Print

Print


Yes, I'd agree with that, Phil.

Reductio ad absurdum: the supplier arguments below would make Microsoft a controller in some part for any personal data entered into an Excel spreadsheet. Particularly if it's on Office365, and you therefore have to sign in to access it.

Regards,
Peter


Peter Dinsdale
Data Protection Consultant

Perfect Image /
T: 0191 238 0111
www.perfect-image.co.uk

Follow us on Twitter http://twitter.com/perfectimage

-----Original Message-----
From: This list is for those interested in Data Protection issues <[log in to unmask]> On Behalf Of Phil Bradshaw
Sent: 10 August 2018 11:21
To: [log in to unmask]
Subject: Re: [data-protection] Friday question - logon details...

I agree with Peter and Charlene.

However in not dissimilar situations I have been faced with suppliers who are adamant, even before the Facebook fan page judgement,  that they are it least in part, but not for all purposes (see Art 26(1) ) a controller.

Argument along the lines:

Supplier is likely to be categorised as a controller along with client at least in some elements of the application The rationale for this view is based on the following:
a.supplier has  developed the application in particular choosing how the app operates in relation to collection and  processing of [login] personal data;
b.Supplier therefore exercises a material degree of control over deciding what personal data is collected ; and
c.Supplier has autonomy in relation to the manner in which such personal data is collected and processed through the app, how long such data is stored for, who generally has access to it and how that data is presented.
d.   So while supplier could argued to be merely providing a tool, supplier independently determined how the data collection takes place and is taking a more active role than simply following the instructions of client.

My view = all irrelevant. Client free CHOICE to procure and use that tool breaks any such link.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask] All user commands can be found at https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

______________________________________________________________________
This email has been scanned by the Symantec Email Security.cloud service.
For more information please visit http://www.symanteccloud.com ______________________________________________________________________

________________________________

Save paper, please think twice before printing this email.

Equinox House | Cobalt 3.2 | Cobalt Business Park | Silver Fox Way | North Tyneside | Newcastle upon Tyne | NE27 0QJ
T. 0191 238 0111 | F. 0191 238 0127 | Service Desk Direct Line. 0191 238 0121
Perfect Image Ltd. Registered in England & Wales. Company Registration Number: 2650067
Registered Office: Equinox House, Cobalt 3.2, Cobalt Business Park, Silver Fox Way, North Tyneside, Newcastle upon Tyne, NE27 0QJ

This e-mail is confidential and intended solely for the use of the individual to whom it is addressed. Any views or opinions presented are solely those of the author and do not represent those of Perfect Image Ltd. If you are not the intended recipient, please notify us at [log in to unmask] and be advised that you have received this mail in error and that any use, dissemination, forwarding, printing or copying of this e-mail is strictly prohibited.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^