JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for DATA-PROTECTION Archives


DATA-PROTECTION Archives

DATA-PROTECTION Archives


data-protection@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

DATA-PROTECTION Home

DATA-PROTECTION Home

DATA-PROTECTION  August 2011

DATA-PROTECTION August 2011

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: IT Back-ups and Personal Data

From:

Ben Plouviez <[log in to unmask]>

Reply-To:

[log in to unmask]

Date:

Thu, 4 Aug 2011 15:26:41 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (546 lines)

I think there is a difference, because of the difference between
"holding" and "processing".  FOI is about the records you have of what
happened, and if you have deleted or intended to delete that record then
there is a limit to the usefulness of expensively reconstructing it
(although ICO clearly reserves the right to decree that it must be done
in specific cases). But holding personal information is about what you
could or might do with respect to that person in the future - and so
long as the information is processed in your systems, even if obscurely,
that possibility continues to exist.

Not a legal definition - IANAL - but my instinct for the difference in
approach between the regimes.

Ben


-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Andrew Cormack
Sent: 04 August 2011 15:13
To: [log in to unmask]
Subject: Re: [data-protection] IT Back-ups and Personal Data

Further to the previous discussion on long-duration backups, in the
course of carrying out my threat to write up the difference between
backups and archives I've spotted what seems to be a significant
difference in their treatment under FoIA.

While I presume an archive is always likely to be accessible to an FoIA
request, it seems that a backup may not be.
http://www.ico.gov.uk/foikb/PolicyLines/FOIPolicyDeletedelectronicinform
ation.htm seems to be saying that once the original of a file has been
intentionally deleted and the trashcan emptied, any copies that happen
to remain on backups can be ignored for FoIA purposes. So the only time
you actually need to go to a true backup is if the original has been
*accidentally* deleted and you haven't restored it yet.

Have I understood that correctly? And does the same apply to SARs? I
can't find such an explicit statement in the DPA half of the ICO
website.

I note there's a warning against "backups that are actually being used
as a form of storage" though, so presumably the ICO was aware of the
potential loophole ;)

Thanks
Andrew

--
Andrew Cormack, Chief Regulatory Adviser, JANET(UK) Lumen House, Library
Avenue, Harwell, Didcot. OX11 0SG UK
Phone: +44 (0) 1235 822302
Blog: http://webmedia.company.ja.net/edlabblogs/regulatory-developments/

JANET, the UK's education and research network

JANET(UK) is a trading name of The JNT Association, a company limited by
guarantee which is registered in England under No. 2881024 and whose
Registered Office is at Lumen House, Library Avenue, Harwell Science and
Innovation Campus, Didcot, Oxfordshire. OX11 0SG


> -----Original Message-----
> From: Andrew Cormack
> Sent: 19 July 2011 15:25
> To: Bradshaw, Phillip; [log in to unmask]
> Subject: RE: IT Back-ups and Personal Data
> 
> I have a theory, which I'd very much welcome comments on, that there 
> are three things hiding within what's commonly referred to as "back-
> up":
> 
> 1) Recovery from physical failure (e.g. computer, building fire) - 
> needs two (because the failure might affect one of them) recent 
> snapshots of the file system, preferably with those copies kept in 
> separate locations. For this purpose you want the retention period to 
> be as short as possible (since it's the period of work you'll give up 
> if you have to use the backups - e.g. a weekly backup means you can 
> restore to last week's state), though practicality of the amount you 
> can back up overnight may mean you may have to build the snapshot from

> interspersed full and incremental backups.
> 
> 2) Recovery from human error (e.g. unintended deletion of
> files/emails/etc) - here the retention period is as long as you want 
> to allow humans to notice their mistake: weeks or months, perhaps, if 
> you're feeling generous. But the longer it is, the more DPA/SAR issues

> you get into, not to mention physical storage space. And in this case 
> (unlike (1) above) you want to be able to restore a single e- 
> mail/file/directory, which probably means the backup has to be a bit 
> more clever, not to mention bigger and slower.
> 
> 3) Records management/archiving. Here the aim is to capture evidence 
> of past events, so you may actually want multiple copies of the same 
> information (or at least proof that it didn't change). Retention 
> period is probably set by law, and may vary significantly from one 
> type of record to another, but can be years or decades. And as well as

