Print

Print


I agree wholeheartedly.  Keep "Data Protection" out of the vocabulary.

"As you'd expect, we keep your personal information confidential.  I need to (whatever we do need to do)"

Valid questions are tokens known only to the pair communicating.  fully addressed and mailed utility bills are good.  Hmm I get mine electronically!  Same with bank statements!  I shred the council tax bill because I pay by installments. 

Does it need to have a photo?  If so, why?  If not, should it?

Griffiths, Ian wrote:
[log in to unmask]" type="cite">
There's lots of convention, often becoming more stringent when money is
involved.  It probably should not be disproportionate to the value of
the data - although some on this will probably disagree with that one
I'm sure.

I think you probably have more licence now than ever to make sure people
are who they say they are.  My only request would be that you open with
the phrase 'in order to identify you' rather than 'for the purpose of
data protection', which always sounds to me like a script rather than
actual comprehension of the reasons for clear authentication.

Ian

-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Henley, Lee
Sent: 29 November 2007 07:59
To: [log in to unmask]
Subject: [data-protection] questions asked to confirm identify of caller


Is there any guidance around that details questions to be put to
telephone callers (to confirm their identity) prior to releasing any
details over the phone?
Regards 
Lee Henley 

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  

--

Tim Trent - Consultant
Tel: +44 (0)7710 126618
web: ComplianceAndPrivacy.com - where busy executives go to find the news first
personal blog: timtrent.blogspot.com/
petition:: Let's rebuild and refloat the Cutty Sark

Important: This message is private and confidential. If you have received this message in error, please notify us and remove it from your system. This email and any attachment(s) are believed to be virus-free, but it is the responsibility of the recipient to make all the necessary virus checks. This email and any attachments to it are copyright of Meadowood Associates, owners of Compliance And Privacy, unless otherwise stated. Their copying, transmission, reproduction in whole or in part may only be undertaken with the express permission, in writing, of Meadowood Associates, at Meadowood House, 30 Redditch, Bracknell, Berkshire, RG12 0TT.


All archives of messages are stored permanently and are available to the world wide web community at large at http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the email if you are receiving emails in HTML format):

All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm and are sent in the body of an otherwise blank email to [log in to unmask]

Any queries about sending or receiving messages please send to the list owner [log in to unmask]

(Please send all commands to [log in to unmask] not the list or the moderators, and all requests for technical help to [log in to unmask], the general office helpline)