Print

Print


0100,0100,0100I agree with the reservations of Tim Trent but would also make the point that the consultants are data processors and must only work under written contract in accordance with Schedule 1, Part ll, Section 12 of the Act. I would be particularly careful where the sensitive data is involved and, like Tim, question the need for that to be passed to them. It would be even better if all the data could be anonymised before being handed over so that it is used only for statistical purposes. John Hitches John Hitches Information Security Officer and Data Protection Officer Kingston University Telephone 020 8547 7768 The views expressed are those of the individual and not necessarily those of the university ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm all commands go to [log in to unmask] not the list please! ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^