Yes. I found it important, and am regularly reminded by discussions and issues raised within this group, how necessary it is to identify the scope of the organisational powers and legislated boundaries, then the necessity of correctly reflecting those constraints within the framework of any Crime and Disorder Act agreement. e.g. It is no good saying the CDA allows a data transfer to happen if the DPA principles cannot be met, or, just as importantly, other legislative constraints apply to either the data or the purpose(s) the data may be used for. (Unless of course those involved are trying to extend those powers, come what may.....) Good examples might be the recent discussion on council tax/benefits data, or the use of electoral roll material. Ian W -----Original Message----- From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]]On Behalf Of Fiona Musgrave Sent: 16 June 2003 11:48 To: [log in to unmask] Subject: Information Sharing Protocols - Crime and Disorder I have been asked to give a 20 minute presentation on DP Act and the impact for Crime and Disorder Partnerships and Information Sharing Protocols. Anyone done this, and would care to share a few pointers?? Thanks in anticipation. Fiona Musgrave DP Officer / IT Team Principal Customer and Information Services Carlisle City Council 01228 81 7258 [log in to unmask] ________________________________________________________________________ This email has been scanned for all viruses by the MessageLabs Email Security System. For more information on a proactive email security service working around the clock, around the globe, visit http://www.messagelabs.com ________________________________________________________________________ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - www.jiscmail.ac.uk/user-manual/summary-user-commands.htm (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^