>The problems attempting to be addressed still remain... for instance
requests are received by a single organisation from:-
>
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>[log in to unmask]
>Would any of them be vexatious requests? How much time should be spent
>enquiring with the John Smiths involved to see if they were using their
>real names and if they were the same person?
Because all have different addresses it is probably reasonable to presume
they are all different individuals and therefore the presumption in
favour of disclosure would apply unless however all the actual information
requests in themselves were remarkably similar.
Alternatively if you received 9 requests from [log in to unmask] or
9 from [log in to unmask] then I think you would be justified in
taking a closer look at them. Of course that doesn't mean that you have
to do that but you may if you wish to do so.
rgds,
K
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving message please send to the list owner
[log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|