Matthew
I haven't come across this specific argument but have seen a similar
argument in relation to computer records as evidence where the system
manager is asked to make a statement concerning the integrity of system. As
we know electonic information can be corrupted in many ways some accidental
and some malicious, one reason why we have a data protection to set some
processing standards.
David Wyatt
----- Original Message -----
From: "Matthew Nunn" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Thursday, December 12, 2002 11:05 AM
Subject: [data-protection] CCTV
> We've had a theft outside one of our halls of residence. The culprits were
> caught on the CCTV cameras.
>
> The police have informed us that that the footage is useless as it does
not
> show their facial features, which is fair enough.
>
> However, the policeman involved also informed us that even if the footage
> was able to be used, it could still be thrown out of court as the
> solicitor/barrister could argue that the tape has been tampered with, as
we
> do not keep a log book detailing who has changed/viewed
> or handled the tape. Is this correct?
>
> Can anyone verify that such a log is required?
>
> Would it be enough if we were able to prove the date of recording? Is it
> possible to prove that a tape is genuine?
>
> I appreciate that the police are probably not too interested in taking
this
> further for 2 bikes.
>
> However, has anyone got any good advice on use of CCTV in prosecuting
> offenders?
>
> Thanks,
>
> Matthew Nunn
> Southampton Institute
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
www.jiscmail.ac.uk/user-manual/summary-user-commands.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|