Print

Print


Simon,

What would be your response to the following question, posed by one of your
University colleagues:

A number of overseas students, who graduated from our business Masters
course, have complained to the Alumni Department about their use of e-mail
to promote the benefits of joining the Alumni Association. In particular,
one of the complainants from Denmark was absolutely livid that they had not
obtained consent to use her e-mail for direct marketing. Her husband read
her e-mail and as a result discovered that she had been attending the
University, when she had claimed all along that she was working for a living
at a UK company. She is now seeking compensation for Damage & Distress
caused by our alleged breach of the Danish AND UK data protection
legislation.

Given that the "Act itself does not seem to be complicated", what would be
your advice :-)


-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]]On Behalf Of Simon Laverty
Sent: Tuesday, March 27, 2001 11:06 AM
To: [log in to unmask]
Subject: Application of DP


I would be interested to know what DP officers who work in Universities
think the problem with data protection is. I have been researching this for
some time now, and I consider the only problem being the sheer volumes of
data that need to be processed as the Act itself does not seem to be
complicated. Am I just being very naive or is the problem with DP volume?

thank you for any contributions.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^