Data Management Flashcards

x

1
Q

Give me an example of how you process and handle confidential information.

A

For example; in sales reports I must handle confidential purchaser information. What do I do?

  1. Control access (password protection)
  2. If printed, use the shredder/ confidential waste bin
  3. Train support staff on do’s and dont’s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give me an example of how you ensure that data is kept securely throughout the sales process

A

Prepare diligently to ensure compliance

Assess any privacy risks inherent in business processes/activities

Involve IT support to make appropriate changes

Provide staff training and support on data security

Appoint a Data Protection Officer if required by GDPR

Ensure you have adequate systems to deal with a breach and subsequent notification to the ICO (within 72 hours)

Do your systems comply with all GDPR principles, including the right to be forgotten

Update your internet security, e.g. virus protection, including on desktops, laptops and mobile phones

Ensure any data already held is up to date and compliant with GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is copyright?

A

Copyright is a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can copyright be transferred?

A

Like any other property, all or part of the rights in a work may be transferred by the owner to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What data protection legislation are you aware of nationally?

A

Data Protection Act 2018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give me an example of a property information tool.

A

Land registry, Daft.ie, MyHome, Price register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tell me about how you extract data from a source regularly used in your role.

A

Using Land registry for information on valuaitons.

Daft and My home for info on market appraisals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you validate information?

A

I call local agents to verify information. Desktop research. Use logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the limitations of primary/secondary data sources?

A

Primary data limitations - lack of direct comparable information. Time consuming. Lots of limits.
Secondary data limitations - Lack of control over data quality , Biased, Not timely (may be obsolete)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you source title information?

A

There are 2 separate systems for recording property transactions:

The registration of title system (Land Registry) which provides a State-guaranteed title to property
The registration of deeds system (Registry of Deeds) which records the existence of deeds and conveyances affecting property

Both systems are mutually exclusive. Your solicitor will know which of the 2 systems is relevant to your case. Both systems are under the control and management of the Property Registration Authority (PRA), an independent statutory body set up under the Registration of Deeds and Title Act 2006.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a deed and a registered title?

A

A title is the ownership of a property and a deed is a written document that affects property.
A deed is an official written document declaring a person’s legal ownership of a property, while a title refers to the concept of ownership rights. … In this way, a book title and a property title are the same: neither are physical objects, but rather concepts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the differences between manual and electronic records?

A

A manual database is one that is not computerised – i.e. not available in electronic format. A telephone directory, an organiser or printed address book are examples of manual databases. An electronic database is one that is computerised, and can be accessed/manipulated using computer applications.

One of the major advantages of storing information in electronic databases is that it is easy to add new information, sort information, and search through millions of records to find one specific match. A search tries to find matches for whatever you search for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a firewall?

A

A firewall screens and checks connections to and from your computer or network according to a predefined set of rules, just like a security guard. While every computer comes with basic firewall protections, there are still numerous points of entry. It is important to make sure your network stays safe with a top-tier cybersecurity tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does encryption mean?

A

Encryption is the method by which information is converted into secret code that hides the information’s true meaning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does block chain mean?

A

Blockchain is the innovative database technology that’s at the heart of nearly all cryptocurrencies. By distributing identical copies of a database across an entire network, blockchain makes it very difficult to hack or cheat the system. While cryptocurrency is the most popular use for blockchain presently, the technology offers the potential to serve a very wide range of applications. E.g. Banking, asset transfer, voting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you protect electronic data from viruses?

A
  1. Install and update malware software
  2. Ensure IT devices have the latest security patches installed
  3. Ensure administrator privileges prevent access to unauthorised users or guests
  4. Only install software you need and from reputable sources
  5. Back-up data regularly (on and off-line)
  6. Segment your hard drive or network to limit damage
  7. Use two-factor authentication - Apple iPhones use this technology
  8. Recognise what a ransomware attack could look like
  9. Ensure good staff training and data security processes
17
Q

What are the impacts of viruses?

A

Loss of data

Financial cost to meet ransom demand

Risk that decryption key won’t be released

Disruption to serve

Reputational damage

Breach of GDPR

18
Q

How do you manage general information and data on a project?

A

The process includes:

  1. Collection of project information E.g. from daft, myhome, newspapers, gov articles.
  2. Storage is important for: analysis, identifying historical trends, developing lessons learned, satisfying legislative requirements etc. Appropriate controls – including user access, export controls, versioning, change control, audit, and back-ups – must be established.
  3. Curation - gathering and organising information relevant so that it can add value.
  4. Distribution involves consideration of questions such as: what information is to be distributed, to whom, in what format, how often, under what circumstances and using what security protocols?
  5. Archiving takes place after a period of time, usually determined by a mix of company policy and judgement. Because of the large volumes of information archived, an effective classification system that anticipates future uses is essential.
  6. Destruction – deleting because the information is no longer deemed important especially in comparison to the on-going storage costs and legislation e.g. privacy laws.
19
Q

Tell me about the increasing use of computerised central project databases.

