Print

Print


In message <002501c49ab5$aa484e80$0400a8c0@DAD1>, at 00:50:50 on Wed, 15
Sep 2004, davidwyatt <[log in to unmask]> writes

>The receiving controller should be looking at ensuring their procedures fit
>with section 29(3)

If the request is being made using 29(3) exemption [I'm not we've
established this yet]; in addition to David's excellent advice, I would
recommend the following site [for which I was once responsible] that
documents the forms and procedure agreed between ACPO and the ISP
industry pre-RIPA.

The notes and guidance for the form are particularly relevant as a guide
to the process, which is equally applicable to any sector because the
DPA is a horizontal piece of legislation. The only matter which is
ISP-specific is perhaps and agreement on the seniority of policeman
required to sign, but this form, which is well known to TICO, sets a
useful precedent.

http://www.linx.net/misc/dpa28-3form.html
--
Roland Perry

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
  (all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^