Print

Print


I agree that it might not be a good idea to use live data for training, and
certainly not if the people you are training would not otherwise have access
to that data.

However, I don't think it's necessarily a contravention of Principle 2.  It
says that any further use must be 'compatible' with the original purpose.
If the legislators had wanted to say 'must only be used for the original
purpose' they could have said so.  Therefore, one must assume that being
'compatible' is something different from being 'the same as'.  I think you
could make a case that on-the-job training in how to use a system is
'compatible' with the underlying use, whereas downloading live data to your
training suite and using it with all-comers would certainly not be
compatible (and wrong for all sorts of reasons).

But I expect there are members of the group who take a much more hard-line
view.

Paul Ticher
Information Management
0116 273 8191
22 Stoughton Drive North, Leicester LE5 5UB

----- Original Message -----
From: Barry Kelly <[log in to unmask]>
To: <[log in to unmask]>
Sent: 31 August 2001 16:10
Subject: Re: Training


> Yes as I presume you did not originally collect the data for the purposes
of
> training staff then the 2nd Principle applies
> "Personal data shall be obtained only for one or more specified and lawful
> purposes, and shall not be further processed in any manner incompatible
with
> that purpose or those purposes."
>
> >-----Original Message-----
> >From: This list is for those interested in Data Protection issues
> >[mailto:[log in to unmask]]On Behalf Of Rebecca Hughes
> >Sent: 31 August 2001 16:03
> >To: [log in to unmask]
> >Subject: Training
> >
> >
> >Dear All,
> >
> >Can a university use real student files to train its staff in a new
> >computer system? If the staff concerned would have access to the
> >information contained in those files idependently of that training, would
> >we still have to obtain the consent of the students in order to use their
> >personal data for the purpose of training?
> >
> >Any advice greatly appreciated.
> >Becky
> >
> >^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> >    If you wish to leave this list please send the command
> >       leave data-protection to [log in to unmask]
> >            All user commands can be found at : -
> >    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> >all commands go to [log in to unmask] not the list please!
> >^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> >
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>     If you wish to leave this list please send the command
>        leave data-protection to [log in to unmask]
>             All user commands can be found at : -
>     www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^