Data management Flashcards

1
Q

How Is the data on Share Point protected?

A

“When it comes to data protection in SharePoint, Microsoft has implemented several measures to ensure the security of your data. Here are some key points:

Ownership of Data: When you store your data in SharePoint and OneDrive for Microsoft 365, you remain the owner of the data1. For more information about data ownership, you can refer to Microsoft 365 Privacy by Design.

Administration and Access Control: Microsoft engineers administer SharePoint and OneDrive using a PowerShell console that requires two-factor authentication1. They perform day-to-day tasks through workflows, ensuring rapid response to new situations. Check-ins to the service require code review and management approval. No engineer has standing access to the service. When engineers need access, they must request it, and eligibility is checked. If approved, access is granted for a limited time. In rare cases where Microsoft engineers need access to content (e.g., if you submit a support ticket because a user can’t access an important file that is believed to be damaged), they must follow a specific workflow that requires business justification and manager approval1.

Data Safeguarding: One of the most important things you can do to safeguard your data is to require two-factor authentication for your identities in Microsoft 3651. This prevents credentials from being used without a second factor and mitigates the impact of compromised passwords. Other recommended security measures include using Azure Active Directory device-based conditional access to block or limit access on unmanaged devices, creating policies to sign users out of Microsoft 365 web sessions after a period of inactivity, and evaluating the need for IP-based sessions1.

Data Loss Prevention (DLP): SharePoint Online provides a feature called Data Loss Prevention (DLP) that helps protect your data while it is stored or shared2. This feature helps prevent sensitive data from being accidentally or maliciously shared outside your organization.

Data Resiliency: SharePoint uses Append-Only storage, which means that Microsoft can only add new blobs and can never change old ones until they’re permanently deleted3. This process ensures that files can’t be changed or corrupted after an initial save, protecting against attackers who try to corrupt old versions.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Talk me through how you create new libraries In Share Point and how these benefit the team.

A

“To create a new library in SharePoint, you can follow these steps:

Go to the team site where you want to create a new document library.
On the menu bar, select New, and then select Document library.
Enter a name for the new library.
Select Create.
You can add additional document and other libraries to a site as needed 1.

Document libraries in SharePoint are used to securely store files where you and your co-workers can find them easily, work on them together, and access them from any device at any time 1. They help teams collaborate more effectively by providing a central location for storing and sharing files. You can also set up versioning, check-in/check-out, and other features to help manage your documents 1.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does ‘Business Objects’ Interact with Uniform?

A

“Business Objects can interact with other databases by using various techniques. One approach is to create a universe in Business Objects that connects to multiple databases1. A universe is a semantic layer that allows users to interact with data from different databases as if it were a single source1. To design a universe that interacts with multiple databases, you can follow these steps:

Create database links or synonyms to establish connections between the databases1.
Use derived tables to call tables from other databases along with the table name and the database link name1.
Specify the desired schema and access permissions for accessing tables from different databases1.
By following these steps, you can design a universe in Business Objects that interacts with multiple databases and allows users to access data from different sources seamlessly.

Please note that this is just one approach, and there may be other techniques or tools available for integrating Business Objects with databases”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you keep the data extracted up to date?

A

it’s a one use report which is run periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What additional Items do you request when verifying data extracted for rent review comparables?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How have you used previous property transaction sheets during your rent reviews?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How have you assisted in the development of a property information system?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How have you inputted survey and valuation data?

A

we do not use uniform to store our valuation data, it double handles the information from spreadsheets to the management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How have you extracted and used survey and valuation data?

A

we do put EPC information on Uniform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How have you searched for comparable evidence?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How have you used data searches for due diligence functions?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How have you advised on data storage system? How have you advised on business filling systems? How have you benchmarked from analysed historic data? How have you advised on the use of a computerised central project database? How have you advised on security of data? How have you advised colleagues on relevant data through completing returns and market survey data? How have you complied with client’s data security requirements? How have you incorporated data research into complex reasoned advice to clients? How have you presented conclusions to clients from data research and analysis?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is It Important to maintain data Integrity in the Uniform database?

A

“Data integrity is crucial in a database for several reasons. It ensures the accuracy, completeness, and reliability of data1. By maintaining data integrity, you can create relationships between disparate data elements, ensuring that the data transferred from one stage to another is accurate and error-free1.

