Data Management Flashcards

1
Q

What should be considered when sourcing data?

A

When accessing data, it is essential to consider the reliability of the source and associated risks; where possible, you should verify data against an alternative source through ‘triangulation’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is triangulation?

A

Triangulation in data management refers to a research strategy where multiple datasets, methods / theories, investigations are used to address a research question.

By doing so, researchers aim to enhance the validity and credibility of their findings and mitigate any potential research biases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Ballymore’s data protection protocols?

A

It is essential that data is kept safe from corruption and that access to it is suitably controlled to ensure privacy and protection.

At Ballymore we have:
- Regular software updates to ensure the latest security & anti-virus software
- Staff training with spotting Phishing emails (spam)
- Password protection for data systems (IFS)
- VPN & two-factor authentication requirement when working remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Copyrights?

A
  • A set of exclusive rights granted to the author or creator of any original work, including the right to copy.
  • These rights can be licences, assigned, or transferred.
  • Form of intellectual property.
  • Crown Copyright refers to all material created and prepared by the Government e.g., laws, public records, official press releases etc.
  • It is essential to acknowledge any copyright for information duplicated in your work.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the UK General Data Protection Regulation and the Data Protection Act 2018

A

DPA (Data protection Act 2018) controls how personal information is used by organisations, businesses or government

DPA is the UKs implementation of the GDPR

The EUs GDPR no longer applies in the UK, but was almost entirely transcribed into the UK GDPR in 2016. It is covered by the Data Protection Act 2018.
- Aims to create a single data protection regime affecting businesses, and empower individuals to take control of how their data is used by third parties.
- It gives people rights to be informed about how their personal information is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the key requirements and penalties for non compliance?

A

Requirements:
- Obligation to conduct data protection impact assessments for high risk holding of data.
- New rights for individuals to have access to info on what personal data is held and to have it erased.
- Data controller decides how / why personal data is processed and is directly responsible for GDPR
- New principle of ‘data accountability’ ensuring that organisations can prove to the Information Commissioner’s Office (ICO) how they comply with the new regulations.
- Data security breaches need to be reported to ICO within 72 hours where there is a loss of personal data and a risk of harm to individuals.
- Fines up to 4% global turnover of the company or £17.5m (whichever greater)
- Policed by ICO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the principles of the UK GDPR?

A
  • Information processed lawfully, fairly and transparently
  • Collected for specified, explicit, and legitimate purposes
  • Adequate, relevant and limited to necessity
  • Accurate (kept up to date). Erase inaccurate data.
  • Kept no longer than necessary
  • Processed in a safe manner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 8 Individual Rights under UK GDPR?

A
  1. Right to be informed
  2. Right to access
  3. Right to rectification
  4. Right to erasure
  5. Right to restrict processing
  6. Right to data portability
  7. Right to object
  8. Right to automated decision making and profiling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Freedom of Information Act 2000?

A

Gives individuals right of access to information held by public bodies.
- The public body must tell any individual requesting sight of information whether it holds it.
- Normally the public body is required to supply it in 20 working days in the format requested.
- It can charge for the provision of the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Non-Disclosure Agreement (NDA)?

A
  • A legally enforceable contract between two parties relating to sensitive information.
  • The agreement will create a confidential relationship between info holder and person with access
  • The party that was harmed by the breach of the NDA can take legal action to enforce the agreement and seek damages for any losses
  • The duration of NDAs typically range from 1-5 years (circumstances dependent)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What would you do if there was a data security breach and what are the penalties for breaching the Data Protection Act 2018?

A

If there was a data security breach, I would inform the ICO within 72 hours.

The penalty for breaches are either 4% of the global turnover, or £17.5m, whichever is greater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 key benefits of a cloud based storage system?

A
  1. Information is backed up securely on encrypted servers.
  2. Accessibility can be managed via online settings.
  3. It is more convenient and environmentally friendly to share files online rather than sending phsyical copies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who are the key persons outlined within GDPR?

A

Controller
Person or enitity that determines the purposes and means of processing of personal data (e.g., when processing an employee’s personal data, the employer is considered to be the ‘controller’).
BALLYMORE IT

Processor
Person or entity that processes personal data on behalf of the controller (e.g., a call centres acting on behalf of its client) is considered to be a processor. At time, a processor is also called a third party.
ME!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If two separate departments within your firm were working for two rival companies, how would you ensure client sensitive data was managed?

