- 1. Nothing in this presentation may be construed as Legal
Advice. SubjectHow to achieve aAccessdevastating Request effect
www.dataprotectionofficer.com ||| [email protected]
SAR SAR can be requested here Evidence likely to be tampered with
Evidence less likely to be tampered with
2. The truth about Subject Access Request (SAR) When you make a
SARSAR Your request may not ask the right questions from theright
sources , therefore the information may be Tampered with The
organisation may deny the existence of the informationrequired
leaving your request less effective as an evidence. This guide will
provide you information about the depth of information that can be
requested capable of preventing tamper The request needs to get to
areas of an organisation that is more difficult to tamper withSAR
SAR can be requested here Evidence likely to be tampered with
Evidence less likely to be tampered with 3. Overview of the
processSubject has With an official Notification ofDecision andAn
issue has arisena complainor departmentmanagementdocumentationIssue
Official(s)Management Decision SARSAR IncidentcommunicationAct
Officer(s)ManagementMeeting DepartmentHR Documentation Decision
SubjectSAR SAR SAREvent AllegationNegligence SAR SAR can be
requested hereEvidence likely to be tampered withEvidence less
likely to be tampered with 4. Issue arises with the subject Subject
Incident MeetingDecision Officer or subject communicates with the
subject or Email Report Meeting Telephone Management Communication
Audit of the issue is communicated PC Laptop Witnessvia the network
Network TelephoneAll electronictraffic is logged Serversand
trackedTraffic logs Server logs Backup logsAudit logs on all
computer systems Auditsprovide evidence PC Audit Web AuditEmail
Audit Target organisation layoutAll decisions are required to be HR
files Recordsdocumented Decision & documents 5. SAR points of
impactMobile phoneAudit, logs & serversSAR SAR Email
serverLaptopsSARIssue SARSARSAR Web logs computersSAR Telephone SAR
SARSAR SARSAR can be requested hereWitnessEvidence likely to be
tampered withEvidence less likely to be tampered with 6. The
overall objective An in-depth request that isThe strategy Make it
difficult for the harder to repudiate respondent to deny the Target
areas that will reveal existence of the information information
that the Request information from respondent cant tamperareas that
the respondent with & that will reveal cant easily tamper
detrimental information The SAREnd result 7. Contact details
www.dataprotectionofficer.com Ben Oguntala, LLB Hons, LLM
[email protected] (+44)
(0)7812039867