Print

Print


Message
Hi Phi
 
Any ideas as to a possible publshing date for this CoP?
 
Regards
Sara
-----Original Message-----
From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Phil Bradshaw
Sent: 14 November 2012 14:32
To: [log in to unmask]
Subject: Re: [data-protection] Disproportionate effort - a challenge to the ICO's view of Section 8(2)?

Indeed.

ICO is about to issue a draft stautory Code of Practice on SAR's. Will be interesting to see how he deals with the Eliot / Ezsias cases, and also what his view on the purpose of an SAR is.

 

----- Original Message -----

From: Baines, Jonathan

Sent: 11/14/12 12:55 PM

To: [log in to unmask]

Subject: Re: [data-protection] Disproportionate effort - a challenge to the ICO's view of Section 8(2)?


 
11KBW's Panopticon blog has a detailed post on this 



http://www.panopticonblog.com/2012/04/25/subject-access-requests-–-mixed-motives-and-proportionate-searches/ 



I agree it tends to contradict the ICO's position. As the blog says, whether the ICO will alter that position in light of it remains to be seen. 



Jonathan 





All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)


_______________________________________________________________________________________________________________

This e-mail and any files transmitted with it are confidential. If you are not the intended recipient, any reading, printing, storage, disclosure, copying or any other action taken in respect of this e-mail is prohibited and may be unlawful. If you are not the intended recipient, please notify the sender immediately by using the reply function and then permanently delete what you have received.

Incoming and outgoing e-mail messages are routinely monitored for compliance with Leicestershire County Council's policy on the use of electronic communications. The contents of e-mails may have to be disclosed to a request under the Data Protection Act 1998 and the Freedom of Information Act 2000.

The views expressed by the author may not necessarily reflect the views or policies of the Leicestershire County Council.

Attachments to e-mail messages may contain viruses that may damage your system. Whilst Leicestershire County Council has taken every reasonable precaution to minimise this risk, we cannot accept any liability for any damage which you sustain as a result of these factors. You are advised to carry out your own virus checks before opening any attachment.


All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)