Print

Print


I think it depends what the dial in user accesses.  The transfer is, in my
view, only relevant under the act if PERSONAL DATA is transferred.  And then
only relevant if it is the personal data of an EEA Data Subject (including
that user).

However I would register as transferring outside the EEA if non EEA access
is allowed or planned.

-----Original Message-----
From: Duncan Smith [mailto:[log in to unmask]]
Sent: 18 December 2001 09:23
To: [log in to unmask]
Subject: Is this a transfer?


8th principle and all that.

If I allow a individual from outside the EEA dial-in access to my server
(and database) has a transfer taken place?

My view would be that despite all the tech. arguments about thin
clients, data not being stored, view only etc. etc. the spirit of the
Act would be that a transfer HAS taken place.

Anyone think differently?

Regards,

Duncan S Smith
Snr. Consultant

Ashton Court Consultants Ltd, Northampton, UK
T: 01604 864 781   F: 01604 864 611   M: 0777 556 8180
Mailto:[log in to unmask]   Web: www.accl.co.uk



----------------------------------------------------------------
The information transmitted is intended only for the person or entity to
which it is addressed and may contain confidential and/or privileged
material.  Any review, retransmission, dissemination or other use of, or
taking of any action in reliance upon, this information by persons or
entities other than the intended recipient is prohibited.   If you
received this in error, please contact the sender and delete the
material from any computer.

This footnote confirms that this email message has been swept by Norton
Antivirus software for the presence of computer viruses.

Ashton Court Consultants Ltd.
"Harnessing Information for Business Success"
-----------------------------------------------------------------

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^