Print

Print


I myself have dealt with both types of SAR, in case of specific data
requests it is easier to collate the information quickly.  I have however
always managed to get the job done within the maximum 40 day time scale even
when a data subject has asked for everything.  The basic issue I think is
that the right of SAR is written to empower the individual and no the
institution, so if someone asks for everything and can't be persuaded
otherwise we have a duty to supply everything.

Paul Couldrey

-----Original Message-----
From: [log in to unmask] [mailto:[log in to unmask]]
Sent: 28 September 2001 15:12
To: [log in to unmask]
Subject: Re: SARs


        My understanding is that if they ask for all personal data , then
that must be provided. Providing less is a matter of negotiation with the
particular individual. I have gone down the route of trying to get
applicants to focus on what it is they really want although this can be
tricky since often their application is part of some wider complaint.
        Gail Waters
        DP Coordinator
        Open University

> -----Original Message-----
> From: Rebecca Hughes [SMTP:[log in to unmask]]
> Sent: 28 September 2001 14:43
> To:   [log in to unmask]
> Subject:      SARs
>
> Dear All,
>
> Subject Access Requests - how do your institutions handle them? I am
> interested in smoothing out our procedures and I wondered whether on every
> request it is necessary to send out as list or a copy of all data held on
> the subject or whether you can just provide them with the specific
> information they require. It seems to be such a simple question that I
> can't find the answer! Advice welcome!
>
> Becky
>
> Administrative Officer (Data Protection)
> University of Exeter
> [log in to unmask]
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>     If you wish to leave this list please send the command
>        leave data-protection to [log in to unmask]
>             All user commands can be found at : -
>     www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> all commands go to [log in to unmask] not the list please!
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Email Disclaimer

************************************************************************************************
DISCLAIMER: This email and files transmitted are confidential and are intended solely for the use of the intended recipient. If you are not the intended recipient, or the person responsible for delivering it to the intended recipient, you may not copy, disclose, distribute or use it in any unauthorised manner. If you have received this email in error please notify us by telephone on 01902-554455 or by email to [log in to unmask] and then delete it and any attachments accompanying it. Please note that Wolverhampton City Council cannot guarantee that this message or any attachments are virus free or have not been intercepted and amended.
Any views or opinions expressed within this email are those of the author and may not necessarily reflect those of Wolverhampton City Council and no contractual arrangement is intended to arise from this communication.

************************************************************************************************

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
all commands go to [log in to unmask] not the list please!
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^