7
Subject Access Request How to achieve a devastating effect www.dataprotectionofficer.com ||| [email protected] Evidence likely to be tampered with Evidence less likely to be tampered with SAR SAR can be requested here Nothing in this presentation may be construed as Legal Advice.

how to use a SAR to devastating effect

Embed Size (px)

DESCRIPTION

A SAR can be a vital tool in a Subject or Lawyer\'s arsenal to discover information that could weaken the respondent\'s case. This article provides the key areas where a SAR request can be used to devastating effect.

Citation preview

  • 1. Nothing in this presentation may be construed as Legal Advice. SubjectHow to achieve aAccessdevastating Request effect www.dataprotectionofficer.com ||| [email protected] SAR SAR can be requested here Evidence likely to be tampered with Evidence less likely to be tampered with

2. The truth about Subject Access Request (SAR) When you make a SARSAR Your request may not ask the right questions from theright sources , therefore the information may be Tampered with The organisation may deny the existence of the informationrequired leaving your request less effective as an evidence. This guide will provide you information about the depth of information that can be requested capable of preventing tamper The request needs to get to areas of an organisation that is more difficult to tamper withSAR SAR can be requested here Evidence likely to be tampered with Evidence less likely to be tampered with 3. Overview of the processSubject has With an official Notification ofDecision andAn issue has arisena complainor departmentmanagementdocumentationIssue Official(s)Management Decision SARSAR IncidentcommunicationAct Officer(s)ManagementMeeting DepartmentHR Documentation Decision SubjectSAR SAR SAREvent AllegationNegligence SAR SAR can be requested hereEvidence likely to be tampered withEvidence less likely to be tampered with 4. Issue arises with the subject Subject Incident MeetingDecision Officer or subject communicates with the subject or Email Report Meeting Telephone Management Communication Audit of the issue is communicated PC Laptop Witnessvia the network Network TelephoneAll electronictraffic is logged Serversand trackedTraffic logs Server logs Backup logsAudit logs on all computer systems Auditsprovide evidence PC Audit Web AuditEmail Audit Target organisation layoutAll decisions are required to be HR files Recordsdocumented Decision & documents 5. SAR points of impactMobile phoneAudit, logs & serversSAR SAR Email serverLaptopsSARIssue SARSARSAR Web logs computersSAR Telephone SAR SARSAR SARSAR can be requested hereWitnessEvidence likely to be tampered withEvidence less likely to be tampered with 6. The overall objective An in-depth request that isThe strategy Make it difficult for the harder to repudiate respondent to deny the Target areas that will reveal existence of the information information that the Request information from respondent cant tamperareas that the respondent with & that will reveal cant easily tamper detrimental information The SAREnd result 7. Contact details www.dataprotectionofficer.com Ben Oguntala, LLB Hons, LLM [email protected] (+44) (0)7812039867