> recovering individual files, you probably want to be able to do all 
> sorts of searches (e.g. records relating to building X), so the 
> archive has to include lots of metadata as well as the files 
> themselves. Again that's an even smarter and larger archive, though 
> you should be able to feed only a subset of the files on your disks
into it.
> 
> If that's right then it has a number of implications notably, since 
> the requirements for each type are different, that a single solution 
> is unlikely to be effective in all of them. Indeed they may even 
> require different storage media - it's arguable that redundant disks 
> could satisfy (1) whereas digital archival over decades can be 
> distinctly challenging.
> 
> I've always intended to write up these ideas (if only to explain to 
> salesmen why I regard the phrase "e-mail archiving" as an oxymoron), 
> but have never got round to it. Happy to be encouraged to do so, or 
> even happier to be told that someone has already done it better?
> 
> Cheers
> Andrew
> 
> --
> Andrew Cormack, Chief Regulatory Adviser, JANET(UK) Lumen House, 
> Library Avenue, Harwell, Didcot. OX11 0SG UK
> Phone: +44 (0) 1235 822302
> Blog: http://webmedia.company.ja.net/edlabblogs/regulatory-
> developments/
> 
> JANET, the UK's education and research network
> 
> JANET(UK) is a trading name of The JNT Association, a company limited 
> by guarantee which is registered in England under No. 2881024 and 
> whose Registered Office is at Lumen House, Library Avenue, Harwell 
> Science and Innovation Campus, Didcot, Oxfordshire. OX11 0SG
> 
> > -----Original Message-----
> > From: This list is for those interested in Data Protection issues 
> > [mailto:[log in to unmask]] On Behalf Of Bradshaw,
> Phillip
> > Sent: 19 July 2011 13:18
> > To: [log in to unmask]
> > Subject: Re: IT Back-ups and Personal Data
> >
> > I also agree with Ben. We have a typical incremental and rotational 
> > back up process and I think the maximum held is for 5 weeks - rather

> > less than 9 years.
> >
> > 9 years cannot be required for a 'true' back-up -  which is for data

> > loss event recovery.
> >
> > It is I suspect a form of archiving to allow retrieval of historical

> > information ( I know some regard this as a secondary purpose of
> 'back-
> > up') , but if that's what is desired DP rules must be complied with,

> > and it cannot supersede other retention rules otherwise there is no 
> > point in having them.
> >
> > Makes RM easier to have a single retention period of 9 years though.
> > Perhaps they are onto something after all.
> >
> >
> >
> > Phillip Bradshaw
> >
> >
> > Room CY5C, County Hall
> >
> > Phone:         029 2087 3346
> > Mobile :        07890 265987
> > Fax:              029 2087 3349
> >
> >
> >
> > ________________________________
> >
> > From: This list is for those interested in Data Protection issues 
> > [mailto:[log in to unmask]] On Behalf Of Ben Plouviez
> > Sent: 19 July 2011 12:49
> > To: [log in to unmask]
> > Subject: Re: [data-protection] IT Back-ups and Personal Data
> >
> >
> > Steve
> >
> > The simple answer is: don't keep backups for anything like that
> length
> > of time (why would you ever want to go back 9 years?). It seems to 
> > me well beyond a "reasonable" period in which to hold data and could
> give
> > rise to a whole set of DP, FOI and other RM issues.
> >
> > if you do keep backup data that long, and have a process whereby 
> > that data can be retrieved for business use (otherwise why keep it?)

> > then
> it
> > seems to me that you should indeed be editing your backups in order
> to
> > be able to comply with the 5th Principle.
> >
> >
> > Ben
> >
> >
> > --------------
> > Ben Plouviez
> > Head of KIRM
> > The Scottish Government
> > --------------
> > Sent from my BlackBerry
> >
> >
> > ________________________________
> >
> > From: This list is for those interested in Data Protection issues 
> > <[log in to unmask]>
> > To: [log in to unmask] <[log in to unmask]>
> > Sent: Tue Jul 19 11:55:56 2011
> > Subject: [data-protection] IT Back-ups and Personal Data
> >
> >
> > Dear all,
> >
> > I am a bit confused about the scenario below and what to advise. Any

> > thought appreciated.
> >
> > What is the stance to take with regards to IT and server back ups? 
> > We keep back ups for 9 years and thus as I understand it are still 
> > technically 'processing the data'. Much of the data technically 
> > might not still be required - photos, letters etc. Surely we don't 
> > have to 'edit the back-up servers on a regular basis s and when data

> > might no longer be required?
> >
> > Regards
> > Steve
> >
> >
> ______________________________________________________________________
> _
> > _______________________________________________
> > Stephen Cotterill
> > Procurement & Technical Officer
> > Broxtowe Borough Council
> >
> >
> >
> > DISCLAIMER:
> > This email and any attachments are confidential and intended solely
> for
> > the use of the individual to whom it is addressed. If you are not 
> > the intended recipient be advised that you have received this email 
> > in error and that any use, dissemination, forwarding, printing or
> copying
> > of this email is strictly prohibited.
> > If you have received this email in error please contact the IT
> Service
> > Desk at Broxtowe Borough Council on [log in to unmask] or

