Data Management Flashcards

1
Q

What are the data act responsibilities regarding the information?

A
  • Used fairly, lawfully and transparently
  • Used for specified, explicit purposes
  • Used in a way that is adequate, relevant and limited to only what is necessary
  • Accurate and, where necessary is kept up to date.
  • Kept for no longer than is necessary.
  • Handled in a way that ensures appropriate security, including protection against. unlawful or unauthorised processing, access, loss, destruction or damage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where is there stronger legal protection for more sensitive information?

A
  • Race
  • Ethical background
  • Pollical opinions
  • Religious beliefs
  • Trade union membership
  • Genetics
  • Health
  • Sex life or orientation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is triangulation?

A

Means using multiple datasets, methods, theories and/or investigators to address a research question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When would you use Triangulation?

A

Landstack / EA flooding / Historic England / Local plan policy map for constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is internal information?

A

Information we share within our team and office within the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is external information?

A

o EG
o Land Reg
o Clients Info
LandInisght

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can data security technologies include and how can security of data technology be improved?

A
  • Firewalls
  • Encryptions
  • Password Protection
  • Use of anti virus software protection
  • Regular back ups off site
  • PDF – read only copies should be sent so they cannot be altered – this shows accountability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Stonebond do and what are actions in your company / office to ensure the security of data?

A
  • When we log into our systems – we have to authenticate it – using the Microsoft authentication which is connected to our phone. Meaning you cannot access our system without verification every day.
  • Always have passwords to get into every computer
  • Passwords for folders and only people working on them have passwords for those sites etc.
  • Always shred paper when finished / try and become more paperless.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is security so important?

A

To protect against:
- Unlawful proceedings
- Access
- Loss
- Destruction
- Damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a non-disclosure agreement?

A

NDA is also known as a confidentiality agreement.

It is a legally binding contact that establishes confidential relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are there any exemptions when you can release personal data?

A

Yes.
* If it would prejudice a criminal investigation.
* Contrary to GDPR Requirements
* Prejudice a person/organisation commercial interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you make sure to keep up to date with agreements etc?

A

Private diary reminds for who is working on that project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What would you do if sensitive information?

A

Act in accordance with data protection act
* Then just what was in my head.
* 4 closed walls
* Password protected
* Speak to that client how would they like to be communicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an SAR?

A

Subject Access Request - Demand that the individual be given all the information that a company holds on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the Data Protection Act do?

A
  • Makes our data protection laws fit for the digital age when an ever increasing amount of data is being processed.
  • Empowers people to take control of their data.
  • Supports UK business and organisations through this change.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key Requirements under the Data Protection Act are?

A
  • An obligation to conduct data protection impact assessments for high risk holding of data.
  • New rights for individuals to have access to information on what personal data is held and to have it erased.
  • A data controller decides how and why personal data is processed and is directly responsible for GDPR.
17
Q

What happens if there is a Data Security Breach?

A

Data Security Breaches need to be reported to the ICO – Information Commissioners Office.
This needs to happen within 72 hours – when there is a loss of personal data and a risk of harm to individuals.

18
Q

Who is the Data Protection Act policed by?

A

The Information Commissioners Office

19
Q

What are the fines / punishments?

A

An increase in fines to up to 4% global turnover of the company or 17.5 million euros (whichever is the greater).

20
Q

What are the principles of GDPR – in relation to the storage of personal data?

A

1) Processed lawfully, fairly and transparently.
2) Collected for specified and legitimate purpose.
3) Relevant and limited to what is necessary of the purpose for which they are processed.
4) Accurate and where necessary kept up to date.
5) kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed.
6) processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures.

21
Q

What are the 8 Individual Rights Under GDPR?

A

1) Right of Access
2) Right of Automated Decision Making
3) Right to be Informed
4) Right to Object
5) Right to Data Portability
6) Right to Removal
7) Right to Rectification
8) Right to Restrict Processing