A
  1. Make client aware of the risks
  2. Conflict of interest
  3. NDAs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What must companies put in place to ensure GDPR compliance?

A
  • Raise awareness across your business.
  • Audit all personal data.
  • Update your privacy notice.
  • Review your procedures supporting individuals’ rights.
  • Identify and document your legal basis for processing personal data under GDPR.
  • Review how you seek, obtain and record consent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the principles of data management

A
  1. Accuracy, consistency and reliability.
  2. Transparency and trust
  3. Accountability - data ownership
  4. Storage limitation
  5. Confidentiality
17
Q

When was DPA introduced?

A

25th May 2018

18
Q

What constitutes personal data?

A

Information relating to a person to identify that person

e.g. names, photo, email, bank details, IP address

19
Q

How have consent conditions been strengthened under GDPR?

A

Consent must be given with the purpose for data procesing attached to that consent
- Consent must be clear and indistinguishable from other matters and provided in an intelligible and easily accesible form, using clear and plain language
- It must be as easy to withdraw consent as it is to give it

20
Q

What is a data protection officer?

A

An individual appointed to monitor internal compliance, inform and advise on an organisations’ data protection obligations

Only required if organisation is a public body or authority or if the organisation carries out certain types of processing activities

21
Q

What are the RICS best practice points for compliance with GDPR?

A
  • Conduct data reviews to understand risks
  • Anonymise data where posisble
  • Encrypt where possible
  • Create breach policy response
  • Treat commercial data as personal data (even though not covered under GDPR)
  • Understand data processes
22
Q

What is RICS best practice recommendations for using confidential information?

A
  • Think whether the info is personal or confidential
  • Keep a record of consent for processing, storage and retention
23
Q

What is requried for a Land Registry Compliant Plan

A

Drawn to scale of 1:100 or 1:200
Have a scale measurement bar
Have the scale noted on a plan
Include a 1:1250 scale map of the location
Full address
North point
Demise in red outline

24
Q

How do you comply with GDPR in your role?

A

I report suspected breaches
I do not give out confidential or personal information
I keep records of consent for processing, storing and retaining data
I understand the information we hold that is protected by GDPR

25
Q

What is encryption

A

tool that encodes data so that only authorised users can access

26
Q

What is a fire wall

A

Network security system that monitors and controls incoming and outcgoing network traffic based on predetermined security rules

27
Q

Give me an example of a property information tool

A

BIM (Building Information Modelling)

28
Q

Give me an example of how you ensure thatdata is kept securely

A

Unique password & VPN

29
Q

What are the risks of data being lost/breached

A
  • Financial cost to the company
  • Sensitive or confidential data being leaked
30
Q

What is BIM (Building Information Modelling) and why is it used

A

A digital process that integrates multi-disciplinary data. Provides a comprehensive representation of the physical and functional characteristics of a project.

BIM data can be used throughout the lifecycle of a building, from design and construction to operation and maintenance, ensuring efficient management of the asset

31
Q

ADGMPRRSS

What is the Equality Act (2010)
and what are the 9 protected characteristics?

A

The Equality Act 2010 makes it illegal to discriminate against people based on certain characteristics

  1. Age
  2. Disability
  3. Gender Reassignment
  4. Marriage and Civil Partnership
  5. Pregnancy
  6. Race
  7. Religion
  8. Sex
  9. Sexual Orientation

Aism to ensure that everyone has equal access to opportunities and protection, both in workplace and in wider society

32
Q

why is a team made of individuals from different backgrounds more likely to be an effective team

A

Diversity of perspectives and problem-solving tehcniques.
Think outside the box
Challenge each other’s ideas

33
Q

What is unconscious bias?

A

A prejudice or stereotype individuals hold about certain groups of people that they aren’t consciously aware of having.

34
Q

What is approved Part M?

A

Part ‘M’ of building regulations sets out minimum standards for building design to ensure tha tbuildings are accessible to all individuals

  • Ease of access to, and use of buildings (ramps, lifts, clear signage..)
35
Q
A