Michael,
Not quite sure what your question is here. Are you asking what is the Sch2/3
condition? If so, can you not rely on the SI which permits the processing of
sensitive personal data for research purposes as it is in the substantial
public interest?
Secondly, Police Forces are getting up to speed with DP contracts in this
area. They are specifying very stringent security and confidentiality
requirements, although the one I am currently looking through doesn't
mention the use of encryption techniques.
My view is that I very much prefer that the data controller supplies the
data as de-personalised as possible. I would restrict any use of 'anonymous'
to those situations where an individual cannot be identified.
Mike
> From: Michael Doherty <[log in to unmask]>
> Reply-To: Michael Doherty <[log in to unmask]>
> Date: Mon, 31 Oct 2005 12:22:45 +0000
> To: <[log in to unmask]>
> Subject: Academic Research - Police Held Information
>
> Afternoon All,
>
> Police Forces hold lots of personal data including sensitive personal data
> regarding crimes. Researchers often want to use it. Usually de-personalised
> data is sufficient.
>
> A situation has arisen where the researcher is adamant that although
> anonymity, in the sense that no name detail is needed, exact locations,
> time, date, and category of offence are needed for the research. The
> research is for academic purposes (to improve investigations in the future)
> and is not intended for the investigation of the offences themselves. The
> value of the research and the necessity for detail are not in question.
>
> The information, if disclosed, will include domestic violence and sexual
> offences (amongst other less sensational stuff): quite clearly in the hands
> of the data controller the information is sufficient when combined with
> other information to identify the victim.
>
> I am satisfied that the research will be overall DPA compliant - except so
> far as subject information provisions are concerned. No victim has been
> informed their data will be used for research. No work has started.
>
> Disproportionate effort is being cited on the grounds of the vast numbers
> concerned. I'm not convinced and following the 2001 incident in the West
> country; I will take a lot of convincing.
>
> As this is an academic mailing list and I've got an academic's problem,
> perhaps an academic answer would help me!
> Regards,
>
> Michael Doherty
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> All archives of messages are stored permanently and are
> available to the world wide web community at large at
> http://www.jiscmail.ac.uk/lists/data-protection.html
> If you wish to leave this list please send the command
> leave data-protection to [log in to unmask]
> All user commands can be found at : -
> http://www.jiscmail.ac.uk/help/commandref.htm
> Any queries about sending or receiving message please send to the list owner
> [log in to unmask]
> (all commands go to [log in to unmask] not the list please)
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|