday I went with my daughter (who has no license) to hire a van, > to move her belongings to a new flat. > > On the counter of the hire desk were two web cams, pointing outwards. > As an essential part of the hiring process, one of these was pointed > at me, and my image recorded. > > When I asked what would happen to this data, I was told it would be > 'filed' indefinitely. > > Now, I can see how it might well be useful to have a picture of the > person who doesn't return your van - but I don't see the > justification for permanently storing that image after the van had > been returned? > > A notice on the office wall warned of video surveillance - when I > queried their policy, I was told it was 'covered by the notice'. I > specifically did not give permission for any recording of my personal > data, but this made no difference. > > We needed the van, so continued, under protest - but I'd certainly > appreciate comments about the legality of this policy! > > - duncan > -------------------------------------------------------------------------- > --- > Dr Duncan Langford Computing Laboratory, University of Kent at Canterbury > UK > Practical Computer Ethics:McGrawHill Business Computer > Ethics:AddisonWesley > 'Internet Ethics' - MacMillan Press (UK) and St Martins Press (USA) > -------------------------------------------------------------------------- > --- > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > If you wish to leave this list please send the command > leave data-protection to [log in to unmask] > All user commands can be found at : - > www.jiscmail.ac.uk/user-manual/summary-user-commands.htm > all commands go to [log in to unmask] not the list please! > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > _____________________________________________________________________ > This message has been checked for all known viruses by Star Internet > delivered through the MessageLabs Virus Scanning Service. For further > information visit http://www.star.net.uk/stats.asp or alternatively call > Star Internet for details on the Virus Scanning Service. _____________________________________________________________________ This message has been checked for all known viruses by Star Internet delivered through the MessageLabs Virus Scanning Service. For further information visit http://www.star.net.uk/stats.asp or alternatively call Star Internet for details on the Virus Scanning Service. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm all commands go to [log in to unmask] not the list please! ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^