I agree that it might not be a good idea to use live data for training, and certainly not if the people you are training would not otherwise have access to that data. However, I don't think it's necessarily a contravention of Principle 2. It says that any further use must be 'compatible' with the original purpose. If the legislators had wanted to say 'must only be used for the original purpose' they could have said so. Therefore, one must assume that being 'compatible' is something different from being 'the same as'. I think you could make a case that on-the-job training in how to use a system is 'compatible' with the underlying use, whereas downloading live data to your training suite and using it with all-comers would certainly not be compatible (and wrong for all sorts of reasons). But I expect there are members of the group who take a much more hard-line view. Paul Ticher Information Management 0116 273 8191 22 Stoughton Drive North, Leicester LE5 5UB ----- Original Message ----- From: Barry Kelly <[log in to unmask]> To: <[log in to unmask]> Sent: 31 August 2001 16:10 Subject: Re: Training > Yes as I presume you did not originally collect the data for the purposes of > training staff then the 2nd Principle applies > "Personal data shall be obtained only for one or more specified and lawful > purposes, and shall not be further processed in any manner incompatible with > that purpose or those purposes." > > >-----Original Message----- > >From: This list is for those interested in Data Protection issues > >[mailto:[log in to unmask]]On Behalf Of Rebecca Hughes > >Sent: 31 August 2001 16:03 > >To: [log in to unmask] > >Subject: Training > > > > > >Dear All, > > > >Can a university use real student files to train its staff in a new > >computer system? If the staff concerned would have access to the > >information contained in those files idependently of that training, would > >we still have to obtain the consent of the students in order to use their > >personal data for the purpose of training? > > > >Any advice greatly appreciated. > >Becky > > > >^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > If you wish to leave this list please send the command > > leave data-protection to [log in to unmask] > > All user commands can be found at : - > > www.jiscmail.ac.uk/user-manual/summary-user-commands.htm > >all commands go to [log in to unmask] not the list please! > >^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > > > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > If you wish to leave this list please send the command > leave data-protection to [log in to unmask] > All user commands can be found at : - > www.jiscmail.ac.uk/user-manual/summary-user-commands.htm > all commands go to [log in to unmask] not the list please! > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm all commands go to [log in to unmask] not the list please! ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^