51. Ironically, the system means that they are unlikely to be told, in case they use the information as evidence in an action. 52. They will use the information not to understand the individual transactions recorded in the data, but the society that created it. 53. Generally, whether computer records fall under this rule depends on the information contained within the record and the purpose for using such information as evidence. 54. These are collected and put into a PC database at HQ where the information can be used with the GIS to map the problem areas. 55. Such an order would prevent the defendants using that information for any purpose of defending an action in the Commercial Court. 56. The defendant denied that any secret process existed or that he had taken and used any information. 57. Using information with no relevance to, in my Liverpool home. 58. Basically it was receiving telephone calls from the public erm and using that information to put on a computer to send officers to incidents various incidents. 59. Skills in handling information in both the classroom and the library -- the definition of purpose, finding information and using information --should also be discussed. 60. Who is likely to use the information? |