Data Management Flashcards
x
Give me an example of how you process and handle confidential information.
For example; in sales reports I must handle confidential purchaser information. What do I do?
- Control access (password protection)
- If printed, use the shredder/ confidential waste bin
- Train support staff on do’s and dont’s
Give me an example of how you ensure that data is kept securely throughout the sales process
Prepare diligently to ensure compliance
Assess any privacy risks inherent in business processes/activities
Involve IT support to make appropriate changes
Provide staff training and support on data security
Appoint a Data Protection Officer if required by GDPR
Ensure you have adequate systems to deal with a breach and subsequent notification to the ICO (within 72 hours)
Do your systems comply with all GDPR principles, including the right to be forgotten
Update your internet security, e.g. virus protection, including on desktops, laptops and mobile phones
Ensure any data already held is up to date and compliant with GDPR.
What is copyright?
Copyright is a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression.
Can copyright be transferred?
Like any other property, all or part of the rights in a work may be transferred by the owner to another.
What data protection legislation are you aware of nationally?
Data Protection Act 2018
Give me an example of a property information tool.
Land registry, Daft.ie, MyHome, Price register
Tell me about how you extract data from a source regularly used in your role.
Using Land registry for information on valuaitons.
Daft and My home for info on market appraisals
How do you validate information?
I call local agents to verify information. Desktop research. Use logic.
What are the limitations of primary/secondary data sources?
Primary data limitations - lack of direct comparable information. Time consuming. Lots of limits.
Secondary data limitations - Lack of control over data quality , Biased, Not timely (may be obsolete)
How do you source title information?
There are 2 separate systems for recording property transactions:
The registration of title system (Land Registry) which provides a State-guaranteed title to property
The registration of deeds system (Registry of Deeds) which records the existence of deeds and conveyances affecting property
Both systems are mutually exclusive. Your solicitor will know which of the 2 systems is relevant to your case. Both systems are under the control and management of the Property Registration Authority (PRA), an independent statutory body set up under the Registration of Deeds and Title Act 2006.
What is the difference between a deed and a registered title?
A title is the ownership of a property and a deed is a written document that affects property.
A deed is an official written document declaring a person’s legal ownership of a property, while a title refers to the concept of ownership rights. … In this way, a book title and a property title are the same: neither are physical objects, but rather concepts.
What are the differences between manual and electronic records?
A manual database is one that is not computerised – i.e. not available in electronic format. A telephone directory, an organiser or printed address book are examples of manual databases. An electronic database is one that is computerised, and can be accessed/manipulated using computer applications.
One of the major advantages of storing information in electronic databases is that it is easy to add new information, sort information, and search through millions of records to find one specific match. A search tries to find matches for whatever you search for.
What is a firewall?
A firewall screens and checks connections to and from your computer or network according to a predefined set of rules, just like a security guard. While every computer comes with basic firewall protections, there are still numerous points of entry. It is important to make sure your network stays safe with a top-tier cybersecurity tool.
What does encryption mean?
Encryption is the method by which information is converted into secret code that hides the information’s true meaning.
What does block chain mean?
Blockchain is the innovative database technology that’s at the heart of nearly all cryptocurrencies. By distributing identical copies of a database across an entire network, blockchain makes it very difficult to hack or cheat the system. While cryptocurrency is the most popular use for blockchain presently, the technology offers the potential to serve a very wide range of applications. E.g. Banking, asset transfer, voting.