> > telephone 0115 917 3194.
> > Senders and recipients of email should be aware that, under current 
> > legislation, the contents may be monitored and will be retained. The

> > contents of the email may have to be disclosed in response to a 
> > request.
> > This disclaimer confirms that this email message has been swept for
> the
> > presence of computer viruses.
> >
> > This email was received from the INTERNET and scanned by the
> Government
> > Secure Intranet anti-virus service supplied by Cable&Wireless
> Worldwide
> > in partnership with MessageLabs. (CCTM Certificate Number
> > 2009/09/0052.) In case of problems, please call your organisation's
> IT
> > Helpdesk.
> > Communications via the GSi may be automatically logged, monitored 
> > and/or recorded for legal purposes.
> >
> >
> > *********************************** ********************************
> >
> > This email has been received from an external party and
> >
> > has been swept for the presence of computer viruses.
> >
> > ********************************************************************
> >
> > *******************************************************
> >
> > This e-mail (and any files or other attachments transmitted with it)
> is
> >
> > intended solely for the attention of the addressee(s). Unauthorised
> >
> > use, disclosure, storage, copying or distribution of any part of 
> > this
> >
> > e-mail is not permitted. If you are not the intended recipient 
> > please
> >
> > destroy the email, remove any copies from your system and inform
> >
> > the sender immediately by return.
> >
> > Communications with the Scottish Government may be monitored or
> >
> > recorded in order to secure the effective operation of the system 
> > and
> >
> > for other lawful purposes. The views or opinions contained within
> >
> > this e-mail may not necessarily reflect those of the
> >
> > Scottish Government.
> >
> > ********************************************************
> >
> >
> > The original of this email was scanned for viruses by the Government

> > Secure Intranet virus scanning service supplied by Cable&Wireless 
> > Worldwide in partnership with MessageLabs. (CCTM Certificate Number
> > 2009/09/0052.) On leaving the GSi this email was certified virus
> free.
> > Communications via the GSi may be automatically logged, monitored 
> > and/or recorded for legal purposes.
> >
> > ________________________________
> >
> > All archives of messages are stored permanently and are available to

> > the world wide web community at large at 
> > http://www.jiscmail.ac.uk/lists/data-protection.html
> >
> > Selected commands (the command has been filled in below in the body
> of
> > the email if you are receiving emails in HTML format):
> >
> > *	Leaving this list: send leave data-protection to
> > [log in to unmask] <mailto:[log in to unmask]&BODY=LEAVE
> > data-protection>
> > *	Suspending emails from all JISCMail lists: send SET * NOMAIL to
> > [log in to unmask] <mailto:[log in to unmask]&BODY=SET *
> > NOMAIL>
> > *	To receive emails from this list in text format: send SET data-
> > protection NOHTML to [log in to unmask] 
> > <mailto:[log in to unmask]&BODY=SET data-protection NOHTML>
> > *	To receive emails from this list in HTML format: send SET data-
> > protection HTML to [log in to unmask] 
> > <mailto:[log in to unmask]&BODY=SET data-protection HTML>
> >
> > All user commands can be found at
> > http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the
> body
> > of an otherwise blank email to [log in to unmask]
> >
> > Any queries about sending or receiving messages please send to the
> list
> > owner [log in to unmask]
> >
> > (Please send all commands to [log in to unmask] not the list or

> > the moderators, and all requests for technical help to 
> > [log in to unmask], the general office helpline)
> >
> > ________________________________
> >
> > ________________________________
> >
> > All archives of messages are stored permanently and are available to

> > the world wide web community at large at 
> > http://www.jiscmail.ac.uk/lists/data-protection.html
> >
> > Selected commands (the command has been filled in below in the body
> of
> > the email if you are receiving emails in HTML format):
> >
> > *	Leaving this list: send leave data-protection to
> > [log in to unmask] <mailto:[log in to unmask]&BODY=LEAVE
> > data-protection>
> > *	Suspending emails from all JISCMail lists: send SET * NOMAIL to
> > [log in to unmask] <mailto:[log in to unmask]&BODY=SET *
> > NOMAIL>
> > *	To receive emails from this list in text format: send SET data-
> > protection NOHTML to [log in to unmask] 
> > <mailto:[log in to unmask]&BODY=SET data-protection NOHTML>
> > *	To receive emails from this list in HTML format: send SET data-
> > protection HTML to [log in to unmask] 
> > <mailto:[log in to unmask]&BODY=SET data-protection HTML>
> >
> > All user commands can be found at
> > http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the
> body
> > of an otherwise blank email to [log in to unmask]
> >
> > Any queries about sending or receiving messages please send to the
> list
> > owner [log in to unmask]
> >
> > (Please send all commands to [log in to unmask] not the list or

