Print

Print


"This being based on the fact that
the infrastructure has changed and is no-longer processing the data in
question as if it was then it would be retrievable."

Agreed - but only if , as suggested in my previous post, you can successfully argue that it is not held, since simply holding it is processing for DPA purpose, and if it is still held it is held in response to the original instructions to place it on the server !


-----Original Message-----
From: This list is for those interested in Data Protection issues on behalf of Carroll James (South of Tyne and Wear)
Sent: Fri 29/07/2011 15:35
To: [log in to unmask]
Subject: Re: [data-protection] DPA if you hold but cannot retrieve it - then what?
 
Point accepted. In that case could you argue that it no longer meets
requirement 1(a) as it is no-longer being processed "...in response to
instructions given for that purpose." This being based on the fact that
the infrastructure has changed and is no-longer processing the data in
question as if it was then it would be retrievable. As such it no-longer
falls under the definition of 'data'.

James 
 
-----Original Message-----
From: Bradshaw, Phillip [mailto:[log in to unmask]] 
Sent: 29 July 2011 15:19
To: Carroll James (South of Tyne and Wear);
[log in to unmask]
Subject: RE: [data-protection] DPA if you hold but cannot retrieve it -
then what?

"I think you could possibly argue that the information is no-longer held
within a relevant filing system, in that it is no-longer "...structured,
either by reference to individuals or by reference to criteria relating
to individuals, in such a way that specific information relating to a
particular individual is readily accessible."

Except of course that the concept of a relevant filing structure is
irrelevant for data held electronically.

The concept of the information no longer being held is certainly not to
be ignored. Why is it still there at all ? Was there a firm intention to
dispose of it ? 

Eszias is also certainly relevant. As pointed out it was not based on
s8(2) but on the more general notion that the obligation under s7 is "to
take reasonable and proportionate steps to identify and disclose the
information he is bound to disclose" - para 93 of the judgement. The
questions in my previous paragraph are I suggest relevant is deciding
what is reasonable and proportionate, as well as the nature and
significance of the data, why it was held in the first place, what the
normal retention period would have been, and of course the cost. i.e.
all the circumsatnces.


-----Original Message-----
From: This list is for those interested in Data Protection issues on
behalf of Carroll James (South of Tyne and Wear)
Sent: Fri 29/07/2011 14:53
To: [log in to unmask]
Subject: Re: [data-protection] DPA if you hold but cannot retrieve it -
then what?
 
I think you could possibly argue that the information is no-longer held
within a relevant filing system, in that it is no-longer "...structured,
either by reference to individuals or by reference to criteria relating
to individuals, in such a way that specific information relating to a
particular individual is readily accessible."

 

James 

 

________________________________

From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Bailey, Trish
Sent: 29 July 2011 14:23
To: [log in to unmask]
Subject: [data-protection] DPA if you hold but cannot retrieve it - then
what?

 

All

 

I have been asked by a colleague - hypothetical situation.

 

If you have  Personal information that has been requested under DPA and
of which is stored on a server, however you have implemented a different
infrastructure since so therefore accessing this "information" would
require the "rebuild" of the previous infrastructure to access and
retrieve.  Under the definition of DPA is it reasonable to quote -
"because of the change to hardware/software we are unable to access this
information so therefore this is deemed disproportionate".

 

Q:  Do organisations have a legal requirement under DPA to fulfil the
request (absorb the cost and rebuild to access it), because the
organisation failed to destroy the information initially when the new
infrastructure was implemented? 

 

 

Many thanks 

Trish 

Trish-louise Bailey

Audit & Assurance (Information Governance)

(IG covers:  Data Protection & Privacy, FOI, Information Security,
Information Sharing & Confidentiality, Information & Records Management,
Information Quality & Assurance) 

Telford & Wrekin Council 

Civic Offices

Coach Central

Telford 

TF3 4HD

www.telford.gov.uk 

 

em:   [log in to unmask] or [log in to unmask] 

tel:    01952 382537

mb:   07528 969455

 

 

------------------------------------------------------------------------
--------------------------------------------
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom
they are addressed. If you have received this email in error 
please notify the originator of the message. 

Any views expressed in this message are those of the individual
sender, except where the sender specifies and with authority,
states them to be the views of Telford & Wrekin Council.

The content of this email has been automatically checked in 
conjunction with the relevant policies of Telford & Wrekin Council.

 

________________________________

All archives of messages are stored permanently and are available to the
world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of
the email if you are receiving emails in HTML format):

*	Leaving this list: send leave data-protection to
[log in to unmask] <mailto:[log in to unmask]&BODY=LEAVE
data-protection> 
*	Suspending emails from all JISCMail lists: send SET * NOMAIL to
[log in to unmask] <mailto:[log in to unmask]&BODY=SET *
NOMAIL> 
*	To receive emails from this list in text format: send SET
data-protection NOHTML to [log in to unmask]
<mailto:[log in to unmask]&BODY=SET data-protection NOHTML> 
*	To receive emails from this list in HTML format: send SET
data-protection HTML to [log in to unmask]
<mailto:[log in to unmask]&BODY=SET data-protection HTML> 

All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body
of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list
owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the
moderators, and all requests for technical help to
[log in to unmask], the general office helpline)

________________________________


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at
http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list
owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your
needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


**********************************************************************
Privileged/Confidential Information may be contained in this message. If you are not the addressee indicated in this message (or responsible for delivery of the message to such person), you may not copy or deliver this message to anyone. In such case, you should destroy this message and kindly notify the sender by reply email. Please advise immediately if you or your employer does not consent to Internet email for messages of this kind.  Opinions, conclusions and other information in this message that do not relate to the official business of the Council of the City and County of Cardiff shall be understood as neither given nor endorsed by it.  All e-mail sent to or from this address will be processed by Cardiff County Councils Corporate E-mail system and may be subject to scrutiny by someone other than the addressee.
**********************************************************************
Mae'n bosibl bod gwybodaeth gyfrinachol yn y neges hon. Os na chyfeirir y neges atoch chi'n benodol (neu os nad ydych chi'n gyfrifol am drosglwyddo'r neges i'r person a enwir), yna ni chewch gopio na throsglwyddo'r neges. Mewn achos o'r fath, dylech ddinistrio'r neges a hysbysu'r anfonwr drwy e-bost ar unwaith. Rhowch wybod i'r anfonydd ar unwaith os nad ydych chi neu eich cyflogydd yn caniatau e-bost y Rhyngrwyd am negeseuon fel hon. Rhaid deall nad yw'r safbwyntiau, y casgliadau a'r wybodaeth arall yn y neges hon nad ydynt yn cyfeirio at fusnes swyddogol Cyngor Dinas a Sir Caerdydd yn cynrychioli barn y Cyngor Sir nad yn cael sel ei fendith. Caiff unrhyw negeseuon a anfonir at, neu o'r cyfeiriad e-bost hwn eu prosesu gan system E-bost Gorfforaethol Cyngor Sir Caerdydd a gallant gael eu harchwilio gan rywun heblaw'r person a enwir.
**********************************************************************


-- 
Scanned by iCritical.


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^