Was sufficiently intrigued by this to go and read it online. For anyone who is interested the link to the article is at: http://www.computerweekly.co.uk/Articles/2005/09/06/211595/EUprivacylawposescompliancechallengeforIT%2cwarnsGartner.htm#ContentContinues Frankly I think this is a lot of old baloney. I think they underestimate the seriousness the NHS places on patient confidentiality for a start. At the very least, "reconstructing" individual elements of data would inevitably be based on assumptions which could not be confirmed...... -----Original Message----- From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Tim Trent Sent: 06 September 2005 11:06 To: [log in to unmask] Subject: [data-protection] Fulfilling FoIA can break DPA An article in Computer Weekly promoting Gartner's IT Security Summit has an interesting quite from Jay Heiser, a VP in their research team. A précis is that multiple FOIA request fulfilments could well give sufficient information to break the DPA, even though each individual fulfilment does not of itself break it. The article speaks of combining the data released in each FoIA fulfilment to create a picture bigger than the sum of he individual elements and thus "break the Data Privacy Directive". Whether editing has removed the all important element about creating a dataset capable of identifying a living individual is unclear. The article also speaks of using some form of inference engine (my words) being able to reconstruct personal data form anonymised patient records where the personal data has been scrubbed away. Whether this risk is real or whether they are flying a kite for the conference is open to discussion I think. Tim Trent - Consultant Direct: +44(0)1344 392644 Mobile:+44(0)7710 126618 email: [log in to unmask] <blocked::mailto:[log in to unmask]> Marketing Improvement Limited, Abbey House, Grenville Place, Bracknell, United Kingdom, RG12 1BP <blocked::http://www.marketingimprovement.com/> http://www.marketingimprovement.com Important: This mail contains proprietary information some or all of which may be legally privileged. It is for the intended recipient only. If an addressing or transmission error has misdirected this email, please notify the author by replying to this email. if you are not the intended recipient you must not use, disclose, distribute, copy, print or rely on this email. If you are not the named recipient please notify us immediately. This email and any attachment(s) are believed to be virus-free, but it is the responsibility of the recipient to make all the necessary virus checks. This email and any attachments to it are copyright of Marketing Improvement Limited unless otherwise stated. Their copying, transmission, reproduction in whole or in part may only be undertaken with the express permission, in writing, of Marketing Improvement Limited. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving message please send to the list owner [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving message please send to the list owner [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^