Print

Print


***** THIS EMAIL WAS SENT VIA THE INTERNET *****

1.      Did the student have legitimate access to the payroll system or did
she/he just ask for a few names from payroll staff?  (1st breach)
2.      If used from the internal directory did she/he ask permission to use
the information after interview with those people/colleagues and
3.      Did she/he obtain consent to use the information for further
purposes?

Or in fact was it made known to all staff that this student may be coming to
interview them and would be using the information as part of his/her course
and it may be used?

I think you would have to anonymise the names if it was to be used by the
employer........
Doreen
Doreen Broom
Access to Information Officer
Scottish Borders Council
Tel: 01835 826516
Fax: 01835 825041


        -----Original Message-----
        From:   Graham Hadfield
[SMTP:[log in to unmask]]
        Sent:   23 February 2004 14:13
        To:     [log in to unmask]
        Subject:        Use of data for questionnaires

        ***** THIS EMAIL WAS RECEIVED FROM THE INTERNET *****

        The scenario:
        An employee is doing a part time MBA course at a local university,
        supported by the employer. Part of the course involves a study of
some
        aspect of management within the workplace. In order to choose people
to
        take part in the survey the employee either:
        1. obtains an extract of a number of fellow employees from the
        personnel/payroll system
        2. picks names at random from the internal telephone directory
        3. sends questionnaire to colleagues with whom (s)he has just
happened to
        work with from time to time.

        The questions:
        1. What is the legality/illegality of these methods as far as DPA
1998
        goes?
        2. Does it make a difference if the results of the survey will be
used by
        the employer?

        Regards,
        Graham

        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
               All archives of messages are stored permanently and are
              available to the world wide web community at large at
              http://www.jiscmail.ac.uk/lists/data-protection.html
              If you wish to leave this list please send the command
               leave data-protection to [log in to unmask]
                    All user commands can be found at : -
                http://www.jiscmail.ac.uk/help/commandref.htm
          (all commands go to [log in to unmask] not the list please)
        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


********************************************************************
* This email is privileged, confidential and subject to copyright. *
* Any unauthorised use or disclosure of its content is prohibited. *
* The views expressed in this communication may not necessarily    *
* be the views held by Scottish Borders Council.                   *
********************************************************************

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
  (all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^