0100,0100,0100I agree with the reservations of Tim Trent but would also make
the point that the consultants are data processors and must only
work under written contract in accordance with
Schedule 1, Part ll, Section 12 of the Act.
I would be particularly careful where the sensitive data is
involved and, like Tim, question the need for that to be passed
to them. It would be even better if all the data could be
anonymised before being handed over so that it is used only for
statistical purposes.
John Hitches
John Hitches
Information Security Officer
and Data Protection Officer
Kingston University
Telephone 020 8547 7768
The views expressed are those of the individual and
not necessarily those of the university
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^