Print

Print


Well the interpretation I've provided was given to the BBA by legal counsel
and although not considered to be best practice was reluctantly agreed with
by the ICO.

As for what is intelligible to one person or another how far do you go
before you draw the line? 

-----Original Message-----
From: Jethro R Binks [mailto:[log in to unmask]] 
Sent: Mon 31 July 2006 13:07
To: [log in to unmask]
Subject: Re: [data-protection] That B4U enforcement notice

On Mon, 31 Jul 2006, Lee Gardiner wrote:

> Most banks will provide the raw data and copies of any codes their 
> systems use to allow you to identify what a particular transaction is.
> Provision of these along with the raw data means that the information 
> has been provided in an 'intelligible form'.
> 
> In essence it's up to the data controller to decide what constitutes 
> an 'intelligible form' and if they can do it without recreating 
> statements then they have met their s7 obligations. Anything over what 
> they consider 'intelligible' then falls outside of s7 and is open to 
> the data controller's charging structure.

What use is the data controller's interpretation of 'intelligible'?  If the
Subject doesn't find the data as provided 'intelligible', how can the
controller be said have fulfilled their obligations?

What is intelligible to the controller is not necessarily intelligible to
the recipient, and that's the person who wants to receive - and understand
- data relating to themselves.

Jethro.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jethro R Binks
Computing Officer, IT Services
University Of Strathclyde, Glasgow, UK

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
              [log in to unmask]
  (all commands go to [log in to unmask] not the list please)
   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.

This footnote also confirms that this email message has been swept by
MIMEsweeper for the presence of computer viruses using Sophos 
anti-virus software.

www.mimesweeper.com
www.sophos.com
**********************************************************************

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
              [log in to unmask]
  (all commands go to [log in to unmask] not the list please)
   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^