In message <[log in to unmask]>, at 11:00:53 on Tue, 8 Jan
2008, Roland Perry <[log in to unmask]> writes
>The charity may have some traffic data to help identify the perpetrator
>if the DD was filled in online (and if they log and keep such stuff of
>course).
Although I could also point out that translating that information into a
suspect's name and address will also require the co-operation (via RIPA)
of at least one ISP somewhere, and it could end up being traced
somewhere that isn't "helpful", like a free wifi point.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|