Data integrity is different from data security and data quality. While data security focuses on protecting enterprise data from misuse, data integrity deals with the accuracy and completeness of data present in the database1. Data quality, on the other hand, ensures that the stored data complies with the organization’s standards and requirements1.

Maintaining data integrity is essential because it helps in creating a stable and reliable database. It ensures that your entire dataset can be recovered and searched whenever needed, strengthening the stability of your data1. Moreover, it allows you to gain reliable insights from your data model, enabling you to make informed business decisions1.

In summary, maintaining data integrity in a database is important because it:

Ensures accuracy, completeness, and reliability of data.
Facilitates accurate and error-free data transfer between stages.
Strengthens the stability of your data.
Enables reliable insights for informed decision-making.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you ensure this happens?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain how you created a script to perge the system.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What systems have you put In place to ensure data Is deleted at lease expiry?

A

to run the purge system periodically this does not happen

17
Q

How did you advise a change In culture could be achieved and maintained?

A
18
Q

How has this been successful?

A
19
Q

Explain the growing use of AVMs in the industry.

A

“According to the Royal Institution of Chartered Surveyors (RICS), the use of Automated Valuation Models (AVMs) has been increasing in the industry. AVMs are computer algorithms that use statistical models to estimate the value of a property based on various data points such as location, size, and age. The adoption of AVMs has been driven by their ability to provide quick and cost-effective valuations, especially for properties that are not unique or complex1.

AVMs have been used in the UK mortgage industry for almost 20 years and have become an integral part of the mortgage lending business. They are used for audit purposes to identify potential over-valuation before loans are approved. AVMs can also be used to inform collateral risk decisions for banks2.

RICS is developing a roadmap to ensure that appropriate guidance, standards, and content are produced to support its members and provide market confidence in valuations. RICS is seeking feedback from stakeholders to help shape this roadmap1.”

20
Q

What AVMs are you aware of?

A

automated and some with valuer checks

21
Q

What is ISO 9001?

A

“ISO 9001 is a global industry standard that specifies requirements and best practices for a quality management system (QMS). The current ISO 9001 standard is ISO 9001:2015. A QMS is the documentation of an organization’s processes and plans for achieving quality objectives. It should be tailored to the organization and to the needs of its customers.

An effective quality management system enables organizations to consistently deliver high-quality products, resulting in happier customers and better business overall. A QMS also helps make processes more efficient, leading to less time and effort wasted on non-essential tasks and allowing teams to focus on high-impact activities instead”

22
Q

What are the requirements of ISO 9001?

A

“Elements of a Quality Management System
Quality management systems have these nine elements: quality policy and objectives, quality manual, organizational structure and responsibilities, data management, processes, customer satisfaction with product quality, continuous improvement, and document control.

Quality Policy and Quality Objectives
A quality policy is an official statement of the organization’s commitment to quality and its strategy for promoting, maintaining, and improving quality. To ensure alignment with quality policies, organizations set specific business goals or quality objectives. Both quality policies and quality objectives are standard requirements of ISO 9001.

Organizations can use the quality policy and quality objective below as an example:

Quality Policy: Guarantee client’s satisfaction
Quality Objective: Maintain at least 95% client satisfaction”

23
Q

What is an Electronic Document Management System (EDMS)?

A

An electronic document management system (EDMS) is a software system that helps businesses to manage their documents12. It allows users to create, use, and store files in multiple formats2. It is a more specific type of document management system, which can handle both paper and digital documents1. EDMS is also related to other terms such as EDRMS, EDM, ERM, and ERMS, which refer to different aspects of electronic document and records management3.

24
Q

What do you understand by the Civil Evidence Act 1995?

A

The Civil Evidence Act 1995 is an Act of Parliament that provides for the admissibility of hearsay evidence, the proof of certain documentary evidence and the admissibility and proof of official actuarial tables in civil proceedings1. The Act abolished the general rule that hearsay evidence would not be admissible, and set out the conditions and procedures for dealing with hearsay evidence in civil cases2. The Act is incorporated into the Civil Procedure Rules, which govern the conduct of civil litigation in England and Wales2.

25
Q

Are electronic signatures accepted by the Land Registry?

