>The problems attempting to be addressed still remain... for instance requests are received by a single organisation from:- > >[log in to unmask] >[log in to unmask] >[log in to unmask] >[log in to unmask] >[log in to unmask] >[log in to unmask] >[log in to unmask] >[log in to unmask] >[log in to unmask] >Would any of them be vexatious requests? How much time should be spent >enquiring with the John Smiths involved to see if they were using their >real names and if they were the same person? Because all have different addresses it is probably reasonable to presume they are all different individuals and therefore the presumption in favour of disclosure would apply unless however all the actual information requests in themselves were remarkably similar. Alternatively if you received 9 requests from [log in to unmask] or 9 from [log in to unmask] then I think you would be justified in taking a closer look at them. Of course that doesn't mean that you have to do that but you may if you wish to do so. rgds, K ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at : - http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving message please send to the list owner [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^