Print

Print


Yes.

I found it important, and am regularly reminded by discussions and issues
raised within this group, how necessary it is to identify the scope of the
organisational powers and legislated boundaries, then the necessity of
correctly  reflecting those constraints within the framework of any Crime
and Disorder Act agreement.  e.g. It is no good saying the CDA allows a data
transfer to happen if the DPA principles cannot be met, or, just as
importantly, other legislative constraints apply to either the data or the
purpose(s) the data may be used for.  (Unless of course those involved are
trying to extend those powers, come what may.....)

Good examples might be the recent discussion on council tax/benefits data,
or the use of electoral roll material.


Ian W



-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]]On Behalf Of Fiona Musgrave
Sent: 16 June 2003 11:48
To: [log in to unmask]
Subject: Information Sharing Protocols - Crime and Disorder


I have been asked to give a 20 minute presentation on DP Act and the impact
for Crime and Disorder Partnerships and Information Sharing Protocols.
Anyone done this, and would care to share a few pointers??

Thanks in anticipation.

Fiona Musgrave
DP Officer / IT Team Principal

Customer and Information Services
Carlisle City Council
01228 81 7258
[log in to unmask]




________________________________________________________________________
This email has been scanned for all viruses by the MessageLabs Email
Security System. For more information on a proactive email security
service working around the clock, around the globe, visit
http://www.messagelabs.com
________________________________________________________________________

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
  (all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
    www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
  (all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^