Ian If the subject is dead and the "action" period is between dead and confirmed dead, DPA does not apply to dead so I would not have thought so, just my opinion. Many thanks Trish Trish-louise Bailey Audit & Assurance (Information Governance) (IG covers: Data Protection & Privacy, FOI, Information Security, Information Sharing & Confidentiality, Information & Records Management, Information Quality & Assurance) Telford & Wrekin Council Civic Offices Coach Central Telford TF3 4HD www.telford.gov.uk em: [log in to unmask] or [log in to unmask] tel: 01952 382537 mb: 07528 969455 -----Original Message----- From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Ian Welton Sent: 06 July 2011 09:53 To: [log in to unmask] Subject: Hacking - application of the DPA Thinking about the apparently everyday and certainly scandalous actions coming to light creates what appears as a useful paradox to consider. If the DPA does not apply to the deceased, what happens in those cases where a data subject is not known to be dead… does the DPA apply to a data subjects personal data until some acceptable level of confirmation of death is received? Is any non-compliance with the DPA between when a data subject actually dies, and is confirmed to have died actionable under the DPA, or is any non-compliance, during that period of time not an actionable breach under the DPA but only indicative of non-complaint common processes across all the organizational areas having any responsibility for the data subjects data and hence actionable anyway. Ian W ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -------------------------------------------------------------------------------------------------------------------- This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the originator of the message. Any views expressed in this message are those of the individual sender, except where the sender specifies and with authority, states them to be the views of Telford & Wrekin Council. The content of this email has been automatically checked in conjunction with the relevant policies of Telford & Wrekin Council. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^