Print

Print


Hello Paul

 

By saying put in a ‘legitimate request’ you are gaining the grounds for fishing out the information in the first place.  Otherwise you are carrying out a piece of work potentially of no value to the requester and definitely of no value to the University and such work would be detrimental (albeit in only a small way) to the working of the University.

 

He/she is a repeat requester they should know the form by now.

 

Kind regards

 

Phil

 

Phil Oakman

 

Data Protection Officer

University of Northampton

Boughton Green Road

Northampton

NN2 7AL

 

 

 

From: This list is for those interested in Data Protection issues [mailto:[log in to unmask]] On Behalf Of Starkey, Paul R.
Sent: 10 November 2017 10:32
To: [log in to unmask]
Subject: [data-protection] DSAR question

 

Hi, this is a bit of a strange question and I might be overthinking this, but I’ve got a data subject, who’s made multiple DSARs before, now asking if I can confirm whether some recent documents exist so they can make a DSAR for them if they do. On the one hand this seems perfectly reasonable but it also smacks a little of making a DSAR by a roundabout route to get a quick answer and avoid paying (and where people make an SAR and we don’t have the data we tend to refund the £10 anyway). Just wondering what people would do in this situation, be helpful (but have the risk of answering outside of the legislative framework) or stick to a  jobsworth approach of ‘if you want to know what we hold make a DSAR”?

 

Regards

 

Paul Starkey
Senior Information Assurance Officer

 

Information Assurance Services,
University of Leicester, University Road, Leicester, LE1 7RH, UK

 

t: +44 (0)116 229 7945
e:  [log in to unmask] 
w: www.le.ac.uk

Follow us on Twitter or visit our Facebook page

 

 


All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)


University of Northampton: Transforming Lives and Inspiring Change www.northampton.ac.uk This e-mail is private and may be confidential and is for the intended recipient only. If you are not the intended recipient you are strictly prohibited from using, printing, copying, distributing or disseminating this e-mail or any information contained in it. We virus scan all E-mails leaving The University of Northampton but no warranty is given that this E-mail and any attachments are virus free. You should undertake your own virus checking. The right to monitor E-mail communications through our networks is reserved by us.

All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)