Print

Print


>The problems attempting to be addressed still remain... for instance 
requests are received by a single organisation from:-
>
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]

>Would any of them be vexatious requests? How much time should be spent
>enquiring with the John Smiths involved to see if they were using their 
>real names and if they were the same person?

Because all have different addresses it is probably reasonable to presume 
they are  all different individuals and therefore the presumption in 
favour of disclosure would apply unless however all the actual information 
requests in themselves were remarkably similar.  

Alternatively  if you received 9 requests from [log in to unmask] or 
9 from [log in to unmask] then I think you would be justified in 
taking a closer look at them.  Of course that doesn't mean that you have 
to do that but you may if you wish to do so.

rgds,

K

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
       All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
      If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
            All user commands can be found at : -
        http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
              [log in to unmask]
  (all commands go to [log in to unmask] not the list please)
   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^