A serious question which I have been unable to progress further without
active engagement causes me to enquire with the active practitioners of
the list for viewpoints.
Are the workings of the data protection
regime becoming so much a part of the fabric that they are directly
reflected in the methods and answers it provides; Or, are the multitude
of methods and answers affecting the regime to the extent tokenism is
becoming the norm?
Wording that slightly differently – are tokens (in
various forms) which relate to identifiable individuals now perceived
as non-personal data, and hence only subject to other legal controls
and social rules?
Ian W
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|