In message <002501c49ab5$aa484e80$0400a8c0@DAD1>, at 00:50:50 on Wed, 15 Sep 2004, davidwyatt <[log in to unmask]> writes >The receiving controller should be looking at ensuring their procedures fit >with section 29(3) If the request is being made using 29(3) exemption [I'm not we've established this yet]; in addition to David's excellent advice, I would recommend the following site [for which I was once responsible] that documents the forms and procedure agreed between ACPO and the ISP industry pre-RIPA. The notes and guidance for the form are particularly relevant as a guide to the process, which is equally applicable to any sector because the DPA is a horizontal piece of legislation. The only matter which is ISP-specific is perhaps and agreement on the seniority of policeman required to sign, but this form, which is well known to TICO, sets a useful precedent. http://www.linx.net/misc/dpa28-3form.html -- Roland Perry ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^