Print

Print


What if a crime comes to light in a years time, using that van?? Would that
not then be justified. Just a thought (thinking about some appeals on
Crimewatch and the like)!!

Fiona Musgrave
IT Team Principal/DP Officer
Carlisle City Council


> -----Original Message-----
> From: Duncan Langford [SMTP:[log in to unmask]]
> Sent: 28 November 2001 10:57
> To:   [log in to unmask]
> Subject:      Car hire issue...
>
> Yesterday I went with my daughter (who has no license) to hire a van,
> to move her belongings to a new flat.
>
> On the counter of the hire desk were two web cams, pointing outwards.
> As an essential part of the hiring process, one of these was pointed
> at me, and my image recorded.
>
> When I asked what would happen to this data, I was told it would be
> 'filed' indefinitely.
>
> Now, I can see how it might well be useful to have a picture of the
> person who doesn't return your van - but I don't see the
> justification for permanently storing that image after the van had
> been returned?
>
> A notice on the office wall warned of video surveillance - when I
> queried their policy, I was told it was 'covered by the notice'. I
> specifically did not give permission for any recording of my personal
> data, but this made no difference.
>
> We needed the van, so continued, under protest - but I'd certainly
> appreciate comments about the legality of this policy!
>
> - duncan
> --------------------------------------------------------------------------
> ---
> Dr Duncan Langford  Computing Laboratory, University of Kent at Canterbury
> UK
> Practical Computer Ethics:McGrawHill   Business Computer
> Ethics:AddisonWesley
>       'Internet Ethics' - MacMillan Press (UK) and St Martins Press (USA)
> --------------------------------------------------------------------------
> ---
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>     If you wish to leave this list please send the command
>        leave data-protection to [log in to unmask]
>             All user commands can be found at : -
>     www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> _____________________________________________________________________
> This message has been checked for all known viruses by Star Internet
> delivered through the MessageLabs Virus Scanning Service. For further
> information visit http://www.star.net.uk/stats.asp or alternatively call
> Star Internet for details on the Virus Scanning Service.

_____________________________________________________________________
This message has been checked for all known viruses by Star Internet
delivered through the MessageLabs Virus Scanning Service. For further
information visit http://www.star.net.uk/stats.asp or alternatively call
Star Internet for details on the Virus Scanning Service.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^