Print

Print


I would echo Phil's points on this as they are borne out by the recent tribunal decision on Cardiff City Council. There the council could not show a pattern of behaviour from the applicant and their attempt to use s14 failed. They compounded this failure by appealing to the tribunal but that is a different issue.

My experience has been to set the parameters for the applicant by explaining when and how their behaviour has begun to fit into the s.14 categories. Often times the applicant is unaware of the impact or effect and will modulate or moderate their behaviour.

If something has been going on for years, it is never too late to make a change. However, it requires time to change the pattern as Phil points out.

A further way to manage the applicant might be to create a single point of contact (SPOC) for them and indicate that all contact on the issue(s) has to go through that person. This gives you the ability to limit the effect on teams and it gives you a basis for negotiating behaviour with the applicant.

Best,

Lawrence


-----Original Message-----
From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Phil Bradshaw
Sent: 13 May 2015 15:27
To: [log in to unmask]
Subject: Re: Information sharing

Whatever else you do you need to have a proper review & assessment of the material you hold before handing anything over. Whilst I do not disagree with Michelle in principle you cannot simply abdicate responsibility for reasonable and proprotionate assessment as that is part of the 'necessity' test.

Harassment offence includes a specific mens rea "which he knows or ought to know amounts to harassment of the other" - tepered of course by s1(2). Have you for instance ever thought it necessary to warn Mr X that if he persists he might be reported for an offence ?  Have you ever used the word harrassment in communications with him ? Have you ever treated an FOI request as vexatious or given notice under s17(6) FOIA? Has the LGA ever warned him or criticised his conduct. Has he been subject to a formal vexatious complainant procedure (if you have one)?

If you have been playing his game by his rules without comment for years he might have cause for further complaint if you suddenly, without warning,  hand it all over to the constabulary.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask] All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

________________________________


Help protect our environment by only printing this email if absolutely necessary. The information it contains and any files transmitted with it are confidential and are only intended for the person or organisation to whom it is addressed. It may be unlawful for you to use, share or copy the information, if you are not authorised to do so. If you receive this email by mistake, please inform the person who sent it at the above address and then delete the email from your system. Durham County Council takes reasonable precautions to ensure that its emails are virus free. However, we do not accept responsibility for any losses incurred as a result of viruses we might transmit and recommend that you should use your own virus checking procedures.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^