Well the interpretation I've provided was given to the BBA by legal counsel and although not considered to be best practice was reluctantly agreed with by the ICO. As for what is intelligible to one person or another how far do you go before you draw the line? -----Original Message----- From: Jethro R Binks [mailto:[log in to unmask]] Sent: Mon 31 July 2006 13:07 To: [log in to unmask] Subject: Re: [data-protection] That B4U enforcement notice On Mon, 31 Jul 2006, Lee Gardiner wrote: > Most banks will provide the raw data and copies of any codes their > systems use to allow you to identify what a particular transaction is. > Provision of these along with the raw data means that the information > has been provided in an 'intelligible form'. > > In essence it's up to the data controller to decide what constitutes > an 'intelligible form' and if they can do it without recreating > statements then they have met their s7 obligations. Anything over what > they consider 'intelligible' then falls outside of s7 and is open to > the data controller's charging structure. What use is the data controller's interpretation of 'intelligible'? If the Subject doesn't find the data as provided 'intelligible', how can the controller be said have fulfilled their obligations? What is intelligible to the controller is not necessarily intelligible to the recipient, and that's the person who wants to receive - and understand - data relating to themselves. Jethro. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jethro R Binks Computing Officer, IT Services University Of Strathclyde, Glasgow, UK ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving message please send to the list owner [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ********************************************************************** This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This footnote also confirms that this email message has been swept by MIMEsweeper for the presence of computer viruses using Sophos anti-virus software. www.mimesweeper.com www.sophos.com ********************************************************************** ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving message please send to the list owner [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^