Print

Print


In message <004901c787df$0cef3ad0$0200a8c0@PaulWork>, at 09:44:06 on 
Thu, 26 Apr 2007, Paul Ticher <[log in to unmask]> writes
>Surely you couldn't successfully prosecute individuals for being 
>reckless if they were following their organisation's procedures (or 
>even doing their best in the absence of procedures).

But if the procedures said you weren't to do a reasonable level of 
authentication, would the "I'm only following orders" defence apply?

And what about the responsibility of those who wrote the procedures?

(I'm in devil's advocate mode here, of course).
-- 
Roland Perry

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^