"This being based on the fact that the infrastructure has changed and is no-longer processing the data in question as if it was then it would be retrievable." Agreed - but only if , as suggested in my previous post, you can successfully argue that it is not held, since simply holding it is processing for DPA purpose, and if it is still held it is held in response to the original instructions to place it on the server ! -----Original Message----- From: This list is for those interested in Data Protection issues on behalf of Carroll James (South of Tyne and Wear) Sent: Fri 29/07/2011 15:35 To: [log in to unmask] Subject: Re: [data-protection] DPA if you hold but cannot retrieve it - then what? Point accepted. In that case could you argue that it no longer meets requirement 1(a) as it is no-longer being processed "...in response to instructions given for that purpose." This being based on the fact that the infrastructure has changed and is no-longer processing the data in question as if it was then it would be retrievable. As such it no-longer falls under the definition of 'data'. James -----Original Message----- From: Bradshaw, Phillip [mailto:[log in to unmask]] Sent: 29 July 2011 15:19 To: Carroll James (South of Tyne and Wear); [log in to unmask] Subject: RE: [data-protection] DPA if you hold but cannot retrieve it - then what? "I think you could possibly argue that the information is no-longer held within a relevant filing system, in that it is no-longer "...structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular individual is readily accessible." Except of course that the concept of a relevant filing structure is irrelevant for data held electronically. The concept of the information no longer being held is certainly not to be ignored. Why is it still there at all ? Was there a firm intention to dispose of it ? Eszias is also certainly relevant. As pointed out it was not based on s8(2) but on the more general notion that the obligation under s7 is "to take reasonable and proportionate steps to identify and disclose the information he is bound to disclose" - para 93 of the judgement. The questions in my previous paragraph are I suggest relevant is deciding what is reasonable and proportionate, as well as the nature and significance of the data, why it was held in the first place, what the normal retention period would have been, and of course the cost. i.e. all the circumsatnces. -----Original Message----- From: This list is for those interested in Data Protection issues on behalf of Carroll James (South of Tyne and Wear) Sent: Fri 29/07/2011 14:53 To: [log in to unmask] Subject: Re: [data-protection] DPA if you hold but cannot retrieve it - then what? I think you could possibly argue that the information is no-longer held within a relevant filing system, in that it is no-longer "...structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular individual is readily accessible." James ________________________________ From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Bailey, Trish Sent: 29 July 2011 14:23 To: [log in to unmask] Subject: [data-protection] DPA if you hold but cannot retrieve it - then what? All I have been asked by a colleague - hypothetical situation. If you have Personal information that has been requested under DPA and of which is stored on a server, however you have implemented a different infrastructure since so therefore accessing this "information" would require the "rebuild" of the previous infrastructure to access and retrieve. Under the definition of DPA is it reasonable to quote - "because of the change to hardware/software we are unable to access this information so therefore this is deemed disproportionate". Q: Do organisations have a legal requirement under DPA to fulfil the request (absorb the cost and rebuild to access it), because the organisation failed to destroy the information initially when the new infrastructure was implemented? Many thanks Trish Trish-louise Bailey Audit & Assurance (Information Governance) (IG covers: Data Protection & Privacy, FOI, Information Security, Information Sharing & Confidentiality, Information & Records Management, Information Quality & Assurance) Telford & Wrekin Council Civic Offices Coach Central Telford TF3 4HD www.telford.gov.uk em: [log in to unmask] or [log in to unmask] tel: 01952 382537 mb: 07528 969455 ------------------------------------------------------------------------ -------------------------------------------- This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the originator of the message. Any views expressed in this message are those of the individual sender, except where the sender specifies and with authority, states them to be the views of Telford & Wrekin Council. The content of this email has been automatically checked in conjunction with the relevant policies of Telford & Wrekin Council. ________________________________ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format): * Leaving this list: send leave data-protection to [log in to unmask] <mailto:[log in to unmask]&BODY=LEAVE data-protection> * Suspending emails from all JISCMail lists: send SET * NOMAIL to [log in to unmask] <mailto:[log in to unmask]&BODY=SET * NOMAIL> * To receive emails from this list in text format: send SET data-protection NOHTML to [log in to unmask] <mailto:[log in to unmask]&BODY=SET data-protection NOHTML> * To receive emails from this list in HTML format: send SET data-protection HTML to [log in to unmask] <mailto:[log in to unmask]&BODY=SET data-protection HTML> All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask] Any queries about sending or receiving messages please send to the list owner [log in to unmask] (Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline) ________________________________ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ********************************************************************** Privileged/Confidential Information may be contained in this message. If you are not the addressee indicated in this message (or responsible for delivery of the message to such person), you may not copy or deliver this message to anyone. In such case, you should destroy this message and kindly notify the sender by reply email. Please advise immediately if you or your employer does not consent to Internet email for messages of this kind. Opinions, conclusions and other information in this message that do not relate to the official business of the Council of the City and County of Cardiff shall be understood as neither given nor endorsed by it. All e-mail sent to or from this address will be processed by Cardiff County Councils Corporate E-mail system and may be subject to scrutiny by someone other than the addressee. ********************************************************************** Mae'n bosibl bod gwybodaeth gyfrinachol yn y neges hon. Os na chyfeirir y neges atoch chi'n benodol (neu os nad ydych chi'n gyfrifol am drosglwyddo'r neges i'r person a enwir), yna ni chewch gopio na throsglwyddo'r neges. Mewn achos o'r fath, dylech ddinistrio'r neges a hysbysu'r anfonwr drwy e-bost ar unwaith. Rhowch wybod i'r anfonydd ar unwaith os nad ydych chi neu eich cyflogydd yn caniatau e-bost y Rhyngrwyd am negeseuon fel hon. Rhaid deall nad yw'r safbwyntiau, y casgliadau a'r wybodaeth arall yn y neges hon nad ydynt yn cyfeirio at fusnes swyddogol Cyngor Dinas a Sir Caerdydd yn cynrychioli barn y Cyngor Sir nad yn cael sel ei fendith. Caiff unrhyw negeseuon a anfonir at, neu o'r cyfeiriad e-bost hwn eu prosesu gan system E-bost Gorfforaethol Cyngor Sir Caerdydd a gallant gael eu harchwilio gan rywun heblaw'r person a enwir. ********************************************************************** -- Scanned by iCritical. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html If you wish to leave this list please send the command leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm Any queries about sending or receiving messages please send to the list owner [log in to unmask] Full help Desk - please email [log in to unmask] describing your needs To receive these emails in HTML format send the command: SET data-protection HTML to [log in to unmask] (all commands go to [log in to unmask] not the list please) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^