Jo You may be interested in what Richard Morgan and Ruth Boardman have to say about the IC's Audit Manual (in which the IC's audit methodology is defined) in their book about implementing data protection compliance: "The desire to be thorough has in our view been in danger of outstripping the need to be practical - particularly for small- and medium-sized businesses. ... The Manual assumes that the user already has a compliance procedure in place ... and as such it is not suitable for organisations who are learning about compliance. Worse still from a practical point of view is the fact that the Manual ... assumes that the user has already mastered the theory of the Act and has it all at his finger tips." I, for one, wouldn't disagree with any of that. Ian Mansbach Mansbachs Data Protection Practitioners [log in to unmask] phone: 0871 716 5060 international: +44 (871) 716 5060 -----Original Message----- From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Jo Archer Sent: 09 June 2004 10:29 To: [log in to unmask] Subject: [data-protection] Audit methodologies Chaps, Does anyone have experience of the IC data protection audit methodology? Is it more suitable for some business rather than others? What other methodologies do you know of? Which consultancies have most experience in this area? Thanks, Jo Archer ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^