Observations If the the purpose that data was collected and advised was for security access ie a key access system then the used for directory services (possibly staff admin?) is a different purpose. Given this new purpose the purpose has to be both notified to data subject and I believe expressly consented to given the new purpose is different to that which the data subject was originally advised. The photo image would appear to be only one datum in the collection required for the new directory use. I assume the name associated with the photo image is also to be extracted and possibly a building location. This data presumably is to be matched with a seperate set of data already holding name and telephone number. A further consideration therefore in the light of the accuracy principle is how are two 'John Smiths' in the same organisation being matched without error? What does the addition of a photo acheive in a telephone directory? Video phones of Netmeeting by Web Cams are not yet the norm. Is the matching undertaken just for the sake of justifying the existance of an IT operation or does it serve a purpose justifying the costs of the compliance overheads? David ----- Original Message ----- From: "Anne-Marie Sizer" <[log in to unmask]> To: <[log in to unmask]> Sent: Monday, November 22, 2004 12:14 PM Subject: [data-protection] Use of photographs > Could someone advise me please on the use of staff photographs that we > currently hold on the security access system, for the purpose of the > intranet telephone directory. > > Has anyone had experience of this and what was the reaction to requesting > permission from staff to use their photographs in this way? > > Many thanks. > [log in to unmask] > > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > All archives of messages are stored permanently and are > available to the world wide web community at large at > http://www.jiscmail.ac.uk/lists/data-protection.html > If you wish to leave this list please send the command > leave data-protection to [log in to unmask] > All user commands can be found at : - > http://www.jiscmail.ac.uk/help/commandref.htm > (all commands go to [log in to unmask] not the list please) > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^