A

“Land Registry Digital Signatures
The Land Registry announced on 27th July 2020 that it will accept witnessed electronic signatures. This was a landmark date for all those looking to transfer ownership of a property, taking out leases, mortgages and other property related activities. It suddenly made it faster and easier for people to move homes with no more waiting around for signed hard copies of paperwork”

26
Q

What type of documents can electronic signatures be used for?

A

“Electronic signatures can be used to sign documents of all shapes and sizes, including:

Offer letters
Sales contracts
Permission slips
Rental/lease agreements
Liability waivers
Financial documents”

27
Q

What is data redundancy?

A

“In computer main memory, auxiliary storage and computer buses, data redundancy is the existence of data that is additional to the actual data and permits correction of errors in stored or transmitted …

Data redundancy refers to storing the same data in more than one place. This happens in nearly every business that doesn’t use a central database for all its data storage needs.

Data redundancy also allows for more efficient backups since it allows backing up exactly what needs to be backed up instead of everything all at once.

This process is extremely important in networks as losing even one bit of data can result in the loss of entire networks. This concept was first introduced in IBM’s Personal Computer in 1981.”

28
Q

What is VLOOKUP used for?

A

Use VLOOKUP when you need to find things in a table or a range by row. For example, look up a price of an automotive part by the part number, or find an employee name based on their employee ID

29
Q

What is a pivot table?

A

A pivot table is a summary toolthat wraps up or summarizes information sourced from bigger tables. These bigger tables could be a database, an Excel spreadsheet, or any data that is or could be converted in a table-like form. The data summarized in a pivot table might include sums, averages, or other statistics

30
Q

Can you tell me three principles of UK GDPR and the Data Protection Act 2018?

A

“The Data Protection Act 2018 is the UK’s implementation of the General Data Protection Regulation (GDPR)1. It outlines several data protection principles that organizations must follow when using personal data12. Here are three of them:

Lawfulness, fairness, and transparency: Personal data must be used fairly, lawfully, and transparently. Organizations should provide individuals with information about how their data will be used.

Purpose limitation: Personal data should only be collected for specified, explicit purposes. Organizations should clearly define the purposes for which they are collecting data and ensure that it is not used for other purposes without proper justification.

Data minimization: Organizations should only collect and process personal data that is necessary for the specified purposes. They should avoid collecting excessive or irrelevant data.

These principles are designed to protect individuals’ privacy and ensure that their personal data is handled responsibly and securely12.”

31
Q

How do you comply with UK GDPR and the Data Protection Act 2018 in your role?

A

The data we hold for tenants is soley in coneection with their lease agreements. If a tenants wishes to have their personal contact details held on a waiting list, this is done theough written consent which is held on file.

32
Q

What is ransomware

A

a type of malicious software designed to block access to a computer system until a sum of money is paid:

33
Q

What is another name for CEO fraud

A

CEO fraud is a type of fraud that involves pretending to be a senior manager or executive in order to persuade a staff member to make a payment or divulge confidential information. It is also known as Business Email Compromise (BEC), executive impersonation, or whaling

34
Q

What % of data breaches is it estimatedthat a company’s own employees may account for

A

50%

35
Q

copyright can be licensed, assigned, or transferred

A

“Yes, copyright can be licensed, assigned, or transferred. Licensing is a contractual agreement between the copyright owner and the user, which sets out what the user can do with the copyrighted work. The license can be exclusive or nonexclusive and can be limited in time or any other way1. Licensing allows the copyright owner to retain ownership of the work while granting others permission to use it under certain conditions12.

On the other hand, assigning or transferring copyright involves transferring ownership of the work from one party to another. This can be done through a written agreement, such as a contract, where the copyright owner permanently transfers their rights to another person or entity1. Once assigned, the new owner has exclusive rights to use and control the copyrighted work1.”

36
Q

what is the The Data Protection Bill

A

“The Data Protection Bill will give people more control over their data, support businesses in their use of data, and prepare Britain for Brexit.

37
Q

What do the Privacy and Electronic Communications Regulations 2003 (amended 2016) relate to

A

The Privacy and Electronic Communications Regulations (PECR) are UK laws that regulate the security and confidentiality of marketing communications and the use of cookies and similar technologies for UK consumers. They are based on the EU ePrivacy Directive and sit alongside the Data Protection Act and the UK GDPR. They give people specific privacy rights in relation to electronic communications, such as marketing calls, emails, texts and faxes.

38
Q
A
39
Q
A