Data Management Flashcards
What are the key requirements of Data protection act?
Conduct data protection impact assessment for high risk holding of data.
‘Data accountability’ businesses proving to ICO how they comply with regulations.
Have a ‘controller’ decides how and why personal data is processed and directly responsible for GDPR.
report breach to ICO in 72 hours
Why were the regulations consolidated?
Create a single data protection regime affecting businesses and empower individuals to learn how and why their data is processed by businesses.
What are your company’s compliance procedures?
All our data is in a secure filing system, only accessible by password protected computers.
When the information is no longer needed the data is removed
What are the key principles of the data protection act?
Purpose limitation
Accountability
Integrity and Confidentiality
Data minimisation
Storage limitation
Accuracy
Lawfulness
What are the individual rights of GDPR?
- Right to be informed.
- Right to access.
- Right to amend.
- Right to erase.
- Right to portability
- Right to restrict process
- Right to object.
- Right to automated decision making.
What databases have you used?
CoStar.
Agent Insight.
What are the limitations of these databases?
Relies on third party information, need to check the information is correct
How do you ensure the information is kept up to date?
Verify data with parties involved in the transaction.
E.g. if unit was u/o, would ask in the future if the sale was completed.
What does it mean to be GDPR compliant?
Your business’s processes are in line with GDPR.
If you collate information from various sources, how would you store this data to allow for easy analysis?
I would keep in our online filing system on a clearly name file in the appropriate project that it relates to.
How can you keep data stored securely?
On a filing system only accessible from our password protected computers.
Key Principles of Data Protection Act
Act lawfully
Limit data for purpose
Remove data when finished
Process data securely
Data Protection Act Purpose
gives people right to be informed on how their data is processed
How long can you store data?
Only as long as it is necessary to do so.
Minimum of six years.
How did you provide advice on data security?
Name another time you recommended data and security? What system?
Propman (Detail propman system, what security it provided and services)
How do you comply with UK GDPR when dealing with mailing lists?
Obtain consent from those who are to receive the marketing list.
How would you request data from a public body?
You would submit a Freedom of Information request in writing. FOI Act 2000.
How do you request your personal information from a public authority?
Subject Access Request
How long does an organisation have to respond?
Within 20 working days.
What are the exemptions to the freedom of information act?
- Contrary to GDPR requirements
- if it would prejudice a criminal matter under investigation
- Or someone’s personal information.
Why was data management storage essential when providing a reliable service?
Propman. Rent collection, RR dates, upcoming lease events
How did you verify data against another source
Triangluation. Speaking with other agents to confirm rents.
What is Copyright
Set of exclusive rights granted to author or creator of original work.
Form of intellectual property.
Who polices the data protection act
The information commissioners office and enforcement
What replaced the data protection act 1998
UK GDPR supplemented by the Data Protection Act 2018.
Relates to personal data.
What are the fines for data breaches
Up to 4% global turnover of the company or up to 20 million euros, whichever is greater.
Policed by ICO
What is the aim of UK GDPR supplemented by Data Proteciton Act 2018
Aims to create single data protection regime affecting business and empower individuals to take control of how their data is used by 3rd parties
What is personal data?
All data from which a living person is identified or identifiable
What can you tell me about data security
Relates to preventing breaches
Data retention, handling and security
CAs, NDA’s CDA’s