> > the moderators, and all requests for technical help to 
> > [log in to unmask], the general office helpline)
> >
> > ________________________________
> >
> >
> **********************************************************************
> >
> > Privileged/Confidential Information may be contained in this
message.
> > If you are not the addressee indicated in this message (or
> responsible
> > for delivery of the message to such person), you may not copy or 
> > deliver this message to anyone. In such case, you should destroy 
> > this message and kindly notify the sender by reply email. Please 
> > advise immediately if you or your employer does not consent to 
> > Internet
> email
> > for messages of this kind. Opinions, conclusions and other
> information
> > in this message that do not relate to the official business of the 
> > Council of the City and County of Cardiff shall be understood as 
> > neither given nor endorsed by it. All e-mail sent to or from this 
> > address will be processed by Cardiff County Councils Corporate 
> > E-mail system and may be subject to scrutiny by someone other than 
> > the addressee.
> >
> >
> **********************************************************************
> >
> > Mae'n bosibl bod gwybodaeth gyfrinachol yn y neges hon. Os na
> chyfeirir
> > y neges atoch chi'n benodol (neu os nad ydych chi'n gyfrifol am 
> > drosglwyddo'r neges i'r person a enwir), yna ni chewch gopio na 
> > throsglwyddo'r neges. Mewn achos o'r fath, dylech ddinistrio'r neges
> a
> > hysbysu'r anfonwr drwy e-bost ar unwaith. Rhowch wybod i'r anfonydd
> ar
> > unwaith os nad ydych chi neu eich cyflogydd yn caniatau e-bost y 
> > Rhyngrwyd am negeseuon fel hon. Rhaid deall nad yw'r safbwyntiau, y 
> > casgliadau a'r wybodaeth arall yn y neges hon nad ydynt yn cyfeirio
> at
> > fusnes swyddogol Cyngor Dinas a Sir Caerdydd yn cynrychioli barn y 
> > Cyngor Sir nad yn cael sel ei fendith. Caiff unrhyw negeseuon a
> anfonir
> > at, neu o'r cyfeiriad e-bost hwn eu prosesu gan system E-bost 
> > Gorfforaethol Cyngor Sir Caerdydd a gallant gael eu harchwilio gan 
> > rywun heblaw'r person a enwir.
> >
> >
> **********************************************************************
> >
> >
> > --
> > Scanned by iCritical.
> >
> >
> > ________________________________
> >
> > All archives of messages are stored permanently and are available to

> > the world wide web community at large at 
> > http://www.jiscmail.ac.uk/lists/data-protection.html
> >
> > Selected commands (the command has been filled in below in the body
> of
> > the email if you are receiving emails in HTML format):
> >
> > *	Leaving this list: send leave data-protection to
> > [log in to unmask] <mailto:[log in to unmask]&BODY=LEAVE
> > data-protection>
> > *	Suspending emails from all JISCMail lists: send SET * NOMAIL to
> > [log in to unmask] <mailto:[log in to unmask]&BODY=SET *
> > NOMAIL>
> > *	To receive emails from this list in text format: send SET data-
> > protection NOHTML to [log in to unmask] 
> > <mailto:[log in to unmask]&BODY=SET data-protection NOHTML>
> > *	To receive emails from this list in HTML format: send SET data-
> > protection HTML to [log in to unmask] 
> > <mailto:[log in to unmask]&BODY=SET data-protection HTML>
> >
> > All user commands can be found at
> > http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the
> body
> > of an otherwise blank email to [log in to unmask]
> >
> > Any queries about sending or receiving messages please send to the
> list
> > owner [log in to unmask]
> >
> > (Please send all commands to [log in to unmask] not the list or

> > the moderators, and all requests for technical help to 
> > [log in to unmask], the general office helpline)
> >
> > ________________________________

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask] All user
commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list
owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your
needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

*********************************** ********************************
This email has been received from an external party and has been swept
for the presence of computer viruses.
******************************************************************** 

The original of this email was scanned for viruses by the Government Secure Intranet virus scanning service supplied by Cable&Wireless Worldwide in partnership with MessageLabs. (CCTM Certificate Number 2009/09/0052.) On leaving the GSi this email was certified virus free.
Communications via the GSi may be automatically logged, monitored and/or recorded for legal purposes.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000
1999
1998


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager