Print

Print


Thanks to all who replied – all will be taken on board.

 

Regards

 

Derek O'Connor

Rheolwr Llywodraethu Gwybodaeth / Information Governance Manager

Cyngor Bwrdeistef Sirol CONWY County Borough Council
E-Bost / E-Mail: [log in to unmask]

Ffon/Tel 01492 574016

 


 

 

From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Simon Howarth
Sent: 12 August 2015 14:56
To: [log in to unmask]
Subject: Re: [data-protection] Agile / Flexible Working

 

I agree with Tim. It has to be managed carefully and considerately. And I agree that Principle 7 could bite you.

 

Simon.

 

From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Tim Turner
Sent: 12 August 2015 11:26
To: [log in to unmask]
Subject: Re: [data-protection] Agile / Flexible Working

 

The best way to prevent the unnecessary spread of data is to limit access to it. By mixing staff from different disciplines in the same environment, the organisation loses the most obvious method of control. So what the organisation has to do is demonstrate what it has done instead - training, reminders, clear desk policies, places for staff to have confidential meetings and discussions, and proper supervision by management. Where any misuse of data is detected, there will have to be disciplinary proceedings. It isn’t that you can’t do agile / flexible working, just that the range of necessary measures is bigger and more complicated.

 

Tim Turner

 

On 12 August 2015 at 11:00:50, Derek O'Connor ([log in to unmask]) wrote:

Scenario - In a drive towards more agile/flexible working an organisation is planning to adopt an approach permitting any staff to work from any office environment within the organisation.

My take on this is that it cannot be a free for all and there needs to be some elements of commonality between the staff work roles within that work environment.

Although everyone is bound by confidentiality at work I think it would be wholly inappropriate for say a Highways Engineer to sit amongst Social Care staff where normal office work related (and client related) discussions/conversations take place.

Should a breach of data security occur I am of the opinion that the 7th principle will come crashing down as a very reasonable and easy way of preventing such a breach would have been not to have allowed/adopted such working practice in the first place.

Would welcome all views
Derek

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)



All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)


-----------------------------------------
Mae'r neges e-bost hon ac unrhyw ymgysylltiadau yn gyfrinachol, ac wedi eu bwriadu ar gyfer yr un sy'n cael ei h/enwi yn unig. Gallent gynnwys gwybodaeth freintiedig. Ar gyfer yr amodau llawn ynglŷn â chynnwys a defnyddio’r neges e-bost hon ac unrhyw atodiadau, gweler www.conwy.gov.uk/ebost_ymwadiad

This email and any attachments are confidential and intended for the named recipient only. The content may contain privileged information. For full conditions in relation to content and use of this e-mail message and any attachments, please refer to www.conwy.gov.uk/email_disclaimer

All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)