Print

Print


Observations

If the the purpose that data was collected and advised was for security
access ie a key access system then the used for directory services (possibly
staff admin?) is a different purpose. Given this new purpose the purpose has
to be both notified to data subject and I believe expressly consented to
given the new purpose is different to that which the data subject was
originally advised.

The photo image would appear to be only one datum in the collection required
for the new directory use. I assume the name associated with the photo image
is also to be extracted and possibly a building location. This data
presumably is to be  matched with a seperate set of data already holding
name and telephone number. A further consideration therefore in the light of
the accuracy principle is how are two 'John Smiths' in the same organisation
being matched without error?

What does the addition of a photo acheive in a telephone directory?   Video
phones of  Netmeeting by Web Cams are not yet the norm. Is the matching
undertaken just for the sake of justifying the existance of an IT operation
or does it serve a purpose justifying the costs of the compliance overheads?

David

----- Original Message -----
From: "Anne-Marie Sizer" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Monday, November 22, 2004 12:14 PM
Subject: [data-protection] Use of photographs


> Could someone advise me please on the use of staff photographs that we
> currently hold on the security access system, for the purpose of the
> intranet telephone directory.
>
> Has anyone had experience of this and what was the reaction to requesting
> permission from staff to use their photographs in this way?
>
> Many thanks.
> [log in to unmask]
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>       All archives of messages are stored permanently and are
>      available to the world wide web community at large at
>      http://www.jiscmail.ac.uk/lists/data-protection.html
>      If you wish to leave this list please send the command
>       leave data-protection to [log in to unmask]
>            All user commands can be found at : -
>        http://www.jiscmail.ac.uk/help/commandref.htm
>  (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
  (all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^