On Thu, 19 Oct 2006, Roland Perry wrote:
> In message <[log in to unmask]>, at 09:17:53 on Thu,
> 19 Oct 2006, Jethro R Binks <[log in to unmask]> writes
> >
> > I'm afraid I still do not understand. Or rather, I think understand
> > what you are saying, but I do not see how without corroborative
> > information you can know which Chief Executive was being referred to
> > in an undated document quoting
> > [log in to unmask]
>
> emails are not "undated documents".
No, but undated documents featuring email addresses and maybe discussing
the address owners are, surprisingly enough, "undated documents", which is
the point I was making.
Jethro.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Jethro R Binks
Computing Officer, IT Services
University Of Strathclyde, Glasgow, UK
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|