In some ways it is hard to identify an individual, however technology is getting very good these days, where resolution of digital cameras are getting better and better, when i was being shown around university's a few years ago, (1999), I was being shown technology that students were developing at Kingston University, where CCTV cameras were monitoring a car park. These cameras were not just recording the movements of cars but, the computer attached to them was recording the colour of cars, the type i.e. van, salon, hatch back. and also recording the number plate. As well as this it was also programmed to record information like medium build, short black hair, white human. As well as this, it was able to record where the persons moved in the car park by tracking there movements and recording the path of the individuals this may be advanced technology in the making but it was being developed 3 years ago so what is available today? This system was able to recognise number plates, how do we know that the same system can be used to read any text in any personal belongings you have, for example if you walk into a shop, with advanced CCTV, how do we know that the CCTV system is not equipped with high enough resolution to read the information that is on the credit card. i.e. name, number expiry date. also any other identifiably information like the glimpse of a driving licence as you open your wallet? Hopefully most have seen the film "enemy of the state", now I know its science fiction, however a lot of the technology they described in the film was technology that authorities have access to. Does this breach data protection, as it is inevitably data held on a form of technology, the information does not necessary need to be held on a hard disk in a data base, for it to be classed as data on a system. What are others thoughts on this? David Smith Student, DeMontfort University, Leicester ----- Original Message ----- From: <[log in to unmask]> To: <[log in to unmask]> Sent: Wednesday, October 10, 2001 10:14 PM Subject: Re: new topic: CCTV and surveillance > In a message dated 10/10/2001 08:13:34 GMT Daylight Time, > [log in to unmask] writes: > > << What is challenging my own mind at the moment is "Is a CCTV image 'data > capable of identifying an individual' as described by the DP Act, or must > something be combined with the image before the image and recording and > storage of that image is subject to this act?" >> > ---------- > > The argument put forward by the OIC in the early days (perhaps before they > were called the OIC) was that because personal data was that where a person > could be identified from that - or from that and other info in the possession > of the controller - or from that and info likely to come into the possession > of the controller - and that it was likely that your control room operator > knew the individual (perhaps they know shoplifters from previous incidents) > or you would want to find out the identity of the subject who was committing > some sort of offence (perhaps from the police) - it would be classed as > personal data. > > In terms of subject access requests, perhaps even the data subject will > supply information that helps you identify the individual. > > So for those who were thinking they had wasted loads of time - rest easy, it > was time well spent. > > > Ian Buckland > MD > Keep IT Legal Ltd > > Please Note: The information contained in this document does not replace or > negate the need for proper legal advice and/or representation. It is > essential that you do not rely upon any advice given without contacting your > solicitor. If you need further explanation of any points raised please > contact Keep I.T. Legal Ltd at the address below: > > 55 Curbar Curve > Inkersall, Chesterfield > Derbyshire S43 3HP > (Reg 3822335) > Tel: 01246 473999 > Fax: 01246 470742 > E-mail: [log in to unmask] > Website: www.keepitlegal.co.uk > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > If you wish to leave this list please send the command > leave data-protection to [log in to unmask] > All user commands can be found at : - > www.jiscmail.ac.uk/user-manual/summary-user-commands.htm > all commands go to [log in to unmask] not the list please! > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > _________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm all commands go to [log in to unmask] not the list please! ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^