A

Data is increasingly seen as a corporate asset that can be used to make more-informed business decisions, improve marketing campaigns, optimize business operations and reduce costs, all with the goal of increasing revenue and profits.
But a lack of proper data management can saddle organizations with incompatible data silos, inconsistent data sets and data quality problems that limit their ability to run business intelligence (BI) and analytics applications – or, worse, lead to faulty findings.
Data management has also grown in importance as businesses are subjected to an increasing number of regulatory compliance requirements, including data privacy and protection laws such as GDPR.

Project-based working relies on accurate and timely information and data for teams and stakeholders to make informed decisions and fulfil their role in a cost-efficient and effective way.
Effective information management enables project teams to use their time, resources and expertise effectively to make decisions and to fulfil their roles.

20
Q

What are the Benefits of electronic data management?

A
  • Direct 24 hour access to information.
  • Aids faster document approvals.
  • Supports the Green Agenda.
  • Provides audit trail.
  • Less chance of losing information.
21
Q

What is BIM and how can it be used?

A

BIM is a process for creating and managing information on a construction project throughout its whole life cycle. As part of this process, a coordinated digital description of every aspect of the built asset is developed, using a set of appropriate technology. It is likely that this digital description includes a combination of information-rich 3D models and associated structured data such as product, execution and handover information.

For example, a building owner may find evidence of a leak in his building. Rather than exploring the physical building, he may turn to the model and see that a water valve is located in the suspect location. He could also have in the model the specific valve size, manufacturer, part number, and any other information ever researched in the past, pending adequate computing power.

22
Q

Which records are manually kept in your office and why?

A
  1. Business License
  2. Keep tax records for at least seven years. Before scanning tax documents and discarding them, verify that you will not need them for other purposes. In some cases, auditors, creditors or insurance companies may require you to keep them for longer periods.
  3. Insurance documents
  4. Employer identification numbers (EIN)
23
Q

What AVMs are you aware of?

A

Examples: Zillows Zestimate. Hometrack is market leader in UK.

24
Q

Explain the growing use of AVMs in the industry.

A

Automated valuation models (AVMs) are statistically based computer programs that use real estate information such as comparable sales, property characteristics, and price trends to provide a current estimate of market value for a specific property. An AVM report provides a written summary of the results

25
Q

What is ISO 9001?

A

ISO 9001 is the world’s foremost quality management standard, used by hundreds of thousands of organizations in over 170 countries around the globe. It sets out the essential requirements for a practical and effective quality management system (QMS) which is, in essence, a system for minimising risk and maximising opportunity.

26
Q

What are the requirements of ISO 9001?

A
The ISO 9001 standard requires your organisation address seven key areas – also known as clauses – in order to achieve continual improvement within your Quality Management System:
 Context of the organisation.
 Leadership.
 Planning.
 Support.
 Operation.
 Performance evaluation.
 Improvement.
27
Q

Why is quality management important?

A

“Quality management” ensures superior quality products and services.

28
Q

What is an Electronic Document Management System (EDMS)?

A

Electronic Document Management, or EDM, is the process of managing information, data and documents digitally. … There is a wide variety of data formats, including information found in business documents such as contracts and invoices, customer data, financial data and intellectual property, etc.

29
Q

What is data redundancy?

A

Data redundancy occurs when the same piece of data is stored in two or more separate places and is a common occurrence in many businesses.

30
Q

Under GDPR , what do you do if there is a breach?

A

Under the GDPR (General Data Protection Regulation), Ireland-based organisations must report data breaches to the DPC (Data Protection Commission) within 72 hours of becoming aware of them. It applies to any kind of data breach – i.e. any time the confidentiality, integrity or availability of information is compromised.
Failure to disclose an incident could lead to penalties under the GDPR’s second tier of fines – up to €10 million or 2% of your organisation’s annual global turnover, whichever is higher.

31
Q

Who is responsible for supervising GDPR compliance?

A

OCM must abide to the new GDPR rules when handling the publics personal information about the individual to ensure it can operate as it needs to but not compromise the personal data it holds on an individual. GDPR Compliance Officer is responsible for training staff members and staying up to date with compliance to GDPR legislation. She is responsible for reporting GDPR breaches to the DPC..