Print

Print


Jo

You may be interested in what Richard Morgan and Ruth Boardman have to say
about the IC's Audit Manual (in which the IC's audit methodology is defined)
in their book about implementing data protection compliance: "The desire to
be thorough has in our view been in danger of outstripping the need to be
practical - particularly for small- and medium-sized businesses. ... The
Manual assumes that the user already has a compliance procedure in place ...
and as such it is not suitable for organisations who are learning about
compliance. Worse still from a practical point of view is the fact that the
Manual ... assumes that the user has already mastered the theory of the Act
and has it all at his finger tips."

I, for one, wouldn't disagree with any of that.

Ian Mansbach
Mansbachs
Data Protection Practitioners
[log in to unmask]
phone: 0871 716 5060
international: +44 (871) 716 5060


-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Jo Archer
Sent: 09 June 2004 10:29
To: [log in to unmask]
Subject: [data-protection] Audit methodologies


Chaps,

Does anyone have experience of the IC data protection audit methodology? Is
it more suitable for some business rather than others? What other
methodologies do you know of? Which consultancies have most experience in
this area?

Thanks,

Jo Archer

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
  (all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
  (all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^