In a message dated 17/10/2002 15:15:47 GMT Daylight Time,
[log in to unmask] writes:
<< We have CCTV in many of our student PC rooms and I would prefer to be able
to use the images not only for the "usual" purposes of "personal safety and
the prevention and detection of crime" but ALSO for "ensuring compliance with
regulations".
I'm sure there are other areas in University life but I find that
irresponsible use of IT pushes at many boundaries. >>
----------------
Well said. The irresponsible use of CCTV (information technology after all)
is spreading and needs to be stopped. It is a breach of human rights as well
as rights under the DPA.
Remember the guidance on CCTV? Establish a legitimate need, consider the
privacy of the individual, proportionality, etc.
Cameras have already been found in toilets and changing rooms (including
schools' changing rooms), staff rooms, offices, and so on. They are already
used for a number of purposes beyond crime detection and prevention -
including checking staff arrival/leaving times for compliance with a
"trust-based" flexitime scheme.
Obviously not all CCTV operators are breaching the law but many are sailing
very close to the wind.
Ian B (currently drinking a coke but I am more responsible than most
students, honest)
Ian Buckland
Managing Director
Keep IT Legal Ltd
Please Note: The information contained in this document does not replace or
negate the need for proper legal advice and/or representation. It is
essential that you do not rely upon any advice given without contacting your
solicitor. If you need further explanation of any points raised please
contact Keep I.T. Legal Ltd at the address below:
55 Curbar Curve
Inkersall, Chesterfield
Derbyshire S43 3HP
(Reg 3822335)
Tel: 01246 473999
Fax: 01246 470742
E-mail: [log in to unmask]
Website: www.keepitlegal.co.uk
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|