I would suggest that there are issues around data protection, human rights
and reasonable expectation here.
My article also discusses the case of Peck v UK.
see www.actnow.org.uk
regards
Ibrahim Hasan
----- Original Message -----
From: "davidwyatt" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Tuesday, November 23, 2004 1:02 AM
Subject: Re: [data-protection] Use of photographs
> Observations
>
> If the the purpose that data was collected and advised was for security
> access ie a key access system then the used for directory services
(possibly
> staff admin?) is a different purpose. Given this new purpose the purpose
has
> to be both notified to data subject and I believe expressly consented to
> given the new purpose is different to that which the data subject was
> originally advised.
>
> The photo image would appear to be only one datum in the collection
required
> for the new directory use. I assume the name associated with the photo
image
> is also to be extracted and possibly a building location. This data
> presumably is to be matched with a seperate set of data already holding
> name and telephone number. A further consideration therefore in the light
of
> the accuracy principle is how are two 'John Smiths' in the same
organisation
> being matched without error?
>
> What does the addition of a photo acheive in a telephone directory?
Video
> phones of Netmeeting by Web Cams are not yet the norm. Is the matching
> undertaken just for the sake of justifying the existance of an IT
operation
> or does it serve a purpose justifying the costs of the compliance
overheads?
>
> David
>
> ----- Original Message -----
> From: "Anne-Marie Sizer" <[log in to unmask]>
> To: <[log in to unmask]>
> Sent: Monday, November 22, 2004 12:14 PM
> Subject: [data-protection] Use of photographs
>
>
> > Could someone advise me please on the use of staff photographs that we
> > currently hold on the security access system, for the purpose of the
> > intranet telephone directory.
> >
> > Has anyone had experience of this and what was the reaction to
requesting
> > permission from staff to use their photographs in this way?
> >
> > Many thanks.
> > [log in to unmask]
> >
> > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> > All archives of messages are stored permanently and are
> > available to the world wide web community at large at
> > http://www.jiscmail.ac.uk/lists/data-protection.html
> > If you wish to leave this list please send the command
> > leave data-protection to [log in to unmask]
> > All user commands can be found at : -
> > http://www.jiscmail.ac.uk/help/commandref.htm
> > (all commands go to [log in to unmask] not the list please)
> > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|