That deals with intellectual property rights in databases, which are distinct from actual property rights. That Datateam case is specifically about property rights in databases. See for summary the very last para:

http://www.bailii.org/ew/cases/EWCA/Civ/2014/281.html

Jon



On 20 Feb 2015, at 14:10, Paul Ticher <[log in to unmask]> wrote:

There is, however, the Copyright and Rights in Databases Regulations 1997 (amended 2003) which amends the Copyright, Designs and Patents Act 1988.  As I understand it, in some cases at least this would apply to personal data stored in a database.  Would that be relevant in any of the situations being described?
 
Best wishes,
 
Paul
 

Paul Ticher
0116 273 8191
www.paulticher.com
22 Stoughton Drive North, Leicester LE5 5UB
 
Need to know about Data Protection?  See my webinars at www.paulticher.com/webinarlist
 
 
----- Original Message -----
From: "Baines, Jonathan" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Friday, February 20, 2015 11:16 AM
Subject: Re: s55 "obtaining"

> Hi Catherine
>
> Lawrence has previously mentioned the Fairstar case - this is one in a line of cases which establish that there are no proprietary rights in information itself. See also Your Response Ltd v Datateam http://www.bristows.com/articles/your-response-v-datateam-court-of-appeal-refuses-to-treat-databases-as-property
>
> Jon
>
> -----Original Message-----
> From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Catherine Lantsbery
> Sent: 20 February 2015 10:17
> To: [log in to unmask]
> Subject: Re: [data-protection] s55 "obtaining"
>
> We are in a similar situation. An ex-employee has seperated from her husband in what is currently an acrimonious dispute. She has left a computer that contains sensitive information regarding clients. We are informed of this by the husband and we write back to him to ask for the return of the data. He is seeking to discredit his estranged wife and will not return or delete the data and further has threatened to release the information to the press.  He is effectively holding the data to ransom but there is very little recourse we have unless he does go ahead and pass this onto the press, in which case he will meet the criteria of section 55, i.e. knowingly disclosing without our consent as DC.
>
> (NB. There is a broader issue around the ex-employee's conduct whilst employed, not least breaching our information security policies, but those are unrelated to the current topic...)
>
> It's also another debate but I think there is also a fundamental issue about whether data is property. My opinion is that if the data can "belong" to someone (whether the owner is data subject or data controller), it has a value, in particular commercial/monetarty value, and it is a fundamental asset to an organisation, I think that data must be considered as property.  I also don't have enough knowldge around intellectual property law which I assumes could apply (?) but of course my opinion also holds no weight in legal terms so I'll have to wait until we get some more case law on this, which I am sure will happen as the importance of information as currency in an electronic/virtual world will only grow.
>
> Catherine Lantsbery
> Information Governance Manager
> Information Governance Unit - Staffordshire County Council
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>     All archives of messages are stored permanently and are
>      available to the world wide web community at large at
>      http://www.jiscmail.ac.uk/lists/data-protection.html
>     If you wish to leave this list please send the command
>       leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list owner
>              [log in to unmask]
>  Full help Desk - please email [log in to unmask] describing your needs
>        To receive these emails in HTML format send the command:
>         SET data-protection HTML to [log in to unmask]
>   (all commands go to [log in to unmask] not the list please)
>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> [http://www.buckscc.gov.uk/healthy-living/nhs-health-check]<http://www.buckscc.gov.uk/healthy-living/nhs-health-check>
>
> [Facebook]<https://www.facebook.com/pages/Our-Buckinghamshire/118283198190717>Like Us<https://www.facebook.com/pages/Our-Buckinghamshire/118283198190717> [Follow Us] <http://www.twitter.com/buckscc> Follow Us<http://www.twitter.com/buckscc> [Watch Us] <http://www.youtube.com/buckinghamshirecc> Watch Us<http://www.youtube.com/buckinghamshirecc>
>
>
> [LGC Awards Winner]<http://www.lgcawards.co.uk/home>[Investors In People]<http://www.investorsinpeople.co.uk/>
>
> Buckinghamshire County Council
>
> Visit our Web Site : http://www.buckscc.gov.uk<http://www.buckscc.gov.uk/>
>
> Buckinghamshire County Council Email Disclaimer
>
> This Email, and any attachments, may contain Protected or Restricted information and is intended solely for the individual to whom it is addressed. It may contain sensitive or protectively marked material and should be handled accordingly. If this Email has been misdirected, please notify the author or [log in to unmask]<mailto:[log in to unmask]> immediately. If you are not the intended recipient you must not disclose, distribute, copy, print or rely on any of the information contained in it or attached, and all copies must be deleted immediately. Whilst we take reasonable steps to try to identify any software viruses, any attachments to this Email may nevertheless contain viruses which our anti-virus software has failed to identify. You should therefore carry out your own anti-virus checks before opening any documents.
>
> Buckinghamshire County Council will not accept any liability for damage caused by computer viruses emanating from any attachment or other document supplied with this email.
>
> All GCSx traffic may be subject to recording and / or monitoring in accordance with relevant legislation.
>
> The views expressed in this email are not necessarily those of Buckinghamshire County Council unless explicitly stated.
>
> This footnote also confirms that this email has been swept for content and for the presence of computer viruses.
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>     All archives of messages are stored permanently and are
>      available to the world wide web community at large at
>      http://www.jiscmail.ac.uk/lists/data-protection.html
>     If you wish to leave this list please send the command
>       leave data-protection to [log in to unmask]
> All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving messages please send to the list owner
>              [log in to unmask]
>  Full help Desk - please email [log in to unmask] describing your needs
>        To receive these emails in HTML format send the command:
>         SET data-protection HTML to [log in to unmask]
>   (all commands go to [log in to unmask] not the list please)
>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
>
>

All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)