Print

Print


Ian

If the subject is dead and the "action" period is between dead and confirmed dead, DPA does not apply to dead so I would not have thought so, just my opinion.

Many thanks 
Trish 
Trish-louise Bailey
Audit & Assurance (Information Governance)
(IG covers:  Data Protection & Privacy, FOI, Information Security, Information Sharing & Confidentiality, Information & Records Management, Information Quality & Assurance) 
Telford & Wrekin Council 
Civic Offices
Coach Central
Telford 
TF3 4HD
www.telford.gov.uk 

em:   [log in to unmask] or [log in to unmask] 
tel:    01952 382537
mb:   07528 969455


-----Original Message-----
From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Ian Welton
Sent: 06 July 2011 09:53
To: [log in to unmask]
Subject: Hacking - application of the DPA

Thinking about the apparently everyday and certainly scandalous actions 
coming to light creates what appears as a useful paradox to consider.


If the DPA does not apply to the deceased, what happens in those cases 
where a data subject is not known to be dead… does the DPA apply to a 
data subjects personal data until some acceptable level of confirmation 
of death is received?

Is any non-compliance with the DPA between when 
a data subject actually dies, and is confirmed to have died actionable 
under the DPA, or is any non-compliance, during that period of time not 
an actionable breach under the DPA but only indicative of non-complaint 
common processes across all the organizational areas having any 
responsibility for the data subjects data and hence actionable anyway.


Ian W

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

--------------------------------------------------------------------------------------------------------------------
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom
they are addressed. If you have received this email in error 
please notify the originator of the message. 

Any views expressed in this message are those of the individual
sender, except where the sender specifies and with authority,
states them to be the views of Telford & Wrekin Council.

The content of this email has been automatically checked in 
conjunction with the relevant policies of Telford & Wrekin Council.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^