Print

Print


Last night I met by phone someone who has had a database of 100,000 individuals stolen by a competitor.  The competitor is using that data.  I know they are because they cold called me and even arrived at my door!

I chatted to the victim and he said that the Information Commissioner's help line had said he could report it by all means but that their caseload was such that it would only get a cursory glance.  Obviously I have only got one side of the conversation.

but it seems to me that so much of the DPA has been broken here that it is in the public interest to investigate it properly.

The police are involved, after some persuasion, and are investigating the Computer Misuse Act, but the victim suspects that a caution is the only likely outcome for the thief.  And he thinks that those who acquired the data will get away scot free.

I'd be interested in the list's thoughts on this on.

As an individual whose data has been compromised I have made a formal UKIC complaint.  Cold caller has both broken PECR by calling a TPS registered number, and the DPA in many ways including ~gasp~ lack of notification.

Of course, now that they auto acknowledge properly, that system has failed entirely and I have heard nothing back, even from an automated system.
--

Tim Trent - Consultant
Tel: +44 (0)7710 126618
web: ComplianceAndPrivacy.com - where busy executives go to find the news first
personal blog: timtrent.blogspot.com/ - news, views, and opinions
personal website: Tim's Personal Website - more than anyone needs to know

Marketing by Permission

Important: This message is private and confidential. If you have received this message in error, please notify us and remove it from your system. This email and any attachment(s) are believed to be virus-free, but it is the responsibility of the recipient to make all the necessary virus checks. This email and any attachments to it are copyright of Meadowood Associates, owners of Compliance And Privacy, unless otherwise stated. Their copying, transmission, reproduction in whole or in part may only be undertaken with the express permission, in writing, of Meadowood Associates, at Meadowood House, 30 Redditch, Bracknell, Berkshire, RG12 0TT.


All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)